Sciweavers

762 search results - page 52 / 153
» Modeling and Simulating Information Security Management
Sort
View
IEEESP
2007
98views more  IEEESP 2007»
13 years 7 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
WSC
1998
13 years 9 months ago
Avoiding the Blues for Airline Travelers
The fast growth in airline passenger traffic combined with the slow growth in airport capacity worldwide is putting a severe strain on the capability of airlines to adapt their pr...
Jane L. Snowdon, Soad El-Taji, Mario Montevecchi, ...
WSC
1998
13 years 9 months ago
Using Simulation in Call Centers
A company's call center is its most visible strategic weapon. It is a business battlefront where millions of dollars of products and services are purchased, sold, and traded....
Vivek Bapat, Eddie B. Pruitte Jr.
IOR
2006
192views more  IOR 2006»
13 years 7 months ago
Exact Simulation of Stochastic Volatility and Other Affine Jump Diffusion Processes
The stochastic differential equations for affine jump diffusion models do not yield exact solutions that can be directly simulated. Discretization methods can be used for simulati...
Mark Broadie, Özgür Kaya
JCP
2008
116views more  JCP 2008»
13 years 7 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...