Sciweavers

575 search results - page 92 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
DAC
2003
ACM
14 years 27 days ago
Determining appropriate precisions for signals in fixed-point IIR filters
This paper presents an analytical framework for the implementation of digital infinite impulse response filters in fixed-point hardware on field programmable gate arrays. This ana...
Joan Carletta, Robert J. Veillette, Frederick W. K...
SAC
2002
ACM
13 years 7 months ago
Semi-automatic design of agent organisations
Designing realistic multi-agent systems is a complex process, which involves specifying not only the functionality of individual agents, but also the authority relationships and l...
Anthony Karageorgos, Simon G. Thompson, Nikolay Me...
ACMDIS
2006
ACM
14 years 1 months ago
What do usability evaluators do in practice?: an explorative study of think-aloud testing
Think-aloud testing is a widely employed usability evaluation method, yet its use in practice is rarely studied. We report an explorative study of 14 think-aloud sessions, the aud...
Mie Nørgaard, Kasper Hornbæk
SAC
2011
ACM
12 years 10 months ago
Software security aspects of Java-based mobile phones
More and more functionality is provided by mobile phones today; this trend will continue over the next years. However, with the increasing functionality new risks go along. This n...
Karsten Sohr, Tanveer Mustafa, Adrian Nowak
CCS
2009
ACM
14 years 2 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache