A software process can be characterized as the ISO/IEC 15504. A common process framework is established by defining a small number of framework activities that are applicable to all software projects, regardless of th...
详细信息
A software process can be characterized as the ISO/IEC 15504. A common process framework is established by defining a small number of framework activities that are applicable to all software projects, regardless of their size or complexity. There are many risk items of the project development that cause the process maturity level occurring in the quality problems during process management and project progress. This paper designs the opportunity tree that management of security requirement the current domain and their problems solution as well. And this paper reference ISO/IEC 15504 and ISO/IEC 15408 as the international standard. In this paper, we propose a security requirement handing based approach considering security when developing system.
There are many risk items of the project development that cause the process maturity level occurring in the quality problems during process management and project progress. This paper designs the opportunity tree that...
详细信息
There are many risk items of the project development that cause the process maturity level occurring in the quality problems during process management and project progress. This paper designs the opportunity tree that level-up the current environments and their problems solution as well. For the similar projects, we can estimate defects and prepare to solve them by using domain expert knowledge and the opportunity tree, which can greatly improve the software process. And this paper reference ISO/IEC 15504 as the international standard. Also, this paper is intended to develop the relationship between process improvement and their causes to introduce. Therefore, using defect causes, we understand the associated relationship between AHP and design opportunity tree to level-up.
computer algebra system (CAS) applications are mathematical applications developed with the purpose of solving mathematical problems which are too difficult or even impossible to solve by hand. Modern versions of CAS ...
详细信息
computer algebra system (CAS) applications are mathematical applications developed with the purpose of solving mathematical problems which are too difficult or even impossible to solve by hand. Modern versions of CAS applications are known for their rather large set of features such as support for graphical representations of results, symbolic manipulation, big-integer calculations, and complex-number arithmetic. The proposed idea in developing framework for a mathematical tool with CAS capability is derived from the motivation of object oriented design that integrate each application process in terms of an independent object module. Additional motivation is scalability and interface, meaning more functionality can be integrated without changing any core existed module, that is just create a new object and plug in.
This paper considers the general filtering problem for a distinct class of two-dimensional (2-D) discrete linear systems, i.e. information propagation in two independent directions, known as discrete linear repetitive...
详细信息
Fuzzy communication contains vague or imprecise components and it might lack of abundant information. If two entities (man or machine) are communicating by a fuzzy channel, it is necessary that both ends possess the s...
详细信息
Fuzzy communication contains vague or imprecise components and it might lack of abundant information. If two entities (man or machine) are communicating by a fuzzy channel, it is necessary that both ends possess the same codebook. The codebook might partly consist of common knowledge but it usually requires a context dependent part that is either learned by the communicating entity or defined by expert knowledge. Possibly it is continuously adapting to the input information. If such a codebook is not available or it contains too imprecise information, the information to be transmitted might be too much distorted and might lead to misunderstanding, misinterpretation and serious damage. If however the quality of the available codebook is satisfactory, the communication will be efficient i. e., the original contents of the message can be reconstructed. At the same time it is cost effective, as fuzzy communication is compressed as compared to traditional "abundant communication".
The unique characteristic of a repetitive process is a series of sweeps or passes through a set of dynamics defined over a finite duration known as the pass length. At the end of each pass, the process is reset and th...
详细信息
The unique characteristic of a repetitive process is a series of sweeps or passes through a set of dynamics defined over a finite duration known as the pass length. At the end of each pass, the process is reset and the next time through the output, or pass profile, produced on the previous pass acts as a forcing function on, an hence contributes to, the dynamics of the new pass profile. They are hence a class of systems with information propagation in two independent directions where here the dynamics over the finite pass length are described by a matrix linear differential equation and that from pass to pass has a discrete updating structure. This means that filtering/estimation theory/algorithms for, in particular, 2D discrete linear systems is not applicable. In this paper we solve a general filtering problem with a view toward use in the many applications where such action will be required.
Monte Carlo Go is a promising method to improve the performance of computer Go programs. This approach determines the next move to play based on many Monte Carlo samples. This paper examines the relative advantages of...
详细信息
Heterogeneous wireless networks are gaining popularity as users can be connected to these networks without any cables and even when they are mobile. The high power nodes in heterogeneous wireless networks do not have ...
详细信息
ISBN:
(纸本)1595933069
Heterogeneous wireless networks are gaining popularity as users can be connected to these networks without any cables and even when they are mobile. The high power nodes in heterogeneous wireless networks do not have energy constraints but the user nodes, which can be large in numbers, are usually low power energy constrained devices. Therefore, the GKA protocol used to secure group communications in these networks has to take into consideration both the low power nature of the user nodes and the network size. In this paper, we present an energy efficient and scalable GKA protocol, which uses our proposed Contributory Ring-Centralized (ContRi-Central) group model. Besides providing complexity analysis, we also show the computational and communication energy consumption costs analysis of all nodes running our proposed scheme and four other efficient GKA protocols. Both the complexity analysis and energy consumption costs analysis indicate that our proposed scheme is more efficient and suitable for heterogeneous wireless networks. Copyright 2006 ACM.
One useful application of wireless networks is for secure group communication, which can be achieved by running a Group Key Agreement (GKA) protocol. One well-known method of providing authentication in GKA protocols ...
详细信息
Multicast service, which is one of the multi-point communication methods, should be applied to adjust it to evolving mobile network environment. In this paper, we propose a fast multicast management scheme for mobile ...
详细信息
Multicast service, which is one of the multi-point communication methods, should be applied to adjust it to evolving mobile network environment. In this paper, we propose a fast multicast management scheme for mobile terminals in HMIPv6-based mobile networks. In HMIPv6-based mobile network environment, multicast management scheme provides multicast service during mobile handover depending on the change of multicast transmission routing. Changed impact of the multicast routing is determined by handovers processed intra AR, inter AR, or MAP. Our multicast supporting scheme, which is proposed in this paper, uses tunneling scheme for intra AR handovers, and advance registration scheme for intra AR handovers to support multicast service management scheme depending on the changed impact of the multicast routing.
暂无评论