Sciweavers

33 search results - page 5 / 7
» Understanding the Effect of Risk Aversion on Risk
Sort
View
IWRT
2008
109views Communications» more  IWRT 2008»
13 years 6 months ago
Classification of RFID Attacks
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Altho...
Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew ...
ACSAC
2009
IEEE
13 years 11 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
CAISE
2008
Springer
13 years 6 months ago
Refactoring Process Models in Large Process Repositories
With the increasing adoption of process-aware information systems (PAIS), large process model repositories have emerged. Over time respective models have to be re-aligned to the re...
Barbara Weber, Manfred Reichert
NIPS
2007
13 years 6 months ago
Structured Learning with Approximate Inference
In many structured prediction problems, the highest-scoring labeling is hard to compute exactly, leading to the use of approximate inference methods. However, when inference is us...
Alex Kulesza, Fernando Pereira
IJHCI
2010
110views more  IJHCI 2010»
13 years 3 months ago
Images of Usability
The term usability is ubiquitous in human-computer interaction, so much so that it is commonly used without definition. Rather than one established meaning of usability, there are,...
Morten Hertzum