Sciweavers

331 search results - page 39 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
EDBTW
2010
Springer
15 years 5 months ago
Expressing privacy metrics as one-symbol information
Organizations often need to release microdata without revealing sensitive information. To this scope, data are anonymized and, to assess the quality of the process, various privac...
Michele Bezzi
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
15 years 5 months ago
E-File Adoption: A Study of U.S. Taxpayers' Intentions
In the United States, congress has set goals for the diffusion of e-government initiatives. One of congressÂ’ goals for 2007 was for 80% of tax and informational returns to be fil...
L. Christian Schaupp, Lemuria Carter, Jeff Hobbs
HICSS
2007
IEEE
132views Biometrics» more  HICSS 2007»
15 years 5 months ago
Complex Interacting Infrastructure Systems
Critical infrastructures have some of the characteristic properties of complex systems. They exhibit infrequent large failures events. These events, though infrequent, often obey ...
Ian Dobson
SCS
2001
15 years 13 days ago
Software Safety: Where's the Evidence?
Standards for safety critical software usually either mandate or recommend development and assessment techniques which are deemed appropriate to reduce the risk of flaws in the so...
John A. McDermid
ESANN
2008
15 years 15 days ago
A method for robust variable selection with significance assessment
Our goal is proposing an unbiased framework for gene expression analysis based on variable selection combined with a significance assessment step. We start by discussing the need ...
Annalisa Barla, Sofia Mosci, Lorenzo Rosasco, Ales...