Sciweavers

15253 search results - page 2804 / 3051
» Integer-Programming Software Systems
Sort
View
141
Voted
DSN
2002
IEEE
15 years 8 months ago
Performability Analysis of Guarded-Operation Duration: A Successive Model-Translation Approach
When making an engineering design decision, it is often necessary to consider its implications on both system performance and dependability. In this paper, we present a performabi...
Ann T. Tai, William H. Sanders, Leon Alkalai, Savi...
100
Voted
HICSS
2002
IEEE
73views Biometrics» more  HICSS 2002»
15 years 8 months ago
Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design
This paper reports on one of the first efforts to apply Value-Sensitive Design (VSD) to a large-scale real-world software system. We sought to improve informed consent in Web-base...
Batya Friedman, Daniel C. Howe, Edward W. Felten
119
Voted
HICSS
2002
IEEE
99views Biometrics» more  HICSS 2002»
15 years 8 months ago
Privacy in Distributed Electronic Commerce
In recent years there has been a movement toward deployment of distributed approaches for electronic commerce. Intelligent software agents, for instance, may be instructed to act ...
Larry Korba
108
Voted
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
15 years 8 months ago
Legitimate by Design: Towards Trusted Virtual Community Environments
Legitimacy is a key part of the social requirements specification for a trusted virtual community environment (VCE). If an environment is not seen as legitimate, social conflicts m...
Brian Whitworth, Aldo de Moor
97
Voted
ICRA
2002
IEEE
75views Robotics» more  ICRA 2002»
15 years 8 months ago
First Experiment in Sun-Synchronous Exploration
Sun-synchronous exploration is accomplished by reasoning about sunlight: where the Sun is in the sky, where and when shadows will fall, and how much power can be obtained through ...
David Wettergreen, M. Bernardine Dias, Benjamin Sh...
« Prev « First page 2804 / 3051 Last » Next »