咨询与建议

限定检索结果

文献类型

  • 37 篇 会议
  • 26 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 68 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 56 篇 工学
    • 41 篇 计算机科学与技术...
    • 21 篇 软件工程
    • 9 篇 电气工程
    • 4 篇 信息与通信工程
    • 4 篇 建筑学
    • 4 篇 土木工程
    • 3 篇 机械工程
    • 2 篇 交通运输工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 仪器科学与技术
    • 1 篇 控制科学与工程
  • 10 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 3 篇 工商管理
  • 6 篇 理学
    • 4 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 体育学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 农学
    • 1 篇 作物学
  • 1 篇 军事学

主题

  • 68 篇 data flow diagra...
  • 5 篇 dfd
  • 5 篇 diformyl dapsone
  • 5 篇 entity relations...
  • 4 篇 petri net
  • 3 篇 defocusing
  • 3 篇 software enginee...
  • 3 篇 text
  • 2 篇 business process
  • 2 篇 fmea
  • 2 篇 systems design
  • 2 篇 diagram datových...
  • 2 篇 privacy by desig...
  • 2 篇 vývojový diagram
  • 2 篇 control flow dia...
  • 2 篇 structured analy...
  • 2 篇 requirement anal...
  • 2 篇 information flow
  • 2 篇 transformation s...
  • 2 篇 information syst...

机构

  • 4 篇 brno university ...
  • 1 篇 asian inst finan...
  • 1 篇 norwegian univ s...
  • 1 篇 univ vienna fac ...
  • 1 篇 univ bologna dei...
  • 1 篇 karlsruhe inst t...
  • 1 篇 prince sattam bi...
  • 1 篇 department of el...
  • 1 篇 nagoya univ stra...
  • 1 篇 school of busine...
  • 1 篇 physical educati...
  • 1 篇 sultan qaboos un...
  • 1 篇 tsinghua univers...
  • 1 篇 zf friedrichshaf...
  • 1 篇 avl graz austria
  • 1 篇 karlstad univ ka...
  • 1 篇 tamkang univ dep...
  • 1 篇 univ ferrara dip...
  • 1 篇 osaka university
  • 1 篇 tampere universi...

作者

  • 2 篇 perera srinath
  • 2 篇 tuma katja
  • 2 篇 heinrich robert
  • 2 篇 scandariato ricc...
  • 2 篇 omori takayuki
  • 2 篇 shih tk
  • 2 篇 ohnishi atsushi
  • 1 篇 yanan su
  • 1 篇 xinxin lv
  • 1 篇 bucao samantha d...
  • 1 篇 heayyoung jo
  • 1 篇 yasuyuki matsush...
  • 1 篇 hung jc
  • 1 篇 bowles john b.
  • 1 篇 hung jason c.
  • 1 篇 riguzzi f
  • 1 篇 das gupta pranab...
  • 1 篇 li lw
  • 1 篇 simoncini v
  • 1 篇 alotaibi asma s.

语言

  • 63 篇 英文
  • 5 篇 其他
检索条件"主题词=Data Flow Diagram"
68 条 记 录,以下是31-40 订阅
Tool-assisted Threat Modeling for Smart Grid Cyber Security  7
Tool-assisted Threat Modeling for Smart Grid Cyber Security
收藏 引用
International Conference on Cyber Situational Awareness, data Analytics and Assessment (Cyber SA)
作者: Fla, Lars Halvdan Borgaonkar, Ravishankar Tondel, Inger Anne Jaatun, Martin Gilje Norwegian Univ Sci & Technol Trondheim Norway SINTEF Digital Trondheim Norway
Threat modeling is about identifying architectural flaws and weaknesses in a system in order to mitigate them and avoid unwanted incidents caused by an attacker. Tool-assisted threat modeling has seen limited use in c... 详细信息
来源: 评论
The Design of Network Query System for Automobile Inspection data  19
The Design of Network Query System for Automobile Inspection...
收藏 引用
19th IEEE International Symposium on Parallel and Distributed Processing with Applications (IEEE ISPA)
作者: Ma, Bo Zhuo, Kuncheng Su, Zanyou Huang, Donghai Zou, Yonglong Sany Heavy Ind Co Ltd Changsha Peoples R China Xiamen Great Power Geo Informat Technol Co Ltd Xiamen Peoples R China Xiamen Univ Technol Sch Comp & Informat Engn Xiamen Peoples R China
The purpose of designing the automobile inspection data network query system is to realize the query and statistics of automobile inspection data on the Internet. The system connects the holders and demanders of autom... 详细信息
来源: 评论
Ripple Effect Analysis of data flow Requirements  14
Ripple Effect Analysis of Data Flow Requirements
收藏 引用
14th International Conference on Software Technologies (ICSOFT)
作者: Hung, Bui Do Tien Omori, Takayuki Ohnishi, Atsushi Ritsumeikan Univ Dept Comp Sci 1-1-1 Noji Higashi Kusatsu Shiga 5258577 Japan
Ripple effect in the modification of software requirements should be properly analyzed, since it may cause errors of software requirements. We have already proposed a ripple effect analysis method in deletion or updat... 详细信息
来源: 评论
iCheck: an Android Application for Enhancing In-store Shopping Experience Using Modern Techniques  2
iCheck: an Android Application for Enhancing In-store Shoppi...
收藏 引用
2nd International Conference on Computer Applications and Information Security (ICCAIS)
作者: AlWadani, Rawabi M. AlOtaibi, Asma S. Prince Sattam Bin Abdul Aziz Univ Informat Syst Dept Kharj Saudi Arabia
this paper aims to provide a service that improves In-stores customer's shopping experience in order to lead stores 'customers' comfort, efficient, and convenient shopping experience by applying images pro... 详细信息
来源: 评论
Maximum Mutual Information Rate for The Uniformly Symmetric Variable Noise FSMC without Channel State Information
Maximum Mutual Information Rate for The Uniformly Symmetric ...
收藏 引用
International Symposium on Information Theory and its Applications (ISITA)
作者: Xu, Benshuai Krusevac, Zarko Rapajic, Predrag Chen, Yifan Univ Greenwich London SE18 6PF England
The orthodoxy in the time-varying channel is that, the mutual information (MI) rate of the Uniform Symmetric Variable Noise Finite State Markov Channel (USVN-FSMC) is maximized by the channel input of maximum entropy,... 详细信息
来源: 评论
Asynchronous multimedia presentation design machine  12
Asynchronous multimedia presentation design machine
收藏 引用
12th International Conference on Information Networking (ICOIN-12)
作者: Shih, TK Wang, YH Jiang, DR Hung, JC Wang, CC Pai, WC Tamkang Univ Dept Comp Sci & Informat Engn Taipei 251 Taiwan
This paper describes how to present different multimedia objects on a Multimedia Abstract Machine with a structural mechanism. The structural mechanism is based on the Petri net. Using features of a Petri net to displ... 详细信息
来源: 评论
An application of algebraic Petri nets specification for vendor management inventory
An application of algebraic Petri nets specification for ven...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Jian, W Xue, YC Qian, JX Zhejiang Univ Inst Syst Engn Hangzhou 310027 Peoples R China
In this paper, the algebraic Petri nets (APN) is used to a vendor management inventory (VMI) system modeling. An APN specification for a simple VMI system is put out and a procedure to write APN specification is propo... 详细信息
来源: 评论
Practical Security and Privacy Threat Analysis in the Automotive Domain: Long Term Support Scenario for Over-the-Air Updates  5
Practical Security and Privacy Threat Analysis in the Automo...
收藏 引用
5th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS)
作者: Vasenev, Alexandr Stahl, Florian Hamazaryan, Hayk Ma, Zhendong Shan, Lijun Kemmerich, Joerg Loiseaux, Claire ESI TNO Eindhoven Netherlands AVL Software & Funct Regensburg Germany ZF Friedrichshafen AG Friedrichshafen Germany AVL Graz Austria Internet Trust Paris France
Keeping a vehicle secure implies provide of a long-term support, where over-the-air updates (OTA) play an essential role. Clear understanding of OTA threats is essential to counter them efficiently. Existing research ... 详细信息
来源: 评论
Engineering Privacy by Design - Lessons from the Design and Implementation of an Identity Wallet Platform  19
Engineering Privacy by Design - Lessons from the Design and ...
收藏 引用
34th ACM/SIGAPP Annual International Symposium on Applied Computing (SAC)
作者: Veseli, Fatbardh Olvera, Jetzabel Serna Pulls, Tobias Rannenberg, Kai Capgemini Germany Frankfurt Germany Goethe Univ Frankfurt Frankfurt Germany Karlstad Univ Karlstad Sweden
In the last decade, there has been more and more focus on the topic of information privacy, especially considering the ever increasing digital transformations that both businesses and the society are experiencing. As ... 详细信息
来源: 评论
Enrichment of UML by Introjection of Functional Model  1st
Enrichment of UML by Introjection of Functional Model
收藏 引用
1st International Conference on Smart Computing and Informatics (SCI)
作者: Handigund, Shivanand M. Arunakumari, B. N. Chikkamannur, Ajeet Vemana Inst Technol Dept Informat Sci & Engn Bengaluru 560034 India Visvesvaraya Technol Univ Dept Comp Sci & Engn Res Resource Ctr Belagavi 590018 India RL Jalappa Inst Technol Dept Comp Sci & Engn Bengaluru 561203 India
The de facto status of unified modeling language (UML) remains unaltered even after 20 years of advances in other technologies. The non-ascension in the status indicates some lacuna in UML, though it has undergone up-... 详细信息
来源: 评论