Sciweavers

327 search results - page 38 / 66
» Model Checking and Evidence Exploration
Sort
View
FMSB
2008
199views Formal Methods» more  FMSB 2008»
13 years 11 months ago
Bounded Asynchrony: Concurrency for Modeling Cell-Cell Interactions
We introduce bounded asynchrony, a notion of concurrency tailored to the modeling of biological cell-cell interactions. Bounded asynchrony is the result of a scheduler that bounds ...
Jasmin Fisher, Thomas A. Henzinger, Maria Mateescu...
ICNS
2009
IEEE
14 years 4 months ago
Psychometric and Evidentiary Approaches to Simulation Assessment in Packet Tracer Software
Packet Tracer is a comprehensive instructional software application for teaching skills and concepts associated with computer networking. In addition to a wide range of simulation...
Dennis C. Frezzo, John T. Behrens, Robert J. Misle...
HICSS
2008
IEEE
125views Biometrics» more  HICSS 2008»
14 years 4 months ago
The Impact of Virtual Technologies on Organizational Knowledge Creation: An Empirical Study
– This study examines the processes of organizational knowledge creation in two highly virtualized teams, one involved in the design of a small city car and the second in the re-...
Antonio Vaccaro, Francisco Veloso, Stefano Brusoni
MWCN
2004
Springer
14 years 3 months ago
The Receiver's Dilemma
In Mobile Ad Hoc Networks (MANETs), each node has the capacity to act as a router. The performance of the MANET relies on how well the nodes perform this function. In simulations,...
John P. Mullen, Timothy Matis, Smriti Rangan
CHB
2011
158views more  CHB 2011»
13 years 4 months ago
Factors mediating disclosure in social network sites
In this paper, we explore how privacy settings and privacy policy consumption (reading the privacy policy) affect the relationship between privacy attitudes and disclosure behavio...
Frederic Stutzman, Robert Capra, Jamila Thompson