Sciweavers

331 search results - page 55 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
ICEIS
2009
IEEE
15 years 5 months ago
AgEx: A Financial Market Simulation Tool for Software Agents
Many researchers in the software agent field use the financial domain as a test bed to develop adaptation, cooperation and learning skills of software agents. However, there are no...
Paulo André Lima de Castro, Jaime Sim&atild...
BPM
2009
Springer
134views Business» more  BPM 2009»
15 years 5 months ago
Business Process-Based Resource Importance Determination
Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources’ importance in the overall organizational context. Alt...
Stefan Fenz, Andreas Ekelhart, Thomas Neubauer
ICASSP
2008
IEEE
15 years 5 months ago
Blind optimization of algorithm parameters for signal denoising by Monte-Carlo SURE
We consider the problem of optimizing the parameters of an arbitrary denoising algorithm by minimizing Stein’s Unbiased Risk Estimate (SURE) which provides a means of assessing ...
Sathish Ramani, Thierry Blu, Michael Unser
IWPC
2008
IEEE
15 years 5 months ago
Evaluating the Reference and Representation of Domain Concepts in APIs
As libraries are the most widespread form of software reuse, the usability of their APIs substantially influences the productivity of programmers in all software development phas...
Daniel Ratiu, Jan Jürjens
WOWMOM
2006
ACM
195views Multimedia» more  WOWMOM 2006»
15 years 5 months ago
Can I Add a Secure VoIP Call?
— Voice over IP is a major trend in applications for wireless networks, but even so it is not immune to the risks usually related with IP networks. Proposed solutions for VoIP se...
Arlen Nascimento, Alexandre Passito, Edjair de Sou...