Sciweavers

405 search results - page 43 / 81
» Avatar-centric Risk Evaluation
Sort
View
IEEEARES
2007
IEEE
15 years 4 months ago
Collection of Quantitative Data on Security Incidents
Quantitative data about security threats is a precondition for a precise assessment of security risks and consequently for an efficient management of information security. Curren...
Thomas Nowey, Hannes Federrath
ISCAS
2007
IEEE
128views Hardware» more  ISCAS 2007»
15 years 4 months ago
Synchronization of the Time-Varying Discrete Biological Networks
Abstract— The study of synchronization of population dynamics is extremely important for predicting and evaluating the risk of global extinctions. The migration in a network of p...
Liang Chen, Jinhu Lu, Junan Lu
ACMDIS
2006
ACM
15 years 3 months ago
How bodies matter: five themes for interaction design
Our physical bodies play a central role in shaping human experience in the world, understanding of the world, and interactions in the world. This paper draws on theories of embodi...
Scott R. Klemmer, Björn Hartmann, Leila Takay...
CBMS
2005
IEEE
15 years 3 months ago
Computer-Aided Thyroid Nodule Detection in Ultrasound Images
Nodular thyroid disease is a frequent occurrence in clinical practice and it is associated with increased risk of thyroid cancer and hyperfunction. In this paper we propose a nove...
Dimitrios E. Maroulis, Michalis A. Savelonas, Stav...
ICSM
2005
IEEE
15 years 3 months ago
A Case Study of the Release Management of a Health-care Information System
This paper describes a case study of the release management of CS-ECIS, a health-care information system developed by the Dutch software vendor ChipSoft. We performed this case st...
Gerco Ballintijn