Zobrazeno 1 - 10
of 182
pro vyhledávání: '"Mead, Nancy"'
Caveat emptor, or let the buyer beware, is commonly attributed to open source software (OSS)-the onus is on the OSS consumer to ensure that it is fit for use in the consumer's context. OSS has been compared to an open market bazaar where consumers ar
Externí odkaz:
http://arxiv.org/abs/2404.16737
Autor:
Mead, Nancy
Nutritional status during pregnancy and the effects of nutritional deficiencies on pregnancy outcomes following bariatric surgery is an important issue that warrants further study. Objective: To investigate pregnancy outcomes and nutritional indices
Externí odkaz:
http://hdl.handle.net/10889/8071
This paper presents a method for analyzing the survivability of distributed network systems and an example of its application.
Externí odkaz:
http://arxiv.org/abs/cs/9811011
Publikováno v:
In Procedia CIRP 2016 41:427-430
Autor:
Mead, Nancy C., Sakkatos, Panagiotis, Sakellaropoulos, George C., Adonakis, George L., Alexandrides, Theodore K., Kalfarentzos, Fotis
Publikováno v:
In Surgery for Obesity and Related Diseases November-December 2014 10(6):1166-1173
This report presents instructions for using the Malware-driven Overlooked Requirements (MORE) website applications. The site enables requirements engineers and architects to bring the benefit of malware attack analysis to their own product developmen
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3d5296a4d6b3d11651832c57dfcf8452
Autor:
Mead, Nancy, Moran, Thomas W., Steffler, Jason, Anonymous, Terry, William Dan, Warkentin, Merrill, Williams, John Michael, Phoha, Vir V., Basili, Vic, Brooks, Fred, DeMarco, Tom, Denert, Ernst, Kishida, Koichi, Lehman, Manny, Soloway, Elliot
Publikováno v:
Communications of the ACM. May2000, Vol. 43 Issue 5, p11-15. 5p.
Autor:
Mead, Nancy R.
Publikováno v:
In The Journal of Systems & Software 2009 82(4):571-575
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
In FY 2016, the research team evaluated Security Cards, STRIDE (Spoofing identity, Tampering with data, Repudiation, Information disclosure, Denial of service, Elevation of privilege), and persona non grata (PnG) for effectiveness in threat identific
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3e020eb25de695434d9ab69a18df8a23