Sciweavers

1296 search results - page 70 / 260
» Multiplicative Background Risk
Sort
View
WISTP
2010
Springer
15 years 7 months ago
Fraud Detection for Voice over IP Services on Next-Generation Networks
The deployment of Next-Generation Networks (NGN) is a challenge that requires integrating heterogeneous services into a global system of All-IP telecommunications. These networks c...
Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia B...
110
Voted
HICSS
2010
IEEE
187views Biometrics» more  HICSS 2010»
15 years 7 months ago
Engaging the Periphery for Visual Communication on Mobile Phones
While mobile phones have become ubiquitous instruments of communication and social interaction, they still require explicit interaction, placing high demands on attention. Engagin...
Lisa Cowan, William G. Griswold, Louise Barkhuus, ...
82
Voted
FM
2006
Springer
127views Formal Methods» more  FM 2006»
15 years 4 months ago
Using Domain-Independent Problems for Introducing Formal Methods
Abstract. The key to the integration of formal methods into engineering practice is education. In teaching, domain-independent problems -i.e., not requiring prior engineering backg...
Raymond T. Boute
87
Voted
FAST
2010
15 years 2 months ago
A Clean-Slate Look at Disk Scrubbing
A number of techniques have been proposed to reduce the risk of data loss in hard-drives, from redundant disks (e.g., RAID systems) to error coding within individual drives. Disk ...
Alina Oprea, Ari Juels
69
Voted
FLAIRS
2003
15 years 1 months ago
Decision Evaluation of Three Flood Management Strategies
This article describes the application of computational decision analytic techniques for a national policy decision. It constitutes an example of the increasing use of modern comp...
Mats Danielson, Love Ekenberg, Jim Johansson