Sciweavers

196 search results - page 33 / 40
» Examining risk attitudes
Sort
View
IAW
2003
IEEE
15 years 5 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
GECCO
2003
Springer
15 years 5 months ago
HEMO: A Sustainable Multi-objective Evolutionary Optimization Framework
The capability of multi-objective evolutionary algorithms (MOEAs) to handle premature convergence is critically important when applied to real-world problems. Their highly multi-mo...
Jianjun Hu, Kisung Seo, Zhun Fan, Ronald C. Rosenb...
DSN
2002
IEEE
15 years 4 months ago
Modeling the Effect of Technology Trends on the Soft Error Rate of Combinational Logic
This paper examines the effect of technology scaling and microarchitectural trends on the rate of soft errors in CMOS memory and logic circuits. We describe and validate an end-to...
Premkishore Shivakumar, Michael Kistler, Stephen W...
HICSS
2002
IEEE
80views Biometrics» more  HICSS 2002»
15 years 4 months ago
EasyWinWin: Managing Complexity in Requirements Negotiation with GSS
More than ¾ of large software projects suffer large cost and schedule overruns or fail outright. Deficits in project requirements cause more than half of these failures and overr...
Robert O. Briggs, Paul Grünbacher
IWPC
1999
IEEE
15 years 4 months ago
Reconstructing Ownership Architectures To Help Understand Software Systems
Recent research suggests that large software systems should have a documented system architecture. One form of documentation that may help describe the structure of software syste...
Ivan T. Bowman, Richard C. Holt