نتایج جستجو برای: 4 assurance

تعداد نتایج: 1321914  

2009
Jon G. Hall

The design of assurance cases is hampered by the positand-prove approach to software and systems engineering; it has been observed that, traditionally, a product is produced and then evidence from the development is looked for to build an assurance case. Although post-hoc assured development is possible, it often results in errors being uncovered late—leading to costly redevelopment—or to syste...

Journal: :Same-day surgery 1977
S F Jencks

Any facility or program operated by the Office of Mental Health shall restrict the use of personal cell phones, recording devices, and wireless devices on the grounds of such facility or program, as set forth in this policy directive, provided, however, that the use of personally owned cell phones, recording devices, and wireless devices within forensic and secure facilities or units shall be i...

Journal: :The Journal of Cell Biology 2002
Nicole LeBrasseur

In This Issue In This Issue Rabs make their way to mitochondria he large family of Rab GTPases has various functions, including the assembly of proteins required for endocytosis and membrane trafficking. Now, a new function for a Rab is emerging. On page 659, Alto et al. describe a Rab that affects mitochon-drial fission. This GTPase, Rab32, also has an unusual binding partner, the cAMP-depende...

1998
Jeffrey R. Williams George F. Jelen

Informed decisions about security depend upon a complex set of factors related to both assurance and risk. In this paper we argue for a new definition of assurance, specifically describing its relationship to measurements of risk or security. The following definition expands the traditional definition of assurance to include a broad range of evidence, while narrowing the scope to a specific typ...

Journal: :Qanun medika : jurnal kedokteran Fakultas Kedokteran FKUM Surabaya 2023

Indonesia was the second world's highest TB case in 2021. Tuberculosis therapy that takes a long time can cause patients to drop out of treatment. Hospitals conduct quality evaluations regularly and improve health service personnel realize excellent services. This literature review aims determine effect tuberculosis services on patient compliance with anti-tuberculosis drugs. written using syst...

2007
Yi Qian

1.1 INTRODUCTION Recent advances in computer networks and information technology (IT) and the advent and growth of the Internet have created unprecedented levels of opportunities for the connectivity and interaction of information systems at a global level. This has provided significant new possibilities for advancing knowledge and societal interactions across the spectrum of human endeavors , ...

2015
Nabil Moussa Sandra Moussa

In this paper some of the aspects of implementing measures for quality assurance of e-learning in developing countries are discussed. Also the main problems of establishing quality assurance of e-learning are illustrated. The advantages of adopting international measures of quality assurance in those countries together with several recommendations for the future and our conclusion are then given.

2007
Noura Abbas Andrew M. Gravell Gary B. Wills

1. What is the quality of Agile Software, importantly, how we can evaluate the quality of Agile Software? 2. Can Agile assure the quality under time pressure and with unstable requirements? 3. What are the best ways to assure the quality of Agile Software? 4. Different organizations interpret words like Agile and iterative in different ways. Therefore, another question is how do organizations u...

2005
Sushil Jajodia Christopher Kruegel Fredrik Valeur Giovanni Vigna

The goals of Kluwer International Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source for advanced and timely topics in information security research and development. The scope of this series includes all aspects of computer and network security ...

2009
Chad DeStefano Thomas Clark

The increased use of machine assistance has opened new doors for adversaries to thwart coalition planning processes and systems using the next generation of sophisticated cyber exploits. These new attack vectors, aimed directly at our core mission-essential systems, will not close during normal operations and will require Command and Control (C2) planners to operate in contested environments re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید