A Hierarchical Requirements Reference Model
نویسنده
چکیده
منابع مشابه
Requirements Engineering Model in Designing Complex Systems
This research tends to development of the requirements elicitation methodology with regard to operational nature and hierarchical analysis for complex systems and also, regarding available technologies. This methodology applies Analytic Hierarchy Process (AHP) and Analytic Network Process (ANP) to ensure traceability of planned qualitative and quantitative data from requirements to available te...
متن کاملRequirements Engineering Model in Designing Complex Systems
This research tends to development of the requirements elicitation methodology with regard to operational nature and hierarchical analysis for complex systems and also, regarding available technologies. This methodology applies Analytic Hierarchy Process (AHP) and Analytic Network Process (ANP) to ensure traceability of planned qualitative and quantitative data from requirements to available te...
متن کاملAn Architecture for Cyberspace: Spatialization of the Internet
The basic problem of cyberspace architecture is to prescribe a spatiallycoherent internetworked infrastructure capable of delivering a real-time environment, with appropriate fidelity, to a large number of participants. We use the ARPA Domain-Specific Software Architecture process to develop an architecture for cyberspace. The process begins with the development of a Domain Model. Reference Req...
متن کاملNovel Hierarchical Control of VSI-based Microgrids Against Large-Signal Disturbances
This paper provides a novel hierarchical control for VSI-based microgrids. The advantage of the provided control scheme is to maintain the frequency and voltage stability and load sharing against large-signal disturbances. A hierarchical control, consisting of three levels, is described. A new control loop based on PI controller, is presented. The new control loop has a great impact on increasi...
متن کاملData security in location-aware applications: an approach based on RBAC
Data security in a mobile context is a critical issue. Over the last few years a new category of location-based services, the Enterprise LBS (ELBS), has emerged focusing on the demands of mobility in organisations. These applications pose challenging requirements, including the need of selective access to ELBS based on the position of mobile users and spatially bounded organisational roles. To ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014