1,459 Hits in 4.5 sec

Selection & implementation of component in component based development using analytical network process

Mahima Gupta, D. K. Somwanshi
2014 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE)  
In Component Based Development the selection of component is the most crucial part due to its 'Black-Box' nature.  ...  Many researches have been done in this field but they have their shortcomings like inadequate address of Nonfunctional requirements, use of Hierarchical Process, no learning from previous selection, no  ...  Does not handle mismatches, NFR not addressed, no formal evaluation process WinWin Approach [22] 2003 No formal process to give multiple COTS selection, handle risk of mismatches but does not tells how  ... 
doi:10.1109/icgccee.2014.6921384 fatcat:phw6kqipzvbfbbj7jf2uatewh4

MiHOS: an approach to support handling the mismatches between system requirements and COTS products

Abdallah Mohamed, Guenther Ruhe, Armin Eberlein
2007 Requirements Engineering  
In the process of selecting Commercial Off-The-Shelf (COTS) products, it is inevitable to encounter mismatches between system requirements and COTS products.  ...  This paper proposes a decision support approach, called MiHOS (Mismatch Handling for COTS Selection), that aims at addressing COTS mismatches during and after the selection process.  ...  Acknowledgments We appreciate the support of the Natural Sciences and Engineering Council of Canada (NSERC) and of the Alberta Informatics Circle of Research Excellence (iCORE) to conduct this research  ... 
doi:10.1007/s00766-007-0041-5 fatcat:x2ldj6egjzee7az7fjaisl6rpe

A systematic review of COTS evaluation and selection approaches

Rakesh Garg
2017 Accounting  
Acknowledgement The authors would like to thanks the anonymous referees for constructive comments on earlier version of this paper.  ...  Ibrahim et al. (2011) proposed a hybrid model UnHOS (Uncertainty Handling in COTS Selection) by combining AHP and BBN followed by the sensitivity analysis to solve the COTS component selection problem  ...  MiHOS The focus of Mismatch-Handling aware COTS Selection (MiHOS) approach is to handle the mismatch between the requirements and COTS candidates.  ... 
doi:10.5267/ fatcat:5wgrmw3jdnd3ndr3habktj635i

On the robustness of the Quasi-Harmonic model of speech

Yannis Pantazis, Olivier Rosec, Yannis Stylianou
2010 2010 IEEE International Conference on Acoustics, Speech and Signal Processing  
In this paper we discuss the robustness of the Quasi-Harmonic model, QHM, previously suggested for speech analysis [1] and AM-FM decomposition of speech [2] .  ...  In this paper, we show that this is a biased estimator and then, we compute analytically and numerically the bias of the estimator showing its dependence on the type and length of the analysis window.  ...  Frequency mismatch intervals are obtained indicating the bandwidth of frequency mismatch that QHM can efficiently handle.  ... 
doi:10.1109/icassp.2010.5495700 dblp:conf/icassp/PantazisRS10 fatcat:4dbhrsuvx5gjnj4r73tlysnvcq

Off-Grid DOA Estimation for wideband LFM signals in FRFT Domain Using the Sensor Arrays

Xiuhong Wang, Bo Li, Hongjuan Yang, Weidang Lu
2019 IEEE Access  
bias, and it also has the advantage of being less sensitive to the grid size.  ...  In this paper, based on the high aggregation characteristic of wideband linear frequency modulation signals, we derive the modified fractional domain sparse model (MFDSM) in DOA estimation and propose  ...  ANALYSIS IN TERMS OF SNR This subsection intends to present a detailed performance analysis on the aforementioned algorithms to illustrate the superiority of our methods.  ... 
doi:10.1109/access.2019.2893452 fatcat:oyljknkuwjftfcqzh5q2wpnk7e

Merging Integration Solutions for Architecture and Security Mismatch [chapter]

Jamie Payton, Gerður Jónsdóttir, Daniel Flagg, Rose Gamble
2001 Lecture Notes in Computer Science  
A major drawback comes from interoperability problems that hinder the seamless integration of components. Two types of problems are prominent: architecture mismatch and security mismatch.  ...  In this paper, we depict the architectural differences among components, their security access control policies, and the integration solutions that result from independent analysis.  ...  In the future, as this type of analysis matures, more complex problems can be discovered and reconciled at this step.  ... 
doi:10.1007/3-540-45588-4_19 fatcat:bvzlwa34drc4vjz7kyihmazx5e

Cloud adoption

Shehnila Zardari, Rami Bahsoon, Aniko Ekárt
2014 Proceedings of the 29th Annual ACM Symposium on Applied Computing - SAC '14  
To assess the AHP choice of the resolution tactics we support the method by stability and sensitivity analysis.  ...  We argue that obstacles prioritisation and their resolution is core to mitigating risks in the adoption process.  ...  ACKNOWLEDGMENTS The research leading to these results has received funding from NED University of Engineering and Technology, Pakistan. Ms.  ... 
doi:10.1145/2554850.2555067 dblp:conf/sac/ZardariBE14 fatcat:b43wnyeb2bgqdfmxupmz3anikq

A map of security risks associated with using COTS

U. Lindqvist, E. Jonsson
1998 Computer  
The system can be used in an unintended way, for example, to store and process data that are more sensitive than the system was designed to handle or to attack other systems. • Insufficient understanding  ...  It can be used to aid the analysis of security risks when using systems that to some extent contain COTS components. It is based on the typical phases in the establishment of the system.  ... 
doi:10.1109/2.683009 fatcat:e4mafbvq6nhtlbgg4exki3q3oe

Reliability through redundant parallelism for micro-satellite computing

Ian Vince McLoughlin, Timo Rolf Bretschneider
2010 ACM Transactions on Embedded Computing Systems  
The latter argument is particularly of major importance at a time when the gap between required and available processing capability in satellites is widening.  ...  An analysis compares the proposed architecture to typical alternatives, maintaining risk of failure to within required levels, and discusses key applications for the parallel architecture.  ...  Note that in this paper the COTS concept is handled purely from a technical point-of-view. Issues relating to the procurement and adoption of such devices were addressed in [Bretschneider 2008 ].  ... 
doi:10.1145/1698772.1698784 fatcat:4qqvnxjdmzht7oyeapywxnfeia

Beyond Cost: The Drivers of COTS Application Value

M. Keil, A. Tiwana
2005 IEEE Software  
The rise of packaged material requirements planning systems for manufacturing organizations followed in the 1980s, and enterprise resource planning (ERP) systems, designed to handle virtually all of an  ...  In these situations, reliability becomes a key driver in the acquisition process.  ... 
doi:10.1109/ms.2005.58 fatcat:ppowihilifhi5kvlyiuhhbrx2y

Investigation of Speed Matching Affecting Contrarotating Fan's Performance Using Wireless Sensor Network including Big Data and Numerical Simulation

Hengxuan Luan, Liyuan Weng, Ranhui Liu, Yuanzhong Luan, Dongmin Li
2018 Complexity  
In order to solve the performance mismatch between two stages of CRF under nondesigned working conditions, under small flow rate condition, the priority shall be given to increase of the speed of rotor  ...  1, while the speed of rotor 2 shall be reduced appropriately; under large flow rate condition, the speed of rotor 1 shall be reduced and the speed of rotor 2 shall be increased at the same time.  ...  Jensen [26] emphasized the necessity of investing in WSNs' performance, based on model analysis and validation, before handling more critical functions.  ... 
doi:10.1155/2018/1246381 fatcat:gnb5d3nwtrexnb6jjbsics7uge

Vertical Profiles of Ice Cloud Microphysical Properties and Their Impacts on Cloud Retrieval Using Thermal Infrared Measurements

Pradeep Khatri, Hironobu Iwabuchi, Masanori Saito
2018 Journal of Geophysical Research - Atmospheres  
model yielded results that were in better agreement with radar/lidar ice cloud products than those obtained under the assumption of PPH cloud layers.  ...  The vertical profiles of both the cloud-particle effective radius (CER) and a proxy of cloud-particle number concentration showed close associations with the vertical IWC profile.  ...  For optically thicker clouds, the TIR measurements exhibit low sensitivity in the lower part of the cloud system, making COT retrieval very difficult and uncertain.  ... 
doi:10.1029/2017jd028165 fatcat:h7ka4y4juzc7jb73g3ue7qwy6m

Understanding the role of constraints on architecturally significant requirements

Neil A. Ernst, Ipek Ozkaya, Robert L. Nord, Julien Delange, Stephany Bellomo, Ian Gorton
2013 2013 3rd International Workshop on the Twin Peaks of Requirements and Architecture (TwinPeaks)  
We produce a mapping showing how the architectural risks identified in the initial architectural analysis were impacted by the tool choices made.  ...  We identified ASRs in an existing health IT project, CONNECT, and also identified the constraints on the project that were tool-related.  ...  Architecture Tradeoff Analysis Method®, ATAM® are registered in the U.S. Patent and Trademark Office by Carnegie Mellon University. DM-0000390  ... 
doi:10.1109/twinpeaks-2.2013.6617353 dblp:conf/re/ErnstONDBG13 fatcat:333cfad5mfgzhgwmwcxcwqbey4

Software engineering for safety

Robyn R. Lutz
2000 Proceedings of the conference on The future of Software engineering - ICSE '00  
Develop better methods for safety analysis of product families and safe reuse of Commercial-Off-The-Shelf software.  ...  : ABSTRACT This report describes the current state of software engineering for safety and proposes some directions for needed work that appears to be achievable in the near future.  ...  The defect (type mismatch) was straightforward, well-understood, easy to prevent in design, and easy to catch in testing. However, the sensitivity of the system to this error was very high.  ... 
doi:10.1145/336512.336556 dblp:conf/icse/Lutz00 fatcat:to4aaglfyra7tcdc443izhdq3e

Leveraging Electromagnetic Polarization in a Two-Antenna Whiteboard in the Air

Longfei Shangguan, Kyle Jamieson
2016 Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies - CoNEXT '16  
In this paper we present the design and implementation of PolarDraw, the first whiteboard in the air that sends differentially-polarized wireless signals to glean more precise tracking information from  ...  Leveraging information received from each polarization angle, our novel algorithms infer orientation and position of an RFID-tagged pen using just two antennas, when the user writes in the air or on a  ...  Neil Spring and the anonymous reviewers for their insightful comments. This material is based upon work supported by the National Science  ... 
doi:10.1145/2999572.2999601 dblp:conf/conext/ShangguanJ16 fatcat:opm7zqvvkrfg3fkdbscuqqr56m
« Previous Showing results 1 — 15 out of 1,459 results