Sciweavers

390 search results - page 37 / 78
» The Factors that Affect the Implementation Success of IS
Sort
View
ATAL
2005
Springer
14 years 2 months ago
Negotiating agents: from full autonomy to dynamic degrees of delegation
The modularization of negotiating agents as proposed by the C-IPS approach provides a sound base for a concept that we call dynamic degrees of delegation. Agents following this co...
Diemo Urbig, Kay Schröter
KDD
2010
ACM
199views Data Mining» more  KDD 2010»
14 years 19 days ago
Overlapping experiment infrastructure: more, better, faster experimentation
At Google, experimentation is practically a mantra; we evaluate almost every change that potentially affects what our users experience. Such changes include not only obvious user-...
Diane Tang, Ashish Agarwal, Deirdre O'Brien, Mike ...
ARESEC
2011
145views more  ARESEC 2011»
12 years 8 months ago
An Attribute Based Framework for Risk-Adaptive Access Control Models
—The concept of risk-based adaptive access control (RAdAC, pronounced Raid-ack) has been recently introduced in the literature. It seeks to automatically (or semi-automatically) ...
Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipat...
ACSAC
2006
IEEE
14 years 2 months ago
Known/Chosen Key Attacks against Software Instruction Set Randomization
Instruction Set Randomization (ISR) has been proposed as a form of defense against binary code injection into an executing program. One proof-of-concept implementation is Randomiz...
Yoav Weiss, Elena Gabriela Barrantes
FASE
2006
Springer
14 years 12 days ago
Trace-Based Memory Aliasing Across Program Versions
One of the major costs of software development is associated with testing and validation of successive versions of software systems. An important problem encountered in testing and...
Murali Krishna Ramanathan, Suresh Jagannathan, Ana...