Sciweavers

260 search results - page 31 / 52
» Risk and Requirements-Based Testing
Sort
View
DSS
2006
91views more  DSS 2006»
14 years 11 months ago
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. Howev...
Mukul Gupta, Jackie Rees, Alok R. Chaturvedi, Jie ...
ENVSOFT
2006
76views more  ENVSOFT 2006»
14 years 11 months ago
Hedgers, speculators and forward markets: Evidence from currency markets
: Since Keynes (1930) and Hicks (1939) propounded their theory of normal backwardation, the issue of whether hedgers must pay speculators an insurance premium has remained controve...
K. F. Radalj
CORR
2007
Springer
84views Education» more  CORR 2007»
14 years 11 months ago
Spreadsheets in Clinical Medicine
There is overwhelming evidence that the continued and widespread use of untested spreadsheets in business gives rise to regular, significant and unexpected financial losses. Whils...
Grenville J. Croll, Raymond J. Butler
SIAMJO
2008
97views more  SIAMJO 2008»
14 years 11 months ago
New Formulations for Optimization under Stochastic Dominance Constraints
Stochastic dominance constraints allow a decision-maker to manage risk in an optimization setting by requiring their decision to yield a random outcome which stochastically domina...
James Luedtke
JOI
2007
52views more  JOI 2007»
14 years 11 months ago
The h-index: Advantages, limitations and its relation with other bibliometric indicators at the micro level
The relationship of the h-index with other bibliometric indicators at the micro level is analysed for Spanish CSIC scientists in Natural Resources, using publications downloaded f...
Rodrigo Costas, María Bordons