Sciweavers

2002 search results - page 59 / 401
» An Approach for Assessment of Reliability of the System Usin...
Sort
View
153
Voted
ICEIS
2008
IEEE
15 years 10 months ago
Internal Fraud Risk Reduction - Results of a Data Mining Case Study
Corporate fraud these days represents a huge cost to our economy. Academic literature already concentrated on how data mining techniques can be of value in the fight against frau...
Mieke Jans, Nadine Lybaert, Koen Vanhoof
109
Voted
SIGMETRICS
2010
ACM
215views Hardware» more  SIGMETRICS 2010»
15 years 1 months ago
Quantifying the sustainability impact of data center availability
Data center availability is critical considering the explosive growth in Internet services and people’s dependence on them. Furthermore, in recent years, sustainability has beco...
Manish Marwah, Paulo Romero Martins Maciel, Amip S...
151
Voted
EXACT
2009
15 years 1 months ago
Explaining a Result to the End-User: A Geometric Approach for Classification Problems
This paper addresses the issue of the explanation of the result given to the end-user by a classifier, when it is used as a decision support system. We consider machine learning cl...
Isabelle Alvarez, Sophie Martin
160
Voted
SEKE
2010
Springer
15 years 1 months ago
Ontology-Based Test Case Generation For Simulating Complex Production Automation Systems
—The behavior of complex production automation systems is hard to predict, therefore simulation is used to study the likely system behavior. However, in a real-world system many ...
Thomas Moser, Gregor Dürr, Stefan Biffl
135
Voted
ESSOS
2009
Springer
15 years 10 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely