Sciweavers

3149 search results - page 168 / 630
» IT security risk management
Sort
View
WSC
2007
13 years 11 months ago
Towards a user-centred road safety management method based on road traffic simulation
One of the most important gaps in road safety management practises is the lack of mature methods for estimating reliability. Road safety performance assessment systems have been d...
Andreas Gregoriades
JBI
2007
113views Bioinformatics» more  JBI 2007»
13 years 9 months ago
Description of a method to support public health information management: Organizational network analysis
In this case study, we describe a method that has potential to provide systematic support for public health information management. Public health agencies depend on specialized in...
Jacqueline Merrill, Suzanne Bakken, Maxine Rockoff...
IJNSEC
2008
152views more  IJNSEC 2008»
13 years 9 months ago
Group Key Management in MANETs
Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most suitable solution to provide the expected level of...
Mohamed Salah Bouassida, Isabelle Chrisment, Olivi...
ICDE
2004
IEEE
85views Database» more  ICDE 2004»
14 years 10 months ago
GODIVA: Lightweight Data Management for Scientific Visualization Applications
Scientific visualization applications are very dataintensive, with high demands for I/O and data management. Developers of many visualization tools hesitate to use traditional DBM...
Xiaosong Ma, Marianne Winslett, John Norris, Xiang...
CHI
2007
ACM
14 years 9 months ago
Mobile kits and laptop trays: managing multiple devices in mobile information work
A study at a large IT company shows that mobile information workers frequently migrate work across devices (here: smartphones, desktop PCs, laptops). While having multiple devices...
Antti Oulasvirta, Lauri Sumari