Sciweavers

1352 search results - page 141 / 271
» Designing Security Requirements Models Through Planning
Sort
View
PRIMA
2007
Springer
14 years 4 months ago
An Agent Modeling Method Based on Scenario Rehearsal for Multiagent Simulation
Multiagent Systems are potential computational systems for various practical applications, tools, and so on. Multiagent simulation is one of the remarkable application to evaluate ...
Shohei Yamane, Toru Ishida
CASES
2003
ACM
14 years 3 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
EUROMICRO
2005
IEEE
14 years 3 months ago
Modelling of Input-Parameter Dependency for Performance Predictions of Component-Based Embedded Systems
The guaranty of meeting the timing constraints during the design phase of real-time component-based embedded software has not been realized. To satisfy real-time requirements, we ...
Egor Bondarev, Peter H. N. de With, Michel R. V. C...
ISCA
2012
IEEE
224views Hardware» more  ISCA 2012»
12 years 20 days ago
A first-order mechanistic model for architectural vulnerability factor
Soft error reliability has become a first-order design criterion for modern microprocessors. Architectural Vulnerability Factor (AVF) modeling is often used to capture the probab...
Arun A. Nair, Stijn Eyerman, Lieven Eeckhout, Lizy...
CHI
2000
ACM
14 years 2 months ago
Instructional interventions in computer-based tutoring: differential impact on learning time and accuracy
We can reliably build “second generation” intelligent computer tutors that are approximately half as effective as human tutors. This paper evaluates two interface enhancements...
Albert T. Corbett, Holly J. Trask