Sciweavers

5189 search results - page 429 / 1038
» Modeling architectural patterns using architectural primitiv...
Sort
View
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
15 years 10 months ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...
HPCA
1995
IEEE
15 years 8 months ago
The Effects of STEF in Finely Parallel Multithreaded Processors
The throughput of a multiple-pipelined processor suffers due to lack of sufficient instructions to make multiple pipelines busy and due to delays associated with pipeline depende...
Yamin Li, Wanming Chu
EDOC
2009
IEEE
15 years 11 months ago
Modeling the IT Impact on Organizational Structure
The impact IT systems have on organizations is widely debated, both in academia and industry. This paper describes a quantitative framework for analyzing organizational impact fro...
Pia Gustafsson, David Höök, Ulrik Franke...
157
Voted
EUSAI
2004
Springer
15 years 10 months ago
Modelling Context: An Activity Theory Approach
In this paper, we review different context classification systems that have been used to define elements of context. Although existing classification systems cover various types of...
Manasawee Kaenampornpan, Eamonn O'Neill
ATAL
2008
Springer
15 years 7 months ago
An adaptive agent model for self-organizing MAS
Self-organizing multi-agent systems (MAS) use different mechanisms to mimic the adaptation exhibited by complex systems situated in unpredictable and dynamic environments. These m...
Candelaria Sansores, Juan Pavón