Sciweavers

39 search results - page 8 / 8
» Incident Management and Incident Response: The Case of Swede...
Sort
View
RE
2010
Springer
13 years 26 days ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
SOSP
2005
ACM
14 years 3 months ago
Capturing, indexing, clustering, and retrieving system history
We present a method for automatically extracting from a running system an indexable signature that distills the essential characteristic from a system state and that can be subjec...
Ira Cohen, Steve Zhang, Moisés Goldszmidt, ...
ECIS
2004
13 years 7 months ago
Adverse Events in Hospitals: The Contribution of Poor Information Systems
Adverse events in hospitals, events in which harm results to a person receiving health care, are well documented (Wilson 1995, Hepler 2001). However, while factors such as lack of...
Reeva M. Lederman
BMCBI
2010
170views more  BMCBI 2010»
13 years 6 months ago
Analysis of lifestyle and metabolic predictors of visceral obesity with Bayesian Networks
Background: The aim of this study was to provide a framework for the analysis of visceral obesity and its determinants in women, where complex inter-relationships are observed amo...
Alex Aussem, André Tchernof, Sergio Rodrigu...