Sciweavers

331 search results - page 42 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
BMCBI
2008
85views more  BMCBI 2008»
14 years 11 months ago
Merging microarray data from separate breast cancer studies provides a robust prognostic test
Background: There is an urgent need for new prognostic markers of breast cancer metastases to ensure that newly diagnosed patients receive appropriate therapy. Recent studies have...
Lei Xu, Aik Choon Tan, Raimond L. Winslow, Donald ...
CBMS
2008
IEEE
15 years 5 months ago
A Self-Test to Detect a Heart Attack Using a Mobile Phone and Wearable Sensors
This paper describes a heart attack self-test application for a mobile phone which allows potential victims of a heart attack to quickly assess whether they are having a heart att...
Peter Leijdekkers, Valérie Gay
COMPSEC
2004
156views more  COMPSEC 2004»
14 years 11 months ago
Computer security impaired by legitimate users
Computer security has traditionally been assessed from a technical point of view. Another way to assess it is by investigating the role played by legitimate users of systems in imp...
Denis Besnard, Budi Arief
IFIP
2001
Springer
15 years 3 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
IRI
2007
IEEE
15 years 5 months ago
Reuse Strategy based on Quality Certification of Reusable Components
There are some barriers that prevent effective and systematic reuse. These barriers are produced by the need of introducing new methods for reuse development and especially by the...
Maryoly Ortega, Anna Grimán, María A...