Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

Extended Collaboration Description Language (X-Codl), Jia Zhang Sep 2006

Extended Collaboration Description Language (X-Codl), Jia Zhang

Jia Zhang

No abstract provided.


Ubiquitous Provision Of Context Aware Web Services, Irene Chen, Stephen Yang, Jia Zhang Aug 2006

Ubiquitous Provision Of Context Aware Web Services, Irene Chen, Stephen Yang, Jia Zhang

Jia Zhang

No abstract provided.


Fault Injection-Based Test Case Generation For Soa-Oriented Software, Jia Zhang, Robin Qiu May 2006

Fault Injection-Based Test Case Generation For Soa-Oriented Software, Jia Zhang, Robin Qiu

Jia Zhang

No abstract provided.


The Tablet Pc For Faculty: A Pilot Project, Rob Weitz, Bert Wachsmuth, Danielle Mirliss Dec 2005

The Tablet Pc For Faculty: A Pilot Project, Rob Weitz, Bert Wachsmuth, Danielle Mirliss

Bert Wachsmuth

This paper describes a pilot project with the purpose of evaluating the usefulness of tablet PCs for university professors. The focus is on the value of tablets primarily with respect to teaching and learning (and not for research or administrative work). Sixty-four professors, distributed across the various schools of a university, were provided with tablet PCs and were trained in their use.


Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara Dec 2005

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara

Qing Hu

With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …