• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,455
Next 10 →

Table 10 - Relating NFR aspects and use cases UC

in Identifying aspectual use cases using a viewpoint-oriented requirements method
by João Araújo 2003
"... In PAGE 5: ... Identify and solve conflicts As we can observe from tables 8 and 9, there is conflict between the non-functional candidate aspects security and performance, as both contribute negatively to each other, have very high priority and affect the same use cases. Table10 shows possible weights attributed to the NFRs in relation the use cases. The stakeholders involved must negotiate the conflicts.... ..."
Cited by 8

TABLE I BEP estimate (in percentage) as a function of the algorithm and NFR.

in An Adaptive Blind Receiver for Asynchronous DS-CDMA Based on Recursive SVD and RLS
by Geert Leus, Marc Moonen

Table 1. Correlation catalogue.

in Software Architectures as Organizational Structures
by Manuel Kolp, John Mylopoulos
"... In PAGE 4: ... Correlation catalogue. Table1 summarizes the correlation catalogue for the organizational patterns and top-level quality attributes we have considered. Following notations used by the NFR (non functional requirements) framework [Chu00], +, ++, -, --, respectively model partial/positive, sufficient/positive, partial/negative and sufficient/negative contributions.... ..."

Table 1. A characteristic for RC6-I-NFR and RC6-NFR. In the analysis that follows we will concentrate on RC6-NFR. The same arguments and results can be applied to RC6-I-NFR by replacing f(x) = x (2x + 1) with the identity function f(x) = x. We will use the fact that x mod 2i

in Improved Analysis of Some Simplified Variants of RC6
by Scott Contini, Ronald L. Rivest, M. J. B. Robshaw, Yiqun Lisa Yin
"... In PAGE 4: ...Existing analysis on RC6-I-NFR and RC6-NFR In [3] one potentially useful six-round iterative characteristic was provided for attacking both RC6-I-NFR and RC6-NFR. This is given in Table1 . Here et is used to denote the 32-bit word that has all bits set to zero except bit t where t = 0 for the least signi cant bit.... In PAGE 4: ...2 Re ned analysis of RC6-I-NFR and RC6-NFR Closer analysis of the characteristic probabilities for RC6-I-NFR and RC6-NFR suggests that the values of some of the subkeys during encryption are important. In particular, the characteristic of interest for RC6-I-NFR and RC6-NFR given in Table1 can only occur if certain subkey conditions are met. Further, once these subkey conditions hold then the characteristic occurs with probability 2?20, which is much higher than the initial estimate of 2?30 that was obtained by... In PAGE 5: ... Lemma 1. If the characteristic given in Table1 holds for RC6-NFR, then the following two conditions on the subkeys must hold: f(?S[9]) =32 ?S[7]; f(S[8]) =32 ?S[11]: Proof. First we observe that if the characteristic is to hold, then certain rotation amounts derived from the B and D registers must be zero.... In PAGE 6: ...Table1 holds up to round ve. Furthermore suppose that f(?S[9]) =32 ?S[7] and f(S[8]) =32 ?S[11].... ..."

Table VII. RIM Support in Seven Projects Activity WinWin NFR ViewPoints KAOS DDRA SCR M Telos

in Requirements Interaction Management
by William N. Robinson, Suzanne D. Pawlowski, Vecheslav Volkov 2003
Cited by 10

Table 1: Framework Instantiations

in Fast Interprocedural Class Analysis
by Greg DeFouw, David Grove, Craig Chambers 1998
"... In PAGE 12: ... 2.5 Instantiations of the Framework Table1 identifies several algorithms that are instantiations of our framework; boldface rows are new algorithms. Classic OO 0-... ..."
Cited by 69

Table 1: Framework Instantiations

in Fast Interprocedural Class Analysis
by Greg Defouw, Greg Defouw, David Grove, David Grove, Craig Chambers, Craig Chambers 1998
"... In PAGE 12: ... 2.5 Instantiations of the Framework Table1 identifies several algorithms that are instantiations of our framework; boldface rows are new algorithms. Classic OO 0-CFA is the standard cubic-time, flow-sensitive but context-insensitive interprocedural class analysis.... ..."
Cited by 69

Table 11: Framework Creation

in A method for reusable and adaptable reference models Table of Contents TABLE OF CONTENTS ERROR! NO TABLE OF CONTENTS ENTRIES FOUND.
by Student Peter Nes 2007
"... In PAGE 69: ....3.2. Framework Creation Table11 gives the elements of the Framework Creation step. Table 11: Framework Creation ... ..."

Table 1 - Purposes of the frameworks

in Xml-Based Frameworks For Internet Commerce
by Yuxiao Zhao Kristian, Kristian S 2000
"... In PAGE 5: ... 3 CHARACTERISTICS OF THE FRAMEWORKS 3.1 Purpose The frameworks have different purposes (see Table1 ). eCo Framework and xCBL are provided for e-commerce infrastructure and environments and the rest for how to achieve the communication between e-commerce systems.... ..."
Cited by 10

Table 1. Classification framework.

in Agent-Based Approaches to Transport Logistics
by Paul Davidsson, Lawrence Henesey, Linda Ramstedt, Johanna Törnquist 2005
"... In PAGE 5: ... 3.4 Summary of framework Table1 on the next page summarizes the framework for describing and assessing the agent-based approaches to logistics. The Appendix provides a table listing the published work in the area of agent-based approached to transport logistics that we have encountered is classified according to this framework.... ..."
Cited by 6
Next 10 →
Results 1 - 10 of 3,455
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University