Sciweavers

405 search results - page 56 / 81
» Avatar-centric Risk Evaluation
Sort
View
BPM
2009
Springer
134views Business» more  BPM 2009»
15 years 4 months ago
Business Process-Based Resource Importance Determination
Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources’ importance in the overall organizational context. Alt...
Stefan Fenz, Andreas Ekelhart, Thomas Neubauer
AUTOMOTIVEUI
2009
ACM
15 years 4 months ago
Acceptance of future persuasive in-car interfaces towards a more economic driving behaviour
Measuring user acceptance to avoid system rejection by the users in pre-prototype stage of product development is of high interest for both researchers and practitioners. This is ...
Alexander Meschtscherjakov, David Wilfinger, Thoma...
SOUPS
2009
ACM
15 years 4 months ago
Conditioned-safe ceremonies and a user study of an application to web authentication
We introduce the notion of a conditioned-safe ceremony. A “ceremony” is similar to the conventional notion of a protocol, except that a ceremony explicitly includes human part...
Chris Karlof, J. D. Tygar, David Wagner
DASFAA
2008
IEEE
105views Database» more  DASFAA 2008»
15 years 4 months ago
Redundant Array of Inexpensive Nodes for DWS
The DWS (Data Warehouse Striping) technique is a round-robin data partitioning approach especially designed for distributed data warehousing environments. In DWS the fact tables ar...
Jorge Vieira, Marco Vieira, Marco Costa, Henrique ...
IRI
2008
IEEE
15 years 4 months ago
Model check stochastic supply chains
—Supply chain [2], [6] is an important component of business operations. Understanding its stochastic behaviors is the key to risk analysis and performance evaluation in supply c...
Li Tan, Shenghan Xu