نتایج جستجو برای: quality constraint
تعداد نتایج: 825597 فیلتر نتایج به سال:
Imposing integrity constraints is an efficient way to improve data quality in databases. Effective imposition of integrity constraints requires their precise distinction and specification. Despite a few efforts for enhancing the distinction and specification of the integrity constraints in spatial and spatiotemporal databases by their classifications, these classifications fail to precisely dis...
This paper considers a single-item, two-echelon, continuous-review inventory model. A number of retailers have their stock replenished from a central warehouse. The warehouse in turn replenishes stock from an external supplier. The demand processes on the retailers are independent Poisson. Demand not met at a retailer is lost. The order quantity from each retailer on the warehouse and from the ...
A compelling argument raised by Bolton and Oliver, states that only customers’ assessment of continuously provided services, which may depend on performance-only evaluation, deserves attention. As libraries are services provided continuously and considered in general to be a public service, it is important to research this issue. Thus this paper discusses four research problems based on quality...
Connectors have emerged as a powerful concept for composition and coordination of concurrent activities encapsulated as components and services. Compositional coordination models and languages serve as a means to formally specify and implement component and service connectors. They support largescale distributed applications by allowing construction of complex component connectors out of simple...
The paper analyzes the modular structure of product family by decomposing the product family into generic modules. Then, the module model denoted by attribute variable is established for each generic module. Based on the classification of customer requirement and erection of product decision tree, the description and explanation type of customer requirement can be used to restrict the sub branc...
The occurrence of anti-patterns in software complicate development process and reduce the software quality. The contribution proposes selected methods as an OCL Query, extension to Similarity Scoring Algorithm, Bit-vector Algorithm and rule based approach originally used for design patterns detection. This paper summarizes approaches, important differences between design patterns and anti-patte...
We describe a new approach to employing specifications for software reliability. Rather than only using specifications to validate implementations, we additionally employ specifications as a reliable alternative to those implementations. Our approach, which we call Plan B, performs dynamic contract checking of methods. However, instead of halting the program upon a contract violation, we employ...
‎In this paper, using the idea of convexificators, we study boundedness and nonemptiness of Lagrange multipliers satisfying the first order necessary conditions. We consider a class of nons- mooth fractional programming problems with equality, inequality constraints and an arbitrary set constraint. Within this context, define generalized Mangasarian-Fromovitz constraint qualification and sh...
this paper provides an optimality-theoretic account of dissimilation in standard persian as well as some other accents and dialects of persian. as such, this work starts by introducing optimality theory (henceforth ot) and its basic concepts and then it investigates dissimilation in this framework. it argues for the superiority of ot over derivational approaches regarding a case in which both d...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید