Sciweavers

164 search results - page 9 / 33
» How to Model Operational Risk If You Must
Sort
View
SIGUCCS
2000
ACM
15 years 1 months ago
Developing and Implementing a Comprehensive Training and Incentive Program for Student Employees in Information Technology
Anyone who works with student employees knows that while it is often difficult to train sufficiently, it is of the utmost importance to have a qualified, knowledgeable staff. We w...
Jim Osborn
AAAI
2007
15 years 13 days ago
Logical Generative Models for Probabilistic Reasoning about Existence, Roles and Identity
In probabilistic reasoning, the problems of existence and identity are important to many different queries; for example, the probability that something that fits some description...
David Poole
CHI
2004
ACM
15 years 10 months ago
Common sense investing: bridging the gap between expert and novice
In this paper, we describe Common Sense Investing (CSI), an interactive investment tool that uses a knowledge base of common sense statements in conjunction with domain knowledge ...
Ashwani Kumar, Sharad C. Sundararajan, Henry Liebe...
MOMPES
2009
IEEE
15 years 4 months ago
Reliable operating modes for distributed embedded systems
Hard real-time embedded distributed systems pose huge demands in their implementation which must contain as few faults as possible. Over the past years, model-driven development a...
Wolfgang Haberl, Stefan Kugele, Uwe Baumgarten
SCAM
2003
IEEE
15 years 3 months ago
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef