Results 31 to 40 of about 1,610,238 (288)

STORE: Security Threat Oriented Requirements Engineering Methodology

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
As we are continuously depending on information technology applications by adopting electronic channels and software applications for our business, online transaction and communication, software security is increasingly becoming a necessity and more ...
Md Tarique Jamal Ansari   +2 more
doaj   +1 more source

A survey on future networks:application scenarios and requirements analysis

open access: yesDianxin kexue, 2019
Faced with the severe challenges of today’s network in terms of scalability,mobility,QoS guarantee and manageability,the essential capability requirements of future networks were summarized by analyzing application scenarios of future networks,and the ...
Bin DAI, Yuanyuan CAO, Yijun MO
doaj   +2 more sources

Determination of a Wave Function Functional

open access: yes, 2005
In this paper we propose the idea of expanding the space of variations in standard variational calculations for the energy by considering the wave function $\psi$ to be a functional of a set of functions $\chi: \psi = \psi[\chi]$, rather than a function.
C. F. Fischer   +9 more
core   +1 more source

A Formalism for Scattering of Complex Composite Structures. 1 Applications to Branched Structures of Asymmetric Sub-Units [PDF]

open access: yes, 2012
We present a formalism for the scattering of an arbitrary linear or acyclic branched structure build by joining mutually non-interacting arbitrary functional sub-units.
Carsten Svaneborg   +9 more
core   +2 more sources

Studying Dynamical and Hydraulic Characteristics of the Hydraulically Suspended Passive Shutdown Subassembly (HS-PSS) and Validating with a Prototypic Test Sample

open access: yesEnergies
The pool-type demonstrative China Fast Reactor 600 (CFR-600) adopted a series of improved safety designs, among which the hydraulic suspended passive shutdown subassembly (HS-PSS) is employed for inherent safety enhancement, especially suitable against ...
Bo Kuang   +3 more
doaj   +1 more source

Functional Requirement Study [PDF]

open access: yes, 1999
This presentation looks at Functional Requirement Studies (FRS) for GIS. A FRS consists of five steps: 1)Identify Decisions, 2)Determine Information Products Needed, 3)Determine Frequencies, 4)Identify Data Sets Required, and 5)Determine GIS Operations ...
Haithcoat, Tim
core  

A Requirement-centric Approach to Web Service Modeling, Discovery, and Selection [PDF]

open access: yes, 2010
Service-Oriented Computing (SOC) has gained considerable popularity for implementing Service-Based Applications (SBAs) in a flexible\ud and effective manner.
A.V. Lamsweerde   +12 more
core   +6 more sources

Imaging of High‐Risk Neuroblastoma: Recommendations From SIOPEN Radiology and Nuclear Medicine Specialty Committees

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Neuroblastoma is the most common extracranial solid tumor in early childhood. Its clinical behavior is highly variable, ranging from spontaneous regression to fatal outcome despite intensive treatment. The International Society of Pediatric Oncology Europe Neuroblastoma Group (SIOPEN) Radiology and Nuclear Medicine Specialty Committees ...
Annemieke Littooij   +11 more
wiley   +1 more source

Functional Requirements for Medical Data Integration into Knowledge Management Environments: Requirements Elicitation Approach Based on Systematic Literature Analysis

open access: yesJournal of Medical Internet Research, 2023
BackgroundIn patient care, data are historically generated and stored in heterogeneous databases that are domain specific and often noninteroperable or isolated.
Benjamin Kinast   +3 more
doaj   +1 more source

A first principles based polarizable O(N) interatomic force field for bulk silica [PDF]

open access: yes, 2010
We present a reformulation of the Tangney-Scandolo interatomic force field for silica J. Chem. Phys. 117, 8898 (2002), which removes the requirement to perform an Ewald summation.
Cereda, Silva   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy