Results 31 to 40 of about 1,610,238 (288)
STORE: Security Threat Oriented Requirements Engineering Methodology
As we are continuously depending on information technology applications by adopting electronic channels and software applications for our business, online transaction and communication, software security is increasingly becoming a necessity and more ...
Md Tarique Jamal Ansari +2 more
doaj +1 more source
A survey on future networks:application scenarios and requirements analysis
Faced with the severe challenges of today’s network in terms of scalability,mobility,QoS guarantee and manageability,the essential capability requirements of future networks were summarized by analyzing application scenarios of future networks,and the ...
Bin DAI, Yuanyuan CAO, Yijun MO
doaj +2 more sources
Determination of a Wave Function Functional
In this paper we propose the idea of expanding the space of variations in standard variational calculations for the energy by considering the wave function $\psi$ to be a functional of a set of functions $\chi: \psi = \psi[\chi]$, rather than a function.
C. F. Fischer +9 more
core +1 more source
A Formalism for Scattering of Complex Composite Structures. 1 Applications to Branched Structures of Asymmetric Sub-Units [PDF]
We present a formalism for the scattering of an arbitrary linear or acyclic branched structure build by joining mutually non-interacting arbitrary functional sub-units.
Carsten Svaneborg +9 more
core +2 more sources
The pool-type demonstrative China Fast Reactor 600 (CFR-600) adopted a series of improved safety designs, among which the hydraulic suspended passive shutdown subassembly (HS-PSS) is employed for inherent safety enhancement, especially suitable against ...
Bo Kuang +3 more
doaj +1 more source
Functional Requirement Study [PDF]
This presentation looks at Functional Requirement Studies (FRS) for GIS. A FRS consists of five steps: 1)Identify Decisions, 2)Determine Information Products Needed, 3)Determine Frequencies, 4)Identify Data Sets Required, and 5)Determine GIS Operations ...
Haithcoat, Tim
core
A Requirement-centric Approach to Web Service Modeling, Discovery, and Selection [PDF]
Service-Oriented Computing (SOC) has gained considerable popularity for implementing Service-Based Applications (SBAs) in a flexible\ud and effective manner.
A.V. Lamsweerde +12 more
core +6 more sources
ABSTRACT Neuroblastoma is the most common extracranial solid tumor in early childhood. Its clinical behavior is highly variable, ranging from spontaneous regression to fatal outcome despite intensive treatment. The International Society of Pediatric Oncology Europe Neuroblastoma Group (SIOPEN) Radiology and Nuclear Medicine Specialty Committees ...
Annemieke Littooij +11 more
wiley +1 more source
BackgroundIn patient care, data are historically generated and stored in heterogeneous databases that are domain specific and often noninteroperable or isolated.
Benjamin Kinast +3 more
doaj +1 more source
A first principles based polarizable O(N) interatomic force field for bulk silica [PDF]
We present a reformulation of the Tangney-Scandolo interatomic force field for silica J. Chem. Phys. 117, 8898 (2002), which removes the requirement to perform an Ewald summation.
Cereda, Silva +3 more
core +1 more source

