نتایج جستجو برای: conformance in land
تعداد نتایج: 16997024 فیلتر نتایج به سال:
The use of biometric systems is steadily increasing, which leads to heterogeneity and, thus, possibly interoperability issues. In order to address such issues, standards are developed by ISO/IEC Joint Technical Committee 1. In the case of minutiae-based fingerprint recognition, for instance, ISO/IEC 19794-2 defines biometric data interchange records that vendors should adhere to. To validate ad...
A number of techniques for semi-automated traceability link recovery between source code and documentation have recently been proposed to support the reverse engineering and maintenance of legacy systems. This is only the first step in supporting the long term maintainability of such systems. A crucial issue, after recovering traceability links is analyzing their general conformance over time. ...
This paper deals with a case study of conformance testing and interoperability testing of ATM Adaptation Layer type 3/4 (AAL 3/4) implementations. A set of conformance test purposes for AAL 3/4 sublayers is developped. The implementation of these test purposes is analysed using the transverse conformance test method and the interoperability test method. This analysis leads to the identiication ...
DecSerFlow is a declarative language to specify business processes. It consists of a set of temporal predicates that can be translated into LTL but limited to finite sequences. This paper focuses on the “conformance problem”: Given a set of DecSerFlow constraints, is there an execution sequence that satisfies all given constraints? This paper provides syntactic characterizations of conformance ...
Abstract. Calls have been made for water and ecological planning design to tackle the ongoing environmental degradation, yet gaps are not clear where implemented (blue) (green) infrastructure might help improve ecosystem services. We selected mega-city Beijing, pioneer of “Ecological Priority” strategy, as study area. evaluated conformance performance Beijing's water-related implementation on e...
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and denial of service attacks. Historically, many of such attacks used illformed data-packets and/or protocol runs, which did not conform to the protocols’ standards. Attackers exploited vulnerabilities of the protocols’ i...
مراتع حدود نیمی از خشکی های جهان را در بر دارند و پوشش گیاهی آن در نتیجه تأثیر متقابل محیط و موجودات زنده به وجود آمده است و به عنوان یک اکوسیستم طبیعی مدیریت می شوند. علاوه بر مراتع، راه ها در عصر حاضر نیز از اجزا مهم و زیرساخت های اصلی زندگی نوین و توسعه کشورها به شمار می روند. جاده ها ساخته دست بشر هستند و جوامع گیاهی کنار جاده تحت تأثیر ساخت و ساز قرار دارند. پوشش "رودرال" به مجموعه ای از پ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید