SEMrush
utd.edu

Please wait for loading...




    SEMrush

      (106):

    /
     2  +14 2014 aug 07utd course lookupComet Calendar, The Official Event Calendar for UT DallasTuesday, Sep 16, Fall 2014 Undergraduate Course WL Withdrawal Period Begins 1st 8-week Session. Wednesday, Sep 3 - Monday, Sep 29 ...
     3  +27 2014 oct 02android nfr frameworkNon-Functional Requirements Non-Functional RequirementsThe NFR Framework . •. Based on traditional framework for problem solving in AI [ Nilsson]. – Establish the goals. – Introduce sub-goals to satisfy the goal where ...
     4  -2 2014 sep 20utd elearningCourse Information - The University of Texas at DallasStudents should immediately report any problems to the instructor and also contact the UTD eLearning Help Desk:
     5  ~ 2014 jul 26non functional requirements typeNon - Functional Requirements Non - Functional Requirements“ non functional requirement – in software system .... stimulus-stimulus: e.g., "the user will type her password within 15 secs from typing her login name".
     6  -2 2014 sep 24briana lemos utdSenate Meeting Minutes - The University of Texas at DallasOfficer Matthew Patchin Jr., Police Department Liaison. Thea Junt, Sustainability Manager. Ex-officio reports: Briana Lemos , SG Advisor.
     6  -3 2014 aug 26multi variate analysisMultivariate Analysis . - The University of Texas at DallasAs the name indicates, multivariate analysis comprises a set of techniques dedicated to the analysis of data sets with more than one variable. Several of these ...
     7  -1 2014 jul 17functional and nonfunctional requirements1. Non-Functional Requirements . Lawrence Chung. Department of Computer Science. The University of Texas at Dallas. Non-Functional Requirements .
     8  -3 2014 aug 26non functional requirement1. Non - Functional Requirements . Lawrence Chung. Department of Computer Science. The University of Texas at Dallas. Non - Functional Requirements .
     8  -4 2014 aug 21non functional requirements
     12  -10 2014 sep 17elearning utd
     13  ~ 2014 aug 26functional requirements softwareNon- Functional Requirements Non- Functional RequirementsNon functional for reliability and availability. –. Shall not requirements . •. Reliability specification. –. Hardware. –. Software . –. Operator. •. Decrease probability of ...
     13  +88 2014 jul 20utd grad ringSenior Week to Celebrate Class of Spring 2013 - UT Dallas NewsUT Dallas will send off its graduating seniors in style, with a full-scale carnival, a ring ceremony and special photo opportunities with the ...
     16  +28 2014 aug 24the social historianIntellectual History vs. the Social History of IntellectualsIntellectual History vs. the Social History of. Intellectuals. Daniel Wickberg. University of Texas at Dallas, USA. With the prominence of the 'new cultural history' in ...
     19  -1 2014 jul 25bgp load balancingDistributed Out-bound Load Balancing in Inter-AS Routing by for inter-AS routing in the Internet is the Border Gateway Protocol ( BGP ) ... By providing load balancing across inter-AS links, each inter-AS link has a greater.
     21  -19 2014 sep 26utd zmailThe UT Dallas School of Management eLearning NewsletterUTD SOM eLearning Newsletter. ... "Integrate mail from eLearning with standard UTD mail ( Zmail ), so that I can send mail to any instructor." "The user interface is  ...
     22  ~ 2014 oct 01modeling management theoriessimulation modeling in organizational and management researchSimulation modeling provides a powerful methodology for advancing theory and ... its potential contributions to management theory by describing the nature of ...
     22  +79 2014 sep 13utexas dian zhouArchive - News Center - The University of Texas at DallasThe University of Texas at Dallas, 800 West Campbell Road, Richardson, Texas ... UTD Electrical Engineering Professor Dian Zhou Takes Leave to Become ...
     24  +10 2014 sep 03graph data generatorPreserving the Privacy of Sensitive Relationships in Graph Datainferring sensitive relationships from anonymized graph data as link re-
     24  -13 2014 jul 17utd computer science graduatePhD -Trifold-Brochure.. - The University of Texas at DallasLocated within a five-mile radius of the UTD campus are over 600 high-tech com panies including, TI, Fujitsu, Intervoice, ... Graduate studies in CS /SE at UTD :.
