نتایج جستجو برای: upon inspection

تعداد نتایج: 316420  

2008
Zhan-jun Zhang

Two protocols of quantum direct communication with authentication [Phys. Rev. A 73, 042305 (2006)] are recently proposed by Lee, Lim and Yang. In this paper we will show that the authenticator Trent should be prevented from knowing the secret message of communication and the protocols can be eavesdropped by Trent using the the intercept-measure-resend attack. To fix this leak, we revise the ori...

2006
Margaret L. Phillips Daniel T. Boatright

Records of restaurant inspections by public healtb departments provide sequential "snapshots" of conditions in retail food service establishments that can be used to identil)' risk factors and evaluate the effectiveness of interventions. Data from a random 10 percent sample of restaurant inspection files from 31 counties in Oklahoma, including 4,044 inspections conducted during 19962000 in "med...

This paper evaluates the added resistance of a torpedo shape AUV, moving inside a water pipeline, due to wall effects within the tube. Today, there are long length pipelines of water or petroleum that need to regular inspection. Early detection of failure will help to prevent breakdown and avoid the huge cost of an accident. As pipelines are enclosed environments and difficult to access, pipeli...

1997
Michiel van Genuchten Wieger Cornelissen Cor van Dijk

Fagan inspections are a structured review of development documents that consists of individual preparation, a meeting and rework by the author of the document. The meeting is used to log the defects found in preparation and to search for more defects. The effectiveness and eficiency of the meeting is typically low as compared to that of the preparation. This paper describes the use of an EMS to...

1998
ANTHONY STEED JOLANDA TROMP

We present our experience with a usability evaluation of two prototype CVE applications being developed by the COVEN project. The applications are a teleconferencing system aimed at future business users of CVEs, and a holiday planning environment for the use of the general public. Our concerns in the evaluations were three fold: to refine the design of these applications, to gain further under...

Journal: :Communications for Statistical Applications and Methods 2006

Journal: :Softw. Test., Verif. Reliab. 1999
James Miller

An essential component of all software inspection processes is a well-founded decision about continuing or stopping the current process. This decision should be based upon directly relevant quantitative information – the number of defects remaining in the artefact. This quantity can be estimated by the use of capturerecapture methods. Several Software Engineering papers have explored this topic...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید