23 research outputs found
Recommended from our members
Finding the object'' proceedings addendum
The purpose of this workshop was to discuss finding the object -- that is, how software engineers imagine, invent, design, or recycle objects and their behaviors for object-oriented software engineering. The workshop organizers (and, as we subsequently discovered, several of the workshop participants) felt that this issue is crucial to successful object-oriented software engineering (after all, finding objects is what the projects is all about, isn't it ). Unfortunately, when previous workshops have had the opportunity to review and discuss techniques practitioners use to find objects, too often the results were heated debates on what is an object '' which becomes all consuming. We believed that, given appropriate control over the question of which kind of object'' is being discussed (which meant tell us what object you are trying to find, then tell us your method), a workshop to concentrate on techniques for finding objects would be quite appropriate. 8 refs., 2 figs
Recommended from our members
A methodology for evaluating potential KBS (Knowledge-Based Systems) applications
It is often difficult to assess how well Knowledge-Based Systems (KBS) techniques and paradigms may be applied to automating various tasks. This report describes the approach and organization of an assessment procedure that involves two levels of analysis. Level One can be performed by individuals with little technical expertise relative to KBS development, while Level Two is intended to be used by experienced KBS developers. The two levels review four groups of issues: goals, appropriateness, resources, and non-technical considerations. Those criteria are identified which are important at each step in the assessment. A qualitative methodology for scoring the task relative to the assessment criteria is provided to alloy analysts to make better informed decisions with regard to the potential effectiveness of applying KBS technology. In addition to this documentation, the assessment methodology has been implemented for personal computers use using the HYPERCARD{trademark} software on a Macintosh{trademark} computer. This interactive mode facilities small group analysis of potential KBS applications and permits a non-sequential appraisal with provisions for automated note-keeping and question scoring. The results provide a useful tool for assessing the feasibility of using KBS techniques in performing tasks in support of treaty verification or IC functions. 13 refs., 3 figs
Recommended from our members
The use of information technology security assessment criteria to protect specialized computer systems
The purpose of this paper is to discuss the information security assessment criteria used in Russia and compare it with that used in the United States. The computer system security assessment criteria utilized by the State Technical Commission of Russia and similar criteria utilized by the US Department of Defense (TCSEC) are intended for the development and implementation of proven methods for achieving a required level of information security. These criteria are utilized, first and foremost, when conducting certification assessments of general purpose systems. The Russian Federation is creating specialized systems for nuclear material control and accountancy (MC and A) within the framework of the international laboratory-to-laboratory collaboration. Depending on the conditions in which the MC and A system is intended to operate, some of the criteria and the attendant certification requirements may exceed those established or may overlap the requirements established for attestation of such systems. In this regard it is possible to modify the certification and attestation requirements depending on the conditions in which a system will operate in order to achieve the ultimate goal--implementation of the systems in the industry
Basaloid squamous cell carcinoma of the upper aerodigestive tract: a single squamous cell carcinoma subtype or two distinct entities hiding under one histologic pattern?
Item does not contain fulltex
Surgical margins in head and neck cancer: A contemporary review
Adequate resection margins are critical to the treatment decisions and prognosis of patients with head and neck squamous cell carcinoma (HNSCC). However, there are numerous controversies regarding reporting and interpretation of the status of resection margins. Fundamental issues relating to the basic definition of margin adequacy, uniform reporting standards for margins, optimal method of specimen dissection, and the role of intraoperative frozen section evaluation, all require further clarification and standardization. Future horizons for margin surveillance offer the possible use of novel methods such as "molecular margins" and contact microscopic endoscopy, However, the limitations of these approaches need to be understood. The goal of this review was to evaluate these issues to define a more rational, standardized approach for achieving resection margin adequacy for patients with HNSCC undergoing curative resection. (c) 2012 Wiley Periodicals, Inc. Head Neck, 2013
Reply to the letter to the editor by Straetmans et al
Item does not contain fulltex