Sciweavers

575 search results - page 34 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
DIGRA
2005
Springer
14 years 1 months ago
Extending Soft Models to Game Design: Flow, Challenges and Conflicts
Challenge and conflict are elements that all game designers strive to engineer into their games. Research shows that challenge is what drives a high proportion of games players ye...
Abdennour El Rhalibi, Martin Hanneghan, Stephen Ta...
TOCS
2002
70views more  TOCS 2002»
13 years 7 months ago
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
SAC
2004
ACM
14 years 1 months ago
Information requirements engineering for data warehouse systems
Information requirements analysis for data warehouse systems differs significantly from requirements analysis for conventional information systems. Based on interviews with projec...
Robert Winter, Bernhard Strauch
ICPP
1998
IEEE
13 years 12 months ago
Response Time Analysis for Distributed Real-Time Systems with Bursty Job Arrivals
This paper presents a new schedulability analysis methodology for distributed hard real-time systems with bursty job arrivals. The schedulability is analyzed by comparing worst-ca...
Chengzhi Li, Riccardo Bettati, Wei Zhao
ISSS
2002
IEEE
106views Hardware» more  ISSS 2002»
14 years 18 days ago
Modeling Assembly Instruction Timing in Superscalar Architectures
This paper proposes an original model of the execution time of assembly instructions in superscalar architectures. The approach is based on a rigorous mathematical model and provi...
William Fornaciari, Vito Trianni, Carlo Brandolese...