Sciweavers

271 search results - page 19 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
WISEC
2010
ACM
14 years 17 days ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
SADM
2011
13 years 2 months ago
Trellis display for modeling data from designed experiments
Abstract: Visualizing data by graphing a response against certain factors, and conditioning on other factors, has arisen independently in many contexts. One is the interaction plot...
Montserrat Fuentes, Bowei Xi, William S. Cleveland
SIGIR
2009
ACM
14 years 2 months ago
Portfolio theory of information retrieval
This paper studies document ranking under uncertainty. It is tackled in a general situation where the relevance predictions of individual documents have uncertainty, and are depen...
Jun Wang, Jianhan Zhu
EOR
2006
105views more  EOR 2006»
13 years 7 months ago
Evaluating cost taxonomies for information systems management
The consideration of costs, benefits and risks underpin many Information System (IS) evaluation decisions. Yet, vendors and project-champions alike tend to identify and focus much...
Zahir Irani, Ahmad Ghoneim, Peter E. D. Love
ACSAC
2001
IEEE
13 years 11 months ago
Privacy-Preserving Cooperative Statistical Analysis
The growth of the Internet opens up tremendous opportunities for cooperative computation, where the answer depends on the private inputs of separate entities. Sometimes these comp...
Wenliang Du, Mikhail J. Atallah