Sciweavers

341 search results - page 51 / 69
» Maturity-independent risk measures
Sort
View
BPM
2009
Springer
134views Business» more  BPM 2009»
14 years 3 months ago
Business Process-Based Resource Importance Determination
Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources’ importance in the overall organizational context. Alt...
Stefan Fenz, Andreas Ekelhart, Thomas Neubauer
AUTOMOTIVEUI
2009
ACM
14 years 3 months ago
Acceptance of future persuasive in-car interfaces towards a more economic driving behaviour
Measuring user acceptance to avoid system rejection by the users in pre-prototype stage of product development is of high interest for both researchers and practitioners. This is ...
Alexander Meschtscherjakov, David Wilfinger, Thoma...
ICASSP
2008
IEEE
14 years 3 months ago
Blind optimization of algorithm parameters for signal denoising by Monte-Carlo SURE
We consider the problem of optimizing the parameters of an arbitrary denoising algorithm by minimizing Stein’s Unbiased Risk Estimate (SURE) which provides a means of assessing ...
Sathish Ramani, Thierry Blu, Michael Unser
IEEEARES
2007
IEEE
14 years 3 months ago
Event-Based Monitoring of Open Source Software Projects
Project management traditionally has a strong focus on human reporting that fits well a tightly coupled form of organization to ensure the quality of project reporting. For loosel...
Dindin Wahyudin, A. Min Tjoa
CIKM
2007
Springer
14 years 3 months ago
"I know what you did last summer": query logs and user privacy
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins