Sciweavers

3149 search results - page 39 / 630
» IT security risk management
Sort
View
ICPP
2006
IEEE
14 years 1 months ago
Managing Risk of Inaccurate Runtime Estimates for Deadline Constrained Job Admission Control in Clusters
The advent of service-oriented Grid computing has resulted in the need for Grid resources such as clusters to enforce user-specific service needs and expectations. Service Level ...
Chee Shin Yeo, Rajkumar Buyya
EOR
2006
104views more  EOR 2006»
13 years 7 months ago
Financial networks with intermediation: Risk management with variable weights
: In this paper, we develop a framework for the modeling, analysis, and computation of solutions to multitiered financial network problems with intermediaries in which both the sou...
Anna Nagurney, Ke Ke
IEEEARES
2007
IEEE
14 years 2 months ago
Event-Based Monitoring of Open Source Software Projects
Project management traditionally has a strong focus on human reporting that fits well a tightly coupled form of organization to ensure the quality of project reporting. For loosel...
Dindin Wahyudin, A. Min Tjoa
MINENET
2006
ACM
14 years 1 months ago
Privacy-preserving performance measurements
Internet performance is an issue of great interest, but it is not trivial to measure. A number of commercial companies try to measure this, as does RIPE, and many individual Inter...
Matthew Roughan, Yin Zhang
WSC
2004
13 years 9 months ago
Tutorial on Portfolio Credit Risk Management
The distribution of possible future losses for a portfolio of credit risky corporate assets, such as bonds or loans, shows strongly asymmetric behavior and a fat tail as the conse...
William J. Morokoff