نتایج جستجو برای: worthiness

تعداد نتایج: 419  

Journal: :AI Magazine 1991
Michel Mitri

research literature, in both AI and the social sciences, dealing with evaluation methodology. Evaluation is often described in terms of establishing numeric scores or qualitative ratings for a candidate. Candidates are usually represented in terms of attributes (criteria) that are relevant to the evaluation. Many models involve a weighted scoring process, where the weights indicate the importan...

2004
S. Ping Ho Fang Ying Lin

The early awareness of a potential financial distress is crucial to firm’s managers for understanding their clients, suppliers and their own firms, and crucial to fund suppliers for assessing the construction firm’s credit worthiness. The purpose of this paper is to develop a dynamic prediction model for financial distress in construction industry using Data Mining. This research expects to pro...

2005
Alfredo Moscardini Mohamed Loutfi

Evaluating new bank loans has been considered as one of the main dilemmas that banks managers have to deal with in order to reduce the probability of default. The lending process is a series of activities involving two main parties whose association ranges from the loan application to the successful or unsuccessful repayment of the loan. This paper describes the construction of a flight simulat...

2007
Kara A. Latorella Colin G. Drury

Maintaining civil aircraft air-worthiness requires the reliability of a complex, socio-technic system. This system's reliability is dependent on the reliability of its components (i.e, equipment, inspectors, the physical environment), and on how reliably these components interact. Error is the measurement counterpart of reliability, and most, if not all, errors can be classified at some stages ...

2007
Andrea Gamba

The paper investigates the impact on credit risk of capital structure choices driven by firm’s investments and financing decisions. We propose a realistic dynamic structural model featuring endogenous investment, capital structure and default. We calibrate the model on accounting and market data. Using simulation, we find that, credit spreads as well as other standard metrics of credit worthine...

2014

The major challenge faced by wireless sensor networks is security. Because of dynamic and collaborative nature of sensor networks the connected sensor devices makes the network unusable. To solve this issue, a trust model is required to find malicious, selfish and compromised insiders by evaluating trust worthiness sensors from the network. It supports the decision making processes in wireless ...

2003
Ester Oliveras Oriol Amat

Recent research shows that financial reports are losing relevance. Mainly this is due to the growing strategic importance of intangible assets in the performance of a company. A possible solution is to modify accounting standards so that statements include more self-generated intangible assets, taking into account with their inherent risk and difficulty of valuation. We surveyed loan officers w...

Journal: :Softw., Pract. Exper. 2006
Ganesh Santhanakrishnan Ahmed Amer Panos K. Chrysanthis

A cache replacement policy is normally suited to a particular class of applications, or limited to a set of fixed criteria for evaluating the cache-worthiness of an object. We present Universal Caching as a mechanism to capture the generality of the most adaptive algorithms, while depending on a very limited set of basic criteria for cache-replacement decisions. Our testing was limited to Web w...

2012
Elisabeth Weisser-Lohmann

In connection with research on humans, the term "vulnerability" is only appropriate to identify the special need for protection of certain sections of the population and individuals, if this term refers to the additional risk of certain groups of subjects. Authors who focus on the additional risk suffering of a subject group when defining vulnerability succeed in considering the specific worthi...

2016
Bagher Rahimpour Cami Hamid Hassanpour

Peer-to-peer networks have become increasingly popular in the recent years. In an open peer-to-peer network peers often have to interact with unknown peers and need to manage the risk in their communications. It is very important for peers to select a trustworthy peer to accomplish a task. Peers must be able to determine the trustworthiness of other peers to increasing uncertainty and risk. Thu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید