by
Doughty, Ken.
Format:
Electronic Resources
Excerpt:
Risk management.
by
Jonker, Willem. editor.
Format:
Electronic Resources
Excerpt:
-- Simulatable Binding: Beyond Simulatable Auditing -- ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure
View Other Search Results
by
Schockaert, Steven. editor.
Format:
Electronic Resources
Excerpt:
information. These include (but are not restricted to) applications in decision support systems, risk analysis
by
Gorlatch, Sergei. editor.
Format:
Electronic Resources
Excerpt:
Visualization Of Grid Applications Based On OCM-G And Paraver -- Analysing Orchestrations Using Risk Profiles
by
Munshi, Usha Mujoo. editor.
Format:
Electronic Resources
Excerpt:
Future: Tactics of Activist Data Archiving -- Chapter 6. Little Data from Big Data for Disaster Risk
by
Shi, Yong. editor.
Format:
Electronic Resources
Excerpt:
cooperation. • Risk management: Better knowledge management also requires more advanced techniques for risk
by
Li, Ki-Joune. editor.
Format:
Electronic Resources
Excerpt:
Management and Risk Evaluation of a Road Slope Using a Terrestrial LiDAR -- Modeling for Web and Mobile GIS
by
Li, Qing. editor.
Format:
Electronic Resources
Excerpt:
Compliance -- Location-Based Software Modeling and Analysis: Tropos-Based Approach -- Risk Evaluation for
by
Weske, Mathias. editor.
Format:
Electronic Resources
Excerpt:
’ Message -- Conceptual Model of Risk: Towards a Risk Modelling Language -- A Critical Analysis of Latest
by
Funabashi, Matohisa. editor.
Format:
Electronic Resources
Excerpt:
Risk-Oriented Job Dispatching Mechanism for Workforce Management System -- Pervasive Technologies for e-Commerce
by
Bellahsène, Zohra. editor.
Format:
Electronic Resources
Excerpt:
Method Engineering: An Analysis of Existing Environments -- Adapting Secure Tropos for Security Risk
by
Meersman, Robert. editor.
Format:
Electronic Resources
Excerpt:
tendencies and approaches, intrusion detection, information hiding, data and risk management, access control
Limit Search Results
Narrowed by: