Sciweavers

4923 search results - page 64 / 985
» Software Risk Management
Sort
View
SACMAT
2011
ACM
12 years 11 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
CAISE
2008
Springer
13 years 10 months ago
Refactoring Process Models in Large Process Repositories
With the increasing adoption of process-aware information systems (PAIS), large process model repositories have emerged. Over time respective models have to be re-aligned to the re...
Barbara Weber, Manfred Reichert
JUCS
2006
74views more  JUCS 2006»
13 years 8 months ago
Pervasive Health Management and Health Management Utilizing Pervasive Technologies : Synergy and Issues
: Much development work is ongoing addressing technologies and their application in the health domain, in order to achieve solutions that are non-invasive to every day life and wor...
Jean Roberts
CLOUDCOM
2009
Springer
14 years 3 months ago
Cloudbus Toolkit for Market-Oriented Cloud Computing
This keynote paper: (1) presents the 21st century vision of computing and identifies various IT paradigms promising to deliver computing as a utility; (2) defines the architecture ...
Rajkumar Buyya, Suraj Pandey, Christian Vecchiola
ICC
2007
IEEE
14 years 3 months ago
On the Risk-Based Operation of Mobile Attacks in Wireless Ad Hoc Networks
—In this paper we study the propagation of malicious software in wireless ad hoc networks under a probabilistic framework. We design topology control algorithms for the developme...
Vasileios Karyotis, Symeon Papavassiliou, Mary Gra...