Adicionar um comentário: mecanismos de conversação em weblogs e fotologs brasileiros

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Barreiras à Adoção da Computação em Nuvem: Um Estudo Delphi Conduzido com Profissionais e Acadêmicos Brasileiros

Information Technology (IT) is becoming a utility, in a very similar way to what happened in the past to electricity and telephony for example. Given the economic advantages of the utilities model, institutions and organizations are rethinking about ways to acquire and use IT resources and are taking into consideration to adhere to cloud computing architectures. However, this new model poses ne...

متن کامل

Mecanismos de Controle de Admissão Baseado em Medições em Redes IEEE 802.11e

Although the 802.11e extension of the IEEE 802.11 standard for wireless local area network was concerned to provide Quality of Service, such provisioning cannot be achieved without specific traffic control mechanisms. In this paper, the use of admission control based on measurement for QoS provision in 802.11e networks is evaluated. It is shown that QoS differentiation can be obtained with the ...

متن کامل

Transformação de um Modelo de Empresa em Requisitos de Software

The transformation from stakeholder requirements into system and software requirements is traditionally executed manually, through a refinement process. This work presents ongoing research to provide automatic transformation from stakeholder requirements into software requirements in the context of enterprise systems. The proposed transformation uses an enterprise model as a stakeholder require...

متن کامل

Em Busca de um Modelo de Referência para Engenharia de Requisitos em Ambientes de Desenvolvimento Di

Resumo. Existe um interesse crescente em pesquisas que enderecem o desenvolvimento distribuído de software. A engenharia de requisitos, nesse contexto, apresenta diversos desafios causados pela distribuição. A necessidade de um processo de requisitos que aborde essas dificuldades é reconhecida. Nesse sentido, esse artigo visa apresentar um modelo de referência para engenharia de requisitos em a...

متن کامل

Estudo de mecanismos de segurança para proteção do roteamento em redes de sensores sem fio

Wireless Sensor Networks (WSN) are more subject to enemy action than conventional networks due to their hardware and energy constraints and due to hostile environment in which they can be inserted. This scenario is too favorable to denial of service attacks, especially in routing function, one critical function in any network. This work is focused in routing protecting in WSN. It presents a stu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Revista Brasileira de Linguística Aplicada

سال: 2009

ISSN: 1984-6398

DOI: 10.1590/s1984-63982009000100008