咨询与建议

限定检索结果

文献类型

  • 29 篇 期刊文献
  • 16 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 43 篇 工学
    • 29 篇 计算机科学与技术...
    • 23 篇 软件工程
    • 8 篇 电气工程
    • 3 篇 控制科学与工程
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 2 篇 机械工程
    • 2 篇 信息与通信工程
    • 2 篇 环境科学与工程(可...
    • 1 篇 电子科学与技术(可...
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 2 篇 理学
    • 2 篇 数学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 医学
    • 1 篇 公共卫生与预防医...

主题

  • 47 篇 data flow diagra...
  • 5 篇 structured analy...
  • 2 篇 data flows
  • 2 篇 simulation
  • 2 篇 software enginee...
  • 2 篇 structured metho...
  • 2 篇 threat modeling
  • 2 篇 information flow
  • 2 篇 sofl
  • 2 篇 entity relations...
  • 2 篇 process modeling
  • 2 篇 requirements eng...
  • 2 篇 spreadsheets
  • 2 篇 systems analysis
  • 2 篇 structured desig...
  • 2 篇 privacy
  • 2 篇 prolog
  • 1 篇 hardware descrip...
  • 1 篇 structure charts
  • 1 篇 gameful experien...

机构

  • 1 篇 univ london roya...
  • 1 篇 trinity coll dub...
  • 1 篇 univ melbourne d...
  • 1 篇 massey univ dept...
  • 1 篇 univ colorado de...
  • 1 篇 narsee monjee in...
  • 1 篇 computing discip...
  • 1 篇 nru hse moscow
  • 1 篇 knime austin tx ...
  • 1 篇 naples univ dipa...
  • 1 篇 cent univ jammu ...
  • 1 篇 knime constance
  • 1 篇 bechtel power co...
  • 1 篇 la salle univ de...
  • 1 篇 noaa fisheries n...
  • 1 篇 konstanz univ co...
  • 1 篇 univ gothenburg ...
  • 1 篇 visma sibiu roma...
  • 1 篇 hosei univ fac c...
  • 1 篇 srge cairo

作者

  • 2 篇 liu sy
  • 2 篇 schneider gerard...
  • 2 篇 van deursen arie
  • 2 篇 hermans felienne
  • 2 篇 pinzger martin
  • 1 篇 fukuzaki t
  • 1 篇 kokovin valery a...
  • 1 篇 baldwin a.n.
  • 1 篇 kolesnik mariia
  • 1 篇 loftus craig
  • 1 篇 protsko lb
  • 1 篇 thorpe a.
  • 1 篇 iovan monica
  • 1 篇 tse th
  • 1 篇 belardo s
  • 1 篇 toetenel hans
  • 1 篇 hassanien aboul ...
  • 1 篇 ghiran ana-maria
  • 1 篇 miyamoto k
  • 1 篇 tong xin

