نتایج جستجو برای: attribute quality control

تعداد نتایج: 2036629  

2001
Leonard J. Bass Mark Klein Felix Bachmann

This paper discusses the understanding of quality attributes and their application to the design of a software architecture. We present an approach to characterizing quality attributes and capturing architectural patterns that are used to achieve these attributes. For each pattern, it is important not only how the pattern achieves a quality attribute goal but also what impact the pattern has on...

Journal: :Regional Science and Urban Economics 2001

2016
Scott D. Stoller Thang Bui

Temporal role-based access control (TRBAC) extends rolebased access control to limit the times at which roles are enabled. This paper presents a new algorithm for mining high-quality TRBAC policies from timed ACLs (i.e., ACLs with time limits in the entries) and optionally user attribute information. Such algorithms have potential to significantly reduce the cost of migration from timed ACLs to...

2010
ELENA PEREZ ANDRES CARRION JOSE JABALOYES FRANCISCO APARISI

Quality control is one of the most used statistical applications in industry. The control of attribute quality characteristics is a subject of study due to the need of improving the efficiency of the charts. The present paper deals with the improvement of the classical u chart, using the Daudin strategy, based in a double sampling scheme and a variable sample size. The DS-u chart is proposed. T...

Journal: :Quality and Reliability Eng. Int. 2012
Yanting Li Fugee Tsung

The statistical cumulative sum (CUSUM) chart is a powerful tool for monitoring the attribute quality variable in manufacturing industry. In this article, we studied the multiplicity problem caused by simultaneously monitoring more than one attribute quality variable. Multiple binomial and Poisson CUSUM charts incorporating a multiple hypothesis testing technique known as false discovery rate co...

Journal: :Journal of the Korea Industrial Information Systems Research 2014

Journal: :Lecture Notes in Computer Science 2021

Logic access control enforces who can read and write data; the enforcement is typically performed by a fully trusted entity. At TCC 2016, Damgård et al. proposed Access Control Encryption (ACE) schemes where predicate function decides whether or not users (decrypt) (encrypt) data, while message secrecy users’ anonymity are preserved against malicious parties. Subsequently, several ACE construct...

Journal: :IEE Proceedings - Software 2005
Felix Bachmann Leonard J. Bass Mark Klein Charles P. Shelton

In order to have a software architecture design method that achieves quality attribute requirements several aspects of the method must be in place. First there must be some way to specify quality attribute requirements so that it can be determined whether the designed architecture can achieve them. Secondly, there must be some way for modularising the knowledge associated with quality attribute...

2005
Auvo Finne

Despite the over five decades long history of information and communication technology there are still many general level problems in the software products and a huge price is paid for that. It indicates that there is much left to learn about what makes up a good information system and how to make it. This paper tries to find out what are the general good properties of information systems and t...

20042005200620072008200920102011201220132014201520162017201820192020202120222023050000100000150000

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید