Sciweavers

7075 search results - page 1249 / 1415
» Models and heterogeneous reasoning
Sort
View
ETS
2006
IEEE
110views Hardware» more  ETS 2006»
15 years 7 months ago
Deterministic Logic BIST for Transition Fault Testing
BIST is an attractive approach to detect delay faults due to its inherent support for at-speed test. Deterministic logic BIST (DLBIST) is a technique which was successfully applie...
Valentin Gherman, Hans-Joachim Wunderlich, Jü...
EUROMICRO
2006
IEEE
15 years 7 months ago
Moving Architectural Description from Under the Technology Lamppost
Software architecture description languages (ADLs) were a particularly active research area in the 1990s. In 2000, we published an extensive study of existing ADLs, which has serv...
Nenad Medvidovic
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
15 years 7 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communitiesâ€...
Karine Barzilai-Nahon
HICSS
2006
IEEE
122views Biometrics» more  HICSS 2006»
15 years 7 months ago
Adoption of Mobile Devices/Services - Searching for Answers with the UTAUT
The future of mobile telephony is expected to rely on mobile services and the use of mobile services will be an integral part of the revenues to be generated by third generation m...
Christer Carlsson, Joanna Carlsson, Kaarina Hyv&ou...
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
15 years 7 months ago
A Formal Approach towards Assessing the Effectiveness of Anti-Spam Procedures
Spam e-mails have become a serious technological and economic problem. So far we have been reasonably able to resist spam e-mails and use the Internet for regular communication by...
Guido Schryen
« Prev « First page 1249 / 1415 Last » Next »