3,568 research outputs found

    Random Surfaces that Suppress Single Scattering

    Full text link
    We present a method for generating numerically a one-dimensional random surface, defined by the equation x_3 = \zx, that suppresses single-scattering processes in the scattering of light from it within a specified range of scattering angles. Rigorous numerical calculations of the scattering of light from surfaces generated by this approach show that the single-scattering contribution to the mean scattered intensity is indeed suppressed within that range of angles.Comment: 3 pagers (Latex), 3 figure

    On Evidence-based Risk Management in Requirements Engineering

    Full text link
    Background: The sensitivity of Requirements Engineering (RE) to the context makes it difficult to efficiently control problems therein, thus, hampering an effective risk management devoted to allow for early corrective or even preventive measures. Problem: There is still little empirical knowledge about context-specific RE phenomena which would be necessary for an effective context- sensitive risk management in RE. Goal: We propose and validate an evidence-based approach to assess risks in RE using cross-company data about problems, causes and effects. Research Method: We use survey data from 228 companies and build a probabilistic network that supports the forecast of context-specific RE phenomena. We implement this approach using spreadsheets to support a light-weight risk assessment. Results: Our results from an initial validation in 6 companies strengthen our confidence that the approach increases the awareness for individual risk factors in RE, and the feedback further allows for disseminating our approach into practice.Comment: 20 pages, submitted to 10th Software Quality Days conference, 201

    Preventing Incomplete/Hidden Requirements: Reflections on Survey Data from Austria and Brazil

    Get PDF
    Many software projects fail due to problems in requirements engineering (RE). The goal of this paper is analyzing a specific and relevant RE problem in detail: incomplete/hidden requirements. We replicated a global family of RE surveys with representatives of software organizations in Austria and Brazil. We used the data to (a) characterize the criticality of the selected RE problem, and to (b) analyze the reported main causes and mitigation actions. Based on the analysis, we discuss how to prevent the problem. The survey includes 14 different organizations in Austria and 74 in Brazil, including small, medium and large sized companies, conducting both, plan-driven and agile development processes. Respondents from both countries cited the incomplete/hidden requirements problem as one of the most critical RE problems. We identified and graphically represented the main causes and documented solution options to address these causes. Further, we compiled a list of reported mitigation actions. From a practical point of view, this paper provides further insights into common causes of incomplete/hidden requirements and on how to prevent this problem.Comment: in Proceedings of the Software Quality Days, 201

    On The Low Frequency Quasi Periodic Oscillations of X-ray Sources

    Get PDF
    Based on the interpretation of the twin kilohertz Quasi Periodic Oscillations (kHz QPOs) of X-ray spectra of Low Mass X-Ray Binaries (LMXBs) to the Keplerian and the periastron precession frequencies at the magnetosphere-disk of X-ray neutron star (NS) respectively, we ascribe the low frequency Quasi Periodic Oscillations (LFQPO) and HBO (15-60 Hz QPO for Z sources or Atoll sources) to the periastron precession at some outer disk radius. The obtained conclusions include: all QPO frequencies increase with increasing the accretion rate. The obtained theoretical relations between HBO (LFQPO) frequency and the kHz QPO frequency are similar to the measured empirical formula. Further, the possible dynamical mechanism for QPO production is discussed.Comment: 6 pages, 2 figures, accepted by APSS, 200

    Doorway States and Billiards

    Full text link
    Whenever a distinct state is immersed in a sea of complicated and dense states, the strength of the distinct state, which we refer to as a doorway, is distributed in their neighboring states. We analyze this mechanism for 2-D billiards with different geometries. One of them is symmetric and integrable, another is symmetric but chaotic, and the third has a capricious form. The fact that the doorway-state mechanism is valid for such highly diverse cases, proves that it is robust.Comment: 7 pages, 6 figures, Accepted in Proceedings of "Symmetries in Nature", Symposium in Memoriam Marcos Moshinsk
    • …
    corecore