NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

3 4 5 6 7
zadetkov: 1.548
41.
  • Using Requirements Engineer... Using Requirements Engineering in an Automatic Security Policy Derivation Process
    Graa, Mariem; Cuppens-Boulahia, Nora; Autrel, Fabien ... Data Privacy Management and Autonomous Spontaneus Security
    Book Chapter
    Recenzirano

    Traditionally, a security policy is defined from an informal set of requirements, generally written using natural language. It is then difficult to appreciate the compatibility degree of the manually ...
Celotno besedilo
42.
  • Chaos in product maps Chaos in product maps
    DEĞİRMENCİ, NEDİM; KOÇAK, ŞAHİN Turkish journal of mathematics, 01/2010, Letnik: 34, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    We discuss how chaos conditions on maps carry over to their products. First we give a counterexample showing that the product of two chaotic maps (in the sense of Devaney) need not be chaotic. We ...
Celotno besedilo
43.
  • A New Approach For Speech A... A New Approach For Speech Audio Steganalysis Using Delay Vector Variance Method
    Emrah Yürüklü; Erdoğan Di̇laveroğlu; Osman Hilmi Koçal Uludağ University Journal of The Faculty of Engineering, 04/2014, Letnik: 19, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Bu çalışmada gecikmeli vektör varyans metodunun, kayıt edilmiş konuşma seslerinin steganalizinde kullanımı araştırılmıştır. Konuşma sinyali içerisine veri gizlemenin orijinal ses verisinin ...
Celotno besedilo
44.
  • Intentional Fragments: Brid... Intentional Fragments: Bridging the Gap between Organizational and Intentional Levels in Business Processes
    Cortes-Cornax, Mario; Matei, Alexandru; Letier, Emmanuel ... On the Move to Meaningful Internet Systems: OTM 2012
    Book Chapter
    Recenzirano

    Business process models provide a natural way to describe real-world processes to be supported by software-intensive systems. These models can be used to analyze processes in the system-as-is and ...
Celotno besedilo
45.
Celotno besedilo

PDF
46.
  • Artificial neural network b... Artificial neural network based chaotic generator for cryptology
    DANIŞMAN, Kenan; DALKIRAN, İlker Elektrik : Turkish journal of electrical engineering & computer sciences, 01/2010, Letnik: 18, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Chaotic systems are sensitive to initial conditions, system parameters and topological transitivity and these properties are also remarkable for cryptanalysts. Noise like behavior of chaotic systems ...
Celotno besedilo
47.
  • Goal-Oriented Requirements Analysis of Online Public Complaints System Using SAR, R2G, and KAOS Methods
    Shofi, Imam Marzuki; Hakiem, Nashrul; Rozy, Nurul Faizah ... 2022 10th International Conference on Cyber and IT Service Management (CITSM), 2022-Sept.-20
    Conference Proceeding

    There are some methods to perform goal-oriented requirements analysis, i.e.: KAOS, GBRAM, i*, etc. The House of Representatives of Republic of Indonesia, as we call DPR RI, is an institution with ...
Celotno besedilo
48.
  • Leimert Phone Company
    Baumann, Karl; Stokes, Benjamin; Bar, François ... Nano (New York, N.Y.), 07/2014 5
    Journal Article
    Recenzirano
    Odprti dostop

    (1) How can we better utilize an abandoned payphone outside of our partner’s building in Leimert Park? (2) With ongoing subway development and fears of gentrification, how can public arts and ...
Celotno besedilo
49.
  • Toward a flexible ontology-... Toward a flexible ontology-based policy approach for network operations using the KAoS framework
    Uszok, A.; Bradshaw, J. M.; Lott, J. ... 2011 - MILCOM 2011 Military Communications Conference, 2011-Nov.
    Conference Proceeding

    This paper addresses the challenges of flexible and uniform policy management in complex military network operations. The ontology-based approach of KAoS policy services provides flexibility in level ...
Celotno besedilo
50.
  • Formal alignment of requirements models with high-level architecture models
    Bougacha, Racem; Laleau, Regine; Collart-Dutilleul, Simon 2023 27th International Conference on Engineering of Complex Computer Systems (ICECCS), 2023-June-14
    Conference Proceeding

    The quality of a system depends on the degree to which it fulfills its requirements. Requirements traceability is broadly recognized as a crucial element of any rigorous system development process, ...
Celotno besedilo
3 4 5 6 7
zadetkov: 1.548

Nalaganje filtrov