Sciweavers

1183 search results - page 169 / 237
» Risk Management with Benchmarking
Sort
View
KDD
2009
ACM
221views Data Mining» more  KDD 2009»
16 years 4 months ago
Migration motif: a spatial - temporal pattern mining approach for financial markets
A recent study by two prominent finance researchers, Fama and French, introduces a new framework for studying risk vs. return: the migration of stocks across size-value portfolio ...
Xiaoxi Du, Ruoming Jin, Liang Ding, Victor E. Lee,...
KDD
2006
ACM
118views Data Mining» more  KDD 2006»
16 years 4 months ago
Maximum profit mining and its application in software development
While most software defects (i.e., bugs) are corrected and tested as part of the lengthy software development cycle, enterprise software vendors often have to release software pro...
Charles X. Ling, Victor S. Sheng, Tilmann F. W. Br...
SIGMOD
2005
ACM
127views Database» more  SIGMOD 2005»
16 years 4 months ago
Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records
As critical records are increasingly stored in electronic form, which tends to make for easy destruction and clandestine modification, it is imperative that they be properly manag...
Qingbo Zhu, Windsor W. Hsu
TMA
2010
Springer
314views Management» more  TMA 2010»
15 years 11 months ago
On the Use of TCP Passive Measurements for Anomaly Detection: A Case Study from an Operational 3G Network
In this work we discuss the use of passive measurements of TCP performance indicators in support of network operation and troubleshooting, presenting a case-study from a real 3G ce...
Peter Romirer-Maierhofer, Angelo Coluccia, Tobias ...
ISW
2009
Springer
15 years 10 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis