Sciweavers

549 search results - page 44 / 110
» Belief-Based Risk Analysis
Sort
View
JCIT
2008
102views more  JCIT 2008»
14 years 11 months ago
Architectural Patterns for Finding your
The paper discusses the innovative patterns such as subtraction, multiplication, division, task unification and attribute dependency change for evaluating the software architectur...
N. Sankar Ram, Paul Rodrigues
EMISA
2010
Springer
14 years 6 months ago
Investigating the Process of Process Modeling with Cheetah Experimental Platform
Abstract. When assessing the usability of BPM technologies enterprises have to rely on vendor promises or qualitative data rather than on empirical or experimental research. To add...
Jakob Pinggera, Stefan Zugal, Barbara Weber
CSB
2004
IEEE
135views Bioinformatics» more  CSB 2004»
15 years 3 months ago
Selection of Patient Samples and Genes for Outcome Prediction
Gene expression profiles with clinical outcome data enable monitoring of disease progression and prediction of patient survival at the molecular level. We present a new computatio...
Huiqing Liu, Jinyan Li, Limsoon Wong
SOUPS
2006
ACM
15 years 5 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
APSEC
2005
IEEE
15 years 5 months ago
An Industrial Case Study on Requirements Volatility Measures
Requirements volatility is an important risk factor for software projects. Software measures can help in quantifying and predicting this risk. In this paper, we present an industr...
Annabella Loconsole, Jürgen Börstler