Sciweavers

260 search results - page 34 / 52
» Risk and Requirements-Based Testing
Sort
View
ACSC
2004
IEEE
15 years 3 months ago
Detecting Privacy and Ethical Sensitivity in Data Mining Results
Knowledge discovery allows considerable insight into data. This brings with it the inherent risk that what is inferred may be private or ethically sensitive. The process of genera...
Peter Fule, John F. Roddick
HCI
2007
15 years 1 months ago
Measuring User Experiences of Prototypical Autonomous Products in a Simulated Home Environment
Advances in sensor technology, embedded processing power, and modeling and reasoning software, have created the possibility for everyday products to sense the environment and pro-a...
Martijn H. Vastenburg, David V. Keyson, Huib de Ri...
CRITIS
2009
15 years 26 days ago
Energy Theft in the Advanced Metering Infrastructure
Abstract. Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an adva...
Stephen E. McLaughlin, Dmitry Podkuiko, Patrick Mc...
MANSCI
2006
122views more  MANSCI 2006»
14 years 11 months ago
Stochastic Dominance and Cumulative Prospect Theory
Second order stochastic dominance characterizes risk-averse preferences represented by expected utility. This paper supplies second order stochastic dominance conditions that char...
Manel Baucells, Franz H. Heukamp
88
Voted
TMI
2002
143views more  TMI 2002»
14 years 11 months ago
A Support Vector Machine Approach for Detection of Microcalcifications
In this paper, we investigate an approach based on support vector machines (SVMs) for detection of microcalcification (MC) clusters in digital mammograms, and propose a successive ...
Issam El-Naqa, Yongyi Yang, Miles N. Wernick, Niko...