Filters








54,951 Hits in 8.8 sec

Applying an Improving Strategy that embeds Functional and Non-Functional Requirements Concepts

Pablo Becker, Guido Tebes, Denis Peppino, Luis Olsina
2019 Journal of Computer Science and Technology  
Therefore, we specify vocabularies for them, and illustrate the applicability of an improving strategy –which embeds these concepts- in the context of a running example.  ...  In this work, we relate business and information need goals with functional and non- functional requirements concepts, which are paramount for well-defined strategies.  ...  Acknowledgements This work and line of research are supported by Science and Technology Agency of Argentina, in the PICT 2014-1224 project at Universidad Nacional de La Pampa.  ... 
doi:10.24215/16666038.19.e15 fatcat:l37wluptjnhkxcoxpfrm2x7qce

High-dimensional Multivariate Time Series Forecasting in IoT Applications using Embedding Non-stationary Fuzzy Time Series [article]

Hugo Vinicius Bitencourt, Frederico Gadelha Guimarães
2021 arXiv   pre-print
Therefore, methods that are capable of high-dimensional non-stationary time series are of great value in IoT applications.  ...  Unfortunately, FTS encounters difficulties when dealing with data sets of many variables and scenarios with concept drift.  ...  The "concept drift" may deteriorate the accuracy of model prediction over time, which requires permanent adaptation strategies.  ... 
arXiv:2107.09785v1 fatcat:ekjrg45rgrfupol577ybiutbni

Systemic Approach Towards Enterprise Functional Decomposition

Dmitry Kudryavtsev, Lev Grigoriev
2011 2011 IEEE 13th Conference on Commerce and Enterprise Computing  
It guides any business improvement initiative, enables to design the enterprise construction -organizational structure, IT-and HR-architectures, etc, as well as to deploy goals and strategies.  ...  The paper suggests the framework for enterprise functional decomposition, which includes the ontology for enterprise activities description, foundations and the process of functional decomposition.  ...  This requires to embed regulatory and improvement mechanisms in activities description.  ... 
doi:10.1109/cec.2011.53 dblp:conf/wecwis/KudryavtsevG11 fatcat:4b3rki477jhfbdu5mz5qgmmcyq

Human Functioning: Developments and Grand Challenges

Jerome Bickenbach
2021 Frontiers in Rehabilitation Sciences  
The ICF notion of functioning provides a clearer understanding of the health and social impact of future trends in population aging and increased prevalence of non-communicable diseases, trends that will  ...  The notion of functioning has in the last 20 years made it possible to clarify the concept and practice of healthcare, and most particular the concept and practice of rehabilitation.  ...  Making this case, at the national level, requires a demonstration that rehabilitation is not an added cost, but an important economic investment.  ... 
doi:10.3389/fresc.2020.617782 fatcat:25keboqz7zcrlg46tohz4je2ue

Resampling strategies for imbalanced time series forecasting

Nuno Moniz, Paula Branco, Luís Torgo
2017 International Journal of Data Science and Analytics  
We extend the application of resampling strategies to the time series context and introduce the concept of temporal and relevance bias in the case selection process of such strategies, presenting new proposals  ...  B Nuno Moniz nmmoniz@inescporto.pt in predictive accuracy on rare cases associated with using resampling strategies, and the use of biased strategies further increases accuracy over non-biased strategies  ...  Acknowledgements This work is financed by the ERDF-European Regional Development Fund through the COMPETE 2020 Programme within project POCI-01-0145-FEDER-006961, and by National Funds through the FCT-Fundação  ... 
doi:10.1007/s41060-017-0044-3 dblp:journals/ijdsa/MonizBT17 fatcat:mco67ao2gzbuna7tpdsf2tlfge

Poly-controlled partial evaluation in practice

Claudio Ochoa, Germán Puebla
2007 Proceedings of the 2007 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation - PEPM '07  
The quality of each of these programs is assessed through the use of a fitness function, which can be resource aware, in the sense that it can take multiple factors into account, such as run-time and code  ...  Some of these techniques are based on heuristics, while others are based on branch and bound and are guaranteed to obtain an optimal solution.  ...  Ministry of Education under the TIN-2005-09207 MERIT project, and by the Madrid Regional Government under the S-0505/TIC/0407 PROMESAS project.  ... 
doi:10.1145/1244381.1244407 dblp:conf/pepm/OchoaP07 fatcat:dc4sdxjegnhufaqibxpj6fyfnu

A Practical MDA Approach for Autonomic Profiling and Performance Assessment [chapter]

Fabio Perez Marzullo, Rodrigo Novo Porto, Divany Gomes Lima, Jano Moreira de Souza, José Roberto Blaschek
2008 Lecture Notes in Computer Science  
and improving software activities in order to create a self-managed environment.  ...  After setting the underlying problem, explaining tools configuration and concepts and describing the profiling technique, it presents a study based on a real project conducted by the Brazilian Ministry  ...  system functionality was assigned an estimated execution time, based on system's non-functional requirements, as shown in Table 2 .  ... 
doi:10.1007/978-3-540-69100-6_8 fatcat:uihsejh4hba3fnwqti52os7ene

On the Applicability of Rules to Automate Data Warehouse Logical Design

Verónika Peralta, Alvaro Illarze, Raúl Ruggia
2003 International Conference on Advanced Information Systems Engineering  
The proposed rules embed design strategies which are triggered by conditions on requirements and source databases, and perform the schema generation through the application of predefined DW design oriented  ...  The designer builds relational or multidimensional structures taking into account a conceptual schema representing the information requirements, the source databases, and non functional (mainly performance  ...  the target DW schema, and design rules that embed design strategies and call the schema transformations.  ... 
dblp:conf/caise/PeraltaIR03 fatcat:ol2lqwz7sfgahbo3pb2byuaq5q

Optimal DWT-SVD Domain Image Watermarking Using Multi-objective Evolutionary Algorithms

M. Monemizadeh, S.A. Seyedin
2009 2009 WRI World Congress on Computer Science and Information Engineering  
After decomposing the cover image into four bands, we apply the SVD to each band, and the singular values of each sub-band of the host image are modified by different scaling factors to embed the watermark  ...  Experimental results show improvement both in transparency and robustness under a wide range of attacks. 2009 World Congress on Computer Science and Information Engineering 978-0-7695-3507-4/08 $25.00  ...  NGSA-II uses an elite-preserving strategy as well as an explicit diversity preserving mechanism [5] .  ... 
doi:10.1109/csie.2009.700 dblp:conf/csie/MonemizadehS09 fatcat:yu7vxrlxk5dwpbrz2wsfqsms2u

Resolution Strategies for Fuzzy Description Logic

Hashim Habiballa
2007 European Society for Fuzzy Logic and Technology  
Resolutionbased reasoning is established on previous works concerning non-clausal resolution principle both theoretical and application-oriented (FPLGERDS inference engine).  ...  The paper presents experimental comparison of several resolution strategies for reasoning in Fuzzy Description Logic based on Fuzzy Predicate Logic with evaluated syntax.  ...  D be concepts and R, S be roles: Emb(C(t)) = C(t), Emb(R(t1, t2) = R(t1, t2)), Emb(A) = A(x), Emb(R) = R(x, y)) (atomic concept and role) G i , G i be an atomic concept or role (a subformula of D, D ).  ... 
dblp:conf/eusflat/Habiballa07 fatcat:5xivm755cfggbcs2cakvpqxndu

Security analyzing and designing GUI with the resources model

Maryam Mehrnejad, Ehsan Toreini, Abbas Ghaemi Bafghi
2011 2011 8th International ISC Conference on Information Security and Cryptology  
And we exploited faults that slow down user co-ordination with the system and used this model to explore design alternative.  ...  We generally analyzed GUI and proposed an alternative GUI in order to solve interaction problems.  ...  Matt Bishop from University of California at Davis, for his comments about the importance of working in the field of HCI-Sec and his help towards our better understanding of HCI-Sec concepts.  ... 
doi:10.1109/iscisc.2011.6062341 fatcat:tu5wiz65ifb6vi2wdggvm3hnlu

A Changing Paradigm in Heart Transplantation: An Integrative Approach for Invasive and Non-Invasive Allograft Rejection Monitoring

Alessia Giarraputo, Ilaria Barison, Marny Fedrigo, Jacopo Burrello, Chiara Castellani, Francesco Tona, Tomaso Bottio, Gino Gerosa, Lucio Barile, Annalisa Angelini
2021 Biomolecules  
The last decade has seen an increased emphasis on identifying non-invasive methods to improve rejection diagnosis and overcome tissue biopsy invasiveness.  ...  Liquid biopsy, as an efficient non-invasive diagnostic and prognostic oncological monitoring tool, seems to be applicable in heart transplant follow-ups.  ...  A drawback from the analytical standpoint is that the assay is a time-consuming, indirect cell function test requiring stimulation and a cell isolation step.  ... 
doi:10.3390/biom11020201 pmid:33535640 fatcat:ojmr6r7y7ranhau6skp2zezvqi

SUPPORTING ADDITIVE MANUFACTURING TECHNOLOGY DEVELOPMENT THROUGH CONSTRAINT MODELLING IN EARLY CONCEPTUAL DESIGN: A SATELLITE PROPULSION CASE STUDY

O. Borgue, F. Valjak, M. Panarotto, O. Isaksson
2020 Proceedings of the Design Society: DESIGN Conference  
One concept takes advantage of AM design freedom, disregarding AM limitations and is not feasible. The other concept considers AM limitations and is manufacturable and feasible.  ...  Constraints modelling highlights AM capabilities that can be improved, showing where future investment is needed.  ...  authors gratefully acknowledge the financial support from VINOVA for funding provided to the project IDAG (2019-02502 Infrastructure for Digitalisation enabling industrialization of Additive manufacturing) that  ... 
doi:10.1017/dsd.2020.289 fatcat:tvrdxhf7pbbmvp5lba67urzkki

Minimizing the embedding impact in steganography

Jessica Fridrich
2006 Proceeding of the 8th workshop on Multimedia and security - MM&Sec '06  
We interpret the results and formulate several "rules of thumb" that should improve steganographic security.  ...  We assume that each element of the cover image is assigned a scalar value that measures the impact of making an embedding change at that pixel (e.g., the embedding distortion).  ...  that is applied to pixels to embed a message, and (3) the selection channel, which is a rule according to which pixels are selected for embedding.  ... 
doi:10.1145/1161366.1161369 dblp:conf/mmsec/Fridrich06 fatcat:4m2pppiqdjdeti5xwopvfzc4vq

Resampling Strategies for Imbalanced Time Series

Nuno Moniz, Paula Branco, Luis Torgo
2016 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA)  
We extend the application of resampling strategies to the time series context and introduce the concept of temporal and relevance bias in the case selection process of such strategies, presenting new proposals  ...  We evaluate the results of standard regression tools and the use of resampling strategies, with and without bias over 24 time series data sets from 6 different sources.  ...  ACKNOWLEDGMENT This work is financed by the ERDF -European Regional Development Fund through the COMPETE 2020 Programme within project POCI-01-0145-FEDER-006961, and by Na-  ... 
doi:10.1109/dsaa.2016.37 dblp:conf/dsaa/MonizBT16 fatcat:vdr7gpdc4ndondsg2xtkz3gmby
« Previous Showing results 1 — 15 out of 54,951 results