نتایج جستجو برای: common methods

تعداد نتایج: 2382183  

2004
Daniel Cvrček Roger Needham

Many papers and articles attempt to define or even quantify privacy, typically with a major focus on anonymity. A related research exercise in the area of evidence-based trust models for ubiquitous computing environments has given us an impulse to take a closer look at the definition(s) of privacy in the Common Criteria, which we then transcribed in a bit more formal manner. This lead us to a f...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه 1377

the methods which are used to analyze microstrip antennas, are divited into three categories: empirical methods, semi-empirical methods and full-wave analysis. empirical and semi-empirical methods are generally based on some fundamental simplifying assumptions about quality of surface current distribution and substrate thickness. thses simplificatioms cause low accuracy in field evaluation. ful...

2007
Nancy R. Mead

vii 1 Background: The Importance of Requirements Engineering 1 1.1 Security Requirements Issues 1 1.1.1 The Problem of Negative Requirements 2 2 Methods and Practices 3 2.1 Overview of the SQUARE Process 3 2.1.1 How to Apply SQUARE 5 2.2 The Comprehensive, Lightweight Application Security Process 6 2.3 Core Security Requirements Artifacts 8 2.4 Security Requirements Engineering Process 8 2.5 Se...

2000
Bruno Langenstein Roland Vogt Markus Ullmann

This paper presents a formal security policy model for SmartCards with digital signature application. This kind of model is necessary for each evaluation according to Information Technology Security Evaluation Criteria assurance level E4 (Common Criteria level EAL5) and above. Furthermore, we argue that such a model is essential for reasoning about the security of Information Technology compone...

2008
Monika Maidl David von Oheimb Peter Hartmann Richard Robinson

Software distribution to target devices like factory controllers, medical instruments, vehicles or airplanes is increasingly performed electronically over insecure networks. Such software often implements vital functionality, and so the software distribution process can be highly critical, both from the safety and the security perspective. In this paper, we introduce a novel software distributi...

Journal: :Epidemiologic Perspectives & Innovations : EP+I 2008
Klaus Rostgaard

INTRODUCTION Many epidemiological methods for analysing follow-up studies require the calculation of rates based on accumulating person-time and events, stratified by various factors. Managing this stratification and accumulation is often the most difficult aspect of this type of analysis. TUTORIAL We provide a tutorial on accumulating person-time and events, stratified by various factors i.e...

2008
Bowen Hui

As collaboration has proven to be beneficial in learning environments, there has been an emerging interest in automating the formation of student groups. However, existing work focuses on optimal formations from the instructor’s perspective based on pedagogical criteria (e.g., maximal group productivity, avoiding orphans or unmatched students). In contrast, we propose a formal collaboration mod...

1996
Matt Kaufmann J Strother Moore

ACL2 is a reimplemented extended version of Boyer and Moore's Nqthm and Kaufmann's Pc-Nqthm, intended for large scale veriication projects. However, the logic supported by ACL2 is compatible with the applicative subset of Common Lisp. The decision to use an \industrial strength" programming language as the foundation of the mathematical logic is crucial to our advocacy of ACL2 in the applicatio...

پایان نامه :0 1374

the rationale behind the present study is that particular learning strategies produce more effective results when applied together. the present study tried to investigate the efficiency of the semantic-context strategy alone with a technique called, keyword method. to clarify the point, the current study seeked to find answer to the following question: are the keyword and semantic-context metho...

Journal: :Communications in Statistics: Case Studies, Data Analysis and Applications 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید