Sciweavers

3192 search results - page 338 / 639
» Translating Model Simulators to Analysis Models
Sort
View
ASE
2007
121views more  ASE 2007»
15 years 4 months ago
Computer-aided Support for Secure Tropos
In earlier work, we have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of securit...
Fabio Massacci, John Mylopoulos, Nicola Zannone
HICSS
2007
IEEE
132views Biometrics» more  HICSS 2007»
15 years 10 months ago
Modeling the Economic Cost of Transmission Bottlenecks
— The purpose of this paper is to model the stochastic behavior of nodal prices and use the predicted price differences between zones as the basis for measuring the magnitude and...
Timothy D. Mount, Jaeuk Ju
HICSS
2003
IEEE
155views Biometrics» more  HICSS 2003»
15 years 9 months ago
No More Shadow Boxing with Online Music Piracy: Strategic Business Models to Enhance Revenues
Novel online file sharing technologies have created new market dynamics and posed a great challenge to the music industry to try and retain customers. Consumers have created anony...
Sudip Bhattacharjee, Ram D. Gopal, Kaveepan Lertwa...
ADHOC
2007
122views more  ADHOC 2007»
15 years 4 months ago
Modeling and analyzing the correctness of geographic face routing under realistic conditions
Geographic protocols are very promising for wireless ad hoc and sensor networks due to the low state storage and low message overhead. Under certain idealized conditions, geograph...
Karim Seada, Ahmed Helmy, Ramesh Govindan
BMCBI
2007
140views more  BMCBI 2007»
15 years 4 months ago
Investigations into the relationship between feedback loops and functional importance of a signal transduction network based on
Background: A number of studies on biological networks have been carried out to unravel the topological characteristics that can explain the functional importance of network nodes...
Yung-Keun Kwon, Sun Shim Choi, Kwang-Hyun Cho