咨询与建议

限定检索结果

文献类型

  • 37 篇 会议
  • 26 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 68 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 57 篇 工学
    • 42 篇 计算机科学与技术...
    • 21 篇 软件工程
    • 9 篇 电气工程
    • 4 篇 信息与通信工程
    • 4 篇 建筑学
    • 4 篇 土木工程
    • 3 篇 机械工程
    • 2 篇 交通运输工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 仪器科学与技术
    • 1 篇 控制科学与工程
  • 10 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 3 篇 工商管理
  • 6 篇 理学
    • 4 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 体育学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 农学
    • 1 篇 作物学
  • 1 篇 军事学

主题

  • 68 篇 data flow diagra...
  • 5 篇 diformyl dapsone
  • 5 篇 entity relations...
  • 4 篇 petri net
  • 4 篇 dfd
  • 3 篇 defocusing
  • 3 篇 software enginee...
  • 3 篇 text
  • 3 篇 stride
  • 2 篇 business process
  • 2 篇 systems design
  • 2 篇 diagram datových...
  • 2 篇 privacy by desig...
  • 2 篇 vývojový diagram
  • 2 篇 control flow dia...
  • 2 篇 structured analy...
  • 2 篇 requirement anal...
  • 2 篇 information flow
  • 2 篇 transformation s...
  • 2 篇 information syst...

机构

  • 4 篇 brno university ...
  • 1 篇 asian inst finan...
  • 1 篇 norwegian univ s...
  • 1 篇 univ vienna fac ...
  • 1 篇 univ bologna dei...
  • 1 篇 karlsruhe inst t...
  • 1 篇 prince sattam bi...
  • 1 篇 nagoya univ stra...
  • 1 篇 school of busine...
  • 1 篇 physical educati...
  • 1 篇 sultan qaboos un...
  • 1 篇 tsinghua univers...
  • 1 篇 zf friedrichshaf...
  • 1 篇 avl graz austria
  • 1 篇 karlstad univ ka...
  • 1 篇 tamkang univ dep...
  • 1 篇 univ ferrara dip...
  • 1 篇 osaka university
  • 1 篇 tampere universi...
  • 1 篇 univ western syd...

作者

  • 2 篇 perera srinath
  • 2 篇 tuma katja
  • 2 篇 heinrich robert
  • 2 篇 scandariato ricc...
  • 2 篇 omori takayuki
  • 2 篇 shih tk
  • 2 篇 ohnishi atsushi
  • 1 篇 yanan su
  • 1 篇 xinxin lv
  • 1 篇 bucao samantha d...
  • 1 篇 heayyoung jo
  • 1 篇 yasuyuki matsush...
  • 1 篇 hung jc
  • 1 篇 bowles john b.
  • 1 篇 hung jason c.
  • 1 篇 riguzzi f
  • 1 篇 das gupta pranab...
  • 1 篇 li lw
  • 1 篇 simoncini v
  • 1 篇 winnie bahati mb...

语言

  • 63 篇 英文
  • 5 篇 其他
检索条件"主题词=Data Flow Diagram"
68 条 记 录,以下是1-10 订阅
排序:
THE TRANSFORMATION SCHEMA - AN EXTENSION OF THE data flow diagram TO REPRESENT CONTROL AND TIMING
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 1986年 第2期12卷 198-210页
作者: WARD, PT Yourdon Inc. New York NY 10036
The data flow diagram has been employed to model the data transformation aspects of proposed systems. An extension of the data flow diagram called the transformation schema is described. The transformation schema yi... 详细信息
来源: 评论
Exploration of Enterprise Audit Information Management System Model Based on data flow diagram  17
Exploration of Enterprise Audit Information Management Syste...
收藏 引用
17th IEEE International Wireless Communications and Mobile Computing Conference (IEEE IWCMC)
作者: Wu, Yanhong Xie, PeiBo Guangdong Ocean Univ Cunjin Coll Zhanjiang 524094 Guangdong Peoples R China
In the modern enterprise management thought, the audit management is in the key position, through carrying out the effective audit management work can strengthen the enterprise's self-restraint consciousness, stan... 详细信息
来源: 评论
Project Management Model with Designed data flow diagram: The Case of ICT Hybrid Learning of Elderly People in the Czech Republic  10th
Project Management Model with Designed Data Flow Diagram: Th...
收藏 引用
10th International Conference on Computational Collective Intelligence (ICCCI)
作者: Svobodova, Libuse Cerna, Miloslava Univ Hradec Kralove Fac Informat & Management Rokitanskeho 62 Hradec Kralove Czech Republic
The paper deals with the intergeneration municipality project on the development of computer literacy in the elderly people with focus on the management of conducted courses. The aim of the paper is to design and prop... 详细信息
来源: 评论
Integrating advanced technologies to uphold security of payment: data flow diagram
收藏 引用
AUTOMATION IN CONSTRUCTION 2020年 114卷 103158-000页
作者: Chong, Heap-Yih Diamantopoulos, Alexander Curtin Univ Sch Design & Built Environm GPO Box U1987 Perth WA 6845 Australia
Security of payment (SOP) issues still persist in the construction industry despite numerous investigations and incremental reforms. Various solutions and policies have been proposed and analysed in-depth in previous ... 详细信息
来源: 评论
Migrating two legacy systems to SOA: a new approach for service selection based on data flow diagram
收藏 引用
INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES 2019年 第3期15卷 251-281页
作者: Bani-Ismail, Basel Baghdadi, Youcef Sultan Qaboos Univ Dept Comp Sci Muscat Oman
There are many service identification methods (SIMs) to simplify service identification in SOA lifecycle. These SIMs vary in terms of their features (e.g., input artefact, technique). Due to this diversity, few evalua... 详细信息
来源: 评论
A New Synthetical Knowledge Representation Model and Its Application in data flow diagram
收藏 引用
Wuhan University Journal of Natural Sciences 1999年 第1期4卷 35-42页
作者: Liu Xiang Wu Guoqing Yao Jian He Feng State Key Lab of Software Engineering Wuhan University Wuhan China
A new synthetical knowledge representation model that integrates the attribute grammar model with the semantic network model was presented. The model mainly uses symbols of attribute grammar to establish a set of sy... 详细信息
来源: 评论
Transformation from data flow diagram to UML2.0 Activity diagram
Transformation from Data Flow Diagram to UML2.0 Activity Dia...
收藏 引用
The 2010 IEEE International Conference on Progress in Informatics and Computing
作者: Fanchao Meng,Dianhui Chu,Dechen Zhan School of Computer Science and Technology, Harbin Institute of Technology at Weihai Weihai,China
Model transformations are frequently applied in business process modeling to bridge between languages on a different level of abstraction and formality This paper proposes a model transformation from data flow diagram... 详细信息
来源: 评论
Assessing the usefulness of data flow diagrams for validating security threats
收藏 引用
Computers & Security 2025年 156卷
作者: Winnie Bahati Mbaka Xinran Zhang Yunduo Wang Tong Li Fabio Massacci Katja Tuma Department of Computer Science Vrije Universiteit Amsterdam Amsterdam The Netherlands Department of Computer Science Beijing University of Technology Beijing China Department of Computer Science Beihang University Beijing China Department of Computer Science University of Trento Trento Italy Department of Mathematics and Computer Science Eindhoven University of Technology Eindhoven The Netherlands
Context: Threat analysis is a pillar of security-by-design which plays an important role in the elicitation and refinement of security threats. In preparation for the analysis, a model of the system under analysis e.g... 详细信息
来源: 评论
Analyzing data flow diagrams by combination of formal methods and visualization techniques
收藏 引用
JOURNAL OF VISUAL LANGUAGES AND COMPUTING 2018年 第Oct.期48卷 41-51页
作者: Zhang, Haocheng Liu, Wei Xiong, Hao Dong, Xiaoju Shanghai Jiao Tong Univ BASICS Sch Elect Informat & Elect Engn Dept Comp Sci & Engn Shanghai Peoples R China
data flow diagram (DFD) is an indispensable method to model data processing in software engineering. To analyze DFD rigorously, a formal semantics is demanded. Formal interpretation of DFD and its formal semantics lea... 详细信息
来源: 评论
Ripple Effect Analysis Method of data flow diagrams in Modifying data flow Requirements  12th
Ripple Effect Analysis Method of Data Flow Diagrams in Modif...
收藏 引用
12th Joint Conference on Knowledge-Based Software Engineering (JCKBSE)
作者: Heayyoung, Jo Omori, Takayuki Ohnishi, Atsushi Ritsumeikan Univ Dept Comp Sci Kusatsu Japan
Ripple effects may occur in modifying software requirements. Without considering such ripple effects, errors in requirements cannot be removed in software development. In this paper, we present a ripple effect analysi... 详细信息
来源: 评论