Search results for "Computer Networks"

showing 10 items of 860 documents

Improving Communication in Risk Management of Health Information Technology Systems by means of Medical Text Simplification

2019

Health Information Technology Systems (HITS) are increasingly used to improve the quality of patient care while reducing costs. These systems have been developed in response to the changing models of care to an ongoing relationship between patient and care team, supported by the use of technology due to the increased instance of chronic disease. However, the use of HITS may increase the risk to patient safety and security. While standards can be used to address and manage these risks, significant communication problems exist between experts working in different departments. These departments operate in silos often leading to communication breakdowns. For example, risk management stakeholder…

Care processInteractive computer systemsMedical terminologyHealth information technologyText simplificationComputer sciencemedia_common.quotation_subjectKnowledge management02 engineering and technologyInformation technologyPatient safetyOrder (exchange)Computer securityPatient Empowerment; Health Information Seeking; User Requirements; Risk Management; IEC 80001-1; Medical Terminology Simplification;Machine learning0202 electrical engineering electronic engineering information engineeringInformation retrievalQuality (business)Risk managementComputer networksmedia_commonEstimationRisk ManagementSettore INF/01 - Informaticabusiness.industryCommunication020206 networking & telecommunications020207 software engineeringMedical Terminology SimplificationWorld Wide WebEducational technologyChronic diseaseRisk analysis (engineering)HealthbusinessIEC 80001-1Machine translating
researchProduct

Anomaly detection in dynamic systems using weak estimators

2011

Accepted version of an article from the journal: ACM transactions on internet technology. Published version available from the ACM: http://dx.doi.org/10.1145/1993083.1993086 Anomaly detection involves identifying observations that deviate from the normal behavior of a system. One of the ways to achieve this is by identifying the phenomena that characterize “normal” observations. Subsequently, based on the characteristics of data learned from the “normal” observations, new observations are classified as being either “normal” or not. Most state-of-the-art approaches, especially those which belong to the family of parameterized statistical schemes, work under the assumption that the underlying…

Change over timeVDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413education.field_of_studyComputer Networks and CommunicationsComputer sciencePopulationEstimatorParameterized complexityVDP::Technology: 500::Information and communication technology: 550Network monitoringcomputer.software_genreOutlierAnomaly detectionData miningeducationcomputer
researchProduct

Childhood Adversities and Adult Headache in Poland and Germany.

2015

Objective Various childhood adversities have been found to be associated with chronic pain in adulthood. However, associations were moderate in most studies, i.e. odds ratios (OR) were between one and two. Method An internet survey was performed in 508 Polish and 500 German subjects. A total of 19 childhood adversities were selected and their associations with headaches explored. Age, gender and country were included as potential confounders, as well as their two-way interaction with the risk factors. Results Two strong risk factors were identified. (1) A combined score for physical and emotional neglect showed an odds ratio (OR) of 2.78 (p < .002) to the frequency of headache in adulthood …

Child abuseMalePhysiologyEconomicsSensory PhysiologySocial Scienceslcsh:MedicineCriminologyPathology and Laboratory MedicinePediatrics0302 clinical medicineSociology030202 anesthesiologyRisk FactorsGermanyOdds RatioMedicine and Health SciencesMicroeconomicsMedicineChild AbuseComputer NetworksChildlcsh:ScienceEmotional neglectmedia_commonMultidisciplinaryHeadachesOrganic CompoundsConfoundingChronic painHeadacheSensory SystemsChemistryAdult Survivors of Child Adverse EventsSomatosensory SystemChild PreschoolPhysical SciencesFemaleCrimeHeadachesmedicine.symptomResearch ArticleAdultmedicine.medical_specialtyComputer and Information Sciencesmedia_common.quotation_subjectNeglect03 medical and health sciencesSigns and SymptomsHumansAdultsPsychiatryMigraineInternetbusiness.industryOrganic Chemistrylcsh:RInfant NewbornChemical CompoundsInfantBiology and Life SciencesPain SensationOdds ratiomedicine.diseaseHealth SurveysHousehold EconomicsMigraineAge GroupsAlcoholsPeople and PlacesPopulation Groupingslcsh:QPolandbusiness030217 neurology & neurosurgeryDemographyNeurosciencePLoS ONE
researchProduct

Fotovoz como metodología innovadora en educación superior

2022

La adaptación al EEES ha exigido el surgimiento de metodologías activas adscritas a la educación, siendo fotovoz clave en diferentes niveles educativos. Sin embargo, la investigación en el contexto educativo, y en concreto en el de Educación Superior, es escaso. Por tanto, el objetivo de este trabajo es analizar el uso de fotovoz en educación superior, a través de una revisión sistemática basada en la Declaración PRISMA 2020 en tres bases de datos. Quince de los 408 estudios identificados cumplieron con los criterios de inclusión. Los resultados posicionan Fotovoz como una alternativa educativa con potencial en entornos de Educación Superior. The adaptation to the EHEA has demanded the emer…

