NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

3 4 5 6 7
zadetkov: 1.554
41.
  • Death, Taxes, & Scalability Death, Taxes, & Scalability
    Duboc, Letícia; Rosenblum, David S; Letier, Emmanuel IEEE software, 07/2010, Letnik: 27, Številka: 4
    Journal Article
    Recenzirano

    The London Ambulance System and the online tax return system of Her Majesty's Revenue and Customs are two systems that have experienced significant problems of scalability. However, we've never seen ...
Celotno besedilo
42.
  • Ecological Degradation: Pir... Ecological Degradation: Pirandello's Natural World in Paolo and Vittorio Taviani's Kaos
    Concolino, Christopher F. Italian culture, 09/2016, Letnik: 34, Številka: 2
    Journal Article
    Recenzirano

    Six short stories by Luigi Pirandello form the basis of the 1984 film Kaos, shot in the same number of episodes, though only four of them principally document rural agrarian society and poverty in ...
Celotno besedilo
43.
  • Learning from others to ada... Learning from others to adapt quality management to the future
    Bäckström, Ingela; Ingelsson, Pernilla; Wiklund, Håkan Total quality management & business excellence, 02/2011, Letnik: 22, Številka: 2
    Journal Article
    Recenzirano

    The purpose of this paper is to compare leadership behaviours from two different approaches with the leadership behaviours within quality management in order to find possible areas for developing ...
Celotno besedilo
44.
  • Using Requirements Engineer... Using Requirements Engineering in an Automatic Security Policy Derivation Process
    Graa, Mariem; Cuppens-Boulahia, Nora; Autrel, Fabien ... Data Privacy Management and Autonomous Spontaneus Security
    Book Chapter
    Recenzirano

    Traditionally, a security policy is defined from an informal set of requirements, generally written using natural language. It is then difficult to appreciate the compatibility degree of the manually ...
Celotno besedilo
45.
  • Chaos in product maps Chaos in product maps
    DEĞİRMENCİ, NEDİM; KOÇAK, ŞAHİN Turkish journal of mathematics, 01/2010, Letnik: 34, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    We discuss how chaos conditions on maps carry over to their products. First we give a counterexample showing that the product of two chaotic maps (in the sense of Devaney) need not be chaotic. We ...
Celotno besedilo
46.
  • A New Approach For Speech A... A New Approach For Speech Audio Steganalysis Using Delay Vector Variance Method
    Emrah Yürüklü; Erdoğan Di̇laveroğlu; Osman Hilmi Koçal Uludağ University Journal of The Faculty of Engineering, 04/2014, Letnik: 19, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Bu çalışmada gecikmeli vektör varyans metodunun, kayıt edilmiş konuşma seslerinin steganalizinde kullanımı araştırılmıştır. Konuşma sinyali içerisine veri gizlemenin orijinal ses verisinin ...
Celotno besedilo
47.
  • Intentional Fragments: Brid... Intentional Fragments: Bridging the Gap between Organizational and Intentional Levels in Business Processes
    Cortes-Cornax, Mario; Matei, Alexandru; Letier, Emmanuel ... On the Move to Meaningful Internet Systems: OTM 2012
    Book Chapter
    Recenzirano

    Business process models provide a natural way to describe real-world processes to be supported by software-intensive systems. These models can be used to analyze processes in the system-as-is and ...
Celotno besedilo
48.
Celotno besedilo

PDF
49.
  • Artificial neural network b... Artificial neural network based chaotic generator for cryptology
    DANIŞMAN, Kenan; DALKIRAN, İlker Elektrik : Turkish journal of electrical engineering & computer sciences, 01/2010, Letnik: 18, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Chaotic systems are sensitive to initial conditions, system parameters and topological transitivity and these properties are also remarkable for cryptanalysts. Noise like behavior of chaotic systems ...
Celotno besedilo
50.
  • Goal-Oriented Requirements Analysis of Online Public Complaints System Using SAR, R2G, and KAOS Methods
    Shofi, Imam Marzuki; Hakiem, Nashrul; Rozy, Nurul Faizah ... 2022 10th International Conference on Cyber and IT Service Management (CITSM), 2022-Sept.-20
    Conference Proceeding

    There are some methods to perform goal-oriented requirements analysis, i.e.: KAOS, GBRAM, i*, etc. The House of Representatives of Republic of Indonesia, as we call DPR RI, is an institution with ...
Celotno besedilo
3 4 5 6 7
zadetkov: 1.554

Nalaganje filtrov