Sciweavers

2588 search results - page 56 / 518
» Project risk management
Sort
View
HICSS
2008
IEEE
134views Biometrics» more  HICSS 2008»
14 years 2 months ago
Simplified Use Case Driven Approach (SUCADA) for Conversion of Legacy System to COTS Package
The conversion of a legacy system to a system based on a commercial-off-the-shelf (COTS) package demands a dedicated guidance. The assumption that it is just a matter of adopting ...
Jose D. Montero, YongSeog Kim, Jeff Johnson
IEEEARES
2010
IEEE
14 years 2 months ago
Analysing and Visualising Security and Usability in IRIS
Abstract—Despite a long standing need to incorporate human factors into security risk analysis, taking a balanced approach to analysing security and usability concerns remains a ...
Shamal Faily, Ivan Flechais
CIKM
2008
Springer
13 years 9 months ago
Predicting individual disease risk based on medical history
The monumental cost of health care, especially for chronic disease treatment, is quickly becoming unmanageable. This crisis has motivated the drive towards preventative medicine, ...
Darcy A. Davis, Nitesh V. Chawla, Nicholas Blumm, ...
SECURWARE
2008
IEEE
14 years 2 months ago
Analysis of Computer Infection Risk Factors Based on Customer Network Usage
— Epidemiology, the science that studies the cause and propagation of diseases, provides us with the concepts and methods to analyze the potential risk factors to which ADSL cust...
Yannick Carlinet, Ludovic Mé, Hervé ...
CONTEXT
2007
Springer
14 years 1 months ago
Risk Context Effects in Inductive Reasoning: An Experimental and Computational Modeling Study
Mechanisms that underlie the inductive reasoning process in risk contexts are investigated. Experimental results indicate that people rate the same inductive reasoning argument dif...
Kayo Sakamoto, Masanori Nakagawa