     26  -4 2014 aug 22functional requirement examplesengineering, a software requirement that describes not what the software will do, but how the software will do it, for example , software performance requirements  ...
     26  ~ 2014 aug 02semantic web cloud computingScalable Complex Query Processing over Large Semantic Web Abstract— Cloud computing solutions continue to grow in- creasingly popular both ... will detail a scalable semantic web framework built using cloud computing  ...
     28  +28 2014 sep 30how to copyright musichow to best ensure remuneration for creators in the market for music ?The focus of this essay is to examine the market for copyrighted works with a ... of man), and because what is happening in the music industry is seen as a likely.
     28  ~ 2014 sep 11low dropout regulatorA Transient-Enhanced Low-Quiescent Current Low - Dropout Abstract—This paper presents a low - dropout regulator (LDO) for portable applications with an impedance-attenuated buffer for driving the pass device.
     30  -8 2014 aug 21functional requirements examples
     31  +22 2014 aug 05optical burst switchingAbsolute QoS Differentiation in Optical Burst - Switched Networkslength-division multiplexing (DWDM), optical burst switching , relative QoS. .... OBS networks, bursts follow an all-optical path from source to destination. Thus ...
     33  ~ 2014 aug 03website security standardsSecurity standards for the semantic web - The University of Texas at Finally some aspects of secure web services as well as directions for research and standards efforts for secure semantic web are provided. D 2004 Published by ...
     34  +16 2014 aug 10security patch managementSecurity Patch Management : Share the Burden or Share the Damage?{huseyin@utdallas.edu, jun.zhang@utdallas.edu}. Patch management is a crucial component of information security management. An important problem within.
     36  -13 2014 sep 26business solutions quizQuiz 4 SolutionsQuiz 4 Solutions . ... A recent study reported that employees spend an average of 40 minutes per day visiting non- business related web sites while on the job.
     36  -19 2014 aug 20serious games engineSerious Games for Immersive Cultural Training - The University of RAGE (Rockstar Advanced Game Engine ) software and incorporates the Euphoria engine from Natu-. ralMotion to create a living world where gamers care not ...
     38  ~ 2014 aug 27optimum return locationsOptimal Asset Location and Allocation with Taxable and Tax investors, the optimal asset location policy is robust to the introduction of tax- exempt bonds and ... allows them to earn the pre-tax return on assets. However ...
     39  +41 2014 aug 15ids alarm systemsThe Value of Intrusion Detection Systems in Information Technology the IDS optimally based on the hacking environment. Key words: economics of IT security ; intrusion detection systems (IDSs); ROC curves; security configuration ...
     39  +15 2014 aug 01face recognition algorithmsFusing Face -Verification Algorithms and Humans - The University of art face - recognition algorithms can surpass human accuracy at matching faces over changes in illumination. The ranking of algorithms and humans by accuracy,  ...
     40  -4 2014 jul 29ids alarm system
     42  -37 2014 sep 16orion utdFAQS: Frequently-Asked Questions | Bursar / Student Financial You are responsible for the information sent to your UTD email. It is important ... Log in to Galaxy and view “home” in Orion Student Center to verify your address.
     42  ~ 2014 aug 10file sharing musicTesting File Sharing's Impact on Music Album Sales in CitiesBy most estimates, the quantity of music files that are shared is enormous. Liebowitz (2006) documents many estimates of the extent of and trends in filesharing .
     43  ~ 2014 aug 29utd tech storesThe increasing significance of information technology (IT) security to firms is evident ... occurring in a computer system or network, analyzing .... Audit trails store .
     43  -25 2014 aug 03volere requirements specification templateNFRs: With Volere Requirements Specification Template . The Atlantic Systems Guild Limited. Table of Contents. (
     44  ~ 2014 aug 22link balancing routerInter-AS routing is accomplished by having neighboring ASms exchange ... By providing load balancing across inter-AS links , each inter-AS link has a greater.
     44  ~ 2014 aug 17social graph datainferring sensitive relationships from anonymized graph data as link re- identification. .... two people in a social network graph are likely to be friends.
     45  -42 2014 sep 12utd orionNew Comets - The University of Texas at DallasOrion . Undergraduates receive midterm grades in fall and spring. Final grades are .... Student Media. The UTD Mercury. A Modest Proposal. Radio UTD . UTD TV ...
     45  +56 2014 aug 18manufacturing operations capital planningOperations Planning - The University of Texas at DallasOperations planning is the process of setting the production volumes ... Sometimes this process may include capital investment decisions.
     45  +8 2014 jul 27buy user requirements templateWith Volere Requirements Specification Templates . Lawrence Chung ... When you buy our cellular phone, you can now call your friend. – Well, … ... is a powerful, easy-to- use application definition platform used by business experts to.
     46  +55 2014 aug 15jb prince tweezersWith Microscope and Tweezers : An Analysis of the Internet Virus of With Microscope and Tweezers : An Analysis of ...... and Tweezers ”. 3.4.1 Getting ...... prince princeton protect protozoa pumpkin puneet puppet rabbit rachmaninoff .... [23] J. Mogul and J. B. Postel, ''Internet Standard Subnet-.
     47  -44 2014 sep 29utd grad applicationMS-Trifold-Brochure - The University of Texas at DallasLocated within a five-mile radius of the UTD campus are over 600 high-tech ... O nline admission application : ... For more information on graduate admissions :.
     49  +52 2014 aug 26discovery engine corpWeb Service Discovery and Composition using USDLdesign of an automatic service discovery and composi- ... This is an ongoing project with Metallect Corp . The ... Our discovery and composition engine is written.
     49  +37 2014 aug 19best ids systemsKey words: economics of IT security; intrusion detection systems (IDSs); ROC curves; security ..... that even the best IDSs could only detect about 80%.
     49  ~ 2014 aug 02effects of plate tectonicsWhen and how did plate tectonics begin? - The University of Texas Plate tectonics is the horizontal motion of Earth's thermal boundary layer ( lithosphere) over the con- .... the lithosphere and has little effect on its motions[6]. The.
     52  +49 2014 aug 06web service discoveryWeb Service Discovery and Composition using USDL. Srividya Kona, Ajay Bansal, Gopal Gupta. Department of Computer Science. University of Texas at Dallas.
     54  +9 2014 aug 31serious games interactiveInstitute for Interactive Arts and. Engineering (IIAE) at the Univer- sity of Texas at Dallas (UT Dallas) has created a serious game that lets players increase their ...
     56  ~ 2014 sep 30pre -stack depth migrationDetailed internal architecture of a fluvial channel sandstone depth migrated . The GPR .... ing, velocity analysis, and depth migration can focus the GPR image and ..... reflector and must be inferred from the attributes pre -.
     58  -28 2014 aug 01functional requirements templateWith Volere Requirements Specification Templates . Lawrence Chung. Why Non- Functional Requirements (NFRs)? • Consider a brochure from an automobile ...
     59  +7 2014 aug 19load balancing routersshare reachability information between any two routers within the same AS. ... By providing load balancing across inter-AS links, each inter-AS link has a greater.
     60  +41 2014 sep 12عبدي دريThe Method of Least Squares - The University of Texas at DallasHervé Abdi : The Method of Least Squares dre's priority. Gauss often did not published ideas when he though that they could be controversial or not yet ripe, but ...
     60  ~ 2014 jul 31pdf mutual fundsInvestigating Underperformance by Mutual Fund PortfoliosUnderperformance by equity mutual funds has been widely documented by both the popular ... improving the efficiency of the allocation of mutual fund assets.
     61  +33 2014 aug 13singular value decompositionand Generalized Singular Value Decomposition (GSVD)Hervé Abdi1. 1 Overview. The singular value decomposition (SVD) is a generalization of the eigen-decomposition which can be used to analyze rectangular.
     65  ~ 2014 oct 02pdf on adrenergic system[alpha]1- Adrenergic modulation of synaptic input to Purkinje rats, is modulated by a1- adrenergic stimulation. The ... many different transmitter systems , including metabo- ... Another study showed b- adrenergic activation of.
     65  -26 2014 sep 22university of texas at dallasNSM : News and Events - The University of Texas at DallasAlumnus Becomes UT Dallas ' First Gates Cambridge Scholar · Two UT Dallas Undergraduate Researchers Earn National Science Foundation Awards.
     65  +23 2014 aug 11ongoing studies on tinnitusVagus Nerve Stimulation to Direct Neural Plasticity and Treat Support Basic Research to Find a Cure for Tinnitus ... Ongoing studies are testing the efficacy of brief episodes of VNS in improving sensory discrimination and ...
     68  ~ 2014 sep 03code as dataDifferentiating Code from Data in x86 Binaries* - The University of The classification of each segment as code or data is based on the min- ... code and static data within a section and uses variable-length, unaligned in- struction ...
     69  +32 2014 aug 09chinese stock exchangeWhat Determines Chinese Stock Returns? - The University of Texas Starting from ground zero in 1990, the Chinese stock market is one of the .... China established Shanghai and Shenzhen Stock Exchanges at the end of 1990.
     69  +32 2014 jul 27ut dallas mbaExecutive MBA Class Invests in Management School's Future - UT Graduates of the 2011 Executive MBA program departed UT Dallas with diplomas, but they left behind a lasting contribution—a new endowed ...
     70  ~ 2014 sep 23solidvaporCalculating the surface tension between a flat solid and a liquid: a cial tensions: the liquid/vapor surface tension, γlv, the solid/vapor surface tension, γsv, and the solid/liquid interfacial tension, γsl (see Fig. 1).
     71  ~ 2014 sep 18antagThe novel nicotinic receptor antagonist , N,N 0-dodecane-1,12-diyl mecamylamine, and the a7 antagonist , methyllycaconitine, also inhibited nicotine -evoked [3H] ... The nonselective nAChR antagonist , mecamylamine, reverses.
     71  ~ 2014 aug 20sample nlp cvCurriculum Vitae - The University of Texas at DallasAnalyzing Language Samples of Spanish-English Bilingual Children for the ... on Innovative Use of NLP for Educational Applications.
     71  ~ 2014 aug 15securely examine a websiteFinally some aspects of secure web services as well as directions for research and standards efforts ... also need to examine trust issues for the semantic web .
     71  -38 2014 jul 27school of management utdReserving and Printing Your UT Dallas Commencement TicketsLogin with your UTD Netid and password. 3. If you do not ... MGMT – Jindal School of Management ... EPPS - School of Economic, Political and Policy Science.
     71  -28 2014 jul 26aloha mind mathProgramming Summer Camps @ Aloha Mind Math CarrolltonProgramming Summer Camps @. Aloha Mind Math Carrollton. (1500 West Hebron Parkway, Suite 106, Carrollton TX 75010). Week. Grade. Levels. Camp Title.
     72  ~ 2014 sep 28least-squares regression lineLeast Squares . - The University of Texas at DallasIntroduction. The least square method—a very popular technique—is used to compute ... Functional fit example: regression ... the slope (b) of the regression line .
     72  ~ 2014 aug 16semantic web journalSemantic web -based social network access control - The University journal homepage: www.elsevier.com/locate/cose · computers & security ... following five important aspects of OSNs using semantic web ontologies: (1) user's.
     72  +29 2014 aug 09intrusion detection systemsFirms rely on security technologies such as firewalls and intrusion detection ... Key words: economics of IT security; intrusion detection systems (IDSs); ROC ...
     72  -36 2014 aug 02functional requiremnts formSometimes reliability requirements take the form : "The software shall have no more than X bugs/1K LOC". But how do we measure bugs at delivery time?
     73  +20 2014 aug 23what is semantic webstandards efforts for secure semantic web are provided. D 2004 Published by Elsevier B.V.. Keywords: Semantic web ; XML; RDF; Ontology; Security; Privacy. 1 .
     73  -7 2014 aug 04face detect cA signal detection model applied to the stimulus: Understanding common use of signal detection theory in this context, especially in the face re ... In a series of simulations, we first varied the stability of d' and C in face sampling.
     74  ~ 2014 aug 12mutual funds portfolioInvestigating Underperformance by Mutual Fund . Portfolios . Abstract. Underperformance by equity mutual funds has been widely documented by both the ...
     75  -3 2014 aug 11router load balancingInter-AS routing is accomplished by having neighboring ASms exchange ... By providing load balancing across inter-AS links, each inter-AS link has a greater.
     77  ~ 2014 aug 05fingerprint recognition algorithmFingerprint Matching Algorithm - The University of Texas at DallasNumerous algorithms have already been proposed to deal with fingerprint matching and recognition . Jain et all proposed a filterbank matching algorithm [3] that ...
     77  -24 2014 aug 01florida inmate populationthe effect of county-level prison population growth on crime ratesuses panel data for 58 Florida counties for 1980 to 2000 to reexamine the link between prison population growth and crime. Unlike previous studies, we find no  ...
     78  ~ 2014 aug 25futuremaking serious gamesSerious Games for Immersive Cultural Training: Creating a Living Networked serious games allow for multiplayer involvement, training
     81  ~ 2014 oct 01nfr tv scheduleMaximum number of radios, CD players, televisions that can be controlled is ten ( 10). Maximum number ..... Refine NFR Softgoals as many times until the meaning is clear. ➢ Refine the type .... Lawrence Chung. 5.29 Schedule a sequence 13.
     81  -47 2014 sep 29analog ic design with low dropout regulatorsA Transient-Enhanced Low -Quiescent Current Low - Dropout Abstract—This paper presents a low - dropout regulator ( LDO ) for portable applications ...... [12] B. Razavi, Design of Analog CMOS Integrated Circuits . New York:.
     82  -35 2014 aug 24cranial nerve disordersVascular compression of cranial nerves : - The University of Texas at microvascular decompression of cranial nerves , is reviewed and different hypotheses about its ... nerve can treat these disorders has naturally placed emphasis ...
     84  -32 2014 aug 02trees for privacyPrivacy -Preserving Decision Trees over Vertically Partitioned DataAdditional Key Words and Phrases: Decision tree classification, privacy . A preliminary version of this article appeared in the Proceedings of the 19th Annual IFIP ...
     84  -60 2014 jul 30functional requirements specificationWith Volere Requirements Specification Templates. Lawrence Chung. Why Non- Functional Requirements (NFRs)? • Consider a brochure from an automobile ...
     84  ~ 2014 jul 23load balancing ruter
     84  ~ 2014 jul 17motor cortex stimulationMotor pathways Somatotopic organization of the motor cortex INFORMATION FROM THE MOTOR CORTEX IS PROCESSED IN THE BASAL ... Transcranial magnetic stimulation of the motor cortex ; Transcranial electrical ...
     84  ~ 2014 jul 16network packet lossFor transmitting 3D progressive meshes over a network , packet loss loss when the meshes are transmitted over unreliable network channels. ... handle packet loss and balance high band load and time delay. In this paper, we  ...
     86  ~ 2014 sep 12quantifiableProtecting patient privacy by quantifiable control of disclosures in quantifiable tools to measure the potential for pri- vacy violation in data sets that may be disclosed to third parties [8]. A common concern is that sensi-.
     87  -23 2014 sep 19utd galaxy
     87  -32 2014 aug 03buy systems requirements templateWith Volere Requirements Specification Templates . Lawrence
     88  ~ 2014 jul 18uml design patternApplying UML and Patterns : An Introduction to Object-OrientedUML Notation, Models, and Methods: Multiple Perspectives 144. Lowering the ... Designing Use-Case Realizations with GoF Design Patterns 341. Adapter ...
     89  ~ 2014 aug 24load balalncer router
     90  ~ 2014 aug 17web migration diagramSemantic Web Implementation Scheme for National Vulnerability 5.1 Class hierarchy diagram . . . . . . . . . . . . . . . . . . . . . . . 13. 5.2 NVD CPE ... 5.3 Relational database to Semantic Web migration strategy . . . . . 23. C.1 Screenshot ...
     93  ~ 2014 aug 16information technology security companyThe increasing significance of information technology ( IT ) security to firms is ... a debate exists in the IT security community about the value of these technologies.
    1 2 of 2 pages    




    SEMrush