منابع مشابه
Elicitação e Especificação de Requisitos em Sistemas Embarcados: Uma Revisão Sistemática
Resumo. A elicitação e especificação de requisitos são fundamentais para que o sistema pretendido funcione de acordo com as necessidades dos stakeholders e às restrições sob as quais se encontre submetido. Os sistemas embarcados têm sido usados em diferentes finalidades (automóveis, medicina, entre outros.). Apesar de avanços em desenvolvimento de sistemas embarcados, são poucas as iniciativas ...
متن کاملUma Revisão Sobre Tendências Tecnológicas em Sistemas Operacionais
Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical environment, but making them effectively invisible to the user. This imposes new requisites to the software development area and in particular to the operating systems area. This document presents a review of some basic concepts in ubiquitous computing literature related to is...
متن کاملRequisitos para Softwares Educacionais Gamificados: Uma Revisão Sistemática de Literatura
Gamification techniques are being inserted in educational environments with the goal of engaging users in the context of learning. However, despite this importance, there is no complete and well defined set of requirements for gamified educational environments. Motivated by this scenario, this work conducted a systematic literature review in order to investigate aspects of gamification for educ...
متن کاملCryptosporidium infections in birds - a review Infecção por Cryptosporidium em aves - uma revisão Alex
Cryptosporidiosis is one of the main protozoan infections in birds. It manifests as either a respiratory or a digestive illness, and it affects a very large number of avian species across several continents. The aim of this review is to report on the main results of studies on cryptosporidiosis among birds and the importance of these results to veterinary medicine and public health.
متن کاملUma Revisão Sobre as Publicações de Sistemas de Detecção de Intrusão
The growing record of security incidents on computer networks has motivated the development of intrusion detection studies, the main identification techniques of intrusion are based on anomalies and signatures. Currently, the academic community explores preferably research on anomalies based networks, however, there is no common model to develop these proposals so that many authors describe, im...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Revista Brasileira de Ciências da Saúde
سال: 2017
ISSN: 1415-2177
DOI: 10.4034/rbcs.2017.21.03.12