Auswahl der wissenschaftlichen Literatur zum Thema „Baseline Requirements“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Baseline Requirements" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Baseline Requirements"

1

Barrett, RobertE. „Some baseline requirements“. Computer Fraud & Security Bulletin 1990, Nr. 12 (Dezember 1990): 14–18. http://dx.doi.org/10.1016/0142-0496(90)90288-v.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

East, Whitfield, Stephanie Muraca-Grabowski, Michael McGurk, David DeGroot, Keith Hauret, Tyson Greer, Marilyn A. Sharp, Stephen Foulis und Jan Redmond. „Baseline soldier physical readiness requirements study“. Journal of Science and Medicine in Sport 20 (November 2017): S24—S25. http://dx.doi.org/10.1016/j.jsams.2017.09.076.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Leite, Julio Cesar Sampaio do Prado, Gustavo Rossi, Federico Balaguer, Vanesa Maiorana, Gladys Kaplan, Graciela Hadad und Alejandro Oliveros. „Enhancing a requirements baseline with scenarios“. Requirements Engineering 2, Nr. 4 (Dezember 1997): 184–98. http://dx.doi.org/10.1007/bf02745371.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Olifer, Dmitrij, Nikolaj Goranin, Antanas Cenys, Arnas Kaceniauskas und Justinas Janulevicius. „Defining the Minimum Security Baseline in a Multiple Security Standards Environment by Graph Theory Techniques“. Applied Sciences 9, Nr. 4 (17.02.2019): 681. http://dx.doi.org/10.3390/app9040681.

Der volle Inhalt der Quelle
Annotation:
One of the best ways to protect an organization’s assets is to implement security requirements defined by different standards or best practices. However, such an approach is complicated and requires specific skills and knowledge. In case an organization applies multiple security standards, several problems can arise related to overlapping or conflicting security requirements, increased expenses on security requirement implementation, and convenience of security requirement monitoring. To solve these issues, we propose using graph theory techniques. Graphs allow the presentation of security requirements of a standard as graph vertexes and edges between vertexes, and would show the relations between different requirements. A vertex cover algorithm is proposed for minimum security requirement identification, while graph isomorphism is proposed for comparing existing organization controls against a set of minimum requirements identified in the previous step.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Kennedy, Larry M., Donna Thomas und Marie D. Weber. „3 A Proven Approach to Requirements Baseline Management“. INCOSE International Symposium 9, Nr. 1 (Juni 1999): 710–20. http://dx.doi.org/10.1002/j.2334-5837.1999.tb00230.x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

HUMPHREY, C. L., D. P. FAITH und P. L. DOSTINE. „Baseline requirements for assessment of mining impact using biological monitoring“. Austral Ecology 20, Nr. 1 (März 1995): 150–66. http://dx.doi.org/10.1111/j.1442-9993.1995.tb00529.x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Choe, Kyung Il. „The Most Preferred Route of the Car Navigation System: A Systems Engineering Approach“. Advanced Materials Research 712-715 (Juni 2013): 2680–85. http://dx.doi.org/10.4028/www.scientific.net/amr.712-715.2680.

Der volle Inhalt der Quelle
Annotation:
The typical route planning of on-board car navigation systems (CNS) attempts to find the shortest route without considering users preferences and driving contexts. However it is more effective for a user to find the most preferred route rather than the shortest one. We propose a systems engineering approach for finding the most preferred route by considering and tracking the requirements of CNS route planning from the business point of view. Our approach consists of 4 baselines: customer baseline, system baseline component baseline, and design baseline. The architecture of a route planning engine is suggested according to the baselines.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Sunil, S., und D. G. Blair. „Investigation of vacuum system requirements for a 5km baseline gravitational-wave detector“. Journal of Vacuum Science & Technology A: Vacuum, Surfaces, and Films 25, Nr. 4 (Juli 2007): 763–68. http://dx.doi.org/10.1116/1.2743645.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Wang, Ji, Dimitri Mawet, Renyu Hu, Garreth Ruane, Jacques-Robert Delorme und Nikita Klimovich. „Baseline requirements for detecting biosignatures with the HabEx and LUVOIR mission concepts“. Journal of Astronomical Telescopes, Instruments, and Systems 4, Nr. 03 (06.07.2018): 1. http://dx.doi.org/10.1117/1.jatis.4.3.035001.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Zheng, Yu, Shao Yang Li, Jun Tong Xi und Hui Wu. „Application of Baseline in Configuration Management for Aerospace Product Design“. Key Engineering Materials 572 (September 2013): 123–26. http://dx.doi.org/10.4028/www.scientific.net/kem.572.123.

Der volle Inhalt der Quelle
Annotation:
Aerospace product design is a complex and difficult process with high technical requirements and a tight development cycle involving a variety of institutes and manufacturers and requiring close collaboration. These features significantly increase the difficulty of configuration management for an aerospace product. Based on the characteristics and management requirements of new-generation aerospace product design, a method for configuration management with baseline is proposed. The application procedure and working mechanisms of baseline in the three typical stages of aerospace product design: stage transition, multi-stage parallel design, and multi-batch parallel design, are discussed in detail. Research and application results can provide a practical solution and concept for the effective and reliable management of complex configurations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Baseline Requirements"

1

Barão, Alexandre. „IT Governance: Risco e Segurança dos SI no sector financeiro Prova de Conceito no Regulador Português“. Master's thesis, Instituto Politécnico de Setúbal. Escola Superior de Ciências Empresariais, 2015. http://hdl.handle.net/10400.26/10647.

Der volle Inhalt der Quelle
Annotation:
Dissertação apresentada para cumprimento dos requisitos necessários à obtenção do grau de Mestre em Sistemas de Informação Organizacionais
O trabalho de projeto de mestrado aplicado ao contexto do sector financeiro, nomeadamente o Sistema Europeu de Bancos Centrais, teve como objetivo analisar a atual metodologia de Information Risk Management (IRM), utilizada pelos bancos centrais na gestão da segurança dos sistemas de informação. Nesta análise foi utilizada uma metodologia assente num focus group com sessões de brainstorming suportado por um guião de entrevista com questões semiestruturadas. Como resultado dessa análise foi possível identificar algumas oportunidades de melhoria no que respeita à metodologia IRM, nomeadamente:  Atualização do standard da ISO27002:2005 para ISO27002:2013;  Conceptualizar a metodologia com uma vertente de gestão de risco;  Relacionar os sistemas de informação com os processos de negócio, pela identificação como o negócio é afetado pelos riscos dos sistemas de informação. De forma breve estes foram os principais resultados, e os mesmos tornam-se críticos quando o sector financeiro, nomeadamente no âmbito do Sistema Europeu de Bancos Centrais, os processos de negócio tem uma grande dependência dos SI, e nesse sentido considera-se critico uma adequada gestão do risco associado. Como principais benefícios esperados da proposta da metodologia de um processo de gestão de risco da informação (IRM) será providenciar uma metodologia objetiva e de fácil aplicação, no sentido de identificar os riscos associados aos sistemas de informação que possam afetar os processos de negócio (riscos de negócio). Em termos práticos visa facultar um meio para avaliar as medidas de segurança e identificar e selecionar os requisitos/ medidas de segurança que melhor mitigam o risco para o sistema de informação. O seu objetivo será assegurar que a segurança da informação é tratada adequadamente em cada fase do ciclo-de-vida do sistema. Desenvolver a segurança em sistemas durante o seu desenvolvimento é mais eficaz e seguro, do que quando realizadas numa fase posterior ao seu desenvolvimento.
Abstract: The Master's project work applied to the financial sector context, in particular the European System of Central Banks, aimed to examine the current methodology of Information Risk Management (IRM), used by central banks in the security management of information systems.  In this analysis we used a methodology based on a focus group with brainstorming sessions supported by a semi-structured interview guide with questions. As a result of this analysis it was possible to identify some opportunities for improvement regarding the IRM methodology, including:update the standard from ISO27002:2005 to ISO27002:2013;  Conceptualize the methodology with a risk management focus;  Linking information systems with business processes by identifying how the business is impacted by the risks of information systems. Briefly these were the main results, and they become critical when the financial sector in particular within the European System of Central Banks, business processes have a great dependence on SI, and in that sense it is considered critical an adequate risk management. Main benefits expected from the proposal of a process to manage information risk (IRM), will provide an objective and easily applicable methodology, to identify the risks associated with information systems that may affect the business processes (business risks). In practical terms it aims to provide a means to assess the security measures and identify and select requirements / security measures to better mitigate the risk to the information system. Its goal will be to ensure that information security is handled appropriately at each stage of the system life-cycle. Building security systems during development is more efficient and secure than when carried out at a later stage the development.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Bergström, Anna, und Emily Berghäll. „Public certificate management : An analysis of policies and practices used by CAs“. Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177148.

Der volle Inhalt der Quelle
Annotation:
Certificate Authorities (CAs) carry a huge responsibility in today's internet security landscape as they issue certificates that establish secure end-to-end connections. This thesis conducts a policy review and survey of CAs' Certificate Policies and Certificate Practice Statements to find similarities and differences that could lead to possible vulnerabilities. Based on this, the thesis then presents a taxonomy-based analysis as well as comparisons of the top CAs to the Baseline Requirements. The main areas of the policies that were focused on are the issuance, revocation and expiration practices of the top 30 CAs as determined by the use of Tranco's list. We also determine the top CA groups, meaning the CAs whose policies are being used by the most other CAs as well as including a top 100 CAs list. The study suggests that the most popular CAs hold such a position because of two main reasons: they are easy to acquire and/or because they are connected to several other CAs.  The results suggest that some of the biggest vulnerabilities in the policies are what the CAs do not mention in any section as it puts the CA at risk for vulnerabilities. The results also suggest that the most dangerous attacks are social engineering attacks, as some of the stipulations for issuance and revocations make it possible to pretend to be the entity of subscribes to the certificate rather than a malicious one.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Weston, Stuart Duncan. „Development of Very Long Baseline Interferometry (VLBI) techniques in New Zealand array simulation, image synthesis and analysis : a thesis submitted to Auckland University of Technology in fulfilment of the requirements for the degree of Master of Philosophy (MPhil), 2008 /“. Click here to access this resource online, 2008. http://hdl.handle.net/10292/449.

Der volle Inhalt der Quelle
Annotation:
This thesis presents the design and development of a process to model Very Long Base Line Interferometry (VLBI) aperture synthesis antenna arrays. In line with the Auckland University of Technology (AUT) Institute for Radiophysics and Space Research (IRSR) aims to develop the knowledge, skills and experience within New Zealand, extensive use of existing radio astronomical software has been incorporated into the process namely AIPS (Astronomical Imaging Processing System), MIRIAD (a radio interferometry data reduction package) and DIFMAP (a program for synthesis imaging of visibility data from interferometer arrays of radio telescopes). This process has been used to model various antenna array configurations for two proposed New Zealand sites for antenna in a VLBI array configuration with existing Australian facilities and a passable antenna at Scott Base in Antarctica; and the results are presented in an attempt to demonstrate the improvement to be gained by joint trans-Tasman VLBI observation. It is hoped these results and process will assist the planning and placement of proposed New Zealand radio telescopes for cooperation with groups such as the Australian Long Baseline Array (LBA), others in the Pacific Rim and possibly globally; also potential future involvement of New Zealand with the SKA. The developed process has also been used to model a phased building schedule for the SKA in Australia and the addition of two antennas in New Zealand. This has been presented to the wider astronomical community via the Royal Astronomical Society of New Zealand Journal, and is summarized in this thesis with some additional material. A new measure of quality (“figure of merit”) for comparing the original model image and final CLEAN images by utilizing normalized 2-D cross correlation is evaluated as an alternative to the existing subjective visual operator image comparison undertaken to date by other groups. This new unit of measure is then used in the presentation of the results to provide a quantative comparison of the different array configurations modelled. Included in the process is the development of a new antenna array visibility program which was based on a Perl code script written by Prof Steven Tingay to plot antenna visibilities for the Australian Square Kilometre Array (SKA) proposal. This has been expanded and improved removing the hard coded fixed assumptions for the SKA configuration, providing a new useful and flexible program for the wider astronomical community. A prototype user interface using html/cgi/perl was developed for the process so that the underlying software packages can be served over the web to a user via an internet browser. This was used to demonstrate how easy it is to provide a friendlier interface compared to the existing cumbersome and difficult command line driven interfaces (although the command line can be retained for more experienced users).
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Baseline Requirements"

1

Baseline survey on sector specific capacity-building requirements for committees of parliament. Harare, Zimbabwe: Parliament of Zimbabwe, 2012.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Rogers, Kerrylee, und Timothy J. Ralph, Hrsg. Floodplain Wetland Biota in the Murray-Darling Basin. CSIRO Publishing, 2010. http://dx.doi.org/10.1071/9780643100992.

Der volle Inhalt der Quelle
Annotation:
Floodplain wetlands of the Murray-Darling Basin provide critical habitat for numerous species of flora and fauna, yet the ecology of these wetlands is threatened by a range of environmental issues. This book addresses the urgent need for an improved ecohydrological understanding of the biota of Australian freshwater wetlands. It synthesises key water and habitat requirements for 35 species of plants, 48 species of waterbirds, 17 native and four introduced species of fish, 15 species of frogs, and 16 species of crustaceans and molluscs found in floodplain wetlands of the Murray-Darling Basin. Each species profile includes: the influence of water regimes on the survival, health and condition of the species; key stimuli for reproduction and germination; habitat and dietary preferences; as well as major knowledge gaps for the species. Floodplain Wetland Biota in the Murray-Darling Basin also provides an overview of the likely impacts of hydrological change on wetland ecosystems and biota, in the context of climate change and variability, with implications for environmental management. This important book provides an essential baseline for further education, scientific research and management of floodplain wetland biota in the Murray-Darling Basin.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Homburg, Stefan. A Study in Monetary Macroeconomics. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198807537.001.0001.

