Sciweavers

161 search results - page 13 / 33
» Measurements Should Generate Value, Rather than Data
Sort
View
CGO
2005
IEEE
14 years 1 months ago
Building Intrusion-Tolerant Secure Software
In this work, we develop a secret sharing based compiler solution to achieve confidentiality, integrity and availability (intrusion tolerance) of critical data together, rather th...
Tao Zhang, Xiaotong Zhuang, Santosh Pande
TVLSI
2008
140views more  TVLSI 2008»
13 years 7 months ago
A Novel Mutation-Based Validation Paradigm for High-Level Hardware Descriptions
We present a Mutation-based Validation Paradigm (MVP) technology that can handle complete high-level microprocessor implementations and is based on explicit design error modeling, ...
Jorge Campos, Hussain Al-Asaad
ACMDIS
2008
ACM
13 years 9 months ago
Paper interface to electronic medical records: a case of usage-driven technology appropriation
We conducted a 6-month project with a physical therapy clinic, involving equal parts ethnographic fieldwork and rapid prototyping. It differed from most reported user-informed des...
Elin Rønby Pedersen, Greg Wolff
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
14 years 2 months ago
CRM and Customer Portfolio Management for E-Tailers
“Don’t put all your eggs in one basket” is common wisdom with respect to financial portfolio theory. The configuration of customer portfolios with regard to appropriate risk...
Dennis Kundisch, Stefan Sackmann, Markus Ruch
EOR
2007
92views more  EOR 2007»
13 years 7 months ago
Modelling profitability using survival combination scores
The paper presents the first empirical investigation of the relationship between present value of net revenue from a revolving credit account and times to default and to second pu...
Galina Andreeva, Jake Ansell, Jonathan Crook