Sciweavers

203 search results - page 27 / 41
» Second-Order Risk Constraints
Sort
View
ICDCSW
2005
IEEE
14 years 1 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
WSC
2007
13 years 9 months ago
Allocation of resources for hospital evacuations via simulation
Department of Health and Environmental Control (DHEC) issued an order recently requiring that all hospitals have an evacuation plan with the following components: sheltering plan,...
Esengul Tayfur, Kevin Taaffe
COR
2008
116views more  COR 2008»
13 years 7 months ago
Robust multiperiod portfolio management in the presence of transaction costs
We study the viability of different robust optimization approaches to multiperiod portfolio selection. Robust optimization models treat future asset returns as uncertain coefficie...
Dimitris Bertsimas, Dessislava Pachamanova
IJMC
2007
40views more  IJMC 2007»
13 years 7 months ago
Valuing wireless data services solutions for corporate clients using real options
: The paper deals with wireless data services and their importance in the enterprise world. Provisioning in difficult-to-reach areas of tall buildings is challenging. To extend cov...
William Ramirez, Fotios C. Harmantzis, Venkata Pra...
ICSM
2009
IEEE
13 years 5 months ago
Balancing value and modifiability when planning for the next release
Planning the next release in software release planning addresses the problem of assigning features to the next release such that technical, resource, risk, and budget constraints ...
Anas Jadallah, Matthias Galster, Mahmood Moussavi,...