搜索结果: 1-13 共查到“计算机科学技术其他学科 analysis”相关记录13条 . 查询时间(0.257 秒)
Graphical Histories for Visualization: Supporting Analysis, Communication, and Evaluation
Visualization history undo analysis presentation evaluation
2016/5/24
Interactive history tools, ranging from basic undo and redo to branching timelines of user actions, facilitate iterative
forms of interaction. In this paper, we investigate the design of history mech...
《Pattern Analysis and Machine Intelligence, IEEE Transactions on》
Pattern Analysis and Machine Intelligence IEEE Transactions on
2013/10/8
The IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI) is published monthly. Its editorial board strives to present most important research results in areas within TPAMI's scope. T...
Risk and Reliability Analysis of Deepwater Reel-Lay Installation: A Scenario Study of Pipeline during the Process of Tensioning
Reel-Lay Installation Risk Analysis Reliability Analysis Monte Carlo Simulation Ergonomics
2013/3/8
In terms of reel-lay installation in deep water, studies on the pipeline during the process of tensioning have been completed based on theories of risk and reliability analysis and Ergonomics. Qualita...
BINLI: An Ontology-Based Natural Language Interface for Multidimensional Data Analysis
NLP BI Ontology Question Answering
2013/1/28
Current technology facilitates access to the vast amount of information that is produced every day. Both individuals and companies are active consumers of data from the Web and other sources, and thes...
The BP-M* Methodology for Process Analysis in the Health Sector
Methodology for Business Process Analysis Process Simulation and Reengineering Care Path-way
2013/1/28
In this paper we present the main phases of the BP-M* methodology and its application to a care pathway for patients in the Oncology Division of a large hospital, to evaluate pros and cons of differen...
Steady-State Queue Length Analysis of a Batch Arrival Queue under N-Policy with Single Vacation and Setup Times
Queue Length Recursion Expressions N Policy Setup
2013/1/29
This paper investigates the steady state property of queue length for a batch arrival queue under N-policy with single vacation and setup times. When the system becomes empty, the server is turned off...
Expert Anti-Evaluation Model Based on Matter-Element Analysis in Fund Project Peer-Review System
Anti-Evaluation Model Matter-Element Analysis Index System Comprehensive Evaluation Peer Review
2013/1/28
The article analyses several key issues which restrict the effectiveness of fund project peer review work. It analyses the evaluating theory and matter-element theory to access the expert anti-evaluat...
Probabilistic Analysis of a Robot System with Redundant Safety Units and Common-Cause Failures
robot safety availability reliability common-cause failures failure repair redundancy
2013/1/29
This paper presents reliability and availability analyses of a model representing a system having one robot and n-redundant safety units with common-cause failures. At least k safety units must functi...
A Case Study on the Application of PVS to Requirements Analysis
Application PVS Requirements Analysis
2009/12/9
This paper presents the results of a formal methods case study in which the Prototype Verification System (PVS) has been used for requirements analysis of one module of a physical access control syste...
A Content Analysis of Australian IS Early Career Job Advertisements
Content Analysis Australian Career Job Advertisements
2009/12/9
The purpose of this paper is to develop an understanding of the knowledge, skills and competencies demanded of early career information systems graduates in Australia. Job advertisements from 2006 wer...
Grammatical Conversion of Descriptive Narrative-an application of discourse analysis in conceptual modelling
Discourse Analysis Conceptual Modelling Fact Abstraction
2009/12/8
Fact-oriented conceptual modelling begins with the search for facts about a universe of discourse (UoD). These facts may be obtained from many sources, including information systems reports, tables, m...
The Analysis and Amendment of Security System in 3G
3G Security 3G Security Structure 3G authentication and key agreement protocol Security arith- metic
2013/1/29
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible V...
Analysis of technological process on the basis of nonmaterials values
Production planning and control Technological efficiency Technological process
2010/1/20
Purpose: What determines the correcttness of industrial company’s functiioning on the market is technological
process. In order to improve it continuously the priority should be technology, technolog...