Sciweavers

1511 search results - page 31 / 303
» Active Risk Estimation
Sort
View
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
14 years 2 months ago
Insuring Big Losses Due to Security Breaches through Insurance: A Business Model
Security breaches deter e-commerce activities. Organizations spend millions of dollars on security appliances to make online transactions more secure. Nonetheless, a new virus or ...
Arunabha Mukhopadhyay, Samir Chatterjee, Rahul Roy...
RAID
2004
Springer
14 years 1 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
SIGIR
2002
ACM
13 years 7 months ago
Risk minimization and language modeling in text retrieval dissertation abstract
tion Abstract ChengXiang Zhai (Advisor: John Lafferty) Language Technologies Institute School of Computer Science Carnegie Mellon University With the dramatic increase in online in...
ChengXiang Zhai
CIKM
2009
Springer
14 years 2 months ago
Reducing the risk of query expansion via robust constrained optimization
We introduce a new theoretical derivation, evaluation methods, and extensive empirical analysis for an automatic query expansion framework in which model estimation is cast as a r...
Kevyn Collins-Thompson
CDC
2009
IEEE
157views Control Systems» more  CDC 2009»
14 years 16 days ago
On trajectory optimization for active sensing in Gaussian process models
Abstract— We consider the problem of optimizing the trajectory of a mobile sensor with perfect localization whose task is to estimate a stochastic, perhaps multidimensional fiel...
Jerome Le Ny, George J. Pappas