Abstract management

Results: 5052



#Item
391Academic publishing / Academic conferences / Conferences / Abstract management / Digital media / Research / Electronic submission / Scholarly peer review

Report on the Technical Track of ICSE 2015 Gerardo Canfora and Sebastian Elbaum Program Co-Chairs April 16, 2015

Add to Reading List

Source URL: www.icse-conferences.org

Language: English - Date: 2015-05-25 07:55:20
392

Critical Finance Review, 2015, 4: 149–155 Always Possible Frontiers Jonathan E. Ingersoll, Jr., Yale School of Management ABSTRACT

Add to Reading List

Source URL: cfr.ivo-welch.info

Language: English - Date: 2015-08-19 17:04:29
    393

    Dynamic Incentives for Risk Management Tansu Alpcan Abstract—Incentives play an important role in assessment and mitigation of operational risks in large-scale organisations with multiple autonomous divisions. This pap

    Add to Reading List

    Source URL: tansu.alpcan.org

    Language: English - Date: 2014-02-20 20:02:40
      394Computing / Computer security / Software / Project management / Threat model / Business / Enterprise modelling / Software engineering / Process management / Threat / Software development / Business process modeling

      Experiences Threat Modeling at Microsoft Adam Shostack Microsoft Abstract. Describes a decade of experience threat modeling products

      Add to Reading List

      Source URL: adam.shostack.org

      Language: English - Date: 2014-06-11 12:01:57
      395Computer access control / Identity management / Computer security / Identity / Federated identity / Cloud standards / OAuth / Information Card / Location-based service / Internet privacy / Authentication / Identity management system

      The Case for a Location Metasystem Nick Doty School of Information, UC Berkeley ABSTRACT

      Add to Reading List

      Source URL: npdoty.name

      Language: English - Date: 2014-03-25 02:38:49
      396

      The Organization Gap in the Provision of Public Information and Open Data - The Case of the City State of Bremen, Germany Herbert Kubicek, Institute of Information Management Bremen (ifib), Abstract: Many

      Add to Reading List

      Source URL: www.ifib-consult.de

      Language: English - Date: 2014-05-28 07:45:39
        397Cryptography / Public-key cryptography / Public key infrastructure / Transport Layer Security / Key management / Cryptographic protocols / Public key certificate / X.509 / HTTPS / OpenSSL / Revocation list

        Secure Abstraction with Code Capabilities Robbert van Renesse∗ , H˚avard D. Johansen† , Nihar Naigaonkar∗ , and Dag Johansen† ∗ Cornell University, USA † University of Tromsø, Norway Abstract—We propose

        Add to Reading List

        Source URL: www.cs.cornell.edu

        Language: English - Date: 2012-11-08 10:00:02
        398

        Abstract Submission Form CEQURA Conference on Advances in Financial and Insurance Risk Management October 1–2, 2014

        Add to Reading List

        Source URL: www.cequra.uni-muenchen.de

          399

          FUEL PREDICTION FOR SPECIFIC TRACTOR MODELS R. D. Grisso, D. H. Vaughan, G. T. Roberson ABSTRACT. Generalized models for fuel consumption are useful for budget and management scenarios, but may not have the ability to co

          Add to Reading List

          Source URL: bsesrv214.bse.vt.edu

          Language: English - Date: 2008-09-11 10:21:19
            400Microsoft / Computing / World Wide Web / Internet marketing / Hypertext Transfer Protocol / Big data / Business intelligence / Session / Outlook.com / Internet privacy / Software prototyping

            Usage Analysis of a Mobile Bargain Finder Application Stephan Karpischek, Darshan Santani, and Florian Michahelles Chair of Information Management, ETH Z¨urich, Switzerland Abstract. Mobile shopping applications for sma

            Add to Reading List

            Source URL: cocoa.ethz.ch

            Language: English - Date: 2013-06-07 09:53:20
            UPDATE