Currently,many modelling methods for software process are *** is difficult to analyze semantics and verify correctness for a key *** Petri Net ( CPN) based on mathematics is an executable model ,which has rigorous for...
详细信息
Currently,many modelling methods for software process are *** is difficult to analyze semantics and verify correctness for a key *** Petri Net ( CPN) based on mathematics is an executable model ,which has rigorous formal semantics and analysis *** paper presents a method of formal modelling and validation for software process that transforms UML model based on RUP to CPN and uses simulation to investigate the behaviour of modelled system.
Data warehouse fragmentation is one of the main problems in distributed data warehouse (DDW) *** first step in DDW design,which in fact affects overall solution,is the definition of *** this work we present our approa...
详细信息
Data warehouse fragmentation is one of the main problems in distributed data warehouse (DDW) *** first step in DDW design,which in fact affects overall solution,is the definition of *** this work we present our approach to improve fragment allocation by their ordering before allocation process.
this paper introduces an *** digital archives management system,which satisfies the requirement that the Archives needs to handle all kinds of *** system discussed in the paper is powerful and easy to control and *** ...
详细信息
this paper introduces an *** digital archives management system,which satisfies the requirement that the Archives needs to handle all kinds of *** system discussed in the paper is powerful and easy to control and *** paper details the implementation of the system functions.
In this paper a new fuzzy evaluation method is proposed to rank several multi disjoint paths selection algorithms in *** method combines fuzzy theory and Copeland method to evaluate rank of each proposed method base o...
详细信息
In this paper a new fuzzy evaluation method is proposed to rank several multi disjoint paths selection algorithms in *** method combines fuzzy theory and Copeland method to evaluate rank of each proposed method base on bandwidth,availability and delay of end to end paths as determinative factors which their importance are expressed in linguistic *** Copeland ranking can be seen as an ordering of alternatives according to the stated principle that the more majority wins the better.
Mobile phone video chat is one of the most important services based on the 3rd generation telecommunication. Supported by this system, the mobile devices can have a video chat with other mobile devices and terminals b...
详细信息
In China, as sustainable development strategy being implemented, quantitative evaluation of environmental load in steel industry has paid been more and more attention. In this paper, Life Cycle Assessment (LCA) was ap...
详细信息
With the development of modern science and technology, online detecting technique with high speed and high precision has been used increasingly by researchers in engineering production field. As the most effective and...
详细信息
We are living in a world of interactions, surrounded by electronic devices which are getting numerous and are complicating interactions. Moreover, the users are now mobile, evolving in multiple changing environments. ...
详细信息
ISBN:
(数字)9783642282270
ISBN:
(纸本)9783642282263
We are living in a world of interactions, surrounded by electronic devices which are getting numerous and are complicating interactions. Moreover, the users are now mobile, evolving in multiple changing environments. The problem is even more complex when it comes to collaborative tasks where these conditions can inhibit productivity and software as a service adoption. This paper presents an ongoing work on the usage of adaptive interfaces to address this problem and the issues raised.
This paper proposes a modeling framework on how to specify security preferences and importance of softwareservices,and compute a quantifiable *** approach advocates for an automatic calculation of the results of comp...
详细信息
This paper proposes a modeling framework on how to specify security preferences and importance of softwareservices,and compute a quantifiable *** approach advocates for an automatic calculation of the results of compli-ances between user’s security preferences and the provider’s capabilities in terms of security properties.
This paper analyzes the Quality of service (QoS) requirements of Internet of Things (IOT).Combined with the QoS technology of the composite service,the author provides a decomposition and optimization method for the q...
详细信息
This paper analyzes the Quality of service (QoS) requirements of Internet of Things (IOT).Combined with the QoS technology of the composite service,the author provides a decomposition and optimization method for the quality of the Internet of Things,and puts forward four basic QoS calculation ***,the issue of QoS strategy management is discussed.
暂无评论