Sciweavers

405 search results - page 2 / 81
» Avatar-centric Risk Evaluation
Sort
View
HICSS
2009
IEEE
213views Biometrics» more  HICSS 2009»
15 years 4 months ago
AURUM: A Framework for Information Security Risk Management
—As companies are increasingly exposed to a variety of information security threats, they are permanently forced to pay attention to security issues. Risk management provides an ...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer
ASIASIM
2004
Springer
15 years 3 months ago
A Security Risk Analysis Model for Information Systems
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo M...
JAMDS
2002
80views more  JAMDS 2002»
14 years 9 months ago
Calculation of steady-state probabilities of M/M queues: further approaches
This paper draws attention to the risk of rounding error in the numerical evaluation of steady-state probabilities for the M/M family of queues. A method for avoiding the risk is p...
David K. Smith
67
Voted
ICML
2010
IEEE
14 years 10 months ago
Unsupervised Risk Stratification in Clinical Datasets: Identifying Patients at Risk of Rare Outcomes
Most existing algorithms for clinical risk stratification rely on labeled training data. Collecting this data is challenging for clinical conditions where only a small percentage ...
Zeeshan Syed, Ilan Rubinfeld
75
Voted
WSC
2001
14 years 11 months ago
Modeling risk in the dynamic environment of maritime transportation
The Washington State Ferries are one of the largest ferry systems in the world. Accidents involving Washington State Ferries are rare events. However, low probability, high conseq...
Jason R. W. Merrick, J. René van Dorp, Thom...