نتایج جستجو برای: functional relationship diagram
تعداد نتایج: 1166759 فیلتر نتایج به سال:
As computer networks grow in size, both physically and geographically, more scalable solutions to network administration are becoming necessary. This need is amplified by the spread of faster and more devastating computer viruses. Furthermore, when dealing with partial and intermittent systems, the need for accompanying network mapping and monitoring with efficient mapping visualization becomes...
The evolution of thermodynamic anomalies are investigated in the pressure–temperature (pT) plane for silicon using well-established Stillinger–Weber potential. Anomalies observed density, compressibility and heat capacity. relationships between them with liquid stability limit related to known constraints. investigations extended into deeply supercooled regime replica exchange techniques. Therm...
With the conservation of power, a phase diagram defined by amplitude square and phase of scattering coefficients for each spherical harmonic channel is introduced as a universal map for any passive electromagnetic scatterers. Physically allowable solutions for scattering coefficients in this diagram clearly show power competitions among scattering and absorption. It also illustrates a variety o...
Genome sequencing projects have revealed a massive catalog of genes and astounding genetic diversity in a variety of organisms. We are now faced with the formidable challenge of assigning functions to thousands of genes, and how to use this information to understand how genes interact and coordinate cell function. Studies indicate that the majority of eukaryotic genes are dispensable, highlight...
Schema restructuring is part of both database design and database reorganization, which are expressions of the specification and evolution of an information system. Entity-Relationship(ER) consistency expresses the capability of relational databases to model information oriented systems. A relational schema consistmg of relation schemes, together with key and inclusion dependencies, is said to ...
With the prevalence of Internet, the rapid development of component, middleware and Web services, and the wide application of the Web, the reliability and quality assurance of Web applications have become a very critical problem and a hot research topic. To ensure the security and reliability of Web applications, Web testing is one of the most effective methods. A Web application is divided int...
It has become clear in software development that functionality and security must go hand in hand in cases where security concerns are to be incorporated early in stages of design. An essential aspect of such a process is threat modeling that integrates security with functional specification. Such an approach includes construction of two models: a functional model and a security (threat) model. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید