Sciweavers

405 search results - page 2 / 81
» Avatar-centric Risk Evaluation
Sort
View
HICSS
2009
IEEE
213views Biometrics» more  HICSS 2009»
14 years 2 days ago
AURUM: A Framework for Information Security Risk Management
—As companies are increasingly exposed to a variety of information security threats, they are permanently forced to pay attention to security issues. Risk management provides an ...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer
ASIASIM
2004
Springer
13 years 10 months ago
A Security Risk Analysis Model for Information Systems
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo M...
JAMDS
2002
80views more  JAMDS 2002»
13 years 5 months ago
Calculation of steady-state probabilities of M/M queues: further approaches
This paper draws attention to the risk of rounding error in the numerical evaluation of steady-state probabilities for the M/M family of queues. A method for avoiding the risk is p...
David K. Smith
ICML
2010
IEEE
13 years 6 months ago
Unsupervised Risk Stratification in Clinical Datasets: Identifying Patients at Risk of Rare Outcomes
Most existing algorithms for clinical risk stratification rely on labeled training data. Collecting this data is challenging for clinical conditions where only a small percentage ...
Zeeshan Syed, Ilan Rubinfeld
WSC
2001
13 years 6 months ago
Modeling risk in the dynamic environment of maritime transportation
The Washington State Ferries are one of the largest ferry systems in the world. Accidents involving Washington State Ferries are rare events. However, low probability, high conseq...
Jason R. W. Merrick, J. René van Dorp, Thom...