نتایج جستجو برای: users requirement

تعداد نتایج: 365055  

Journal: :IEICE Transactions 2010
Yuna Kim Wan Yeon Lee Kyong Hoon Kim Jong Kim

SUMMARY In this paper, we propose a novel Web service composition framework which dynamically accommodates various failure recovery requirements. In the proposed framework called Adaptive Failure-handling Framework (AdaFF), failure-handling submodules are prepared during the design of a composite service and some of them are systematically selected and combined with the composite Web service at...

2014
Sen-Tarng Lai

E-commerce is an important business transaction system in the network age. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. In order to avoid system security flaw and defect caused user great loss, how to reduce e-commerce security risk ...

Journal: :مدیریت صنعتی 0
جعفر رزمی دانشکده¬های فنی، دانشگاه تهران، ایران رضا توکلی مقدم پردیس دانشکده¬های فنی، دانشگاه تهران، ایران فریبرز جولای پردیس دانشکده¬های فنی، دانشگاه تهران، ایران بابک یاری پردیس دانشکده¬های فنی، دانشگاه تهران، ایران

traceability is a basic requirement for the most of products from the viewpoint of governments and customers. it has base of quality systems and supports integration of supply chain information systems. this paper has presented a holistic model for supply chain traceability through structural equation modeling. this model will support recall of products, quality assurance requirements, improve ...

Journal: :CoRR 2016
Nicole Sawyer David B. Smith

This paper proposes a dynamic Stackelberg repeated game for decentralized Device-to-Device (D2D) communications overlaying cellular communications. The proposed game aims to jointly optimize D2D user behavior via a user-in-the-loop (UIL) approach; and minimize transmit power, while maximizing packet delivery ratio (PDR) for all D2D users. The Stackelberg game architecture consists of a single l...

Journal: :International Journal of Computer and Communication Technology 2016

Journal: :JCP 2012
Xiaohua Hu Tao Mu Weihui Dai Hongzhi Hu Genghui Dai

The characteristics of users' browsing behaviors on websites can be used to analyze system performance as well as network communication, understand users’ reaction and motivation, and build adaptive websites. However, the motivation, requirement and experience of users may dynamically change, which cause difficulty in exactly refining a stable behavior pattern and describing their shifted inter...

Journal: :Wireless Personal Communications 2015
Mahima Mehta Ranjan Bala Jain Abhay Karandikar

Relay deployment in Orthogonal Frequency Division Multiple Access (OFDMA) based cellular networks helps in coverage extension and/or capacity improvement. To quantify capacity improvement, blocking probability of voice traffic is typically calculated using Erlang B formula. This calculation is based on the assumption that all users require same amount of resources to satisfy their rate requirem...

2015
Cong Men Wanwan Tang Po Zhang Junqi Hou

To better meet users’ underlying navigational requirement, search engines like Baidu has developed general recommendation engine and provided related entities on the right side of the search engine results page(SERP). However, users’ behavior have not been well investigated after the association of individual queries in search engine. To better understand users’ navigational activities, we prop...

2016
Farnaz Fotrousi Samuel Fricker

Runtime requirement monitoring is used for verification and validation of implemented requirements. To monitor the requirements in runtime; we propose a “QoE probe” tool, a mobile application integrated through an API, to collect usage logs as well as users’ Quality of Experience (QoE) in the form of user feedback. The analysis of the collected data guides requirement monitoring of functional a...

2003
Luncheng Lin Bashar Nuseibeh Darrel C. Ince Michael Jackson Jonathan D. Moffett

We are developing an approach using Jackson's Problem Frames to analyse security problems in order to determine security vulnerabilities. We introduce the notion of an anti-requirement as the requirement of a malicious user that can subvert an existing requirement. We incorporate anti-requirements into so-called abuse frames to represent the notion of a security threat imposed by malicious user...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید