• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 26,734
Next 10 →

TABLE VI ASPECTS OF TRUST IN ASSESSMENT AS CHARACTERIZED IN LOW- AND HIGH-TRUST ENVIRONMENTS

in International Conference on Engineering Education August 18-21, 2002, Manchester, U.K.
by Recent Advances In

Table 3. Axioms on Trust and Distrust

in Modeling Social and Individual Trust in Requirements Engineering Methodologies
by Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone 2005
"... In PAGE 12: ... Notice that ST1-2 and ST5 have also to be repeated for the case where the dependum is a task. Table3 de nes the intensional versions, entrust exec and disentrust exec (entrust perm and disentrust perm) of the extensional predicates trust exec and distrust exec (trust perm and distrust perm) that are used to build (dis)trust chains by propagating (dis)trust of execution (permission) relations. The in- tuitive meaning of rules T1-2 (and T5-6 for permission) is presented in the following examples.... ..."
Cited by 14

Table 3. Axioms on Trust and Distrust

in Modelling Social and Individual Trust in Requirements Engineering Methodologies
by Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone 2005
"... In PAGE 12: ... Notice that ST1-2 and ST5 have also to be repeated for the case where the dependum is a task. Table3 de nes the intensional versions, entrust exec and disentrust exec (entrust perm and disentrust perm) of the extensional predicates trust exec and distrust exec (trust perm and distrust perm) that are used to build (dis)trust chains by propagating (dis)trust of execution (permission) relations. The in- tuitive meaning of rules T1-2 (and T5-6 for permission) is presented in the following examples.... ..."
Cited by 14

Table 3: Axioms on Trust and Distrust

in Abstract
by Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone, Paolo Giorgini, John Mylopoulos, Fabio Massacci, Nicola Zannone 2005
"... In PAGE 12: ... Notice that ST1-2 and ST5 have also to be repeated for the case where the dependum is a task. Table3 de nes the intensional versions, entrust exec and disentrust exec (entrust perm and disentrust perm) of the extensional predicates trust exec and distrust exec (trust perm and distrust perm) that are used to build (dis)trust chains by propagating (dis)trust of execution (permission) relations. The intuitive meaning of rules T1-2 (and T5-6 for permission) is presented in the following examples.... ..."

Table 4: Compilation and execution environment

in The Performance Analysis of Portable Parallel Programming Interface MpC for SDSM and pthread
by Hiroko Midorikawa

Table 2. Simulation Environment

in reputation we believe: query processing in mobile adhoc networks
by Filip Perich, Anupam Joshi, Jeffrey Undercoffer, Timothy Finin, Lalana Kagal, Yelena Yesha 2004
"... In PAGE 6: ... It is designed using a discrete event simula- tion capability provided by Parsec. Table2 summarizes our simulation environment. In order to allow devices employing pessimistic trust approaches, where a trust in other devices can only decrease, we randomly assigned every device to have an initial high trust above a39 for 3 to 5 other devices in the environment.... ..."
Cited by 2

Table 3: Properties of the desktop and web execution environments

in Preprint Series CSPP-36 Deployment Contracts for Software Components
by Kung-kiu Lau, Vladyslav Ukis, Kung-kiu Lau, Vladyslav Ukis 2006
"... In PAGE 80: ... The properties of them considered in this work are transient state and concurrency management in general. Table3 shows detailed properties we use to difierentiate between them.... In PAGE 80: ...Table 3: Properties of the desktop and web execution environments As shown in Table3 , system instantiation is done once for all requests a user can place to the system in the desktop environment, whereas it difiers among technologies and options within a technology in the web environment. The desktop environment is stateful, whereas the web environment is inherently stateless by default through using stateless HTTP protocol.... ..."

Table 2. Execution times for the Cornell box environment.

in A Framework for Global Illumination in Animated Environments
by Jeffry Nimeroff , Julie Dorsey, Holly Rushmeier
"... In PAGE 10: ... The two cubes are red and blue and have rough specular surfaces. Table2 summarizes the execution times for each stage in the processing of this environment and for computing a 30-frame walkthrough. For this animation, we used a quality q of .... ..."

Table 2. Execution times for the Cornell box environment.

in A Framework for Global Illumination in Animated Environments
by Jeffry Nimeroff, Julie Dorsey, Holly Rushmeier
"... In PAGE 10: ... The two cubes are red and blue and have rough specular surfaces. Table2 summarizes the execution times for each stage in the processing of this environment and for computing a 30-frame walkthrough. For this animation, we used a quality q of .... ..."

Table 1 Java Execution Environment Comparison

in Psi -- Pervasive Services Infrastructure
by Dejan Milojicic, Ira Greenberg, Olaf Spinczyk, Danilo Beuche, Wolfgang Schröder-Preikschat, et al.
"... In PAGE 7: ... We compared the perfor- mance/footprint trade-off of this system against that of a variety of JVMs and Java-to- native compiler-based solutions using the EmbeddedCaffeineMark benchmark. Table1 illustrates that a fixed offloading of runtime support can offer a good perfor- mance/footprint trade-off compared to a traditional Java execution environment, and a similar trade-off to that of a monolithic Java-to-native compiler. The results for the jPure and monolithic Java-to-native compiler show similar performance/footprint trade-offs because they are derived from the same source, but the absolute perfor- mance score for jPure is lower because of the cost for remote access of runtime sup- port functions on the server.... ..."
Next 10 →
Results 1 - 10 of 26,734
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University