23,841 research outputs found

    Application of the Asymptotic Iteration Method to a Perturbed Coulomb Model

    Full text link
    We show that the asymptotic iteration method converges and yields accurate energies for a perturbed Coulomb model. We also discuss alternative perturbation approaches to that model.Comment: 9 pages, 2 figures, 1 tabl

    Comment on the numerical solutions of a new coupled MKdV system (2008 Phys. Scr. 78 045008)

    Full text link
    In this comment we point out some wrong statements in the paper by Inc and Cavlak, Phys. Scr. 78 (2008) 04500

    Preventing Incomplete/Hidden Requirements: Reflections on Survey Data from Austria and Brazil

    Get PDF
    Many software projects fail due to problems in requirements engineering (RE). The goal of this paper is analyzing a specific and relevant RE problem in detail: incomplete/hidden requirements. We replicated a global family of RE surveys with representatives of software organizations in Austria and Brazil. We used the data to (a) characterize the criticality of the selected RE problem, and to (b) analyze the reported main causes and mitigation actions. Based on the analysis, we discuss how to prevent the problem. The survey includes 14 different organizations in Austria and 74 in Brazil, including small, medium and large sized companies, conducting both, plan-driven and agile development processes. Respondents from both countries cited the incomplete/hidden requirements problem as one of the most critical RE problems. We identified and graphically represented the main causes and documented solution options to address these causes. Further, we compiled a list of reported mitigation actions. From a practical point of view, this paper provides further insights into common causes of incomplete/hidden requirements and on how to prevent this problem.Comment: in Proceedings of the Software Quality Days, 201

    On Evidence-based Risk Management in Requirements Engineering

    Full text link
    Background: The sensitivity of Requirements Engineering (RE) to the context makes it difficult to efficiently control problems therein, thus, hampering an effective risk management devoted to allow for early corrective or even preventive measures. Problem: There is still little empirical knowledge about context-specific RE phenomena which would be necessary for an effective context- sensitive risk management in RE. Goal: We propose and validate an evidence-based approach to assess risks in RE using cross-company data about problems, causes and effects. Research Method: We use survey data from 228 companies and build a probabilistic network that supports the forecast of context-specific RE phenomena. We implement this approach using spreadsheets to support a light-weight risk assessment. Results: Our results from an initial validation in 6 companies strengthen our confidence that the approach increases the awareness for individual risk factors in RE, and the feedback further allows for disseminating our approach into practice.Comment: 20 pages, submitted to 10th Software Quality Days conference, 201

    Derivation of a multilayer approach to model suspended sediment transport: application to hyperpycnal and hypopycnal plumes

    Full text link
    We propose a multi-layer approach to simulate hyperpycnal and hypopycnal plumes in flows with free surface. The model allows to compute the vertical profile of the horizontal and the vertical components of the velocity of the fluid flow. The model can describe as well the vertical profile of the sediment concentration and the velocity components of each one of the sediment species that form the turbidity current. To do so, it takes into account the settling velocity of the particles and their interaction with the fluid. This allows to better describe the phenomena than a single layer approach. It is in better agreement with the physics of the problem and gives promising results. The numerical simulation is carried out by rewriting the multi-layer approach in a compact formulation, which corresponds to a system with non-conservative products, and using path-conservative numerical scheme. Numerical results are presented in order to show the potential of the model

    On Packet Scheduling with Adversarial Jamming and Speedup

    Full text link
    In Packet Scheduling with Adversarial Jamming packets of arbitrary sizes arrive over time to be transmitted over a channel in which instantaneous jamming errors occur at times chosen by the adversary and not known to the algorithm. The transmission taking place at the time of jamming is corrupt, and the algorithm learns this fact immediately. An online algorithm maximizes the total size of packets it successfully transmits and the goal is to develop an algorithm with the lowest possible asymptotic competitive ratio, where the additive constant may depend on packet sizes. Our main contribution is a universal algorithm that works for any speedup and packet sizes and, unlike previous algorithms for the problem, it does not need to know these properties in advance. We show that this algorithm guarantees 1-competitiveness with speedup 4, making it the first known algorithm to maintain 1-competitiveness with a moderate speedup in the general setting of arbitrary packet sizes. We also prove a lower bound of ϕ+1≈2.618\phi+1\approx 2.618 on the speedup of any 1-competitive deterministic algorithm, showing that our algorithm is close to the optimum. Additionally, we formulate a general framework for analyzing our algorithm locally and use it to show upper bounds on its competitive ratio for speedups in [1,4)[1,4) and for several special cases, recovering some previously known results, each of which had a dedicated proof. In particular, our algorithm is 3-competitive without speedup, matching both the (worst-case) performance of the algorithm by Jurdzinski et al. and the lower bound by Anta et al.Comment: Appeared in Proc. of the 15th Workshop on Approximation and Online Algorithms (WAOA 2017
    • …
    corecore