Requirements and Specification Exemplars

ثبت نشده
چکیده

Page 12 meeting initiator. For instance, the meeting chair and secretary must be present; they have the highest participant importance. In a project meeting where specific tasks are discussed, task leaders would have a higher importance than normal project members and a lower importance than the meeting chair, the task speakers or the project reviewers. Meeting Significance. The meeting significance represents the importance for a specific person to attend a particular meeting relatively to other meetings or meeting requests. Meeting significances are typically determined by the participants concerned. For instance, participants to a specific task in a research project would assign a greater significance to a project meeting where their task will be discussed. This information must be kept confidential. Participant Flexibility. The participant flexibility is intended to indicate how easily a user can make a particular date interval free to allow meetings to be scheduled within that interval. Dates in exclusion sets and/or preference sets can thus be weighted accordingly. The participant flexibility is typically determined by the participants concerned. For instance, professors cannot move lecture periods easily; their participant flexibility for the corresponding date intervals should be low. A date interval which is not in the exclusion set of a participant should have a high flexibility for that participant. This information must be kept confidential. Using Knowledge about Status and Priorities. The following tactics illustrate some typical uses of the various kinds of priorities suggested above.-Best meeting dates and locations should be determined by considering participants with higher participant status first.-If no date can be found to organize a meeting, the system could propose a person having low participant importance to withdraw from the meeting.-If no date can be found to organize a meeting, the system could propose a participant to cancel (or to withdraw from) another meeting having a lower meeting significance.-A meeting date within some exclusion set (or outside some preference set) could be considered if the corresponding participant has a high flexibility for it.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Requirements & Specification Exemplars 1

Specification exemplars are familiar to most software engineering researchers. For instance, many will have encountered the well known library and lift problem statements, and will have seen one or more published specifications. Exemplars may serve several purposes: to drive and communicate individual research advances; to establish research agendas and to compare and contrast alternative appro...

متن کامل

Human-Centered Specification Exemplars for Critical Infrastructure Environments

Specification models of critical infrastructure focus on parts of a larger environment. However, to consider the security of critical infrastructure systems, we need approaches for modelling the sum of these parts; these include people and activities, as well as technology. This paper present human-centered specification exemplars that capture the nuances associated with interactions between pe...

متن کامل

A model for specification, composition and verification of access control policies and its application to web services

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

Model Programs for Preserving Composite Invariants

We describe a solution for the SAVCBS challenge problem: a technique for specifying and verifying invariants for objects designed using the Composite design pattern. The solution presents a greybox specification technique using JML’s model program feature. We show that model program specifications function as exemplars for capturing helper method calls in a way that preserves modularity and enc...

متن کامل

Affinity Propagation: Clustering Data by Passing Messages

AFFINITY PROPAGATION: CLUSTERING DATA BY PASSING MESSAGES Delbert Dueck Doctor of Philosophy Graduate Department of Electrical & Computer Engineering University of Toronto 2009 Clustering data by identifying a subset of representative examples is important for detecting patterns in data and in processing sensory signals. Such “exemplars” can be found by randomly choosing an initial subset of da...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996