Sciweavers

575 search results - page 106 / 115
» A model for evaluating IT security investments
Sort
View
DRR
2008
13 years 9 months ago
Interactive degraded document enhancement and ground truth generation
Degraded documents are frequently obtained in various situations. Examples of degraded document collections include historical document depositories, document obtained in legal an...
G. Bal, Gady Agam, Ophir Frieder, Gideon Frieder
CORR
2007
Springer
107views Education» more  CORR 2007»
13 years 8 months ago
Risk Minimization and Optimal Derivative Design in a Principal Agent Game
We consider the problem of Adverse Selection and optimal derivative design within a Principal-Agent framework. The principal’s income is exposed to non-hedgeable risk factors ar...
U. Horst, S. Moreno
CSDA
2007
120views more  CSDA 2007»
13 years 8 months ago
Boosting ridge regression
Ridge regression is a well established method to shrink regression parameters towards zero, thereby securing existence of estimates. The present paper investigates several approac...
Gerhard Tutz, Harald Binder
PERVASIVE
2006
Springer
13 years 8 months ago
The Smart Tachograph - Individual Accounting of Traffic Costs and Its Implications
Today, several costs caused by road traffic may either be only roughly approximated, or cannot be clearly assigned to the drivers causing them, or both. They are typically distribu...
Vlad Coroama
TWC
2008
138views more  TWC 2008»
13 years 8 months ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng