Sciweavers

20655 search results - page 3904 / 4131
» Exploring Software Systems
Sort
View
91
Voted
DSN
2002
IEEE
15 years 7 months ago
Process Modelling to Support Dependability Arguments
This paper reports work to support dependability arguments about the future reliability of a product before there is direct empirical evidence. We develop a method for estimating ...
Robin E. Bloomfield, Sofia Guerra
127
Voted
DSN
2002
IEEE
15 years 7 months ago
Performability Analysis of Guarded-Operation Duration: A Successive Model-Translation Approach
When making an engineering design decision, it is often necessary to consider its implications on both system performance and dependability. In this paper, we present a performabi...
Ann T. Tai, William H. Sanders, Leon Alkalai, Savi...
84
Voted
HICSS
2002
IEEE
73views Biometrics» more  HICSS 2002»
15 years 7 months ago
Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design
This paper reports on one of the first efforts to apply Value-Sensitive Design (VSD) to a large-scale real-world software system. We sought to improve informed consent in Web-base...
Batya Friedman, Daniel C. Howe, Edward W. Felten
108
Voted
HICSS
2002
IEEE
99views Biometrics» more  HICSS 2002»
15 years 7 months ago
Privacy in Distributed Electronic Commerce
In recent years there has been a movement toward deployment of distributed approaches for electronic commerce. Intelligent software agents, for instance, may be instructed to act ...
Larry Korba
98
Voted
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
15 years 7 months ago
Legitimate by Design: Towards Trusted Virtual Community Environments
Legitimacy is a key part of the social requirements specification for a trusted virtual community environment (VCE). If an environment is not seen as legitimate, social conflicts m...
Brian Whitworth, Aldo de Moor
« Prev « First page 3904 / 4131 Last » Next »