Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

99 results about "Requirement document" patented technology

Requirements documents usually include user, system, and interface requirements; other classes of requirements are included as needed. User requirements are written from the point of view of end users, and are generally expressed in narrative form: The user must be able to change the color scheme of the welcome screen.

Defect prediction method and system based on requirement change

The invention belongs to the computer security field and specifically relates to a defect prediction method and a system based on requirement change. The invention uses software project history defect data and a requirement document to construct a correlation set of requirements and defects, a requirement classifier classifies history requirements according to the correlated history defect attributive classification, calculates the requirement characteristic value of a requirement item and establishes an SVM classifier; when new requirement change occurs, a requirement characteristic extractor extracts the requirement characteristic of the requirement, and a defect attribute predictor finds the requirement classification to which the predictor is belonged in the SVM classifier according to the information of the requirement characteristic, consequently obtains the related defect attribute of the classification and completes the defect prediction. The invention can automatically add or delete the requirement characteristic classification to be extracted and modify the weights of these characteristics in a classification model so as to lead the obtained prediction model to be more accurate and improve the prediction accuracy. The system can automatically complete prediction with directviewing prediction result.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Script-based method for implementing service configuration

The invention relates to a script-based method for implementing service configuration, comprising the following steps: carrying out grammatical definition on scripts; analyzing the scripts; analyzing service configuration data; firstly analyzing requirement documents for each service configuration and allocating fixed service configuration command codes; and compiling the script definition files describing the service configuration. Analysis of the scripts refers to reading the script definition files corresponding to the service configuration and writing the scripts in line with the grammatical definition into corresponding objects in an internal memory, the analysis is terminated if scripts not in line with the grammatical definition appear; analysis of the service configuration data requires the following steps: analyzing byte stream data acquired from the device into service configuration item data according to the definitions of the service configuration scripts and carrying out accuracy verification on the service configuration item data. The method in the invention is based on XML (extensive makeup language) script language and defines the service configurations by descriptions, thus simplifying complexity in implementing service configurations and ensuring accuracy in service configurations.
Owner:FENGHUO COMM SCI & TECH CO LTD

P2P (Peer-to-Peer) mode based PSRD (Program Support Requirements Document) universal service resource discovery method

InactiveCN101917475ADoes not increase in lengthComputational work simplifiedTransmissionHash functionPeering
The invention relates to a P2P (Peer-to-Peer) mode based PSRD (Program Support Requirements Document) universal service resource discovery method, comprising the following steps of: carrying out hash operation on targets (names or descriptions of resources and IP addresses of nodes) through hash functions, wherein the result of the hash operation is an m-digit binary identifier ID which is respectively recorded as IDk=Hash (the names or the descriptions of the resources) and IDn=Hash (IP), and the value range of the IDn is [0, 2m-1]; arraying the IDn from 0 to 2m-1 into a circle according to a sequence from large to small so as to form distributed structuring network node rings, wherein each structuring network node ring stores a subsequent node; mapping a given target to a certain peering point of a network, wherein the peering point stores a (IDk, Value) pair, the IDk is a hash value of a resource to be searched, and the Value is the actual storage position of the resource to be searched; when searching the resource, directly inquiring in a local pointer gauge, and directly spanning a plurality of nodes to reach a destination node or a node near the destination node till the resource is found or corresponding error handling is carried out.
Owner:TIANJIN UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products