Ciències socials MetodologiaComputer Networks and CommunicationsEducacióEducació InvestigacióComputer Science ApplicationsInformation SystemsTECHNO REVIEW. International Technology, Science and Society Review /Revista Internacional de Tecnología, Ciencia y Sociedad
researchProduct

Educating reflective Enterprise Systems practitioners: a design research study of the iterative building of a teaching framework

2013

This research paper reports on the iterative design of a teaching framework developed for teaching Enterprise Systems ES classes for Information Systems IS graduates. These systems embed technical complexity and create organizational challenges when implemented in organizations. Therefore, teaching good ES classes is pedagogically challenging for faculty, and ES curricula are difficult for students. We have gradually designed and rebuilt curricula and teaching frameworks over 8years. This has also resulted in a set of eight design principles. We report from our design and evaluation process and present our final artefact, the teaching framework. The aim is to educate reflective practitioner…

Class (computer programming)EngineeringKnowledge managementIterative designComputer Networks and Communicationsbusiness.industryCollaborative learningEducational researchEnterprise systemTeaching and learning centerComputingMilieux_COMPUTERSANDEDUCATIONInformation systembusinessCurriculumSoftwareInformation SystemsInformation Systems Journal
researchProduct

The effectiveness of office information systems: a social action perspective

1991

. The purpose of this paper is to show that a number of basic issues have not been adequately addressed in existing office information systems research. Prominent among these are the nature and role of offices, the goals of office information systems development, and the nature of its organizational and managerial consequences. It is proposed that office information systems should be analysed as social action systems the behaviour of which is strongly affected by socially determined forces and constraints such as the behaviour-channelling influences of authority, norms, customs, habits and precedence. Four types of social action are discussed: instrumental, strategic, communicative and disc…

Class (computer programming)Knowledge managementComputer Networks and Communicationsbusiness.industryPerspective (graphical)Object systemPublic relationsObject (philosophy)Action (philosophy)Social systemInformation systemSociologyAffect (linguistics)businessSoftwareInformation SystemsInformation Systems Journal
researchProduct

Noise-tolerant efficient inductive synthesis of regular expressions from good examples

1997

We present an almost linear time method of inductive synthesis restoring simple regular expressions from one representative (good) example. In particular, we consider synthesis of expressions of star-height one, where we allow one union operation under each iteration, and synthesis of expressions without union operations from examples that may contain mistakes. In both cases we provide sufficient conditions defining precisely the class of target expressions and the notion of good examples under which the synthesis algorithm works correctly, and present the proof of correctness. In the case of expressions with unions the proof is based on novel results in the combinatorics of words. A genera…

Class (set theory)CorrectnessComputer programComputer Networks and CommunicationsComputer scienceComputer experimentTheoretical Computer ScienceHardware and ArchitectureSimple (abstract algebra)Regular expressionTime complexityAlgorithmSoftwareProgram synthesisNew Generation Computing
researchProduct

On the chromatic number of disk graphs

1998

Colorings of disk graphs arise in the study of the frequency-assignment problem in broadcast networks. Motivated by the observations that the chromatic number of graphs modeling real networks hardly exceeds their clique number, we examine the related properties of the unit disk (UD) graphs and their different generalizations. For all these graphs including the most general class of the double disk (DD) graphs, it is shown that X(G) ≤ c.ω(G) for a constant c. Several coloring algorithms are analyzed for disk graphs, aiming to improve the bounds on X(G). We find that their worst-case performance expressed in the number of used colors is indeed reached in some instances.

Clique-sumComputer Networks and CommunicationsTrapezoid graph1-planar graphMetric dimensionCombinatoricsIndifference graphPathwidthHardware and ArchitectureChordal graphMaximal independent setSoftwareMathematicsofComputing_DISCRETEMATHEMATICSInformation SystemsMathematicsNetworks
researchProduct

Using Cloud Computing to Implement a Security Overlay Network

2012

This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.

Cloud computing securityComputer Networks and CommunicationsComputer scienceNetwork securitybusiness.industryOverlay networkDenial-of-service attackCloud computingIntrusion detection systemElectronic mailNetwork Access ControlElectrical and Electronic EngineeringbusinessLawComputer networkIEEE Security &amp; Privacy Magazine
researchProduct

Comparative analysis of architectures for monitoring cloud computing infrastructures

2015

The lack of control over the cloud resources is one of the main disadvantages associated to cloud computing. The design of efficient architectures for monitoring such resources can help to overcome this problem. This contribution describes a complete set of architectures for monitoring cloud computing infrastructures, and provides a taxonomy of them. The architectures are described in detail, compared among them, and analysed in terms of performance, scalability, usage of resources, and security capabilities. The architectures have been implemented in real world settings and empirically validated against a real cloud computing infrastructure based on OpenStack. More than 1000 virtual machin…

Cloud computing securityComputer Networks and Communicationsbusiness.industryComputer scienceDistributed computingCloud computingcomputer.software_genreSet (abstract data type)Utility computingHardware and ArchitectureVirtual machineScalabilitybusinesscomputerSoftwareFuture Generation Computer Systems
researchProduct