Sciweavers

9841 search results - page 127 / 1969
» Distributed Value Functions
Sort
View
BDIM
2008
IEEE
141views Business» more  BDIM 2008»
14 years 12 months ago
IT confidentiality risk assessment for an architecture-based approach
Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic as...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul...
JMLR
2006
87views more  JMLR 2006»
14 years 10 months ago
Second Order Cone Programming Approaches for Handling Missing and Uncertain Data
We propose a novel second order cone programming formulation for designing robust classifiers which can handle uncertainty in observations. Similar formulations are also derived f...
Pannagadatta K. Shivaswamy, Chiranjib Bhattacharyy...
ANOR
2010
107views more  ANOR 2010»
14 years 7 months ago
Kusuoka representation of higher order dual risk measures
We derive representations of higher order dual measures of risk in Lp spaces as suprema of integrals of Average Values at Risk with respect to probability measures on (0, 1] (Kusu...
Darinka Dentcheva, Spiridon Penev, Andrzej Ruszczy...
IFL
2004
Springer
15 years 3 months ago
A Functional Programming Technique for Forms in Graphical User Interfaces
This paper presents FunctionalForms, a combinator library for constructing fully functioning forms in a concise and flexible way. A form is a part of a graphical user interface (G...
Sander Evers, Peter Achten, Jan Kuper
MOC
2000
88views more  MOC 2000»
14 years 9 months ago
On the error term of symmetric Gauss-Lobatto quadrature formulae for analytic functions
Gauss-Lobatto quadrature formulae associated with symmetric weight functions are considered. The kernel of the remainder term for classes of analytic functions is investigated on e...
David Hunter, Geno Nikolov