Sciweavers

587 search results - page 100 / 118
» Towards a Reference Process Model for Event Management
Sort
View
ESORICS
2010
Springer
13 years 7 months ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
SIGOPSE
2004
ACM
14 years 29 days ago
An approach to benchmarking configuration complexity
Configuration is the process whereby components are assembled or adjusted to produce a functional system that operates at a specified level of performance. Today, the complexity o...
Aaron B. Brown, Joseph L. Hellerstein
ICSE
2007
IEEE-ACM
14 years 1 months ago
Cost-Benefit Analysis of Software Development Techniques and Practices
Investigations of software development practices, processes, and techniques frequently report separately on the costs and benefits of a phenomenon under study, but rarely adequate...
Hakan Erdogmus
DOLAP
2009
ACM
14 years 2 months ago
A taxonomy of ETL activities
Extract-Transform-Load (ETL) activities are software modules responsible for populating a data warehouse with operational data, which have undergone a series of transformations on...
Panos Vassiliadis, Alkis Simitsis, Eftychia Baikou...
HICSS
2005
IEEE
95views Biometrics» more  HICSS 2005»
14 years 1 months ago
Understanding the Effect of Risk Aversion on Risk
As we progress, society must intelligently address the following question: How much risk is acceptable? How we answer this question could have important consequences for the futur...
U. S. Bhatt, David E. Newman, Benjamin A. Carreras...