Sciweavers

405 search results - page 14 / 81
» Avatar-centric Risk Evaluation
Sort
View
ICANN
2007
Springer
14 years 11 months ago
GARCH Processes with Non-parametric Innovations for Market Risk Estimation
Abstract. A procedure to estimate the parameters of GARCH processes with non-parametric innovations is proposed. We also design an improved technique to estimate the density of hea...
José Miguel Hernández-Lobato, Daniel...
93
Voted
ACL
2006
14 years 11 months ago
Minimum Risk Annealing for Training Log-Linear Models
When training the parameters for a natural language system, one would prefer to minimize 1-best loss (error) on an evaluation set. Since the error surface for many natural languag...
David A. Smith, Jason Eisner
SEAFOOD
2007
Springer
15 years 3 months ago
Questionnaire-Based Risk Assessment Scheme for Japanese Offshore Software Outsourcing
Abstract. As the volumes of software development increase and the cost reduction is required, most Japanese IT companies are interested in offshore software outsourcing. Although a...
Hiroshi Tsuji, Akito Sakurai, Kenichi Yoshida, Amr...
FC
2009
Springer
104views Cryptology» more  FC 2009»
15 years 4 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp
CCS
2009
ACM
15 years 10 months ago
Formalizing information security knowledge
Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper de...
Stefan Fenz, Andreas Ekelhart