نتایج جستجو برای: axiomatic
تعداد نتایج: 7135 فیلتر نتایج به سال:
This chapter introduces a new usability evaluation method, the axiomatic evaluation method, which is developed based on the axiomatic design theory – a formalized design methodology that can be used to solve a variety of design problems. This new evaluation method examines three domains of a product: customer domain, functional domain, and control domain. This method investigates not only usabi...
In this paper, an axiomatic theory is established for studying design. Using this theory, a formal model of design is derived to represent the syntactic structure of hierarchical evolving design objects and the dynamic design process. The axiomatic theory can be used by design theorists and computer scientists as a formal logical tool to model design whereas the derived formal model can be used...
In Possibilistic Decision Theory (PDT), decisions are ranked by a pessimistic and an optimistic qualitative criteria. The preference relations induced by these criteria have been axiomatized by corresponding sets of rationality postulates, both à la Neumann-Morgenstern and à la Savage. In this paper we first address a particular issue regarding the axiomatic systems of PDT à la von Neumann and ...
Yoshikawa’s General Design Theory is an axiomatic theory of design in which design is formulated and discussed in terms of topological spaces defined by entities, entity concepts, and abstract concepts. The theory is developed on declarations called definitions and axioms of which represents the basic philosophy of the theory. In this paper, we shall show that a paradoxical situation about the ...
High assurance security is extremely diicult to acheive in distributed computer systems due to their inherent non-determinism and heterogeneity. The practical application of formal methods is the key to high assurance security in open, distributed environments. This paper presents a methodology that applies formal methods within a dual framework to achieve secure interoperation of heterogeneous...
High assurance security is extremely di cult to acheive in distributed computer systems due to their inherent non-determinism and heterogeneity. The practical application of formal methods is the key to high assurance security in open, distributed environments. This paper presents a methodology that applies formal methods within a dual framework to achieve secure interoperation of heterogeneous...
A data schema is a set of constructs that emulate relations between domain instances. Schema evolution is changes in the data schema and a system of data consistency support for such modifications. Axiomatic model regulates modifications and maintains data consistency by ensuring that the data schema always satisfies a set of axioms. This paper is an extension to previous work, which has define...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید