Sciweavers

6147 search results - page 46 / 1230
» Requirements, Architectures and Risks
Sort
View
EKNOW
2010
14 years 6 months ago
Workshop-Based Risk Assessment for the Definition of Secure Business Processes
Nowadays, industry and governments are faced with an increasing number of varying threats concerning the security of their valuable business processes. Due to the vast damage pote...
Thomas Neubauer, Markus Pehn
CSE
2009
IEEE
15 years 6 months ago
Fast Fusion of Medical Images Based on Bayesian Risk Minimization and Pixon Map
Fast fusion of multiple registered out-of-focus images is of great interest in medical imaging; for example, the thoracic cavity is always too bumpy to be focused on all parts at ...
Hongbo Zhou, Qiang Cheng, Mehdi Zargham
CODES
2007
IEEE
15 years 6 months ago
Probabilistic performance risk analysis at system-level
We present a novel hybrid approach for performance analysis of a system design. Unlike other approaches in this area, in this paper we do not focus on the determination of pessimi...
Alexander Viehl, Markus Schwarz, Oliver Bringmann,...
WWW
2009
ACM
16 years 15 days ago
Web service derivatives
Web service development and usage has shifted from simple information processing services to high-value business services that are crucial to productivity and success. In order to...
Thomas Meinl, Benjamin Blau
MOBISYS
2003
ACM
15 years 11 months ago
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Advances in sensing and tracking technology enable location-based applications but they also create significant privacy risks. Anonymity can provide a high degree of privacy, save...
Marco Gruteser, Dirk Grunwald