Sciweavers

9124 search results - page 159 / 1825
» Requirements-Based Design Evaluation
Sort
View
MA
2001
Springer
175views Communications» more  MA 2001»
15 years 8 months ago
Evaluating the Security of Three Java-Based Mobile Agent Systems
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution enviro...
Sebastian Fischmeister, Giovanni Vigna, Richard A....
AVI
2008
15 years 6 months ago
An empirical evaluation of interactive visualizations for preferential choice
Many critical decisions for individuals and organizations are often framed as preferential choices: the process of selecting the best option out of a set of alternatives. This pap...
Jeanette Bautista, Giuseppe Carenini
DAC
2005
ACM
15 years 6 months ago
Asynchronous circuits transient faults sensitivity evaluation
1 This paper presents a transient faults sensitivity evaluation for Quasi Delay Insensitive (QDI) asynchronous circuits. Because of their specific architecture, asynchronous circui...
Yannick Monnet, Marc Renaudin, Régis Leveug...
WMC
2004
224views ECommerce» more  WMC 2004»
15 years 5 months ago
Evaluation Framework for a Mobile Marketing Application in 3rd Generation Networks
: Testing of a software application serves the accomplishment of two dis tinct objectives: ensuring functionality and end-user acceptance. However, with an increasing desire for mo...
Franz Lehner, Eva-Maria Sperger, Holger Nösek...
USITS
2003
15 years 5 months ago
Using Fault Injection and Modeling to Evaluate the Performability of Cluster-Based Services
We propose a two-phase methodology for quantifying the performability (performance and availability) of cluster-based Internet services. In the first phase, evaluators use a fault...
Kiran Nagaraja, Xiaoyan Li, Ricardo Bianchini, Ric...