Sciweavers

1352 search results - page 235 / 271
» Designing Security Requirements Models Through Planning
Sort
View
CIMCA
2005
IEEE
13 years 10 months ago
Customised Customer Support Using a Soft Computing Approach
This paper describes the research and development of a methodology to identify the type of information required by the service advisor (CSA) within customer contact centre (CCC) e...
S. Shah, Rajkumar Roy, Ashutosh Tiwari, Basim Maje...
DIS
2010
Springer
13 years 6 months ago
An Artificial Experimenter for Enzymatic Response Characterisation
Identifying the characteristics of biological systems through physical experimentation, is restricted by the resources available, which are limited in comparison to the size of the...
Chris Lovell, Gareth Jones, Steve R. Gunn, Klaus-P...
SASN
2006
ACM
14 years 2 months ago
RANBAR: RANSAC-based resilient aggregation in sensor networks
We present a novel outlier elimination technique designed for sensor networks. This technique is called RANBAR and it is based on the RANSAC (RANdom SAmple Consensus) paradigm, wh...
Levente Buttyán, Péter Schaffer, Ist...
ASIACRYPT
2011
Springer
12 years 8 months ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
EOR
2007
165views more  EOR 2007»
13 years 8 months ago
Adaptive credit scoring with kernel learning methods
Credit scoring is a method of modelling potential risk of credit applications. Traditionally, logistic regression, linear regression and discriminant analysis are the most popular...
Yingxu Yang