Sciweavers

2169 search results - page 362 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
AAAI
2012
11 years 11 months ago
Identifying Bullies with a Computer Game
Current computer involvement in adolescent social networks (youth between the ages of 11 and 17) provides new opportunities to study group dynamics, interactions amongst peers, an...
Juan Fernando Mancilla-Caceres, Wen Pu, Eyal Amir,...
DSONLINE
2006
120views more  DSONLINE 2006»
13 years 8 months ago
Application Deployment on Catallactic Grid Middleware
An architecture for the integration of Grid applications with a Catallactic middleware is described, along with an analysis of issues associated with this integration in a real wo...
Liviu Joita, Omer F. Rana, Pablo Chacin, Isaac Cha...
DAC
2002
ACM
14 years 9 months ago
A physical model for the transient response of capacitively loaded distributed rlc interconnects
Rapid approximation of the transient response of high-speed global interconnects is needed to estimate the time delay, crosstalk, and overshoot in a GSI multilevel wiring network....
Raguraman Venkatesan, Jeffrey A. Davis, James D. M...
SIGSOFT
2008
ACM
14 years 9 months ago
Why do developers neglect exception handling?
In this paper, we explore the problems associated with exception handling from a new dimension: the human. We designed a study that evaluates (1) different perspectives of softwar...
Carsten Görg, Hina Shah, Mary Jean Harrold
CHI
2001
ACM
14 years 9 months ago
What makes Web sites credible?: a report on a large quantitative study
The credibility of web sites is becoming an increasingly important area to understand. To expand knowledge in this domain, we conducted an online study that investigated how diffe...
B. J. Fogg, Jonathan Marshall, Othman Laraki, Alex...