Sciweavers

2169 search results - page 14 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
HICSS
2007
IEEE
150views Biometrics» more  HICSS 2007»
15 years 6 months ago
Security Ontologies: Improving Quantitative Risk Analysis
— IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-se...
Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, E...
98
Voted
IJBRA
2007
97views more  IJBRA 2007»
14 years 11 months ago
Structural Risk Minimisation based gene expression profiling analysis
: For microarray based cancer classification, feature selection is a common method for improving classifier generalisation. Most wrapper methods use cross validation methods to eva...
Xue-wen Chen, Byron Gerlach, Dechang Chen, ZhenQiu...
INFOCOM
2006
IEEE
15 years 5 months ago
A Comparative Study of the DNS Design with DHT-Based Alternatives
— The current Domain Name System (DNS) follows a hierarchical tree structure. Several recent efforts proposed to re-implement DNS as a peer-to-peer network with a flat structure...
Vasileios Pappas, Daniel Massey, Andreas Terzis, L...
101
Voted
CODES
2007
IEEE
15 years 6 months ago
Probabilistic performance risk analysis at system-level
We present a novel hybrid approach for performance analysis of a system design. Unlike other approaches in this area, in this paper we do not focus on the determination of pessimi...
Alexander Viehl, Markus Schwarz, Oliver Bringmann,...
105
Voted
HICSS
2003
IEEE
151views Biometrics» more  HICSS 2003»
15 years 5 months ago
An Evaluation of Applying Use Cases to Construct Design versus Validate Design
Use case models capture and describe the functional requirements of a software system. A use case driven development process, where a use case model is the principal basis for con...
Erik Syversen, Bente Anda, Dag I. K. Sjøber...