Sciweavers

504 search results - page 12 / 101
» Message Structures: a modelling technique for information sy...
Sort
View
ICCSA
2010
Springer
14 years 23 days ago
Geospatial Analysis of Cooperative Works on Asymmetric Information Environment
In the so-called Information-Explosion Era, astronomical amount of information is ubiquitously produced and digitally stored. It is getting more and more convenient for cooperative...
Tetsuya Kusuda, Tetsuro Ogi
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
14 years 1 months ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
EMSOFT
2005
Springer
14 years 1 months ago
A structural approach to quasi-static schedulability analysis of communicating concurrent programs
We describe a system as a set of communicating concurrent programs. Quasi-static scheduling compiles the concurrent programs into a sequential one. It uses a Petri net as an inter...
Cong Liu, Alex Kondratyev, Yosinori Watanabe, Albe...
CAISE
2007
Springer
14 years 1 months ago
Analyzing the Dynamic Cost Factors of Process-Aware Information Systems: A Model-Based Approach
Introducing process-aware information systems (PAIS) in enterprises is usually associated with high costs. It is therefore crucial to understand those factors that determine these ...
Bela Mutschler, Manfred Reichert, Stefanie Rinderl...
DAC
2007
ACM
14 years 8 months ago
Modeling the Function Cache for Worst-Case Execution Time Analysis
Static worst-case execution time (WCET) analysis is done by modeling the hardware behavior. In this paper we describe a WCET analysis technique to analyze systems with function ca...
Raimund Kirner, Martin Schoeberl