Sciweavers

1412 search results - page 59 / 283
» The Value of Outsourced Software
Sort
View
ICCBSS
2003
Springer
14 years 2 months ago
Estimating the Cost of Security for COTS Software
Abstract. This paper describes enhancements being made to the University of Southern California’s COnstructive COTS (COCOTS) integration cost model to address security concerns. ...
Donald J. Reifer, Barry W. Boehm, Murali Gangadhar...
MOBISYS
2005
ACM
14 years 8 months ago
Energy efficiency of handheld computer interfaces: limits, characterization and practice
Energy efficiency has become a critical issue for battery-driven computers. Significant work has been devoted to improving it through better software and hardware. However, the hu...
Lin Zhong, Niraj K. Jha
WWW
2010
ACM
14 years 3 months ago
Money, glory and cheap talk: analyzing strategic behavior of contestants in simultaneous crowdsourcing contests on TopCoder.com
Crowdsourcing is a new Web phenomenon, in which a firm takes a function once performed in-house and outsources it to a crowd, usually in the form of an open contest. Designing ef...
Nikolay Archak
SIGMETRICS
2004
ACM
124views Hardware» more  SIGMETRICS 2004»
14 years 2 months ago
Interposed proportional sharing for a storage service utility
This paper develops and evaluates new share-based scheduling algorithms for differentiated service quality in network services, such as network storage servers. This form of resou...
Wei Jin, Jeffrey S. Chase, Jasleen Kaur
TRUST
2010
Springer
14 years 1 months ago
Token-Based Cloud Computing
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure cryptographic solutions based on fully homomorphic and verifia...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel ...