Sciweavers

1412 search results - page 25 / 283
» The Value of Outsourced Software
Sort
View
DATE
2008
IEEE
100views Hardware» more  DATE 2008»
14 years 3 months ago
Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme
There have been serious concerns recently about the security of microchips from hardware trojan horse insertion during manufacturing. This issue has been raised recently due to ou...
Francis G. Wolff, Christos A. Papachristou, Swarup...
ICAI
2004
13 years 10 months ago
Task-Oriented Computational Economic-Based Distributed Resource Allocation Mechanisms for Computational Grids
In computational grids, heterogeneous resources with different ownerships are dynamically available and distributed geographically. It is not realistic to build the resource alloc...
Linli He, Thomas R. Ioerger
EUROMICRO
2006
IEEE
14 years 2 months ago
Value-Based Selection of Requirements Engineering Tool Support
In large software and systems engineering companies like Siemens PSE there are several requirements tools in use. There is no “one tool fits all projects/departments” solution...
Matthias Heindl, Franz Reinisch, Stefan Biffl, Ale...
METRICS
1999
IEEE
14 years 1 months ago
Measurements Should Generate Value, Rather than Data
Success factors for measurement programs as identified in the literature typically focus on the `internals' of the measurement program: incremental implementation, support fr...
Frank Niessink, Hans van Vliet
EDBTW
2006
Springer
14 years 12 days ago
Semantically Correct Query Answers in the Presence of Null Values
For several reasons a database may not satisfy a given set of integrity constraints (ICs), but most likely most of the information in it is still consistent with those ICs; and cou...
Loreto Bravo, Leopoldo E. Bertossi