Sciweavers

2403 search results - page 462 / 481
» Cyberinsurance in IT Security Management
Sort
View
ISTAR
2008
13 years 9 months ago
Improving the Syntax and Semantics of Goal Modelling Languages
One major obstacle to requirements engineering (RE) is the growing complexity of today's systems. Such a complexity can only be fficiently by powerful abstraction mechanisms a...
Raimundas Matulevicius
MIE
2008
119views Healthcare» more  MIE 2008»
13 years 9 months ago
Reliable Personal Health Records
A number of applications based on personal health records (PHRs) are emerging in the field of health care and wellness. PHRs empower patients by giving them control over their heal...
Ton van Deursen, Paul Koster, Milan Petkovic
PST
2008
13 years 9 months ago
LogView: Visualizing Event Log Clusters
Event logs or log files form an essential part of any network management and administration setup. While log files are invaluable to a network administrator, the vast amount of dat...
Adetokunbo Makanju, Stephen Brooks, A. Nur Zincir-...
ECIS
2004
13 years 9 months ago
Evaluating integration approaches benefits adopted by healthcare organisations
Healthcare organizations consist of a large number of disparate information systems (IS). These have been deployed to support specific needs of healthcare organisations. The infor...
Khalil Khoumbati, Marinos Themistocleous, Zahir Ir...
DIMVA
2006
13 years 9 months ago
A Fast Worm Scan Detection Tool for VPN Congestion Avoidance
Finding the cause for congested virtual private network (VPN) links that connect an office network over the Internet to remote subsidiaries can be a hassle. Scan traffic of worm i...
Arno Wagner, Thomas Dübendorfer, Roman Hiesta...