Sciweavers

928 search results - page 21 / 186
» Safety management of complex technology
Sort
View
CTW
2002
74views more  CTW 2002»
13 years 7 months ago
Nine Steps to Move Forward from Error
: Following celebrated failures stakeholders begin to ask questions about how to improve the systems and processes they operate, manage or depend on. In this process it is easy to ...
David D. Woods, Richard I. Cook
ACSD
2005
IEEE
114views Hardware» more  ACSD 2005»
14 years 1 months ago
Controlling Speculative Design Processes Using Rich Component Models
This paper elaborates on the application of some aspects of robust systems control theory to the management of uncertainty and risk in distributed and complex design processes, ha...
Werner Damm
IWIA
2006
IEEE
14 years 1 months ago
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited, highlevel guidance for the derivation of actual penetration attempts. In thi...
Ole Martin Dahl, Stephen D. Wolthusen
ECIS
2004
13 years 9 months ago
Change management: the contribution of personal construct theory (PCT)
This paper explores the use of two complementary approaches, each stemming from Personal Construct Theory (PCT), to investigate the interdependence of organizations and informatio...
Laurence Brooks, Christopher J. Davis, Mark Lycett
ISCA
2009
IEEE
189views Hardware» more  ISCA 2009»
14 years 2 months ago
Hybrid cache architecture with disparate memory technologies
Caching techniques have been an efficient mechanism for mitigating the effects of the processor-memory speed gap. Traditional multi-level SRAM-based cache hierarchies, especially...
Xiaoxia Wu, Jian Li, Lixin Zhang, Evan Speight, Ra...