Sciweavers

303 search results - page 43 / 61
» Unifying Theories of Confidentiality
Sort
View
RTSS
2007
IEEE
14 years 4 months ago
Utilization-Bound Based Schedulability Analysis of Weighted Round Robin Schedulers
Schedulability analysis is a cornerstone of modern real-time scheduling theory development. Utilizationbound based schedulability test is considered one of most efficient and effe...
Jianjia Wu, Jyh-Charn Liu, Wei Zhao
ATAL
2007
Springer
14 years 4 months ago
Agent coordination by trade-off between locally diffusion effects and socially structural influences
There were always two separated methods to make agent coordination: individual-local balance perspective and individualsociety balance perspective. The first method only considere...
Yichuan Jiang, Jiuchuan Jiang, Toru Ishida
HICSS
2006
IEEE
122views Biometrics» more  HICSS 2006»
14 years 3 months ago
Adoption of Mobile Devices/Services - Searching for Answers with the UTAUT
The future of mobile telephony is expected to rely on mobile services and the use of mobile services will be an integral part of the revenues to be generated by third generation m...
Christer Carlsson, Joanna Carlsson, Kaarina Hyv&ou...
HICSS
2006
IEEE
144views Biometrics» more  HICSS 2006»
14 years 3 months ago
Habermasian Inquiring System: Toward a General Framework for Knowledge Management Research
This study addresses a long-standing and wellrecognized problem in KM research, namely the lack of conceptual integration and a cumulative tradition. Knowledge management needs an...
Zining Guo, James Sheffield
ICECCS
2006
IEEE
90views Hardware» more  ICECCS 2006»
14 years 3 months ago
A Type System for the Relational Calculus of Object Systems
Being a successful technique in software practice, Object Orientation (OO) is a hot topic in academic research fields. Among many formalisms, rCOS, a refinement calculus of obje...
Liang Zhao, Xiangpeng Zhao, Quan Long, Zongyan Qiu