Sciweavers

164 search results - page 17 / 33
» How to Model Operational Risk If You Must
Sort
View
ICMAS
2000
14 years 11 months ago
Sociological Agents for Effective Social Action
This paper is concerned with the problem of how effective social interaction arises from individual social action and mind. The need to study the individual social mind, suggests ...
Mark d'Inverno, Michael Luck
70
Voted
FAST
2010
15 years 16 days ago
A Clean-Slate Look at Disk Scrubbing
A number of techniques have been proposed to reduce the risk of data loss in hard-drives, from redundant disks (e.g., RAID systems) to error coding within individual drives. Disk ...
Alina Oprea, Ari Juels
83
Voted
CPAIOR
2005
Springer
15 years 3 months ago
Combination of Among and Cardinality Constraints
A cardinality constraint imposes that each value of a set V must be taken a certain number of times by a set of variables X, whereas an among constraint imposes that a certain numb...
Jean-Charles Régin
89
Voted
USS
2008
15 years 16 days ago
Securing Provenance
Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of ...
Uri Braun, Avraham Shinnar, Margo I. Seltzer
112
Voted
ECSQARU
2005
Springer
15 years 3 months ago
Hydrologic Models for Emergency Decision Support Using Bayesian Networks
In the presence of a river flood, operators in charge of control must take decisions based on imperfect and incomplete sources of information (e.g., data provided by a limited numb...
Martín Molina, Raquel Fuentetaja, Luis Garr...