语言

  • 41 篇 英文
  • 6 篇 其他
检索条件"主题词=Data Flow Diagrams"
47 条 记 录,以下是11-20 订阅
排序:
A Privacy-Aware Conceptual Model for Handling Personal data  7th
A Privacy-Aware Conceptual Model for Handling Personal Data
收藏 引用
7th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA)
作者: Antignac, Thibaud Scandariato, Riccardo Schneider, Gerardo Chalmers Univ Gothenburg Dept Comp Sci & Engn Gothenburg Sweden
Handling personal data adequately is one of the biggest challenges of our era. Consequently, law and regulations are in the process of being released, like the European General data Protection Regulation (GDPR), which... 详细信息
来源: 评论
Using flow diagrams to improve tobacco cessation programs
收藏 引用
INTERNATIONAL JOURNAL OF HEALTH CARE QUALITY ASSURANCE 2017年 第5期30卷 436-444页
作者: Dziadkowiec, Oliwier Jenniges, Reese Univ Colorado Denver Coll Nursing Anschutz Med Campus Aurora CO 80045 USA Boulder Cty IMPACT Boulder CO USA
Purpose - The purpose of this paper is to understand how the Wyoming Quit Tobacco Program (WQTP) is used by its subscribers and to better understand how WQTP might be connected to WQTP outcomes. Design/methodology/app... 详细信息
来源: 评论
Unified Profiling of Attackers via Domain Modeling  24
Unified Profiling of Attackers via Domain Modeling
收藏 引用
24th IEEE International Requirements Engineering Conference Workshops (RWE)
作者: Hussein, Nesrin Wang, Wentao Nedelec, Joseph L. Wei, Xuetao Niu, Nan Univ Cincinnati Dept Elect Engn & Comp Syst Cincinnati OH 45221 USA Univ Cincinnati Sch Criminal Justice Cincinnati OH 45221 USA Univ Cincinnati Sch Informat Technol Cincinnati OH 45221 USA
In this position paper, we present our interdisciplinary research into a unified account of profiling attackers for software-intensive systems. Our work draws on the principles from requirements engineering and crimin... 详细信息
来源: 评论
Designing a Power Converter with an Adaptive Control System for Ultrasonic Processing Units
Designing a Power Converter with an Adaptive Control System ...
收藏 引用
Conference on Modern Engineering - Science and Education (MSME)
作者: Diagilev, Vladimir I. Kokovin, Valery A. Uvaysov, Saygid U. Int Univ Dubna Nat Soc & Man Publ Inst Higher Educ Moscow Reg Branch Protvino Severny Pas 9 Protvino 142281 Russia NRU HSE Moscow 101000 Russia
We describe the features of circuit design construction and design of power converters included in ultrasonic process plants. We discuss the results of simulation of an equivalent circuit of the power converter. We th... 详细信息
来源: 评论
Why is data Sharing in Collaborative Natural Resource Efforts so Hard and What can We Do to Improve it?
收藏 引用
ENVIRONMENTAL MANAGEMENT 2014年 第5期53卷 883-893页
作者: Volk, Carol J. Lucero, Yasmin Barnas, Katie South Fork Res Inc North Bend WA 98045 USA Signal Noise Consulting Santa Monica CA 90405 USA NOAA Fisheries NW Fisheries Sci Ctr Seattle WA 98112 USA
Increasingly, research and management in natural resource science rely on very large datasets compiled from multiple sources. While it is generally good to have more data, utilizing large, complex datasets has introdu... 详细信息
来源: 评论
Decision factors for e-waste in Northern Mexico: To waste or trade
收藏 引用
RESOURCES CONSERVATION AND RECYCLING 2014年 86卷 93-106页
作者: Estrada-Ayub, Jesus. A. Kahhat, Ramzy Global Inst Sustainabil Tecnol Monterrey Mexico City 14380 DF Mexico Pontificia Univ Catolica Peru Dept Engn Lima Peru
Currently, around the globe, environmental and social problems derive from the inappropriate recycling of electronic products. Moreover, improper recycling is not the only issue to address in electronic products. Othe... 详细信息
来源: 评论
Drawing layered graphs with port constraints
收藏 引用
JOURNAL OF VISUAL LANGUAGES AND COMPUTING 2014年 第2期25卷 89-106页
作者: Schulze, Christoph Daniel Spoenemann, Miro von Hanxleden, Reinhard Univ Kiel Dept Comp Sci D-24098 Kiel Germany
Complex software systems are often modeled using data flow diagrams, in which nodes are connected to each other through dedicated connection points called ports. The influence a layout algorithm has on the placement o... 详细信息
来源: 评论
Online Banking Security Analysis based on STRIDE Threat Model
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2014年 第2期8卷 271-282页
作者: Tong Xin Ban Xiaofang China Informat Technol Secur Evaluat Ctr Dept Informat Syst Evaluat Beijing Peoples R China
This paper refers important issues regarding how to evaluate the security threats of the online banking effectively, a system threat analysis method combining STRIDE threat model and threat tree analysis is proposed, ... 详细信息
来源: 评论
Detecting and Visualizing Inter-worksheet Smells in Spreadsheets
Detecting and Visualizing Inter-worksheet Smells in Spreadsh...
收藏 引用
34th International Conference on Software Engineering (ICSE)
作者: Hermans, Felienne Pinzger, Martin van Deursen, Arie Delft Univ Technol Software Engn Res Grp Delft Netherlands
Spreadsheets are often used in business, for simple tasks, as well as for mission critical tasks such as finance or forecasting. Similar to software, some spreadsheets are of better quality than others, for instance w... 详细信息
来源: 评论
Supporting Professional Spreadsheet Users by Generating Leveled dataflow diagrams  11
Supporting Professional Spreadsheet Users by Generating Leve...
收藏 引用
33rd International Conference on Software Engineering (ICSE)
作者: Hermans, Felienne Pinzger, Martin van Deursen, Arie Delft Univ Technol NL-2600 AA Delft Netherlands
Thanks to their flexibility and intuitive programming model, spreadsheets are widely used in industry, often for business-critical applications. Similar to software developers, professional spreadsheet users demand su... 详细信息
来源: 评论