Sciweavers

405 search results - page 46 / 81
» Avatar-centric Risk Evaluation
Sort
View
CIS
2008
Springer
14 years 11 months ago
A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks
Delivering continuous services in information infrastructures is a major challenge. For system or network administrators, redundancy allocation is one of the best strategies to en...
Frank Yeong-Sung Lin, Po-Hao Tsang, Kun-Dao Jiang
CRITIS
2008
14 years 11 months ago
Multi-level Dependability Modeling of Interdependencies between the Electricity and Information Infrastructures
The interdependencies between infrastructures may be the cause of serious problems in mission/safety critical systems. In the CRUTIAL3 project the interdependencies between the ele...
Marco Beccuti, Giuliana Franceschinis, Mohamed Ka&...
COLING
2008
14 years 11 months ago
Bayes Risk-based Dialogue Management for Document Retrieval System with Speech Interface
We propose an efficient dialogue management for an information navigation system based on a document knowledge base with a spoken dialogue interface. In order to perform robustly ...
Teruhisa Misu, Tatsuya Kawahara
FECS
2007
86views Education» more  FECS 2007»
14 years 11 months ago
Providing Experiential Learning Through Transnational Teamwork
- The requirement for high standards of professionalism in graduating Computer Science and Information Technology students suggests the applicability of experiential learning. This...
Kirsten Wahlstrom, Susan Tyerman, Rebecca Witt, Ky...
CSREASAM
2006
14 years 11 months ago
Secure E-commerce Protection Profile
We present a Secure E-commerce Protection Profile (SEPP) that captures security requirements for securing sessions in the e-commerce operational environment. The SEPP is prepared ...
Anil Kumar Venkataiahgari, Mourad Debbabi, J. Will...