Sciweavers

954 search results - page 17 / 191
» Conditional Risk Mappings
Sort
View
IJSEKE
2011
141views more  IJSEKE 2011»
14 years 1 months ago
Risk Assessment in Multi-disciplinary (Software+) Engineering Projects
Software systems in safety-critical industrial automation systems, such as power plants and steel mills, become increasingly large, complex, and distributed. For assessing risks, l...
Stefan Biffl, Thomas Moser, Dietmar Winkler
COLING
1992
14 years 11 months ago
Planning To Fail, Not Failing To Plan: Risk-Taking And Recovery In Task-Oriented Dialogue
duplicate the route. The HCRC Dialogue Database [3] We hypothesise that agents who engage in task- contains 128 such dialogues; in this work we examined oriented dialogue usually t...
Jean Carletta
KES
2008
Springer
14 years 9 months ago
Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties
Abstract. Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-proces...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
15 years 3 months ago
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
— Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer beha...
Zhengqiang Liang, Weisong Shi
ICPP
2006
IEEE
15 years 3 months ago
Managing Risk of Inaccurate Runtime Estimates for Deadline Constrained Job Admission Control in Clusters
The advent of service-oriented Grid computing has resulted in the need for Grid resources such as clusters to enforce user-specific service needs and expectations. Service Level ...
Chee Shin Yeo, Rajkumar Buyya