Sciweavers

916 search results - page 57 / 184
» Activity Theory for the Analysis and Design of Multi-agent S...
Sort
View
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
14 years 3 months ago
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...
PRIMA
2007
Springer
14 years 3 months ago
Supporting Requirements Analysis in Tropos: A Planning-Based Approach
Abstract. Software systems are becoming more and more part of human life influencing organizational and social activities. This introduces the need of considering the design of a ...
Volha Bryl, Paolo Giorgini, John Mylopoulos
ACMDIS
2006
ACM
14 years 1 months ago
Randomness as a resource for design
Randomness is being harnessed in the design of some interactive systems. This is observed in random blogs, random web searching, and in particular Apple's iPod Shuffle. Yet t...
Tuck Wah Leong, Frank Vetere, Steve Howard
INTERACT
2003
13 years 10 months ago
The Process of Developing a Mobile Device for Communication in a Safety-Critical Domain
: This paper describes the process of developing an interactive mobile system for use in a safety-critical domain. The system was developed to inquire into the extent of which coor...
Jesper Kjeldskov, Jan Stage
HASE
2007
IEEE
14 years 3 months ago
Simulation Models and Implementation of a Simulator for the Performability Analysis of Electric Power Systems Considering Interd
Electric Power Systems (EPS) become more and more critical for our society, since they provide vital services for the human activities. At the same time, obtaining dependable beha...
Francesco Romani, Silvano Chiaradonna, Felicita Di...