نتایج جستجو برای: criteria evaluation

تعداد نتایج: 1043569  

Journal: :J. Digit. Inf. 2006
Susanne Dobratz Stefan Strathmann Astrid Schoger

This paper describes the general approach nestor – the German “Network of Expertise in Long-Term Storage of Digital Resources” has taken in order to design a criteria catalogue for the self-assessment of trusted digital repositories used for long term preservation issues. Further developments will finally led to the implementation of a formal certification process for trusted digital repositories.

2006
Clark Thomborson Matt Barrett

Trusted computing systems offer great promise in corporate and governmental applications. Their uptake has been very slow outside of the national security agencies for which they were developed, in part because they have been difficult and expensive to configure and use. Recent designs are easier to use, but some compliance and governance issues are unresolved. Our analysis suggests that crypto...

2008
Melanie Volkamer Rüdiger Grimm

Remote electronic voting systems are more and more used not so much for parliamentary elections, but nevertheless for elections on lower levels as in associations and at universities. In order to have a basis for the evaluation and certification, in Germany a Common Criteria Protection Profile [PP08] is developed, which defines basic requirements for remote electronic voting systems. This Prote...

Journal: :Depression and anxiety 2010
Hans-Ulrich Wittchen Andrew T Gloster Katja Beesdo-Baum Giovanni A Fava Michelle G Craske

The status of agoraphobia (AG) as an independent diagnostic category is reviewed and preliminary options and recommendations for the fifth edition of The Diagnostic and Statistical Manual (DSM-V) are presented. The review concentrates on epidemiology, psychopathology, neurobiology, vulnerability and risk factors, clinical course and outcome, and correlates and consequences of AG since 1990. Dif...

2000
Vincenzo Cutello Emilio Mastriani Francesco Pappalardo

This paper presents a mechanism to enrich logging as required in TCSEC [1] document to detect and stop possible intrusions based on typical attacks and to protect the sensible audit data from deletion/modification even in root compromise situation. After installing Piranha Audit, administrators will have a solid infrastructure for improving security and resistance to penetration, with only mode...

2006

2 Orange Book labeled systems – background........................................................................................ 3 2.1 Department of Defense security ............................................................................................... 3 2.2 Separate trusted and commercial versions................................................................................ 4 2.3 ...

2006
Marshall D. Abrams Harold J. Podell

In this essay we present an introduction to evaluation issues in the United States and European Community (EC) to illustrate the two schools of thought. Following development of draft national and regional criteria, the US, Canada, and EC are working on Common Criteria (CC). We compare the proposed evaluation approaches in the hope that in the international process of developing the Common Crit...

2012
Will Ansbacher

I would like to comment on the article by Jino Bak, Jin Hwa Choi, Jae-Sung Kim, and Suk Won Park, “Modified dose difference method for comparing dose distributions,” J. Appl. Clin. Med. Phys. 2012; 13(2): 73-80. Something almost identical to their method was in fact first described by Bakai et al.(1) who called their dimensionless index χ. While it is true that Bak et al. refer to this work in ...

Journal: :European journal of cancer 2009
Jan Bogaerts Robert Ford Dan Sargent Lawrence H Schwartz Larry Rubinstein Denis Lacombe Elizabeth Eisenhauer Jaap Verweij Patrick Therasse

BACKGROUND After the initial RECIST 1.0 were published in 2000, the criteria were widely implemented in the scientific oncology community. Since then, the RECIST working group has identified several issues to examine further. Two key issues that required careful, data-based assessment were the maximum number of lesions that should be assessed at each evaluation and the added value of requiring ...

2015
S De Luca C Carrera E Casalini Vañek L Tolkachier L Alarcon E Eyheremendy

Content organisation Our cases will be presented in a pictorial essay mode. Key differential diagnostic points will be highlighted in the discussion of each case. It is important to consider: Complete knowledge of clinical-oncologic status and treatments time points. Recognition of smallest measured value (NADIR) between time points for adequate selection of comparative review. Sum of target le...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید