نتایج جستجو برای: users requirement
تعداد نتایج: 365055 فیلتر نتایج به سال:
SUMMARY In this paper, we propose a novel Web service composition framework which dynamically accommodates various failure recovery requirements. In the proposed framework called Adaptive Failure-handling Framework (AdaFF), failure-handling submodules are prepared during the design of a composite service and some of them are systematically selected and combined with the composite Web service at...
E-commerce is an important business transaction system in the network age. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. In order to avoid system security flaw and defect caused user great loss, how to reduce e-commerce security risk ...
traceability is a basic requirement for the most of products from the viewpoint of governments and customers. it has base of quality systems and supports integration of supply chain information systems. this paper has presented a holistic model for supply chain traceability through structural equation modeling. this model will support recall of products, quality assurance requirements, improve ...
This paper proposes a dynamic Stackelberg repeated game for decentralized Device-to-Device (D2D) communications overlaying cellular communications. The proposed game aims to jointly optimize D2D user behavior via a user-in-the-loop (UIL) approach; and minimize transmit power, while maximizing packet delivery ratio (PDR) for all D2D users. The Stackelberg game architecture consists of a single l...
The characteristics of users' browsing behaviors on websites can be used to analyze system performance as well as network communication, understand users’ reaction and motivation, and build adaptive websites. However, the motivation, requirement and experience of users may dynamically change, which cause difficulty in exactly refining a stable behavior pattern and describing their shifted inter...
Relay deployment in Orthogonal Frequency Division Multiple Access (OFDMA) based cellular networks helps in coverage extension and/or capacity improvement. To quantify capacity improvement, blocking probability of voice traffic is typically calculated using Erlang B formula. This calculation is based on the assumption that all users require same amount of resources to satisfy their rate requirem...
To better meet users’ underlying navigational requirement, search engines like Baidu has developed general recommendation engine and provided related entities on the right side of the search engine results page(SERP). However, users’ behavior have not been well investigated after the association of individual queries in search engine. To better understand users’ navigational activities, we prop...
Runtime requirement monitoring is used for verification and validation of implemented requirements. To monitor the requirements in runtime; we propose a “QoE probe” tool, a mobile application integrated through an API, to collect usage logs as well as users’ Quality of Experience (QoE) in the form of user feedback. The analysis of the collected data guides requirement monitoring of functional a...
We are developing an approach using Jackson's Problem Frames to analyse security problems in order to determine security vulnerabilities. We introduce the notion of an anti-requirement as the requirement of a malicious user that can subvert an existing requirement. We incorporate anti-requirements into so-called abuse frames to represent the notion of a security threat imposed by malicious user...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید