Sciweavers

669 search results - page 91 / 134
» Managing the Risk of IT Outsourcing
Sort
View
IH
1998
Springer
15 years 2 months ago
The Steganographic File System
Abstract. Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported...
Ross J. Anderson, Roger M. Needham, Adi Shamir
ACMICEC
2007
ACM
94views ECommerce» more  ACMICEC 2007»
15 years 1 months ago
Factors and effects of information credibility
Website success hinges on how credible the consumers consider the information on the website. Unless consumers believe the website's information is credible, they are not lik...
D. Harrison McKnight, Charles J. Kacmar
AAAI
2006
14 years 11 months ago
Properties of Forward Pruning in Game-Tree Search
Forward pruning, or selectively searching a subset of moves, is now commonly used in game-playing programs to reduce the number of nodes searched with manageable risk. Forward pru...
Yew Jin Lim, Wee Sun Lee
AIPS
2004
14 years 11 months ago
Price Prediction Strategies for Market-Based Scheduling
In a market-based scheduling mechanism, the allocation of time-specific resources to tasks is governed by a competitive bidding process. Agents bidding for multiple, separately al...
Jeffrey K. MacKie-Mason, Anna Osepayshvili, Daniel...
ENGL
2007
116views more  ENGL 2007»
14 years 9 months ago
Evacuation Planning using Answer Set Programming: An initial approach
—This paper describes a methodology based on Answer Set Programming (ASP) to work with incomplete geographic data. Source geographic data which describes a risk zone is translate...
Claudia Zepeda, David Sol