Sciweavers

84 search results - page 12 / 17
» assets 2010
Sort
View
SIAMJO
2010
155views more  SIAMJO 2010»
14 years 4 months ago
Optimal Portfolio Execution Strategies and Sensitivity to Price Impact Parameters
When liquidating a portfolio of large blocks of risky assets, an institutional investor wants to minimize the cost as well as the risk of execution. An optimal execution strategy ...
Somayeh Moazeni, Thomas F. Coleman, Yuying Li
SOUPS
2010
ACM
15 years 1 months ago
Where do security policies come from?
We examine the password policies of 75 different websites. Our goal is understand the enormous diversity of requirements: some will accept simple six-character passwords, while o...
Dinei A. F. Florêncio, Cormac Herley
JUCS
2010
167views more  JUCS 2010»
14 years 8 months ago
Ontology based Approach in Knowledge Sharing Measurement
: For many years, physical asset indicators were the main evidence of an organization’s successful performance. However, the situation has changed following the revolution of inf...
Behrang Zadjabbari, Pornpit Wongthongtham, Farookh...
SPLC
2010
14 years 8 months ago
Stratified Analytic Hierarchy Process: Prioritization and Selection of Software Features
Product line engineering allows for the rapid development of variants of a domain specific application by using a common set of reusable assets often known as core assets. Variabil...
Ebrahim Bagheri, Mohsen Asadi, Dragan Gasevic, Sam...
RE
2010
Springer
14 years 4 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa