Sciweavers

739 search results - page 119 / 148
» Information Flow in Credential Systems
Sort
View
RTSS
1994
IEEE
13 years 11 months ago
Bounding Worst-Case Instruction Cache Performance
The use of caches poses a difficult tradeoff for architects of real-time systems. While caches provide significant performance advantages, they have also been viewed as inherently...
Robert D. Arnold, Frank Mueller, David B. Whalley,...
FORTE
2004
13 years 9 months ago
PEPA Nets in Practice: Modelling a Decentralised Peer-to-Peer Emergency Medical Application
Abstract. We apply the PEPA nets modelling language to modelling a peer-topeer medical informatics application, the FieldCare PDA-based medical records system developed by SINTEF T...
Stephen Gilmore, Valentin Haenel, Jane Hillston, L...
ICNP
2007
IEEE
14 years 1 months ago
Loss and Delay Accountability for the Internet
— The Internet provides no information on the fate of transmitted packets, and end systems cannot determine who is responsible for dropping or delaying their traffic. As a resul...
Katerina J. Argyraki, Petros Maniatis, O. Irzak, S...
HICSS
2005
IEEE
77views Biometrics» more  HICSS 2005»
14 years 1 months ago
Towards a Theory of Value Latency for IT Investments
Multiple studies in the information systems (IS) literature recognize that information technology (IT) investments may not yield immediate returns. Nevertheless, there has been a ...
Kim Huat Goh, Robert J. Kauffman
ATAL
2003
Springer
14 years 27 days ago
Information-driven phase changes in multi-agent coordination
Large systems of agents deployed in a real-world environment face threats to their problem solving performance that are independent of the complexity of the problem or the charact...
Sven Brueckner, H. Van Dyke Parunak