Sciweavers

4305 search results - page 668 / 861
» Analysing Protocol Implementations
Sort
View
ECBS
1999
IEEE
138views Hardware» more  ECBS 1999»
15 years 8 months ago
Multi-Domain Surety Modeling and Analysis for High Assurance Systems
Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science which per...
James Davis, Jason Scott, Janos Sztipanovits, Marc...
HICSS
1999
IEEE
183views Biometrics» more  HICSS 1999»
15 years 8 months ago
Extending the Technology Acceptance Model to Account for Social Influence: Theoretical Bases and Empirical Validation
The Technology Acceptance Model (TAM) represents an important theoretical contribution toward understanding IS usage and IS acceptance behaviors [6, 19]. However, as noted by seve...
Yogesh Malhotra, Dennis F. Galletta
130
Voted
CAV
1999
Springer
119views Hardware» more  CAV 1999»
15 years 8 months ago
A Theory of Restrictions for Logics and Automata
BDDs and their algorithms implement a decision procedure for Quanti ed Propositional Logic. BDDs are a kind of acyclic automata. Unrestricted automata (recognizing unbounded string...
Nils Klarlund
EDCC
1999
Springer
15 years 8 months ago
Considering Workload Input Variations in Error Coverage Estimation
The effects of variations in the workload input when estimating error detection coverage using fault injection are investigated. Results from scanchain implemented fault injection ...
Peter Folkesson, Johan Karlsson
RT
1999
Springer
15 years 8 months ago
Lighting Design: A Goal Based Approach using Optimisation
There is a need for reliable lighting design applications because available tools are limited and inappropriate for interactive or creative use. Architects and lighting designers ...
António Cardoso Costa, António Augus...