Der volle Inhalt der Quelle
Annotation:
The Great Recession of 2008/09 and its aftermath present a major challenge to macroeconomics. Many researchers think that prevailing models fail to grasp essential aspects of recent developments, including unprecedented monetary policies and interest rates at the zero lower bound. Approaches that focus on steady states, rational expectations, and individuals planning over infinite horizons are not suitable for analyzing such abnormal situations. This text does not criticize the traditional approach but aims at improvement. The study’s distinctive feature is a rich institutional structure that includes elements such as credit money, external finance, borrowing constraints, net worth, real estate, and commercial banks. To cope with such a complex setting, the text reduces rationality requirements but adheres to the method of dynamic general equilibrium (DGE) with optimizing agents and fully specified models. Results are derived from mathematical reasoning and simulations. Starting with a simple baseline model, the argument is developed step by step in a unified framework that covers almost everything of interest for monetary macroeconomists. The topics discussed include the superneutrality of money, the Tobin effect, monetary policy under sticky prices and wages, but also liquidity traps with borrowing constraints, Fisherian debt-deflations, housing cycles, and environments with excess bank reserves. The text addresses researchers worldwide and may prove useful for teaching postgraduate and advanced graduate courses. The principle objective is to demonstrate that a “not-too-rational” DGE approach makes it possible to develop clean models that work outside steady states and are appropriate for answering macroeconomic questions of actual interest.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Gevaert, Sofie A., Eric Hoste und John A. Kellum. Acute kidney injury. Oxford University Press, 2015. http://dx.doi.org/10.1093/med/9780199687039.003.0068.

Der volle Inhalt der Quelle
Annotation:
Acute kidney injury is a serious condition, occurring in up to two-thirds of intensive care unit patients, and 8.8-55% of patients with acute cardiac conditions. Renal replacement therapy is used in about 5-10% of intensive care unit patients. The term cardiorenal syndrome refers to combined heart and kidney failure; three types of acute cardiorenal syndrome have been described: acute cardiorenal syndrome or cardiorenal syndrome type 1, acute renocardiac syndrome or cardiorenal syndrome type 3, and acute cardiorenal syndrome type 5 (cardiac and renal injury secondary to a third entity such as sepsis). Acute kidney injury replaced the previously used term ‘acute renal failure’ and comprises the entire spectrum of the disease, from small changes in function to the requirement of renal replacement therapy. Not only failure, but also minor and less severe decreases, in kidney function are of clinical significance both in the short and long-term. The most recent definition for acute kidney injury is proposed by the Kidney Disease: Improving Global Outcomes clinical practice guidelines workgroup. This definition is a modification of the RIFLE and AKIN definitions and staging criteria, and it stages patients according to changes in the urine output and serum creatinine (see Tables 68.1 and 68.2). Acute kidney injury is a heterogeneous syndrome with different and multiple aetiologies, often with several insults occurring in the same individual. The underlying processes include nephrotoxicity, and neurohormonal, haemodynamic, autoimmune, and inflammatory abnormalities. The most frequent cause for acute kidney injury in intensive cardiac care patients are low cardiac output with an impaired kidney perfusion (cardiogenic shock) and/or a marked increase in venous pressure (acute decompensated heart failure). Predictors for acute kidney injury in these patients include: baseline renal dysfunction, diabetes, anaemia, and hypertension, as well as the administration of high doses of diuretics. In the intensive cardiac care unit, attention must be paid to the prevention of acute kidney injury: monitoring of high-risk patients, prompt resuscitation, maintenance of an adequate mean arterial pressure, cardiac output, and intravascular volume (avoidance of both fluid overload and hypovolaemia), as well as the avoidance or protection against nephrotoxic agents. The treatment of acute kidney injury focuses on the treatment of the underlying aetiology, supportive care, and avoiding further injury from nephrotoxic agents. More specific therapies have not yet demonstrated efficacy. Renal replacement therapy is indicated in life-threatening changes in fluid, electrolyte, and acid-base balance, but there are also arguments for more early initiation.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Gevaert, Sofie A., Eric Hoste und John A. Kellum. Acute kidney injury. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780199687039.003.0068_update_001.

