Sciweavers

6147 search results - page 43 / 1230
» Requirements, Architectures and Risks
Sort
View
ESORICS
2010
Springer
15 years 28 days ago
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the...
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven...
CCE
2007
15 years 1 months ago
Product Based Interoperability - Approaches and Requirements
: Product data, information and knowledge are the core ICT resources for collaborative design. This paper describes five different approaches to exchanging and sharing product data...
Håvard D. Jørgensen, Dag Karlsen, Fra...
JITECH
2007
220views more  JITECH 2007»
14 years 11 months ago
Fixing the payment system at Alvalade XXI: a case on IT project risk management
This case describes the implementation and subsequent failure of an innovative system installed in the bars of Alvalade XXI, the recently built football stadium in Lisbon, Portuga...
Ramon O'Callaghan
ICML
2008
IEEE
16 years 19 days ago
Reinforcement learning with limited reinforcement: using Bayes risk for active learning in POMDPs
Partially Observable Markov Decision Processes (POMDPs) have succeeded in planning domains that require balancing actions that increase an agent's knowledge and actions that ...
Finale Doshi, Joelle Pineau, Nicholas Roy
DSD
2009
IEEE
118views Hardware» more  DSD 2009»
15 years 3 months ago
On the Risk of Fault Coupling over the Chip Substrate
—Duplication and comparison has proven to be an efficient method for error detection. Based on this generic principle dual core processor architectures with output comparison ar...
Peter Tummeltshammer, Andreas Steininger