نتایج جستجو برای: assurances
تعداد نتایج: 797 فیلتر نتایج به سال:
the aim of this research is to consider the quality of services provided by kerman telecommunication company (ktc) from different perspective in order to keep and attract clients. in this research, the quality of services by kerman province telecommunication company in different parts such as: phone, mobile phone, data service and also the quality of presented services by serving offices due to...
The Common Criteria (CC) certification framework defines a widely recognized, multi-domain certification scheme that aims to provide security assurances about IT products to consumers. However, the CC scheme does not prescribe a monitoring scheme for the CC practice, raising concerns about the quality of the security assurance provided by the certification and questions on its usefulness. In th...
We present a novel method for computing increasing lower bounds on the cost of solving planning problems, based on repeatedly solving and strengthening the delete relaxation of the problem. Strengthening is done by compiling select conjunctions into new atoms, similar to the P ⋆ construction. Because it does not rely on search in the state space, this method does not suffer some of the weakness...
The Satisfiability Modulo Theories (SMT) solver Z3 can generate proofs of unsatisfiability. We present independent reconstruction of unsatisfiability proofs for bit-vector theories in the theorem provers HOL4 and Isabelle/HOL. Our work shows that LCF-style proof reconstruction for the theory of fixed-size bit-vectors, although difficult because Z3’s proofs provide limited detail, is often possi...
Recent developments in the Triple Bottom Line reporting literature suggest a need for standards that ensure consistency, openness, transparency and inclusivity in the Triple Bottom Line reports produced. These standards, it is argued, provide assurances to stakeholders about the quality of a Triple Bottom Line report, and should lead to more inclusive business-stakeholder relations. The link be...
This paper sketches the design of PAST, a large-scale, Internet-based, global storage utility that provides scalability, high availability, persistence and security. PAST is a peer-to-peer Internet application and is entirely selforganizing. PAST nodes serve as access points for clients, participate in the routing of client requests, and contribute storage to the system. Nodes are not trusted, ...
When will we be secure? Nobody knows for sure – but it cannot happen before commercial security products and services possess not only enough functionality to satisfy customers’ stated needs, but also sufficient assurance of quality, reliability, safety, and appropriateness for use. Such assurances are lacking in most of today’s commercial security products and services. I discuss paths to bett...
This short paper presents the results of a research on the design, implementation and analysis of a packet scheduling mechanism for multi-traffic classes in the context of DiffServ networks. Our studies aimed at providing QoS assurances to real-time applications over IP networks. We began by identifying that QoS performance guarantees per-class of traffic aggregate are inherently required in th...
Industrial software projects are not based on a top-down development process relying on refinement but use an evolutionary approach. In this paper, we present the basic concepts of a suitable overall componentware methodology with respect to software evolution. We clarify the difference between refinement steps and evolution steps in an documentbased development process. Based on this, we intro...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید