نتایج جستجو برای: users requirement

تعداد نتایج: 365055  

Journal: :CoRR 2014
Tamjid Rahman M. Rokonuzzaman

Requirement engineering is a key ingredient for software development to be effective. Apart from the traditional software requirement which is not much appropriate for new emerging software such as smart handheld device based software. In many perspectives of requirement engineering, traditional and new emerging software are not similar. Whereas requirement engineering of traditional software n...

Journal: :Electr. Notes Theor. Comput. Sci. 2011
Zhiyuan Liu Jun Pang Chenyi Zhang

In certified email (CEM) protocols, TTP transparency is an important security requirement which helps to avoid bad publicity as well as protecting individual users’ privacy. Recently we have extended the CEM protocol of Cederquist et al. to satisfy TTP transparency. As a continuation, in this paper, we formally verify the security requirement in the exteded protocol. The properties of fairness,...

2001

Software stakeholders, testers and end-users find it very difficult to express the real requirements. It is almost impossible to predict how a system will affect end product, how the software will interact with other existing systems and what user operations should be automated. Careful requirements analysis along with systematic reviews of the requirements help to reduce the uncertainty about ...

2009
Nitin Salodkar Abhay Karandikar

In this paper, we consider uplink transmissions involving multiple users communicating with a base station over a fading channel. We assume that the base station does not coordinate the transmissions of the users and hence the users employ random access communication. The situation is modeled as a non-cooperative repeated game with incomplete information. Each user attempts to minimize its long...

2004
J. Ben Schafer

Recommendation systems help users find items of interest. Meta-recommendation systems provide users with personalized control over the combination of recommendation data from multiple information sources. In the process, they provide users with more helpful recommendations by allowing users to indicate how important each parameter is in their decision process, and how data should be weighted du...

2016

Rich Internet Applications (RIA) require fast execution time and allow richer, faster, and more interactive experiences. Flash is a common technology for building RIAs. Flash programmers usually specialize in graphic design rather than programming. In addition, the tight schedule of projects makes the Flash programmers ignore non-functional characteristics such as the efficiency of their system...

2011
Jaya Vijayan

Requirement elicitation is a critical activity in the requirement development process and it explores the requirements of stakeholders. The common challenges that analysts face during elicitation process are to ensure effective communication between analyst and the users. Mostly errors in the systems are due to poor communication between user and analyst. This paper proposes an improved approac...

2007
Yuzhu Li James J. Jiang Gary Klein

Users and IS development staff often have different interpretations and understandings on software requirements because of the difference in knowledge, experiences and values. Jiang et al (2002) argue that this perception difference must be well managed to lead to the new understanding of requirements. This study tries to solve this question by examining the impact of coordination mechanisms on...

Journal: :Communications and Network 2010
Zhijin Zhao Zhen Peng Zhidong Zhao Shilian Zheng

Spectrum sharing with quality of service (QoS) requirement and power constraint on cognitive users is studied. The objective is to maximize the system throughput. This problem is modeled as a mixed integer nonlinear programming problem and then transformed to a continuous nonlinear programming problem through eliminating integer variables. We propose the joint power control and spectrum allocat...

2014
Zuhua Shao Yipeng Gao

To make users put much confidence in digital signatures, this paper proposes the first provably secure signature scheme based on both factoring and discrete logarithms. The new scheme incorporates both the Schnorr signature scheme and the PSS-Rabin signature scheme. Unless both the two cryptographic assumptions could be become solved simultaneously, anyone would not forge any signature. The pro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید