Sciweavers

6147 search results - page 65 / 1230
» Requirements, Architectures and Risks
Sort
View
EDBTW
2010
Springer
15 years 6 months ago
Expressing privacy metrics as one-symbol information
Organizations often need to release microdata without revealing sensitive information. To this scope, data are anonymized and, to assess the quality of the process, various privac...
Michele Bezzi
CEC
2005
IEEE
15 years 5 months ago
Multiobjective financial portfolio design: a hybrid evolutionary approach
—A principal challenge in modern computational finance is efficient portfolio design – portfolio optimization followed by decision-making. Optimization based on even the widely...
Raj Subbu, Piero P. Bonissone, Neil Eklund, Sriniv...
ISIPTA
2005
IEEE
168views Mathematics» more  ISIPTA 2005»
15 years 5 months ago
Bayesianism Without Priors, Acts Without Consequences
: A generalization of subjective expected utility is presented in which the primitives are a finite set of states of the world, a finite set of strategies available to the decision...
Robert Nau
CHES
2005
Springer
111views Cryptology» more  CHES 2005»
15 years 5 months ago
Security Limits for Compromising Emanations
Nearly half a century ago, military organizations introduced “Tempest” emission-security test standards to control information leakage from unintentional electromagnetic emanat...
Markus G. Kuhn
AISM
2004
15 years 1 months ago
Approaches to IT Security in Small and Medium Enterprises
Organisations of all sizes are now significantly reliant upon information technology and networks for the operation of their business activities. All therefore have a consequent r...
Vassilis Dimopoulos, Steven Furnell, Murray Jennex...