نتایج جستجو برای: it costs

تعداد نتایج: 2954653  

Journal: :Computers & Security 2005
Bilge Karabacak Ibrahim Sogukpinar

Continuously changing nature of technological environment has been enforcing to revise the process of information security risk analysis accordingly. A number of quantitative and qualitative risk analysis methods have been proposed by researchers and vendors. The purpose of these methods is to analyze today's information security risks properly. Some of these methods are supported by a software...

2004
Atsushi Fujii Tetsuya Ishikawa

This paper describes our retrieval system participated in the Patent Retrieval Task at the Fourth NTCIR Workshop. The main task was an associative patent retrieval task, in which a patent application including a target claim is used to search documents that can invalidate the demand in the claim. Our system can be characterized by the structure analysis for both target claim and entire applicat...

2007
Mohamed El-Gafy

Construction Projects are being implemented under different contract systems in the Midwest. Negotiated design-build has been a popular contract system in recent years. It provides various advantages through entailing the contractor to be responsible for the whole project. However, design-build turns out to be risky system for both owners and contractors unless the risks are identified, quantif...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید