Risk intelligence

Results: 718



#Item
501Ethics / Artificial intelligence / Learning / Statistical classification / Applied probability / Exponential mechanism / Differential privacy / Empirical risk minimization / VC dimension / Machine learning / Data privacy / Statistics

JMLR: Workshop and Conference Proceedings vol[removed]–32 24th Annual Conference on Learning Theory Sample Complexity Bounds for Differentially Private Learning

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2011-09-27 03:12:47
502Business intelligence / Data management / 4GL / SAS / Census / Geographic information system / Data quality / Risk management information systems / Health Insurance Portability and Accountability Act / Statistics / Science / Information

BIRTH DEFECTS AND OTHER ADVERSE PREGNANCY OUTCOMES IN ILLINOIS

Add to Reading List

Source URL: www.idph.state.il.us

Language: English - Date: 2007-10-19 11:23:02
503Business intelligence / SWOT analysis / Project management / Swot / Risk management / Insurance / Farm enterprise / BSC SWOT / Context analysis / Strategic management / Management / Business

SWOT Analysis A tool for making better business decisions United States Department of Agriculture Risk Management Agency

Add to Reading List

Source URL: www2.rma.usda.gov

Language: English - Date: 2009-02-18 15:17:00
504Security / Statistics / Surveillance / National security / 4GL / Business intelligence / SAS

ARIZONA 2011 Land Line and Cell Phone Codebook Report Behavioral Risk Factor Surveillance System July 25, 2012 Behavioral Risk Factor Surveillance System

Add to Reading List

Source URL: azdhs.gov

Language: English - Date: 2013-02-14 16:26:44
505Industrial hygiene / Occupational safety and health / Risk management / Safety engineering / Colorado Student Assessment Program / Construction / Intelligence quotient / Intelligence / Safety / Risk / Environmental social science

KEY FINDINGS FROM RESEARCH Do Contractor Safety Assessment Program (CSAP) Scores Reflect Safety Climate? Correlation between Safety Climate

Add to Reading List

Source URL: www.cpwr.com

Language: English - Date: 2013-12-10 12:32:39
506Probability interpretations / Artificial intelligence / Logic in computer science / Fuzzy logic / Measurement / Uncertainty / Conservation status / Endangered species / Risk / Conservation / Environment / Science

Making Consistent IUCN Classifications under Uncertainty H. RE¸SI·T AKÇAKAYA,*†† SCOTT FERSON,* MARK A. BURGMAN,† DAVID A. KEITH,‡ GEORGINA M. MACE,§ AND CHARLES R. TODD** *Applied Biomathematics, 100 North C

Add to Reading List

Source URL: www.ramas.com

Language: English - Date: 2012-02-22 14:20:23
507Workforce management / Human resource management / Workforce planning / Centre for Workforce Intelligence

High‑Risk Update—Human Resources Management: A Significant Number of State Employees Are Beginning to Retire, While Certain Departments That Provide Critical State Services Lack Workforce and Succession Plans

Add to Reading List

Source URL: www.bsa.ca.gov

Language: English - Date: 2009-09-18 18:08:09
508SAS / Statistics / Row / Table / Data management / Computing / Data modeling / 4GL / Business intelligence

ARIZONA 2010 Codebook Report Behavioral Risk Factor Surveillance System June 29, 2011 BEHAVIORAL RISK FACTOR SURVEILLANCE SYSTEM

Add to Reading List

Source URL: azdhs.gov

Language: English - Date: 2013-02-14 16:26:36
509Statistics / Row / Computing / Software / 4GL / Business intelligence / SAS

ARIZONA 2008 Codebook Report Behavioral Risk Factor Surveillance System March 12, 2009 BEHAVIORAL RISK FACTOR SURVEILLANCE SYSTEM

Add to Reading List

Source URL: azdhs.gov

Language: English - Date: 2013-02-14 16:26:10
510Business intelligence / Computer-aided audit tools / Risk / Technology / Enterprise resource planning / Internal control / Analytics / Separation of duties / Business / Auditing / Information technology audit

Solution Overview Segregation of Duties Overview Segregation of Duties The main elements required for fraud are motivation and opportunity. Accordingly, the best opportunity a company can offer a fraudster is weak or no

Add to Reading List

Source URL: www.casewareanalytics.com

Language: English - Date: 2014-01-15 13:07:39
UPDATE