Sciweavers

1682 search results - page 322 / 337
» A behavior model for persuasive design
Sort
View
PERVASIVE
2010
Springer
15 years 1 months ago
Specification and Verification of Complex Location Events with Panoramic
We present the design and evaluation of Panoramic, a tool that enables end-users to specify and verify an important family of complex location events. Our approach aims to reduce o...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...
SODA
2008
ACM
96views Algorithms» more  SODA 2008»
15 years 1 months ago
Unconditionally reliable message transmission in directed networks
In the unconditionally reliable message transmission (URMT) problem, two non-faulty players, the sender S and the receiver R are part of a synchronous network modeled as a directe...
Bhavani Shankar, Prasant Gopal, Kannan Srinathan, ...
ICETE
2004
253views Business» more  ICETE 2004»
15 years 1 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
WCE
2007
15 years 26 days ago
Correlation of Earthquake Ground Motion and the Response of Seismically Isolated Bridges
Abstract—The seismic response of bridges seismically isolated by lead-rubber bearings (LRB) to earthquake excitations of different magnitudes is presented in this thesis. The fo...
Mario Rinke
RV
2010
Springer
220views Hardware» more  RV 2010»
14 years 9 months ago
Runtime Verification with the RV System
The RV system is the first system to merge the benefits of Runtime Monitoring with Predictive Analysis. The Runtime Monitoring portion of RV is based on the successful Monitoring O...
Patrick O'Neil Meredith, Grigore Rosu