Sciweavers

1439 search results - page 190 / 288
» A Component Model Engineered with Components and Aspects
Sort
View
131
Voted
NETGAMES
2005
ACM
15 years 9 months ago
Framework for evaluation of networked mobile games
In this position paper we propose an evaluation framework for networked mobile gaming, consisting of user, group, communication, and environment models. Each of these components a...
Leo Petrak, Olaf Landsiedel, Klaus Wehrle
121
Voted
WSC
2007
15 years 5 months ago
Building composable bridges between the conceptual space and the implementation space
Often the process and effort in building interoperable Command and Control (C2) systems and simulations can be arduous. Invariably the difficulty is in understanding what is inten...
Paul Gustavson, Tram Chase
127
Voted
CPAIOR
2008
Springer
15 years 5 months ago
Optimal Deployment of Eventually-Serializable Data Services
Abstract. Replication is a fundamental technique for increasing throughput and achieving fault tolerance in distributed data services. However, its implementation may induce signif...
Laurent Michel, Alexander A. Shvartsman, Elaine L....
SIMULATION
2008
139views more  SIMULATION 2008»
15 years 3 months ago
Constitutive Hybrid Processes: a Process-Algebraic Semantics for Hybrid Bond Graphs
Models of physical systems have to be based on physical principles such as conservation of energy and continuity of power. These principles are inherently enforced by the bond gra...
Pieter J. L. Cuijpers, Jan F. Broenink, Pieter J. ...
127
Voted
SAC
2006
ACM
15 years 9 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In...
Mike Burmester, Judie Mulholland