Search results for "Computer Networks"
showing 10 items of 860 documents
Improving Communication in Risk Management of Health Information Technology Systems by means of Medical Text Simplification
2019
Health Information Technology Systems (HITS) are increasingly used to improve the quality of patient care while reducing costs. These systems have been developed in response to the changing models of care to an ongoing relationship between patient and care team, supported by the use of technology due to the increased instance of chronic disease. However, the use of HITS may increase the risk to patient safety and security. While standards can be used to address and manage these risks, significant communication problems exist between experts working in different departments. These departments operate in silos often leading to communication breakdowns. For example, risk management stakeholder…
Anomaly detection in dynamic systems using weak estimators
2011
Accepted version of an article from the journal: ACM transactions on internet technology. Published version available from the ACM: http://dx.doi.org/10.1145/1993083.1993086 Anomaly detection involves identifying observations that deviate from the normal behavior of a system. One of the ways to achieve this is by identifying the phenomena that characterize “normal” observations. Subsequently, based on the characteristics of data learned from the “normal” observations, new observations are classified as being either “normal” or not. Most state-of-the-art approaches, especially those which belong to the family of parameterized statistical schemes, work under the assumption that the underlying…
Childhood Adversities and Adult Headache in Poland and Germany.
2015
Objective Various childhood adversities have been found to be associated with chronic pain in adulthood. However, associations were moderate in most studies, i.e. odds ratios (OR) were between one and two. Method An internet survey was performed in 508 Polish and 500 German subjects. A total of 19 childhood adversities were selected and their associations with headaches explored. Age, gender and country were included as potential confounders, as well as their two-way interaction with the risk factors. Results Two strong risk factors were identified. (1) A combined score for physical and emotional neglect showed an odds ratio (OR) of 2.78 (p < .002) to the frequency of headache in adulthood …
Fotovoz como metodología innovadora en educación superior
2022
La adaptación al EEES ha exigido el surgimiento de metodologías activas adscritas a la educación, siendo fotovoz clave en diferentes niveles educativos. Sin embargo, la investigación en el contexto educativo, y en concreto en el de Educación Superior, es escaso. Por tanto, el objetivo de este trabajo es analizar el uso de fotovoz en educación superior, a través de una revisión sistemática basada en la Declaración PRISMA 2020 en tres bases de datos. Quince de los 408 estudios identificados cumplieron con los criterios de inclusión. Los resultados posicionan Fotovoz como una alternativa educativa con potencial en entornos de Educación Superior. The adaptation to the EHEA has demanded the emer…
Educating reflective Enterprise Systems practitioners: a design research study of the iterative building of a teaching framework
2013
This research paper reports on the iterative design of a teaching framework developed for teaching Enterprise Systems ES classes for Information Systems IS graduates. These systems embed technical complexity and create organizational challenges when implemented in organizations. Therefore, teaching good ES classes is pedagogically challenging for faculty, and ES curricula are difficult for students. We have gradually designed and rebuilt curricula and teaching frameworks over 8years. This has also resulted in a set of eight design principles. We report from our design and evaluation process and present our final artefact, the teaching framework. The aim is to educate reflective practitioner…
The effectiveness of office information systems: a social action perspective
1991
. The purpose of this paper is to show that a number of basic issues have not been adequately addressed in existing office information systems research. Prominent among these are the nature and role of offices, the goals of office information systems development, and the nature of its organizational and managerial consequences. It is proposed that office information systems should be analysed as social action systems the behaviour of which is strongly affected by socially determined forces and constraints such as the behaviour-channelling influences of authority, norms, customs, habits and precedence. Four types of social action are discussed: instrumental, strategic, communicative and disc…
Noise-tolerant efficient inductive synthesis of regular expressions from good examples
1997
We present an almost linear time method of inductive synthesis restoring simple regular expressions from one representative (good) example. In particular, we consider synthesis of expressions of star-height one, where we allow one union operation under each iteration, and synthesis of expressions without union operations from examples that may contain mistakes. In both cases we provide sufficient conditions defining precisely the class of target expressions and the notion of good examples under which the synthesis algorithm works correctly, and present the proof of correctness. In the case of expressions with unions the proof is based on novel results in the combinatorics of words. A genera…
On the chromatic number of disk graphs
1998
Colorings of disk graphs arise in the study of the frequency-assignment problem in broadcast networks. Motivated by the observations that the chromatic number of graphs modeling real networks hardly exceeds their clique number, we examine the related properties of the unit disk (UD) graphs and their different generalizations. For all these graphs including the most general class of the double disk (DD) graphs, it is shown that X(G) ≤ c.ω(G) for a constant c. Several coloring algorithms are analyzed for disk graphs, aiming to improve the bounds on X(G). We find that their worst-case performance expressed in the number of used colors is indeed reached in some instances.
Using Cloud Computing to Implement a Security Overlay Network
2012
This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.
Comparative analysis of architectures for monitoring cloud computing infrastructures
2015
The lack of control over the cloud resources is one of the main disadvantages associated to cloud computing. The design of efficient architectures for monitoring such resources can help to overcome this problem. This contribution describes a complete set of architectures for monitoring cloud computing infrastructures, and provides a taxonomy of them. The architectures are described in detail, compared among them, and analysed in terms of performance, scalability, usage of resources, and security capabilities. The architectures have been implemented in real world settings and empirically validated against a real cloud computing infrastructure based on OpenStack. More than 1000 virtual machin…