نتایج جستجو برای: requirement management

تعداد نتایج: 995286  

2011
Nithya Gopalakrishnan Nair Philip J. Morrow Gerard P. Parr

Wireless Sensor Networks (WSNs) have become widely used in various applications areas including environmental monitoring, surveillance and military applications. As the complexity of WSNs increase and the application areas in which they are used become more critical, the requirement of such networks to be self managing becomes necessary. Various aspects of a WSN like power management, event man...

Journal: :Ad Hoc Networks 2007
Xiaojiang Du Yang Xiao Mohsen Guizani Hsiao-Hwa Chen

Security is critical for sensor networks used in military, homeland security and other hostile environments. Previous research on sensor network security mainly considers homogeneous sensor networks. Research has shown that homogeneous ad hoc networks have poor performance and scalability. Furthermore, many security schemes designed for homogeneous sensor networks suffer from high communication...

2002
Nathan Muruganantha Hanan Lutfiyya

An application’s Quality of Service (QoS) requirements refers to non-functional, run-time requirements. These requirements are usually soft in that the application is functionally correct even if the QoS requirement is not satisfied at run-time. QoS requirements are dynamic in that for a specific application, they change. The ability to satisfy an application’s QoS requirement depends on the av...

2003
Nathan Muruganantha Hanan Lutfiyya

An application’s Quality of Service (QoS) requirements refers to non-functional, run-time requirements. These requirements are usually soft in that the application is functionally correct even if the QoS requirement is not satisfied at run-time. QoS requirements are dynamic in that for a specific application, they change. The ability to satisfy an application’s QoS requirement depends on the av...

2009
Heiko Klarl Christian Wolff Christian Emig

The modelling of business processes is widely used in enterprises. Though this is very common, requirements for identity management and access control are often collected separately in documents or requirement tools. Due to the business-driven background of access control, this kind of requirement should be collected at the business site's business process model. This work introduces a meta-mod...

Journal: :Electronic Commerce Research 2003
Darryl N. Davis Yuan Luo Kecheng Liu

A KADS based requirement analysis for the management of stock trading portfolios is presented. This provides a theoretical foundation for a stock trading system. This system is designed around portfolio management tasks that include eliciting user profiles, collecting information on the user’s portfolio position, monitoring the environment on behalf of the user, and making decision suggestions ...

Journal: :Expert Syst. Appl. 2009
Xiaoshuan Zhang Zetian Fu Wengui Cai Dong Tian Jian Zhang

Fish disease and health management is becoming a key barrier and major problem that currently limits expanded production and sustainable development of aquaculture and bring out food-safety issues. There has been a marked growth of interest in developing expert system to aid fish disease/health management. The literature shows that a few have been used to any extent due to the lack of deep user...

2012
Songhao Shang

Crop water requirement is essential for agricultural water management, which is usually available for crop growing stages. However, crop water requirement values of monthly or weekly scales are more useful for water management. A method was proposed to downscale crop coefficient and water requirement from growing stage to substage scales, which is based on the interpolation of accumulated crop ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید