Sciweavers

331 search results - page 22 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
CORR
2006
Springer
70views Education» more  CORR 2006»
14 years 11 months ago
Scalable Algorithms for Aggregating Disparate Forecasts of Probability
- In this paper, computational aspects of the panel aggregation problem are addressed. Motivated primarily by applications of risk assessment, an algorithm is developed for aggrega...
Joel B. Predd, Sanjeev R. Kulkarni, Daniel N. Oshe...
HICSS
2011
IEEE
209views Biometrics» more  HICSS 2011»
14 years 2 months ago
A Risk Management Framework for Design Science Research
As a new and complex form of research, which combines very heterogeneous activities requiring different skills, Design Science Research (DSR) in IS has new and difficult areas of ...
Richard Baskerville, Jan Pries-Heje, John R. Venab...
JSSPP
2010
Springer
14 years 9 months ago
Risk Aware Overbooking for Commercial Grids
Abstract. The commercial exploitation of the emerging Grid and Cloud markets needs SLAs to sell computing run times. Job traces show that users have a limited ability to estimate t...
Georg Birkenheuer, André Brinkmann, Holger ...
JCS
2007
103views more  JCS 2007»
14 years 11 months ago
Risk management for distributed authorization
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...
EOR
2007
88views more  EOR 2007»
14 years 11 months ago
To ask or not to ask, that is the question
Applicants for credit have to provide information for the risk assessment process. In the current conditions of a saturated consumer lending market, and hence falling take rates, ...
Hsin-Vonn Seow, Lyn C. Thomas