Sciweavers

164 search results - page 8 / 33
» How to Model Operational Risk If You Must
Sort
View
HICSS
2005
IEEE
370views Biometrics» more  HICSS 2005»
15 years 3 months ago
Strategic Information Technology Management: Managing Organizational, Political, and Technological Forces
This paper explores the role of Information Technology (IT) in the management of municipally-owned and operated public utilities. Through semi-structured interviews of senior mana...
Keith Schildt, Suzanne Beaumaster, Marcie Edwards
IFM
2004
Springer
125views Formal Methods» more  IFM 2004»
15 years 3 months ago
Formally Justifying User-Centred Design Rules: A Case Study on Post-completion Errors
Abstract. Interactive systems combine a human operator with a computer. Either may be a source of error. The veri cation processes used must ensure both the correctness of the comp...
Paul Curzon, Ann Blandford
ABIALS
2008
Springer
15 years 4 months ago
Anticipative Control of Voluntary Action: Towards a Computational Model
Abstract. Human action is goal-directed and must thus be guided by anticipations of wanted action effects. How anticipatory action control is possible and how it can emerge from ex...
Pascal Haazebroek, Bernhard Hommel
OSDI
2006
ACM
15 years 10 months ago
EXPLODE: A Lightweight, General System for Finding Serious Storage System Errors
Storage systems such as file systems, databases, and RAID systems have a simple, basic contract: you give them data, they do not lose or corrupt it. Often they store the only copy...
Junfeng Yang, Can Sar, Dawson R. Engler
WSC
2004
14 years 11 months ago
Factors Affecting the Expectation of Casualties in the Virtual Range Toxicity Model
The Virtual Range (VR) is an environment that integrates in a seamless fashion several models to improve complex systems visualization. A complex system is a non-linear system of ...
José A. Sepúlveda, Luis C. Rabelo, J...