Sciweavers

549 search results - page 94 / 110
» Belief-Based Risk Analysis
Sort
View
IFIPTM
2009
119views Management» more  IFIPTM 2009»
14 years 9 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
BCSHCI
2009
14 years 9 months ago
Personality traits, usage patterns and information disclosure in online communities
Online communities of different types have become an important part of the daily internet life of many people within the last couple of years. Both research and business have show...
Johann Schrammel, Christina Köffel, Manfred T...
BIBM
2010
IEEE
173views Bioinformatics» more  BIBM 2010»
14 years 9 months ago
Network-based identification of smoking-associated gene signature for lung cancer
This study presents a novel computational approach to identifying a smoking-associated gene signature. The methodology contains the following steps: 1) identifying genes significa...
Ying-Wooi Wan, Changchang Xiao, Nancy Lan Guo
JNCA
2011
123views more  JNCA 2011»
14 years 6 months ago
Empirical tests of anonymous voice over IP
Voice over IP (VoIP) is an important service on the Internet, and privacy for VoIP calls will be increasingly important for many people. Providing this privacy, however, is challen...
Marc Liberatore, Bikas Gurung, Brian Neil Levine, ...
EOR
2010
99views more  EOR 2010»
14 years 6 months ago
Expected gain-loss pricing and hedging of contingent claims in incomplete markets by linear programming
We analyze the problem of pricing and hedging contingent claims in the multi-period, discrete time, discrete state case using the concept of a sufficiently attractive expected gai...
Mustafa Ç. Pinar, Aslihan Salih, Ahmet Camc...