Sciweavers

549 search results - page 34 / 110
» Belief-Based Risk Analysis
Sort
View
ICEBE
2007
IEEE
151views Business» more  ICEBE 2007»
15 years 6 months ago
Systematic Security Analysis for Service-Oriented Software Architectures
Due to the dramatic increase in intrusive activities architecture security analysis and design has emerged as an important aspect of the development of software services. It is a ...
Yanguo Liu, Issa Traoré
SEKE
2007
Springer
15 years 6 months ago
Requirement Analysis Evolution through Patterns
This paper presents a strategy, based on requirement patterns (RP), aimed at improving the requirement analysis discipline by allowing business analysts (BA) to produce more relia...
Luca Vetti Tagliati, Roger Johnson, George Roussos
ICIP
2008
IEEE
16 years 1 months ago
Game-theoretic analysis of maximum-payoff multiuser collusion
Multiuser collusion is an effective attack against traitor-tracing multimedia fingerprinting, where a group of attackers collectively mount attacks to reduce their risk of being d...
H. Vicky Zhao, Wan-Yi Sabrina Lin, K. J. Ray Liu
TITB
2002
98views more  TITB 2002»
14 years 11 months ago
Fetal lung maturity analysis using ultrasound image features
This pilot study was carried out to find the feasibility of analyzing the maturity of the fetal lung using ultrasound images. Data were collected from normal pregnant women at inte...
K. N. Bhanu Prakash, A. G. Ramakrishnan, S. Suresh...
NIPS
2001
15 years 1 months ago
On the Generalization Ability of On-Line Learning Algorithms
In this paper, it is shown how to extract a hypothesis with small risk from the ensemble of hypotheses generated by an arbitrary on-line learning algorithm run on an independent an...
Nicolò Cesa-Bianchi, Alex Conconi, Claudio ...