Sciweavers

7693 search results - page 97 / 1539
» Design and Implementation of the FRIENDS System
Sort
View
KBSE
2007
IEEE
15 years 10 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
FLAIRS
2006
15 years 5 months ago
CATS: A Synchronous Approach to Collaborative Group Recommendation
Group recommender systems introduce a whole set of new challenges for recommender systems research. The notion of generating a set of recommendations that will satisfy a group of ...
Kevin McCarthy, Maria Salamó, Lorcan Coyle,...
ISPAN
2009
IEEE
15 years 11 months ago
Cyberaide Creative: On-Demand Cyberinfrastructure Provision in Clouds
As demand for grid and cloud computing solutions increases, the need for user oriented software to provide access to theses resources also increases. Until recently the use of com...
Casey Rathbone, Lizhe Wang, Gregor von Laszewski, ...
BCSHCI
2007
15 years 6 months ago
"The devil you know knows best": how online recommendations can benefit from social networking
The defining characteristic of the Internet today is an abundance of information and choice. Recommender Systems (RS), designed to alleviate this problem, have so far not been ver...
Philip Bonhard, Martina Angela Sasse, Clare Harrie...
HICSS
2009
IEEE
98views Biometrics» more  HICSS 2009»
15 years 11 months ago
Methodological Approaches to Measuring the Effects of Implementation of Health Information Technology (HIT)
The research design, evaluation methodology, and statistical analysis of the clinical efficacy of healthcare information technology (HIT) implementation can be a challenging task....
Lance Roberts, Marcia M. Ward, Jane M. Brokel, Dou...