نتایج جستجو برای: users requirement

تعداد نتایج: 365055  

2010
Hans Weigand Birger Andersson Paul Johannesson Maria Bergholtz Jeewanie Jayasinghe Arachchige

Coordination services are services, possibly implemented as web services, that support the coordination of (real-world) services that a consumer would like to take. To support users of a future Internet of Services, the effect of the coordination services must be described in such a way that users are not only able to discover services but also to detect and prevent possible conflicts in their ...

2015
B Hassibi H Aghajan B Khalaj A Paulraj

A new method is proposed for blind identi cation of possibly nonminimumphase FIR channels with multiple users The technique exploits the structure of the signals received by an antenna array in both the temporal and spatial frequency domains Although in the single an tenna case it is necessary to use cyclostationary signals or higher order statistics to identify the magnitude and phase of the c...

2004
Harry Chen Tim Finin Anupam Joshi

Privacy protection is a key requirement for the future pervasive computing systems. This paper describes the design and implementation of a privacy protection framework that exploits the SOUPA policy ontology and its associated policy reasoning algorithm. The SOUPA policy ontology expressed in the Web Ontology Language OWL allows users to define policy rules to permit or forbid actions that att...

2007
Robert K. Waldstein

The AT&T library organization has developed an interest in Z39.50 for a number of diverse reasons. It is hoped that eventually Z39.50 will help with or solve several classes of problems, ranging from behind the scenes issues resulting from distributed computing architectures to diversity of user interfaces. In addition to helping with known problems, we hope that Z39.50 will give us a flexibili...

Journal: :Journal of Circuits, Systems, and Computers 2004
Stavros Xynogalas Ioanna Roussaki Maria Chantzara Miltiades E. Anagnostou

The emerging 3 generation services are provided through various types of networks and terminals. Roaming users rely on new kinds of wireless networks and terminals to offer mobility and make services available everywhere. The users’ requirement for continuous access to personalized services from any place, transparently and independently of the underlying network technology and the terminal or ...

2000
M. Savino

The problem of the metrological qualification of data acquisition systems and of waveform recorder is a fundamental issue for both users and manufacturers of digital instruments. The need for an improved industrial standard leading to unification and standardization in this field is a very pressing requirement. Users have to receive technical specifications written in standard format and manufa...

2014
T. Rajani Devi

Requirement engineering is first phase of software development processes and it is most important phase for every software development model. In requirement engineering phase we can gather the requirements from user and use this requirement to software development and produce software product that satisfy the user needs. In other words, we have to see all requirements during the software's life...

Journal: :CoRR 2011
Arijit Ukil Jaydip Sen Debasish Bera

In this paper, Long-Term Proportional Fair (LTPF) resource allocation algorithm in dynamic OFDMA system is presented, which provides long-term QoS guarantee (m 1 ainly throughput requirement satisfaction) to individual user and follows every user's QoS profile at long-term by incremental optimization of proportional fairness and overall system rate maximization. The LTPF algorithm dynamically a...

2016
Mahei Manhai Li Christoph Peters

Turning IT -investments into organizational benefits is one of the key research objectives for information systems. There is a significant body of knowledge dealing with research on system development and management approaches. However, by leveraging crowd mechanisms, we believe that from a service systems perspective, after the rollout (also called shakedown phase) organizations still require ...

Journal: :J. Log. Algebr. Program. 2009
Jason Crampton

Hierarchical access control policies, in which users and objects are associated with nodes in a hierarchy, can be enforced using cryptographic mechanisms. Protected data is encrypted and authorized users are given the appropriate keys. Lazy re-encryption techniques and temporal hierarchical access control policies require that multiple keys may be associated with a node in the hierarchy. In thi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید