咨询与建议

限定检索结果

文献类型

  • 38 篇 会议
  • 27 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 70 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 58 篇 工学
    • 43 篇 计算机科学与技术...
    • 21 篇 软件工程
    • 9 篇 电气工程
    • 4 篇 信息与通信工程
    • 4 篇 建筑学
    • 4 篇 土木工程
    • 3 篇 机械工程
    • 2 篇 交通运输工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 仪器科学与技术
    • 1 篇 控制科学与工程
  • 10 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 3 篇 工商管理
  • 6 篇 理学
    • 4 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 体育学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 农学
    • 1 篇 作物学
  • 1 篇 军事学

主题

  • 70 篇 data flow diagra...
  • 5 篇 dfd
  • 5 篇 diformyl dapsone
  • 5 篇 entity relations...
  • 4 篇 petri net
  • 3 篇 defocusing
  • 3 篇 software enginee...
  • 3 篇 text
  • 3 篇 stride
  • 2 篇 business process
  • 2 篇 fmea
  • 2 篇 systems design
  • 2 篇 diagram datových...
  • 2 篇 privacy by desig...
  • 2 篇 vývojový diagram
  • 2 篇 control flow dia...
  • 2 篇 structured analy...
  • 2 篇 requirement anal...
  • 2 篇 information flow
  • 2 篇 transformation s...

机构

  • 4 篇 brno university ...
  • 1 篇 asian inst finan...
  • 1 篇 norwegian univ s...
  • 1 篇 univ vienna fac ...
  • 1 篇 univ bologna dei...
  • 1 篇 karlsruhe inst t...
  • 1 篇 prince sattam bi...
  • 1 篇 department of el...
  • 1 篇 nagoya univ stra...
  • 1 篇 school of busine...
  • 1 篇 physical educati...
  • 1 篇 sultan qaboos un...
  • 1 篇 tsinghua univers...
  • 1 篇 zf friedrichshaf...
  • 1 篇 avl graz austria
  • 1 篇 karlstad univ ka...
  • 1 篇 tamkang univ dep...
  • 1 篇 univ ferrara dip...
  • 1 篇 osaka university
  • 1 篇 tampere universi...

作者

  • 3 篇 tuma katja
  • 2 篇 perera srinath
  • 2 篇 heinrich robert
  • 2 篇 scandariato ricc...
  • 2 篇 omori takayuki
  • 2 篇 shih tk
  • 2 篇 ohnishi atsushi
  • 1 篇 yanan su
  • 1 篇 xinxin lv
  • 1 篇 bucao samantha d...
  • 1 篇 heayyoung jo
  • 1 篇 yasuyuki matsush...
  • 1 篇 hung jc
  • 1 篇 bowles john b.
  • 1 篇 hung jason c.
  • 1 篇 riguzzi f
  • 1 篇 das gupta pranab...
  • 1 篇 li lw
  • 1 篇 simoncini v
  • 1 篇 alotaibi asma s.

语言

  • 65 篇 英文
  • 5 篇 其他
检索条件"主题词=Data Flow Diagram"
70 条 记 录,以下是21-30 订阅
排序:
Ripple Effect Analysis of data flow Requirements  14
Ripple Effect Analysis of Data Flow Requirements
收藏 引用
14th International Conference on Software Technologies (ICSOFT)
作者: Hung, Bui Do Tien Omori, Takayuki Ohnishi, Atsushi Ritsumeikan Univ Dept Comp Sci 1-1-1 Noji Higashi Kusatsu Shiga 5258577 Japan
Ripple effect in the modification of software requirements should be properly analyzed, since it may cause errors of software requirements. We have already proposed a ripple effect analysis method in deletion or updat... 详细信息
来源: 评论
iCheck: an Android Application for Enhancing In-store Shopping Experience Using Modern Techniques  2
iCheck: an Android Application for Enhancing In-store Shoppi...
收藏 引用
2nd International Conference on Computer Applications and Information Security (ICCAIS)
作者: AlWadani, Rawabi M. AlOtaibi, Asma S. Prince Sattam Bin Abdul Aziz Univ Informat Syst Dept Kharj Saudi Arabia
this paper aims to provide a service that improves In-stores customer's shopping experience in order to lead stores 'customers' comfort, efficient, and convenient shopping experience by applying images pro... 详细信息
来源: 评论
Practical Security and Privacy Threat Analysis in the Automotive Domain: Long Term Support Scenario for Over-the-Air Updates  5
Practical Security and Privacy Threat Analysis in the Automo...
收藏 引用
5th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS)
作者: Vasenev, Alexandr Stahl, Florian Hamazaryan, Hayk Ma, Zhendong Shan, Lijun Kemmerich, Joerg Loiseaux, Claire ESI TNO Eindhoven Netherlands AVL Software & Funct Regensburg Germany ZF Friedrichshafen AG Friedrichshafen Germany AVL Graz Austria Internet Trust Paris France
Keeping a vehicle secure implies provide of a long-term support, where over-the-air updates (OTA) play an essential role. Clear understanding of OTA threats is essential to counter them efficiently. Existing research ... 详细信息
来源: 评论
Engineering Privacy by Design - Lessons from the Design and Implementation of an Identity Wallet Platform  19
Engineering Privacy by Design - Lessons from the Design and ...
收藏 引用
34th ACM/SIGAPP Annual International Symposium on Applied Computing (SAC)
作者: Veseli, Fatbardh Olvera, Jetzabel Serna Pulls, Tobias Rannenberg, Kai Capgemini Germany Frankfurt Germany Goethe Univ Frankfurt Frankfurt Germany Karlstad Univ Karlstad Sweden
In the last decade, there has been more and more focus on the topic of information privacy, especially considering the ever increasing digital transformations that both businesses and the society are experiencing. As ... 详细信息
来源: 评论
Flaws in flows: Unveiling Design Flaws via Information flow Analysis
Flaws in Flows: Unveiling Design Flaws via Information Flow ...
收藏 引用
IEEE International Conference on Software Architecture (ICSA)
作者: Tuma, Katja Balliu, Musard Scandariato, Riccardo Chalmers Univ Gothenburg Gothenburg Sweden KTH Royal Inst Technol Stockholm Sweden
This paper presents a practical and formal approach to analyze security-centric information flow policies at the level of the design model. Specifically, we focus on data confidentiality and data integrity objectives.... 详细信息
来源: 评论
Enrichment of UML by Introjection of Functional Model  1st
Enrichment of UML by Introjection of Functional Model
收藏 引用
1st International Conference on Smart Computing and Informatics (SCI)
作者: Handigund, Shivanand M. Arunakumari, B. N. Chikkamannur, Ajeet Vemana Inst Technol Dept Informat Sci & Engn Bengaluru 560034 India Visvesvaraya Technol Univ Dept Comp Sci & Engn Res Resource Ctr Belagavi 590018 India RL Jalappa Inst Technol Dept Comp Sci & Engn Bengaluru 561203 India
The de facto status of unified modeling language (UML) remains unaltered even after 20 years of advances in other technologies. The non-ascension in the status indicates some lacuna in UML, though it has undergone up-... 详细信息
来源: 评论
Threat Analysis of Wi-Fi connected Dashboard Camera
Threat Analysis of Wi-Fi connected Dashboard Camera
收藏 引用
International Conference on Platform Technology and Service (PlatCon)
作者: Park, Won Choi, Dahee Lee, Kyungho Korea Univ Inst Cyber Secur & Privacy ICSP Seoul South Korea
Recently dashboard camera (dashcam) has a function of connecting Wi-Fi to a smartphone for usability. But, it has severe vulnerabilities that it doesn't have authentication process. We analyzed threats of overall ... 详细信息
来源: 评论
INFORMATION flow AND TACIT KNOWLEDGE MANAGEMENT IN PRODUCT PLANNING PROCESS
INFORMATION FLOW AND TACIT KNOWLEDGE MANAGEMENT IN PRODUCT P...
收藏 引用
作者: SIRKKU SIMOLA Tampere University of Technology
学位级别:硕士
This thesis focuses on the new product process, information that is created in it and its flow. The process owner is product planning organization in a steel company. Four years ago a lot of valuable information was l... 详细信息
来源: 评论
Automatic Test Case Generation for Simulation Training Software
Automatic Test Case Generation for Simulation Training Softw...
收藏 引用
2018 3rd International Conference on Automation,Mechanical Control and Computational Engineering(AMCCE 2018)
作者: Sun Chunsheng Wei Xiang Dong Yanhong Navy Submarine Academy
In the virtual training simulation software, users through graphical interfaces to fullfill in-formation exchange. By adopting the method of black box testing, treating the virtual training simula-tion software as a b... 详细信息
来源: 评论
Analysis and Design on Music Information Management System Based on Android Platform
Analysis and Design on Music Information Management System B...
收藏 引用
2016 3rd International Conference on Education,Management and Computing Technology(ICEMCT 2016)
作者: Xinxin Lv Chengwei Wu College of Education And Sports Bohai University College of Information Science and Technology Bohai University
With the increasingly rapid pace of life in today, mobile devices become more and more popular for people, so the development of a cost-effective information management software has good prospects for development on t... 详细信息
来源: 评论