Sciweavers

405 search results - page 12 / 81
» Avatar-centric Risk Evaluation
Sort
View
CORR
2010
Springer
108views Education» more  CORR 2010»
14 years 9 months ago
Mining The Successful Binary Combinations: Methodology and A Simple Case Study
The importance of finding the characteristics leading to either a success or a failure is one of the driving forces of data mining. The various application areas of finding succes...
Yuval Cohen
EUSFLAT
2009
175views Fuzzy Logic» more  EUSFLAT 2009»
14 years 7 months ago
The Minimization of the Risk of Falling in Portfolios under Uncertainty
Abstract-- A portfolio model to minimize the risk of falling under uncertainty is discussed. The risk of falling is represented by the value-at-risk of rate of return. Introducing ...
Yuji Yoshida
DBSEC
2006
125views Database» more  DBSEC 2006»
14 years 11 months ago
Aspect-Oriented Risk Driven Development of Secure Applications
Abstract. Security breaches seldom occur because of faulty security mechanisms. Often times, security mechanisms are incorrectly incorporated in an application which allows them to...
Geri Georg, Siv Hilde Houmb, Indrakshi Ray
JUCS
2008
99views more  JUCS 2008»
14 years 9 months ago
A Normal Copula Model for the Economic Risk Analysis of Correlated Failures in Communications Networks
: The reliability of a communications network is often evaluated without taking into account the economic consequence of failures. Here a new approach is proposed to assess the eco...
Maurizio Naldi, Giuseppe D'Acquisto
FSMNLP
2005
Springer
15 years 3 months ago
Algorithms for Minimum Risk Chunking
Abstract. Stochastic finite automata are useful for identifying substrings (chunks) within larger units of text. Relevant applications include tokenization, base-NP chunking, name...
Martin Jansche