Der volle Inhalt der Quelle
Annotation:
Acute kidney injury is a serious condition, occurring in up to two-thirds of intensive care unit patients, and 8.8-55% of patients with acute cardiac conditions. Renal replacement therapy is used in about 5-10% of intensive care unit patients. The term cardiorenal syndrome refers to combined heart and kidney failure; three types of acute cardiorenal syndrome have been described: acute cardiorenal syndrome or cardiorenal syndrome type 1, acute renocardiac syndrome or cardiorenal syndrome type 3, and acute cardiorenal syndrome type 5 (cardiac and renal injury secondary to a third entity such as sepsis). Acute kidney injury replaced the previously used term ‘acute renal failure’ and comprises the entire spectrum of the disease, from small changes in function to the requirement of renal replacement therapy. Not only failure, but also minor and less severe decreases, in kidney function are of clinical significance both in the short and long-term. The most recent definition for acute kidney injury is proposed by the Kidney Disease: Improving Global Outcomes clinical practice guidelines workgroup. This definition is a modification of the RIFLE and AKIN definitions and staging criteria, and it stages patients according to changes in the urine output and serum creatinine (see Tables 68.1 and 68.2). Acute kidney injury is a heterogeneous syndrome with different and multiple aetiologies, often with several insults occurring in the same individual. The underlying processes include nephrotoxicity, and neurohormonal, haemodynamic, autoimmune, and inflammatory abnormalities. The most frequent cause for acute kidney injury in intensive cardiac care patients are low cardiac output with an impaired kidney perfusion (cardiogenic shock) and/or a marked increase in venous pressure (acute decompensated heart failure). Predictors for acute kidney injury in these patients include: baseline renal dysfunction, diabetes, anaemia, and hypertension, as well as the administration of high doses of diuretics. In the intensive cardiac care unit, attention must be paid to the prevention of acute kidney injury: monitoring of high-risk patients, prompt resuscitation, maintenance of an adequate mean arterial pressure, cardiac output, and intravascular volume (avoidance of both fluid overload and hypovolaemia), as well as the avoidance or protection against nephrotoxic agents. The treatment of acute kidney injury focuses on the treatment of the underlying aetiology, supportive care, and avoiding further injury from nephrotoxic agents. More specific therapies have not yet demonstrated efficacy. Renal replacement therapy is indicated in life-threatening changes in fluid, electrolyte, and acid-base balance, but there are also arguments for more early initiation.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Baseline Requirements"

1

„Product Requirements Baseline“. In Performance-Based Earned Value. IEEE, 2011. http://dx.doi.org/10.1109/9780470084663.ch3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

„The Baseline Requirements for ipa Application“. In The Internal Protection Alternative in Refugee Law, 167–211. Brill | Nijhoff, 2018. http://dx.doi.org/10.1163/9789004361966_006.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Koukovini, Maria N., Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Nikolaos L. Dellas, Dimitra I. Kaklamani und Iakovos S. Venieris. „Privacy Compliance Requirements in Workflow Environments“. In Cyber Law, Privacy, and Security, 596–618. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch029.

Der volle Inhalt der Quelle
Annotation:
Workflow management systems are used to run day-to-day applications in numerous domains, often including exchange and processing of sensitive data. Their native “leakage-proneness,” being the consequence of their distributed and collaborative nature, calls for sophisticated mechanisms able to guarantee proper enforcement of the necessary privacy protection measures. Motivated by the principles of Privacy by Design and its potential for workflow environments, this chapter investigates the associated issues, challenges, and requirements. With the legal and regulatory provisions regarding privacy in information systems as a baseline, the chapter elaborates on the challenges and derived requirements in the context of workflow environments, taking into account the particular needs and implications of the latter. Further, it highlights important aspects that need to be considered regarding, on the one hand, the incorporation of privacy-enhancing features in the workflow models themselves and, on the other, the evaluation of the latter against privacy provisions.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Koukovini, Maria N., Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Nikolaos L. Dellas, Dimitra I. Kaklamani und Iakovos S. Venieris. „Privacy Compliance Requirements in Workflow Environments“. In Censorship, Surveillance, and Privacy, 1845–66. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7113-1.ch092.

Der volle Inhalt der Quelle
Annotation:
Workflow management systems are used to run day-to-day applications in numerous domains, often including exchange and processing of sensitive data. Their native “leakage-proneness,” being the consequence of their distributed and collaborative nature, calls for sophisticated mechanisms able to guarantee proper enforcement of the necessary privacy protection measures. Motivated by the principles of Privacy by Design and its potential for workflow environments, this chapter investigates the associated issues, challenges, and requirements. With the legal and regulatory provisions regarding privacy in information systems as a baseline, the chapter elaborates on the challenges and derived requirements in the context of workflow environments, taking into account the particular needs and implications of the latter. Further, it highlights important aspects that need to be considered regarding, on the one hand, the incorporation of privacy-enhancing features in the workflow models themselves and, on the other, the evaluation of the latter against privacy provisions.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Koukovini, Maria N., Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Nikolaos L. Dellas, Dimitra I. Kaklamani und Iakovos S. Venieris. „Privacy Compliance Requirements in Workflow Environments“. In Advances in Digital Crime, Forensics, and Cyber Terrorism, 157–77. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6324-4.ch011.

Der volle Inhalt der Quelle
Annotation:
Workflow management systems are used to run day-to-day applications in numerous domains, often including exchange and processing of sensitive data. Their native “leakage-proneness,” being the consequence of their distributed and collaborative nature, calls for sophisticated mechanisms able to guarantee proper enforcement of the necessary privacy protection measures. Motivated by the principles of Privacy by Design and its potential for workflow environments, this chapter investigates the associated issues, challenges, and requirements. With the legal and regulatory provisions regarding privacy in information systems as a baseline, the chapter elaborates on the challenges and derived requirements in the context of workflow environments, taking into account the particular needs and implications of the latter. Further, it highlights important aspects that need to be considered regarding, on the one hand, the incorporation of privacy-enhancing features in the workflow models themselves and, on the other, the evaluation of the latter against privacy provisions.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Felice, Laura, Carmen Leonardi, Liliana Favre und Maria Virginia Mauco. „Enhancing a Rigorous Reuse Process with Natural Language Requirement Specifications“. In Successful Software Reengineering, 129–42. IGI Global, 2002. http://dx.doi.org/10.4018/978-1-931777-12-4.ch009.

Der volle Inhalt der Quelle
Annotation:
Reusability is the ability to use the same software elements for constructing many different applications. Formal specifications can help to semiautomatic design processes based on reusable components. However, during the first stages of development, when the interaction with the stakeholders is crucial, the use of client-oriented requirements engineering techniques seems to be necessary in order to enhance the communication between the stakeholders and the software engineers. In this chapter, we propose a systematic reuse approach that integrates natural language requirement specifications with formal specifications in RSL (RAISE Specification Language). On the one hand, some heuristics are described to develop a formal specification in RSL starting from models belonging to the Requirements Baseline. On the other hand, we have defined a reusable component model that integrates RSL specifications at different levels of abstraction, as well as presented a process with reuse based on the model.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Logeswaran, Rajasvaran, und Li-Choo Chen. „Load Balancing Algorithms in Distributed Service Architectures for Medical Applications“. In Advancing Technologies and Intelligence in Healthcare and Clinical Environments Breakthroughs, 248–62. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-1755-1.ch019.

Der volle Inhalt der Quelle
Annotation:
This paper investigates the performance of two proposed load balancing algorithms for Object-Oriented Distributed Service Architectures (DSA) that are open and flexible, enabling rapid and easy development of new applications on various kinds of software and hardware platforms, catering for telecommunications and distributed medical applications. The proposed algorithms, namely, Node Status Algorithm and Random Sender Initiated Algorithm, have been developed as solutions to the performance problems faced by the DSA. The performance of the proposed algorithms have been tested and compared with baseline load balancing algorithms, namely the Random Algorithm and Shortest Queue Algorithm. Simulation results show that both the proposed algorithms perform better than the baseline algorithms, especially in heavily loaded conditions. This paper discusses the mechanisms of the algorithms and reports on the investigations that have been carried out in comparing the load balancing algorithms implemented on a DSA-based network, which is useful for the distributed computing requirements of the medical field.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Spantideas, Sotirios, und Nikolaos Kapsalis. „Magnetic Dipole Modeling for DC and Low Frequency AC Magnetic Fields in Space Missions“. In Electromagnetic Compatibility for Space Systems Design, 71–114. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5415-8.ch003.

Der volle Inhalt der Quelle
Annotation:
In this chapter, modeling methods of static and slowly varying magnetic field emissions that are generated by spacecraft equipment are analyzed and discussed. In particular, specific issues on the established methods for multiple magnetic dipole modeling (MDM) are investigated and validated via near field measurements of well-behaved magnetic sources. Moreover, a software-based calibration technique for measuring facilities, dedicated to magnetic characterization of spacecraft units, is described and implemented on a configuration consisting of 12 sensors. Due to increasingly strict magnetic cleanliness demands, the modeling of units' induced DC magnetic behavior has become a necessary requirement for various space missions. Therefore, a baseline methodology regarding the measurements and modeling of induced magnetic fields is presented. Finally, DC methods are complemented to cover AC magnetic cleanliness requirements for on-ground verification of low-frequency magnetic fields, including AC induced magnetization effects.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

„Preoperative Multimodal Analgesia for Laparoscopic Cholecystectomy“. In 50 Studies Every Anesthesiologist Should Know, herausgegeben von Anita Gupta, Elena N. Gutman, Michael E. Hochman, Anita Gupta, Elena N. Gutman und Michael E. Hochman, 217–22. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190237691.003.0041.

Der volle Inhalt der Quelle
Annotation:
This case focuses on the use of local anesthesia, nonsteroidal anti-inflammatory or opioid drugs, for laparoscopic cholecystectomy by asking the question: Does prophylactic multimodal nociceptive blockade delay the onset of postoperative pain, decrease analgesic requirements, speed recovery, and facilitate same-day discharge in patients undergoing elective laparoscopic cholecystectomy? In this randomized, double-blind study, intraoperative anesthetic care and postoperative pain and nausea management were standardized for all patients. Study groups were similar in terms of patient age, gender, weight, American Society of Anesthesiologists class, baseline and preinduction pain and nausea scores, duration of surgery, and total dose of propofol received. This study demonstrated the benefit of preoperative multimodal analgesia on recovery and discharge.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Amelia, Simpson. „Part V Separation of Powers, Ch.24 Parliaments“. In The Oxford Handbook of the Australian Constitution. Oxford University Press, 2018. http://dx.doi.org/10.1093/law/9780198738435.003.0025.

Der volle Inhalt der Quelle
Annotation:
This chapter focuses on the national institution variously called the ‘federal Parliament’, the ‘Australian Parliament’, or the ‘Commonwealth Parliament’. It highlights three constitutional meta-principles as having significance for the institution of Parliament. These three—federalism, representative government, and responsible government—have been particularly influential in determining the institutional trajectory of the Parliament. Hence, this chapter uses them to organize a discussion of key structural features. The latter two meta-principles are further taken as useful lenses through which to examine notable innovations, challenges, and constraints that contribute to an understanding of the institution. This chapter thus reveals that Parliament itself has had a significant and ongoing influence upon the structures through which representative government gains expression, even while the High Court has intervened periodically to enforce perceived baseline requirements.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Baseline Requirements"

1

Weaver, Wayne W., Mehrzad M. Bijaieh, Rush D. Robinett und David G. Wilson. „Energy Storage Baseline Requirements for Pulsed Power Loads“. In 2019 IEEE Electric Ship Technologies Symposium (ESTS). IEEE, 2019. http://dx.doi.org/10.1109/ests.2019.8847798.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Cleland-Huang, Jane, Adam Czauderna und Jane Huffman Hayes. „Using tracelab to design, execute, and baseline empirical requirements engineering experiments“. In 2013 IEEE 21st International Requirements Engineering Conference (RE). IEEE, 2013. http://dx.doi.org/10.1109/re.2013.6636744.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Neill, D. R., J. DeVries, E. Hileman, J. Sebag, W. Gressler, O. Wiecha, J. Andrew und W. Schoening. „Baseline design and requirements for the LSST rotating enclosure (dome)“. In SPIE Astronomical Telescopes + Instrumentation, herausgegeben von Larry M. Stepp, Roberto Gilmozzi und Helen J. Hall. SPIE, 2014. http://dx.doi.org/10.1117/12.2056521.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Delorme, Jacques-Robert, Nikita Klimovich, Ji Wang, Dimitri Mawet, Garreth Ruane und Renyu Hu. „Baseline requirements for detecting biosignatures with the HabEx and LUVOIR mission concepts“. In Techniques and Instrumentation for Detection of Exoplanets VIII, herausgegeben von Stuart Shaklan. SPIE, 2017. http://dx.doi.org/10.1117/12.2275222.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Ray Young und Scott Brenton. „Establishing baseline requirements for a UAS ground-based sense and avoid system“. In 2016 Integrated Communications Navigation and Surveillance (ICNS). IEEE, 2016. http://dx.doi.org/10.1109/icnsurv.2016.7486385.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Lu, James, Leslie P. Antalffy, Barry Millet und Dennis Smythe. „Considerations for Baseline NDE of Pressure Vessels“. In ASME 2016 Pressure Vessels and Piping Conference. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/pvp2016-63253.

Der volle Inhalt der Quelle
Annotation:
ASME B&PV Code, Section VIII “Rules for Construction of Pressure Vessels” do not have requirements for baseline examination by vessel manufacturers. However many Owners require baseline data to establish as-built conditions of pressure vessels. Capturing baseline data at the manufacturing stage in a manner suitable for the Owner’s operations can preclude the need for post installation or preservice examination. Baseline NDE data can be easily referenced and compared to inservice inspection results to determine if any specific damage mechanisms manifest during operation and subsequently develop into damages to the vessel. Baseline NDE data can also provide guidance on inspection scheduling and damage monitoring. Therefore baseline examination in manufacturing phase is important to post-construction inspection and evaluation activities. This paper discusses baseline NDE considerations based on pressure vessel service conditions and damage mechanisms. It presents a systematic approach to acquire baseline NDE data in Manufacturers’ shops, including Owner’s role, Manufacturer’s responsibilities and design considerations to allow NDE access to all welds. Topics include examination location reference systems and baseline NDE methods, techniques, and tools that facilitate comparison to inservice examination. This paper also provides an example on implementing baseline NDE of a typical pressure vessel.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Annis, C. G., D. T. Hunter und T. Watkins. „Evaluation of Damage Tolerance Requirements Using a Probabilistic-Based Life Approach“. In ASME 1986 International Gas Turbine Conference and Exhibit. American Society of Mechanical Engineers, 1986. http://dx.doi.org/10.1115/86-gt-266.

Der volle Inhalt der Quelle
Annotation:
This paper presents the results of a study using Pratt & Whitney’s probabilistic-based life analysis system to define the impact of damage tolerance requirements now being written into design specifications. An advanced turbine disk design was considered for several combinations of NDE starting with baseline values representative of actual material and NDE capabilities. Significant conclusions are: (1) Conventional single-valued descriptions of NDE capability (e.g. 90/95, etc.) are incomplete for comparing competing NDE systems. (2) The scatter about the mean NDE capability has little influence on system behavior. These conclusions suggest that more complete descriptions of damage tolerance requirements should be considered. NDE requirements, for example, might be better stated in terms of system performance goals – acceptable failure and removal rates – rather than any specific POD/confidence limit requirement.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Yi, Lin, Eric A. Burt und Wei Zhang. „Space-Very Long Baseline Interferometry Mission Requirements Analysis on Space Borne Frequency Standards and Optical Frequency Combs“. In CLEO: Applications and Technology. Washington, D.C.: OSA, 2020. http://dx.doi.org/10.1364/cleo_at.2020.jw2b.24.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Finger, Barry, und David Zuniga. „Development of Driving Requirements and a Baseline Reference Mission for a Commercial Crew Transport Air Revitalization System“. In 40th International Conference on Environmental Systems. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2010. http://dx.doi.org/10.2514/6.2010-6101.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Allison, James T. „Plant-Limited Co-Design of an Energy-Efficient Counterbalanced Robotic Manipulator“. In ASME 2012 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/detc2012-71108.

Der volle Inhalt der Quelle
Annotation:
Modifying the design of an existing system to meet the needs of a new task is a common activity in mechatronic system development. Often engineers seek to meet requirements for the new task via control design changes alone, but in many cases new requirements are impossible to meet using control design only; physical system design modifications must be considered. Plant-Limited Co-Design (PLCD) is a design methodology for meeting new requirements at minimum cost through limited physical system (plant) design changes in concert with control system redesign. The most influential plant changes are identified to narrow the set of candidate plant changes. PLCD provides quantitative evidence to support strategic plant design modification decisions, including tradeoff analyses of redesign cost and requirement violation. In this article the design of a counterbalanced robotic manipulator is used to illustrate successful PLCD application. A baseline system design is obtained that exploits synergy between manipulator passive dynamics and control to minimize energy consumption for a specific pick-and-place task. The baseline design cannot meet requirements for a second pick-and-place task through control design changes alone. A limited set of plant design changes is identified using sensitivity analysis, and the PLCD result meets the new requirements at a cost significantly less than complete system redesign.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Baseline Requirements"

1

Siranosian, Antranik Antonio. Engineering Analysis Baseline Model Requirements. Office of Scientific and Technical Information (OSTI), Januar 2019. http://dx.doi.org/10.2172/1492682.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Tomi, Laura, Laura Rautiainen, Felix Müller und Baltic+ SEAL Team. Baltic+ SEAL: Requirements Baseline Document. Technische Universität München, Juli 2019. http://dx.doi.org/10.5270/esa.balticseal.rbdv2.0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Tuomi, Laura, Laura Rautiainen und Marcello Passaro. Baltic+ SEAL: Requirements Baseline Document. Technische Universität München, März 2020. http://dx.doi.org/10.5270/esa.balticseal.rbdv3.1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Sharry, John. Emergency Response Capability Baseline Needs Assessment - Requirements Document. Office of Scientific and Technical Information (OSTI), Oktober 2016. http://dx.doi.org/10.2172/1331474.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Boomer, K., J. Garfield, K. Giese, B. Higley, J. Layman, A. Boldt, N. Croskrey, C. Golberg, L. Johnson und R. Parazin. Functional requirements baseline for the closure of single-shell tanks. Office of Scientific and Technical Information (OSTI), Juni 1990. http://dx.doi.org/10.2172/7031711.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Spencer, S. G. High-Level software requirements specification for the TWRS controlled baseline database system. Office of Scientific and Technical Information (OSTI), September 1998. http://dx.doi.org/10.2172/362548.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Johnson, P. E., und D. S. Joy. Baseline requirements of the proposed action for the Transportation Management Division routing models. Office of Scientific and Technical Information (OSTI), Februar 1995. http://dx.doi.org/10.2172/34379.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Olfenbuttel, R., S. Clark, E. Helper, R. Hinchee, C. Kuntz, J. Means, J. Oxley et al. Technical support for the Ohio Clean Coal Technology Program. Volume 2, Baseline of knowledge concerning process modification opportunities, research needs, by-product market potential, and regulatory requirements: Final report. Office of Scientific and Technical Information (OSTI), August 1989. http://dx.doi.org/10.2172/10169138.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Sharry, J. Lawrence Livermore National Laboratory Emergency Response Capability Baseline Needs Assessment Requirement Document. Office of Scientific and Technical Information (OSTI), Dezember 2009. http://dx.doi.org/10.2172/975238.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie