• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 14,756
Next 10 →

Table 4 Types of output from the different risk assessment tools

in PRIVACY MARKING
by Mr Sc Monnington, Mr Mi Gray 2002
"... In PAGE 15: ...Direct comparison of the raw scores provided by the different tools was not possible due to the different types of data returned by the tools (see Table4 for data types). Therefore, the non-parametric Friedman test was used for statistical analysis.... ..."

Table 1 Extant manual handling risk assessment tools (a)

in PRIVACY MARKING
by Mr Sc Monnington, Mr Mi Gray 2002

Table 2 Extant manual handling risk assessment tools (b)

in PRIVACY MARKING
by Mr Sc Monnington, Mr Mi Gray 2002
"... In PAGE 29: ... Errors in these models are shown in Tables 26 to 29 using the hatching in Table 25. Table 22 Hatching code for model errors 4 3 2 1 0 -1 -2 -3 -4 Table A in REBA combines the scores for the neck, trunk and legs ( Table2 6). With a minimum error of 0 and a maximum error of 1, it can be derived using Equation (13): (13) Table A score l Neck + Trunk + Legs -2 The Load/Force score is added to the Table A score to generate Score A: (14) Score A = Table A score + Load/Force Therefore: (15) Score A l Neck + Trunk + Legs + Load/Force - 2... ..."

Table 3-2. Summary of COTS Development and Test Tools Risk Assessment RFP

in unknown title
by unknown authors
"... In PAGE 11: ... A summary of the results of this assessment is presented in Table 3-1. Table3 -1. Summary of COTS Software Libraries Risk Assessment (1 of 2) RFP RFC Product Description COTS Name Multi-Threaded Process Risk Section Reference #3 RDBMS for IMS server to support data query, location, and ordering of EOS and non-EOS data Sybase High - Sybase OpenClient 10 and DB-lib Sybase client library currently are not DCE thread safe.... In PAGE 12: ...420-TP-013-001 Table3 -1. Summary of COTS Software Libraries Risk Assessment (2 of 2) RFP RFC Product Description COTS Name Multi-Threaded Process Risk Section Reference #12 Math/Stat libraries to be installed at EDF, each DAAC, and SCF.... ..."

Table 9: Correlation of risk with tool usage (* significant p lt;0.05). Correlation (r) All tools

in Examining the Relationship between Perceived Project Risk and the Use of Collaborative Environments
by Dennis P. Groth
"... In PAGE 6: ... Only 7 out of 56 students reported an increase in risk when comparing the last assessment to the lowest assessment over the 56 month reporting period. Table9 shows the correlation between perceived risk and the use of each of the tools reported by the students. The results indicate a slight positive correlation between the total use of tools and perceived project risk.... ..."

Table 3-1. Summary of COTS Software Libraries Risk Assessment (2 of 2) RFP

in unknown title
by unknown authors
"... In PAGE 11: ... A summary of the results of this assessment is presented in Table 3-1. Table3 -1. Summary of COTS Software Libraries Risk Assessment (1 of 2) RFP RFC Product Description COTS Name Multi-Threaded Process Risk Section Reference #3 RDBMS for IMS server to support data query, location, and ordering of EOS and non-EOS data Sybase High - Sybase OpenClient 10 and DB-lib Sybase client library currently are not DCE thread safe.... In PAGE 13: ...420-TP-013-001 Table3 -2. Summary of COTS Development and Test Tools Risk Assessment RFP RFC Product Description COTS name Problem Supporting Thread Safe Code Development Section Reference #13 Capture/Playback test tool SW to conduct regression testing; identify max.... ..."

Table 1. Risk Assessment

in unknown title
by unknown authors
Cited by 1

Table 1. Methodology Risk Assessment

in MTR 96B0000067 VO1 Distributed Object Management Integration System (DOMIS) FY96 Final Report
by Volume Migration Technology, S. L. Surer, E. R. Hughes, R. S. Hyland, A. S. Rosenthal, A. L. Schafer
"... In PAGE 28: ...1 Risk Assessment The steps of the methodology described above present varying degrees of risk, both programmatic and technical. Table1 depicts the relative amount of overall risk that our project team encountered during each of the steps of the methodology.7... ..."

TABLE I RISK ASSESSMENT RESULTS

in > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Technical Guidelines for Enhancing Privacy and Data Protection in Modern Electronic Medical Environments
by Stefanos Gritzalis, Costas Lambrinoudakis, Dimitrios Lekkas, Spyros Deftereos

Table 2: Applicability of Different Risk Analysis Methodologies to Computer System Validation

in Effective and Practical Risk Management Options for Computerised System Validation
by unknown authors
"... In PAGE 37: ...Page 37 of 51 Summary of Risk Analysis Methodologies There is no universally applicable risk analysis methodology for computer system validation as Table2 demonstrates. Therefore, the onus is on a validation team to select the right tool for the job, using FMEA or FRA for applications and either the BS7799 or NIST SP800-30 risk assessment approaches for infrastructure or the IT elements of a specific system.... ..."
Next 10 →
Results 1 - 10 of 14,756
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University