Requirements Engineering Databases: The Good, The Bad, and The Ugly
|
|
- Meagan Crawford
- 7 years ago
- Views:
Transcription
1 New England Databae Day (NEDBDay08) February 4, 2008 Requirement Engineering Databae: The Good, The Bad, and The Ugly Brian Berenbach Siemen Corporate Reearch 1
2 Agenda Brief Introduction to Siemen (Context) What i a Requirement Databae? Key differentiator of an RE Databae Indutrial Problem Some Current Reearch Area 2
3 Information and Communication Communication Siemen Buine Automation and Control Automation and Drive Indutrial Solution and Service Siemen at a Glance Power Power Generation Power Tranmiion and Ditribution Tranportation Tranportation Sytem Siemen VDO Automotive Medical Medical Solution 3 Siemen Building Technologie Lighting Sylvania Service Annual Worldwide Sale Net Income: $2.8B World 21 t larget company 47,000 employee $6.6B dedicated to global R&D $98.2 billion Siemen AG: Worldwide figure for fical (U.S. GAAP 2 ) 1 Fical Year October 1 September 30 2 Average annual exchange rate for FY 2005: 1.00 =$ % of total ale are from product and ervice developed in the lat five year
4 SIEMENS CORPORATE RESEARCH Siemen ha a long tradition of technological innovation. 4
5 The rate of innovation i increaing. Share of ale with product 5 year and younger 48% 55% 75% 6 to 10 year old 30% 29% more than 10 year old 22% % 19% 6%
6 RE Databae are Important Functionality previouly realized in electrical or electro-mechanical ytem i now being realized in oftware => bigger, more complex, & more oftware project (hundred of developer, million of line of code). Meeting functional and non-functional requirement i important to buine ucce => retricted hardware reource, real-time performance, afety critical application. Multiite development project. High quality (i.e., thoroughly teted, reliable) oftware i important to buine ucce. Our RE databae mut addre the increaing cale and complexity of emerging oftware ytem. 6
7 Requirement Databae A requirement databae i an extenion of a tandard databae that provide key functionality in the area of verion control and traceability. That i, the databae provide, off the helf the ability to verion and track change to requirement and to trace requirement within and outide of the databae, alo to create trace matrice and generate formatted report and pecification. Let find the change! 7
8 Attribute of an RE Databae The are many unique attribute of an RE databae compared with a traditional databae. They include: ischema predefined to upport the torage of requirement of different kind iverion control at the requirement (record) level, with uer view of hitory of a requirement iintrinic upport for tracing, that i, a drag and drop mechanim that i eay to ue and upport creating trace manually between requirement. igeneration of requirement document directly from the repoitory. The preferred method of working I to create and edit requirement in the databae, then ue the documentation facility of the databae to create a filtered and formatted et of requirement in a requirement pecification, uually a either a word or pdf document. 8
9 Typical Configuration of RE Databae There are two typical type of configuration for RE Databae. i One poible one ha the RE management oftware on the erver, uing a brower to acce it. i The other configuration, which i fater but require that oftware be intalled on the client, i to have a client application on the uer PC acceing the databae on a erver. 9
10 Scale and complexity make life difficult Requirement Databae with Over 16000* Requirement View Trace View Trace * We have RE databae with over 2 GB in them 10
11 Key Differentiator of RE Databae Eay to ue, intuitive with minimal need to refer to documentation Ability to baeline and perform change control on requirement. Support for rich text and graphic in a requirement decription 11
12 Key Differentiator of RE Databae Ability to work offline itake requirement home, review them, change them, roll them back into the databae later. Good thing I can make thoe change at at home. 12
13 Key Differentiator of RE Databae Product line upport icreate ubet of requirement that can be reued for different project and product. Global Support. ithe ability to have ditributed requirement analyi i more than jut the ability to fold in rule to determine routing, review procedure (e.g. workflow), and cripting for uer guidance and quality aurance. 13
14 Key Differentiator of RE Databae All field/attribute hould be definable on a per company or per project bai, uch that the ame corporate data dictionary i ued on multiple project for conitency, but each project can till have it own gloary of term, keyword, etc. Corporate DictionaryProject Dictionary 14
15 Key Differentiator of RE Databae Parent child relationhip- it hould be poible to have a parent child relationhip, and where there i uch a relationhip, it hould be poible to have parent and child of a different core requirement type. FEAT101 SECRQT101.5 PERFRQT inote that ome commercial databae do not allow parent-child requirement to be of different type. 15
16 Key Differentiator of RE Databae Traceability- the tool ued hall enable end-toend traceability, vertical and horizontal traceability. Thi may require integration with other tool uch a IDE and/or modeling and teting tool. Mandated by law, including Sarbane-Oxley, the FDA and the FAA. Traceability required by mot demanding afetycritical proce tandard uch a: DO178B, IEC 61508, EN50128*. 16
17 Traceability and The FDA* A oftware requirement traceability analyi hould be conducted to trace oftware requirement to (and from) ytem requirement and to rik analyi reult. In addition to any other analye and documentation ued to verify oftware requirement, a formal deign review i recommended to confirm that requirement are fully pecified and appropriate before extenive oftware deign effort begin. Requirement can be approved and releaed incrementally, but care hould be taken that interaction and interface among oftware (and hardware) requirement are properly reviewed, analyzed, and controlled. *General Principle of Software Validation; Final Guidance for Indutry and FDA Staff, Jan 11,
18 Traceability and the FAA FAA' Adviory Circular AC20-115B etablihed DO-178B a the accepted mean of certifying all new aviation oftware: The tringent and internationally accepted DO-178B proce tandard that govern the development of civilian avionic embedded oftware i primarily requirement driven. at each tage oftware developer mut be able to demontrate traceability of deign againt requirement; i.e. are the highlevel requirement I am pecifying traceable to the ytem requirement? Are the low-level requirement traceable to the high-level requirement?... *Eterel Technologie 18
19 SHR 3 Xx xxx xxx xx xx xxxxxx xxx or Xx xxx xx xx xx xxxx xx xxxxx Stakeholder requirement & Multiple Layer SR 37 X xx x xxxxx xx xx xx xxxx xxx SR 31 Xx x xx xxxxx xx xxxx xx x xxx DK 01: Xxx xxx x xx SR 41 Xxxxxxx xx xxxx x xxxx xx xxxxxx Sytem requirement & or & DR 37 DR 132 DR 24 DR 131 DR 42 DR 14 Deign requirement 19
20 SHR 3 Xx xxx xxx xx xx xxxxxx xxx or Xx xxx xx xx xx xxxx xx xxxxx Stakeholder requirement & Multiple Layer SR 37 X xx x xxxxx xx xx xx xxxx xxx & Product line make Xx x xx xxxxx or SR 31 xx xxxx xx x xxx thi DK 01: Xxx wore!!! xxx x xx & SR 41 Xxxxxxx xx xxxx x xxxx xx xxxxxx Sytem requirement DR 37 DR 132 DR 24 DR 131 DR 42 DR 14 Deign requirement 20
21 The Ugly Databae do not cale Significant performance Degradation Lack of functionality Not uer friendly Obolete cripting language Inefficient query mechanim Poor merge functionality Trace are unmanageable and break 21
22 Time to panic? 22
23 Captain! There are no viable olution on the horizon 23
24 The Bad An unolved computer cience problem 24
25 The Good ome advanced technique that SCR/SE ha piloted may help in the future iunified Requirement Model idynamic Tracing 25
26 The Unified Requirement Modeling Language The Unified Requirement Modeling Language (URML) i a tandard notation for the modeling of requirement artifact a firt tep in developing a product or performing buine modeling. It incorporate element of: iue cae ifeature Modeling ihazard Analyi ithreat Modeling igoal Modeling iother requirement related viual modeling technique Sample URML Picture 26
27 Unified Requirement Model A unified requirement model i a model that ha been created uing the URML. iit ha been found empirically that text pecification are inherently ambiguou. The ambiguity i exacerbated with global oftware development, different language and culture. Graphical model are inherently unambiguou. 27
28 Unified Requirement Model Requirement Relationhip are naturally organized in directed graph, wherea traditional databae upport a tree tructure. The ue of a tree tructure force the creation of an inordinate number of trace and doe not work well with cro-cutting requirement. A a typical project grow to N requirement, the number of trace needed i often greater than N 2. 28
29 SIEMENS CORPORATE RESEARCH I finally undertand why I hould ue childproof door lock! ¾Eaier to undertand than text. ¾Verifiable ¾Fater than text (up to 70%) A Viual Language Provide View into the Model 29
30 Definition of Traceability* Requirement traceability i the ability to decribe and follow the life of a requirement, in both a forward and backward direction: from it origin, through it development and pecification to it ubequent deployment and ue through period of ongoing refinement and iteration in all of the project phae. - *Gotel & Finkletein,
31 Dynamic Tracing Problem: Manual tracing i ubject to error, omiion, and decay a artifact are changed and the lack-of-benefit-to-tracer problem. One olution: Dynamic tracing Dynamic tracing i the automated generation of candidate trace link. 31
32 With over 3000 deign document the rebel will NEVER find the flaw in in the DeathStar. 32
33 Much to to learn you have, hmmm? The rebel are uing Dynamic Tracing! 33
34 A Typical Traceability Matrix 34
35 Information Retrieval* Inference Network Model (probabilitic approach) Frequency of term t i in repect to the ize of the document. prob(d j t i )=freq(d j,t i )/ Σ k freq(d j,t k ) Frequency of term t i in repect to the ize of the query. prob(q t i )=freq(q,t i )/ Σ k freq(q,t k ) Prob(d j q) = Σ prob(d j t i ) prob(q t i ) prob(t i ) i prob(q) Probability of a link between a query and document. Σ i prob(q t i ) prob(t i ) Meaure the rarity/commonality of the term. prob(t i ) = η(1/n i ) where n i = # of doc containing t i. η = normalizing factor *Slide Courtey of Prof. Jane Cleland-Huang, DePaul Univerity 35
36 /* * Notification_Proceing.java Fuhu Liu 5.0 * Changed log file to log DB */ import java.awt.*; import java.awt.event.*; import javax.wing.*; import java.io.*; import java.util.*; import java.ql.*;... void UpdateDiplayLit() { litmodel.removeallelement(); String msql = "SELECT ditinct + SubcriberName FROM EventDetail"; try { r = tmt.executequery(msql); while (r.next()) { String SubName = r.getstring(1); litmodel.addelement(subname); } } } r.cloe(); } catch (Exception e) { Sytem.out.println("Notification_Proceing: Problem with query: " + e); An example of traceable artifact and elected link 36
37 Viualized Hierarchy* X X WEATHER STATION MANAGEMEN T FREEZE PREDICTIO N DRIVING ALERT CONTACTS Alert hall be iued when hazardou driving condition exit WEATHER READINGS WEATHER STATIONS DE-ICING SCHEDULING ROADS ROAD NETWORK MAPS UPDATE ROAD DATA ROAD SENSORS Candidate link Accepted link Current link Rejected link X *Slide Courtey of Prof. Jane Cleland-Huang, DePaul Univerity 37
38 Quetion? Am I uppoed to diintegrate the databae or the audience??? Zapppp 38
License & SW Asset Management at CES Design Services
Licene & SW Aet Management at CES Deign Service johann.poechl@iemen.com www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What
More informationA Review On Software Testing In SDlC And Testing Tools
www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,
More informationSHARESYNC SECURITY FEATURES
www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over
More informationCASE STUDY BRIDGE. www.future-processing.com
CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION
More informationHow Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal
How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing
More informationA Spam Message Filtering Method: focus on run time
, pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department
More informationCASE STUDY ALLOCATE SOFTWARE
CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT
More informationSCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto
More informationApigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management
Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4
More informationQueueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,
MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS
More informationSoftware Engineering Management: strategic choices in a new decade
Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk
More informationREDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.
International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.
More informationVery special thanks to Wolfgang Gentzsch and Burak Yenier for making the UberCloud HPC Experiment possible.
Digital manufacturing technology and convenient acce to High Performance Computing (HPC) in indutry R&D are eential to increae the quality of our product and the competitivene of our companie. Progre can
More informationCHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY
Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad
More informationTap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms
Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:
More informationAPEC Environmental Goods and Services Work Program
APEC Environmental Good and Service In Sydney in 2007 APEC Leader committed, through wide-ranging and ambitiou action, a et out in the Sydney Action Agenda, to enuring the energy need of the economie whilt
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection
More informationHow To Prepare For A Mallpox Outbreak
Iue Brief No. 1 Bioterrorim and Health Sytem Preparedne Addreing the Smallpox Threat: Iue, Strategie, and Tool www.ahrq.gov The Agency for Healthcare Reearch and Quality (AHRQ) i the lead agency charged
More informationReturn on Investment and Effort Expenditure in the Software Development Environment
International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com
More informationOPINION PIECE. It s up to the customer to ensure security of the Cloud
OPINION PIECE It up to the cutomer to enure ecurity of the Cloud Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard
More informationProject Management Basics
Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management
More informationProducts and Services
Product and Service With client ranging from mall buinee to Fortune 500 firm, GIS ha vat experience undertanding and delivering on the unique need of a wide range of client. By providing uperior product
More informationThank you for attending the MDM for the Enterprise Seminar Series!
Thank you for attending the MDM for the Enterprie Seminar Serie! Pleae do not ditribute thi preentation without permiion from the peaker (ee contact information within.) Thi i jut intended a an additional
More informationSchmid Peoplemover Overpass and Revolution. The Discovery of a New Way.
Schmid Peoplemover Overpa and Revolution. The Dicovery of a New Way. A Company of ThyenKrupp Elevator ThyenKrupp Aufzüge TK Creating New Way Demand New Way of Thinking. The Schmid Peoplemover Remove the
More informationPerformance of a Browser-Based JavaScript Bandwidth Test
Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further
More informationCluster-Aware Cache for Network Attached Storage *
Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,
More informationIntegration of Independent Applications and EAI Systems using Service Oriented Enterprise Bus and Open System Application Development Standards
I.J. Information Technology and Computer Science, 2013, 07, 1-11 Publihed Online June 2013 in MECS (http://www.mec-pre.org/) DOI: 10.5815/ijitc.2013.07.01 Integration of Independent Application and EAI
More informationSELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE
SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,
More informationA Novel Web-Based Student Academic Records Information System
A Novel Web-Baed Student Record Information Sytem Nmaju Obai, E. O. Nwachukwu, and C. Ugwu Department of Computer Science, Univerity of Port Harcourt, Port Harcourt, River State, Nigeria nmajuobai@yahoo.com,
More informationBio-Plex Analysis Software
Multiplex Supenion Array Bio-Plex Analyi Software The Leader in Multiplex Immunoaay Analyi Bio-Plex Analyi Software If making ene of your multiplex data i your challenge, then Bio-Plex data analyi oftware
More informationPekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T
Pekka Helkiö, 58490K Antti Seppälä, 63212W Oi Syd, 63513T Table of Content 1. Abtract...1 2. Introduction...2 2.1 Background... 2 2.2 Objective and Reearch Problem... 2 2.3 Methodology... 2 2.4 Scoping
More informationPerformance of Multiple TFRC in Heterogeneous Wireless Networks
Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding
More informationTRID Technology Implementation
TRID Technology Implementation Jaime Koofky, Managing Attorney, Brady & Koofky PA Cecelia Raine, Co-Chair, Cloing Inight Adviory Board, RealEC Technologie Richard Triplett, CMB, Vice Preident, Director
More informationA Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks
A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International
More informationTesting Documentation for CCIH Database Management System By: John Reeves, Derek King, and Robert Watts
Teting Documentation for CCIH Databae Management Sytem By: John Reeve, Derek King, and Robert Watt The teting proce for our project i divided into three part of Unit teting, one part of Integration/Function
More informationLaureate Network Products & Services Copyright 2013 Laureate Education, Inc.
Laureate Network Product & Service Copyright 2013 Laureate Education, Inc. KEY Coure Name Laureate Faculty Development...3 Laureate Englih Program...9 Language Laureate Signature Product...12 Length Laureate
More informationMobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN
Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic
More informationFEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS
Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC
More informationEVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN
International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 4, April 2012 pp. 2563 2581 EVALUATING SERVICE QUALITY OF MOBILE APPLICATION
More informationAcceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds
Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden
More informationBi-Objective Optimization for the Clinical Trial Supply Chain Management
Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective
More informationUnit 11 Using Linear Regression to Describe Relationships
Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory
More informationThird Party Technical Guidelines
Third Party Technical Guideline Configuration Guide Releae: Document Reviion: Ditribution Statu: NICE Engage Platform 6.3 / NICE Interaction Management 4.1 Real-Time Solution 4.9 NICE Perform 3.2 / 3.5
More informationGrowth and Sustainability of Managed Security Services Networks: An Economic Perspective
Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,
More informationAssessing the Discriminatory Power of Credit Scores
Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,
More informationProduction Management II. Product Life-Cycle Management II
Production Management II - - Product Life-Cycle Management II Contact: Dipl.-Ing. Wolfgang Boo w.boo@wzl.rwth-aachen.de WZL 53B Raum 507 Tel.: 80-28 469 Objective of the Lecture: Overview of Product-Data-Management-Sytem
More informationRisk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms
Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,
More informationSubmission to the Network Rail s Long Term Planning Process London and South East Market Study
Submiion to the Network Rail Long Term Planning Proce London and South Eat Market Study Introduction Thi i the repone of London Luton Airport to Network Rail Long Term Planning Proce (LTPP) mot pecifically
More informationTIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME
TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic
More informationRISK MANAGEMENT POLICY
RISK MANAGEMENT POLICY The practice of foreign exchange (FX) rik management i an area thrut into the potlight due to the market volatility that ha prevailed for ome time. A a conequence, many corporation
More informationwww.brindleytech.com Insurance Solutions
Inurance Solution Agenda 1 2 3 4 5 Buine Value Solution Overview Capabilitie Cutomer Succe Storie Inurance Product in Nut Shell Buine Value Cutomer Buine Value Achieved through Winure Increae Efficiency
More informationA Note on Profit Maximization and Monotonicity for Inbound Call Centers
OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright
More informationGrowth and Sustainability of Managed Security Services Networks: An Economic Perspective
Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,
More informationWarehouse Security System based on Embedded System
International Conference on Logitic Engineering, Management and Computer Science (LEMCS 2015) Warehoue Security Sytem baed on Embedded Sytem Gen Li Department of Electronic Engineering, Tianjin Univerity
More informationFour Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations
Four Way Companie Can Ue Open Source Social Publihing Tool to Enhance Their Buine Operation acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Four Way Companie Can Ue Open
More informationScheduling of Jobs and Maintenance Activities on Parallel Machines
Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department
More informationDigifort Enterprise The most complete Digifort solution for camera and alarm monitoring.
Digifort Enterprie The mot complete Digifort olution for camera and alarm monitoring. The Enterprie verion i the package which comprie all of the feature available in the Digifort Sytem, offering complete
More informationStrategic Plan of the Codex Alimentarius Commission 2014-2019 1
Strategic Plan of the Codex Alimentariu Commiion 2014-2019 1 STRATEGIC PLAN OF THE CODEX ALIMENTARIUS COMMISSION 2014-2019 INTRODUCTION The Codex Alimentariu Commiion (CAC) wa etablihed by the Food and
More informationPrincipal version published in the University of Innsbruck Bulletin of 8 April 2009, Issue 55, No 233
Note: The following curriculum i a conolidated verion. It i legally non-binding and for informational purpoe only. The legally binding verion are found in the Univerity of Innbruck Bulletin (in German).
More informationProgress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools
Progre 8 meaure in 2016, 2017, and 2018 Guide for maintained econdary chool, academie and free chool July 2016 Content Table of figure 4 Summary 5 A ummary of Attainment 8 and Progre 8 5 Expiry or review
More information6. Friction, Experiment and Theory
6. Friction, Experiment and Theory The lab thi wee invetigate the rictional orce and the phyical interpretation o the coeicient o riction. We will mae ue o the concept o the orce o gravity, the normal
More informationA note on profit maximization and monotonicity for inbound call centers
A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an
More informationGenuine Bendix. a l v e. c o m p r e. s o r s. s y e r. a i r. d r. s t r o n i c. e l e c. d i s c. b r a k e s. w h e e l. e n d X V.
v a l v e AHEAD OF THE CURVE AHEAD OF THE CURVE Genuine Bendix c o m p r e o r a i r d r y e r e l e c t r o n i c a i r d i c b r a k e w h e e l e n d X V i i o n GENUINE BENDIX NO CUTTING CORNERS. V
More informationMorningstar Fixed Income Style Box TM Methodology
Morningtar Fixed Income Style Box TM Methodology Morningtar Methodology Paper Augut 3, 00 00 Morningtar, Inc. All right reerved. The information in thi document i the property of Morningtar, Inc. Reproduction
More informationChange Management Plan Blackboard Help Course 24/7
MIT 530 Change Management Plan Help Coure 24/7 Submitted by: Sheri Anderon UNCW 4/20/2008 Introduction The Univerity of North Carolina Wilmington (UNCW) i a public comprehenive univerity, one of the ixteen
More informationTurbulent Mixing and Chemical Reaction in Stirred Tanks
Turbulent Mixing and Chemical Reaction in Stirred Tank André Bakker Julian B. Faano Blend time and chemical product ditribution in turbulent agitated veel can be predicted with the aid of Computational
More informationControl Theory based Approach for the Improvement of Integrated Business Process Interoperability
www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development
More information2. METHOD DATA COLLECTION
Key to learning in pecific ubject area of engineering education an example from electrical engineering Anna-Karin Cartenen,, and Jonte Bernhard, School of Engineering, Jönköping Univerity, S- Jönköping,
More informationUtility-Based Flow Control for Sequential Imagery over Wireless Networks
Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building
More informationMANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) *
MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * Praanna Padmanabhan School of Computer Science The Univerity of Oklahoma Norman OK, USA praannap@yahoo-inc.com Dr. Le Gruenwald
More informationFinal Award. (exit route if applicable for Postgraduate Taught Programmes) N/A JACS Code. Full-time. Length of Programme. Queen s University Belfast
Date of Reviion Date of Previou Reviion Programme Specification (2014-15) A programme pecification i required for any programme on which a tudent may be regitered. All programme of the Univerity are ubject
More information1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation
Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted
More informationChapter 3 Torque Sensor
CHAPTER 3: TORQUE SESOR 13 Chapter 3 Torque Senor Thi chapter characterize the iue urrounding the development of the torque enor, pecifically addreing meaurement method, tranducer technology and converter
More informationA technical guide to 2014 key stage 2 to key stage 4 value added measures
A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool
More informationForest Lake Local Plan
1 Introduction Thi Local Plan contain pecific additional local planning requirement. Where it conflict with the requirement of the City Plan, thi Local Plan prevail. In uing thi Local Plan, reference hould
More informationSGROI FINANCIAL. Contact us if you are interested in getting access to our new Client Portal
the SGROI FINANCIAL N E W S L E T T E R INVESTMENTS ANNUITIES ESTATE PLANNING IRA S 401K PLANS 403(b) PLANS ROLLOVERS INSURANCE Sgroi Financial New Client Portal Streamline Information Acce Volume 5 Number
More informationINTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS
INTERACTIVE TOOL FOR ANALYSIS OF TIMEDELAY SYSTEMS WITH DEADTIME COMPENSATORS Joé Lui Guzmán, Pedro García, Tore Hägglund, Sebatián Dormido, Pedro Alberto, Manuel Berenguel Dep. de Lenguaje y Computación,
More informationName: SID: Instructions
CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/
More informationRO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds
!111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg
More informationImagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006
ry Portal Workhop #2 Department of Adminitrative Service, Executive Building Salem, Oregon May 11, 2006 Workhop Purpoe: dicu the outcome of the phae 1 coping proce for development of an imagery portal
More informationPEM GROUP 2015 FINANCIAL RESULTS
Venture Debt Fund July 2015 PEM GROUP 2015 FINANCIAL RESULTS WARSAW, 10 MARCH 2016 Agenda Key miletone in 2015 TSR - our offer for invetor 2015 financial reult Lat 4 year in number New invetment in 2015
More informationSocially Optimal Pricing of Cloud Computing Resources
Socially Optimal Pricing of Cloud Computing Reource Ihai Menache Microoft Reearch New England Cambridge, MA 02142 t-imena@microoft.com Auman Ozdaglar Laboratory for Information and Deciion Sytem Maachuett
More informationAn Asset and Liability Management System for Towers Perrin-Tillinghast
An Aet and Liability Management Sytem for Tower Perrin-Tillinghat John M. Mulvey Gordon Gould Clive Morgan Department of Operation Reearch and Financial Engineering and Bendheim Center for Finance Princeton
More informationAlgorithms for Advance Bandwidth Reservation in Media Production Networks
Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton
More informationA New Optimum Jitter Protection for Conversational VoIP
Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill
More informationDelivering the Next Generation of Satellite and Terrestrial Communications
Delivering the Next Generation of Satellite and Terretrial Communication Editor Letter Developing new technology i a daunting and neceary tak if companie are to tay competitive in today global communication
More informationApplications of Risk Analysis in Border Security Niyazi Onur Bakir, University of Southern California nbakir@usc.edu
Application of Rik Analyi in Border Security Niyazi Onur Bakir, Univerity of Southern California nbakir@uc.edu 1. Overview... 1. Reearch Accomplihment....1. Security of Incoming Truck to U.S. Southwetern
More informationControl of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling
Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada
More information! Search engines are highly profitable. n 99% of Google s revenue from ads. n Yahoo, bing also uses similar model
Search engine Advertiement The Economic of Web Search! Search engine are highly profitable Revenue come from elling ad related to querie 99% of Google revenue from ad Yahoo, bing alo ue imilar model CS315
More informationTHE CARD DESIGN BOOK A STEP-BY-STEP GUIDE TO CREATING DYNAMIC, EFFECTIVE AND SECURE ID CARDS BONUS SECTION: CARD DESIGN GALLERY.
THE CARD DESIGN ID BOOK A STEP-BY-STEP GUIDE TO CREATING DYNAMIC, EFFECTIVE AND SECURE ID CARDS BONUS SECTION: CARD DESIGN GALLERY Preented by INTRODUCTION CREATING ID CARDS HAS NEVER BEEN EASIER Welcome
More informationLow-cost, Drift-free DGPS Locomotive Navigation System
High-Speed Rail IDEA Program Low-cot, Drift-free DGPS Locomotive Navigation Sytem Final Report for High-Speed Rail IDEA Project Prepared by: K. Tyen Mueller Seagull Technology, Inc., Campbell, CA Augut
More informationSupport Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.
The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem
More informationUniversidad de Colima Dirección General de Relaciones Internacionales y Cooperación Académica. List of courses taught in English 2016.
Univeridad de Colima Dirección General de Relacione Internacionale y Cooperación Académica. Lit of coure taught in Englih 2016. SCHOOL OF TOURISM. Bachelor in Tourim Management Semeter January - July 2016.
More informationINFORMATION Technology (IT) infrastructure management
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning
More informationBidding for Representative Allocations for Display Advertising
Bidding for Repreentative Allocation for Diplay Advertiing Arpita Ghoh, Preton McAfee, Kihore Papineni, and Sergei Vailvitkii Yahoo! Reearch. {arpita, mcafee, kpapi, ergei}@yahoo-inc.com Abtract. Diplay
More informationNetwork Architecture for Joint Failure Recovery and Traffic Engineering
Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara Dept. of Computer Science Princeton Univerity, NJ 08544 muchara@princeton.edu Dahai Xu AT&T Lab Reearch Florham Park,
More informationMARINE HEALTH, SAFETY, QUALITY, ENVIRONMENTAL AND ENERGY MANAGEMENT (The ABS Guide for Marine Management Systems)
Guide for Marine Health, Safety, Quality and vironmental Management GUIDE FOR MARINE HEALTH, SAFETY, QUALITY, ENVIRONMENTAL AND ENERGY MANAGEMENT (The ABS Guide for Marine Management Sytem) APRIL 2012
More informationBrokerage Commissions and Institutional Trading Patterns
rokerage Commiion and Intitutional Trading Pattern Michael Goldtein abon College Paul Irvine Emory Univerity Eugene Kandel Hebrew Univerity and Zvi Wiener Hebrew Univerity June 00 btract Why do broker
More informationReview of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015
Review of Multiple Regreion Richard William, Univerity of Notre Dame, http://www3.nd.edu/~rwilliam/ Lat revied January 13, 015 Aumption about prior nowledge. Thi handout attempt to ummarize and yntheize
More information