Sciweavers

1296 search results - page 18 / 260
» Multiplicative Background Risk
Sort
View
ISM
2005
IEEE
159views Multimedia» more  ISM 2005»
15 years 3 months ago
Avatar-centric Risk Evaluation
Hazard detection and prevention of natural and manmade disasters at critical civil infrastructure is becoming increasingly important. Recent events, such as earthquakes and terror...
Maria-Cruz Villa-Uriol, Falko Kuester, Oscar Garc&...
ECIS
2004
14 years 11 months ago
A study of information systems outsourcing risks
Despite the considerable growth of Information Systems (IS) outsourcing in recent years, this trend is still the object of strong criticism. This study has as its aim to show the ...
Reyes-G. Gonzalez, Jose Gasco, Juan Llopis
VOTEID
2007
Springer
15 years 3 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
CIA
2006
Springer
15 years 1 months ago
Risk-Bounded Formation of Fuzzy Coalitions Among Service Agents
Cooperative autonomous agents form coalitions in order to share and combine resources and services to efficiently respond to market demands. With the variety of resources and servi...
Bastian Blankenburg, Minghua He, Matthias Klusch, ...
74
Voted
EOR
2010
120views more  EOR 2010»
14 years 9 months ago
List pricing versus dynamic pricing: Impact on the revenue risk
We consider the problem of a firm selling multiple products that consume a single resource over a finite time period. The amount of the resource is exogenously fixed. We analyze t...
Matthias Koenig, Joern Meissner