The emergence of electronic commerce as a means of transacting business has led many firms to develop business models to take advantage of the opportunities that Internet technolo...
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
For many problems there is only suf£cient prior information for a Bayesian decision maker to identify a class of possible prior distributions. In such cases it is of interest to ...
This paper surveys the use of inferential statistics over the last two BCS HCI conferences and the last year (2006) of two leading HCI journals. Of the 80 papers covered, 41 used ...
Abstract--Randomization is a general technique for evaluating the significance of data analysis results. In randomizationbased significance testing, a result is considered to be in...