Sciweavers

331 search results - page 32 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
ICEIS
2008
IEEE
15 years 5 months ago
Internal Fraud Risk Reduction - Results of a Data Mining Case Study
Corporate fraud these days represents a huge cost to our economy. Academic literature already concentrated on how data mining techniques can be of value in the fight against frau...
Mieke Jans, Nadine Lybaert, Koen Vanhoof
73
Voted
IPPS
2007
IEEE
15 years 5 months ago
Integrated Risk Analysis for a Commercial Computing Service
Utility computing has been anticipated to be the next generation of computing usage. Users have the freedom to easily switch to any commercial computing service to complete jobs w...
Chee Shin Yeo, Rajkumar Buyya
94
Voted
ICPP
2008
IEEE
15 years 5 months ago
On the Design of Fast Pseudo-Random Number Generators for the Cell Broadband Engine and an Application to Risk Analysis
Numerical simulations in computational physics, biology, and finance, often require the use of high quality and efficient parallel random number generators. We design and optimi...
David A. Bader, Aparna Chandramowlishwaran, Virat ...
84
Voted
ISM
2005
IEEE
159views Multimedia» more  ISM 2005»
15 years 4 months ago
Avatar-centric Risk Evaluation
Hazard detection and prevention of natural and manmade disasters at critical civil infrastructure is becoming increasingly important. Recent events, such as earthquakes and terror...
Maria-Cruz Villa-Uriol, Falko Kuester, Oscar Garc&...
91
Voted
WSC
2007
15 years 1 months ago
Simulating pandemic influenza risks of US cities
We describe the spatial Agent-Based Computational Laboratory that we have developed to study the pandemic influenza risks of US cities. This research presented a series of interes...
Catherine Dibble, Stephen Wendel, Kristofor Carle