Sciweavers

4350 search results - page 685 / 870
» Case studies for contract-based systems
Sort
View
MIDDLEWARE
2005
Springer
15 years 9 months ago
Middleware for protocol-based coordination in dynamic networks
Pervasive and ad hoc computing applications are frequently deployed in dynamic networks. Due to mobility of the computing nodes, their unreliability, or a limited communication ra...
Kurt Schelfthout, Danny Weyns, Tom Holvoet
RE
2005
Springer
15 years 9 months ago
Contextual Risk Analysis for Interview Design
Interviews with stakeholders can be a useful method for identifying user needs and establishing requirements. However, interviews are also problematic. They are time consuming and...
Tira Cohene, Steve M. Easterbrook
ICICS
2005
Springer
15 years 9 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
CA
2003
IEEE
15 years 9 months ago
Satisfying the Perceived Need for Free-Play in Pedagogically Oriented Interactive Dramas
This research explores ways of harnessing people’s passion for entertainment in order to stimulate players to attain the meta-learning skills they need for lifelong learning and...
Barry G. Silverman, Michael Johns, Ransom Weaver
HICSS
2003
IEEE
104views Biometrics» more  HICSS 2003»
15 years 9 months ago
Information Technology Investment and Adoption: A Rational Expectations Perspective
This study examines the potential applications of the Rational Expectations Hypothesis (REH) in information technology (IT) investment and adoption decisionmaking. Although REH ha...
Yoris A. Au, Robert J. Kauffman