Sciweavers

549 search results - page 72 / 110
» Belief-Based Risk Analysis
Sort
View
AMC
2006
91views more  AMC 2006»
14 years 12 months ago
Lateral load estimation from visco-plastic mud-flow around cylindrical row of piles
In this paper, the influence of slow and creeping flow of mud/slurry is modelled as a visco-plastic fluid around cylindrical row of piles. The study is carried out theoretically u...
Seyhan Firat, Mehmet Saribiyik, Erkan Çeleb...
IJMC
2007
40views more  IJMC 2007»
14 years 11 months ago
Valuing wireless data services solutions for corporate clients using real options
: The paper deals with wireless data services and their importance in the enterprise world. Provisioning in difficult-to-reach areas of tall buildings is challenging. To extend cov...
William Ramirez, Fotios C. Harmantzis, Venkata Pra...
JIFS
2007
115views more  JIFS 2007»
14 years 11 months ago
Winner determination for combinatorial auctions for tasks with time and precedence constraints
We present a solution to the winner determination problem which takes into account not only costs but also risk aversion of the agent that accepts the bids, and which works for au...
Güleser K. Demir, Maria L. Gini
DSS
2000
107views more  DSS 2000»
14 years 11 months ago
MarketNet: protecting access to information systems through financial market controls
This paper describes novel market-based technologies that uniquely establish quantifiable and adjustable limits on the power of attackers, enable verifiable accountability for mal...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...
JOT
2010
113views more  JOT 2010»
14 years 10 months ago
SOA Web Security and Applications
entional vulnerability detection fails to extend its generic form to an abstract level in coping with particular type of string validation. Consequently the security bypasses key ...
Raymond Wu, Masayuki Hisada