Sciweavers

3149 search results - page 39 / 630
» IT security risk management
Sort
View
ICPP
2006
IEEE
15 years 4 months ago
Managing Risk of Inaccurate Runtime Estimates for Deadline Constrained Job Admission Control in Clusters
The advent of service-oriented Grid computing has resulted in the need for Grid resources such as clusters to enforce user-specific service needs and expectations. Service Level ...
Chee Shin Yeo, Rajkumar Buyya
EOR
2006
104views more  EOR 2006»
14 years 10 months ago
Financial networks with intermediation: Risk management with variable weights
: In this paper, we develop a framework for the modeling, analysis, and computation of solutions to multitiered financial network problems with intermediaries in which both the sou...
Anna Nagurney, Ke Ke
IEEEARES
2007
IEEE
15 years 4 months ago
Event-Based Monitoring of Open Source Software Projects
Project management traditionally has a strong focus on human reporting that fits well a tightly coupled form of organization to ensure the quality of project reporting. For loosel...
Dindin Wahyudin, A. Min Tjoa
MINENET
2006
ACM
15 years 4 months ago
Privacy-preserving performance measurements
Internet performance is an issue of great interest, but it is not trivial to measure. A number of commercial companies try to measure this, as does RIPE, and many individual Inter...
Matthew Roughan, Yin Zhang
WSC
2004
14 years 11 months ago
Tutorial on Portfolio Credit Risk Management
The distribution of possible future losses for a portfolio of credit risky corporate assets, such as bonds or loans, shows strongly asymmetric behavior and a fat tail as the conse...
William J. Morokoff