Sciweavers

6147 search results - page 18 / 1230
» Requirements, Architectures and Risks
Sort
View
IEEECIT
2010
IEEE
14 years 10 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
EWSA
2006
Springer
15 years 3 months ago
Component Deployment Evolution Driven by Architecture Patterns and Resource Requirements
Software architectures are often designed with respect to some architecture patterns, like the pipeline and peer-to-peer. These patterns are the guarantee of some quality attribute...
Didier Hoareau, Chouki Tibermacine
RE
2001
Springer
15 years 4 months ago
Reconciling Software Requirements and Architectures: The CBSP Approach
Little guidance and few methods are available to refine a set of software requirements into an architecture satisfying those requirements. Part of the challenge stems from the fac...
Paul Grünbacher, Alexander Egyed, Nenad Medvi...
HICSS
2003
IEEE
221views Biometrics» more  HICSS 2003»
15 years 5 months ago
"Applying TAM to E-Services Adoption: The Moderating Role of Perceived Risk"
Consumer adoption of e-services is an important goal for many service providers, however little is known about how different consumer segments perceive and evaluate them for adopt...
Mauricio Featherman, Mark A. Fuller
IFIP12
2008
15 years 1 months ago
Addressing Risk Assessment for Patient Safety in Hospitals through Information Extraction in Medical Reports
: Hospital Acquired Infections (HAI) is a real burden for doctors and risk surveillance experts. The impact on patients' health and related healthcare cost is very significant...
Denys Proux, Frédérique Segond, Solw...