Sciweavers

405 search results - page 16 / 81
» Avatar-centric Risk Evaluation
Sort
View
HICSS
2007
IEEE
150views Biometrics» more  HICSS 2007»
15 years 4 months ago
Security Ontologies: Improving Quantitative Risk Analysis
— IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-se...
Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, E...
ICC
2007
IEEE
15 years 4 months ago
On the Risk-Based Operation of Mobile Attacks in Wireless Ad Hoc Networks
—In this paper we study the propagation of malicious software in wireless ad hoc networks under a probabilistic framework. We design topology control algorithms for the developme...
Vasileios Karyotis, Symeon Papavassiliou, Mary Gra...
IPCCC
2006
IEEE
15 years 3 months ago
Risk reduction based survivable WDM network design
— This paper presents an investment strategy to reduce the risk associated with failures in Wavelength Division Multiplexing (WDM) optical networks. The investment strategy deter...
K. Vajanapoom, David Tipper
ER
2004
Springer
96views Database» more  ER 2004»
15 years 3 months ago
Risk-Driven Conceptual Modeling of Outsourcing Decisions
Abstract. In the current networked world, outsourcing of information technology or even of entire business processes is often a prominent design alternative. In the general case, o...
Pascal van Eck, Roel Wieringa, Jaap Gordijn
IJBRA
2007
97views more  IJBRA 2007»
14 years 9 months ago
Structural Risk Minimisation based gene expression profiling analysis
: For microarray based cancer classification, feature selection is a common method for improving classifier generalisation. Most wrapper methods use cross validation methods to eva...
Xue-wen Chen, Byron Gerlach, Dechang Chen, ZhenQiu...