3,037 research outputs found

    Saikewicz: Nontreatment Decisions for Incompetents

    Get PDF

    Transforming a Rule-based Program

    Get PDF
    Conflict resolution is a form of global control used in production systems to achieve an efficient sequential execution of a rule-based program. This type of control is not used to parallel production system models [6,13]. Instead, only those programs that make no assumptions regarding conflict resolution are executed in parallel. Therefore, the initial sequential rule-based programs are either executed in parallel without their conflict resolution strategy, which normally results in incorrect behavior, or the programs are transformed in an ad hoc manner to execute on an particular parallel production system model. As a result, these programs do not exhibit the parallelism hoped for [10,13]. We believe that a second reason behind the lack of parallelism is that no formal methods of verifying the correctness of rule-based programs are utilized. By correctness, we mean verifying the behavior of the program meets the specifications given. Correctness is especially important when conflict resolution is no longer utilized. It is necessary to transform sequential rule-based programs into equivalent programs without conflict resolution. Also, the parallel execution of a rule-based program is more complex and demands these formal methods even more than its sequential counterpart. In this paper, we present preliminary ideas for an approach to designing and developing correct rule-based programs for parallel execution. We investigate the difficulty in transforming a simple sequential rule-based program to a new version of the program with no conflict resolution. Also, we investigate the use of a new programming paradigm and language that may result in more efficient programs which provably correct, and can be executed in parallel [2]

    Roses at Twilight

    Get PDF
    https://digitalcommons.library.umaine.edu/mmb-vp/6146/thumbnail.jp

    Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards

    Get PDF
    Companies and government organizations are increasingly compelled, if not required by law, to ensure that their information systems will comply with various federal and industry regulatory standards, such as the NIST Special Publication on Security Controls for Federal Information Systems (NIST SP-800-53), or the Common Criteria (ISO 15408-2). Such organizations operate business or mission critical systems where a lack of or lapse in security protections translates to serious confidentiality, integrity, and availability risks that, if exploited, could result in information disclosure, loss of money, or, at worst, loss of life. To mitigate these risks and ensure that their information systems meet regulatory standards, organizations must be able to (a) contextualize regulatory documents in a way that extracts the relevant technical implications for their systems, (b) formally represent their systems and demonstrate that they meet the extracted requirements following an accreditation process, and (c) ensure that all third-party systems, which may exist outside of the information system enclave as web or cloud services also implement appropriate security measures consistent with organizational expectations. This paper introduces a step-wise process, based on semantic hierarchies, that systematically extracts relevant security requirements from control standards to build a certification baseline for organizations to use in conjunction with formal methods and service agreements for accreditation. The approach is demonstrated following a case study of all audit-related controls in the SP-800-53, ISO 15408-2, and related documents. Accuracy, applicability, consistency, and efficacy of the approach were evaluated using controlled qualitative and quantitative methods in two separate studies

    Assessment of the dimensionality of the Wijma delivery expectancy/experience questionnaire using factor analysis and Rasch analysis

    Get PDF
    Background: Fear of childbirth has negative consequences for a woman's physical and emotional wellbeing. The most commonly used measurement tool for childbirth fear is the Wijma Delivery Expectancy Questionnaire (WDEQ-A). Although originally conceptualized as unidimensional, subsequent investigations have suggested it is multidimensional. This study aimed to undertake a detailed psychometric assessment of the WDEQ-A; exploring the dimensionality and identifying possible subscales that may have clinical and research utility. Methods: WDEQ-A was administered to a sample of 1410 Australian women in mid-pregnancy. The dimensionality of WDEQ-A was explored using exploratory (EFA) and confirmatory factor analysis (CFA), and Rasch analysis. Results: EFA identified a four factor solution. CFA failed to support the unidimensional structure of the original WDEQ-A, but confirmed the four factor solution identified by EFA. Rasch analysis was used to refine the four subscales (Negative emotions: five items; Lack of positive emotions: five items; Social isolation: four items; Moment of birth: three items). Each WDEQ-A Revised subscale showed good fit to the Rasch model and adequate internal consistency reliability. The correlation between Negative emotions and Lack of positive emotions was strong, however Moment of birth and Social isolation showed much lower intercorrelations, suggesting they should not be added to create a total score. Conclusion: This study supports the findings of other investigations that suggest the WDEQ-A is multidimensional and should not be used in its original form. The WDEQ-A Revised may provide researchers with a more refined, psychometrically sound tool to explore the differential impact of aspects of childbirth fear.Full Tex
    • …
    corecore