In 2009, behind-the-scenes work was undertaken to harmonize the way we proj- ect-manage SAP implementations. The result is the new ASAP Methodology for Implementation 7, which was launched in February 2010. The new ASAP meth- odology brings together the previous ASAP methodology, Business Intelligence Solution Accelerator (BISA) methodology, value delivery principles, business pro- cess management methodology, and service-oriented architecture methodology.
To read the full-text of this research, you can request a copy directly from the authors.
Request full-text PDF
ResearchGate has not been able to resolve any citations for this publication.
ResearchGate has not been able to resolve any references for this publication.
The paper presents the system of environmental management according to the principles of the international standard ISO 14001. In addition to describing the standard and its importance, the authors dwell on the procedure and application of methodology for its implementation in real business systems. Key words: System of environmental management, standard ISO 14001; environmental aspects, impact
... [Show full abstract] on the environment. Read more January 2012
This paper introduces dynamic taint analysis and the architecture of TEMU, and then, analyzes and summarizes the procedure and key functions of disk taint analysis, furthermore, this paper gives a plugin about disk taint and gives experiment results which verify the feasibility of using TEMU to implement disk taint analysis.
Read more July 2000 · Computers & Chemical Engineering
This paper describes the application of a method to carry out a formally correct implementation of a logic controller for an event-driven process system. Given a control architecture and the functional specification of each controller module, formal proofs are established and discharged to demonstrate the logical equivalence between the functional specification and the code implementation of
... [Show full abstract] logic controllers. The methodology is illustrated with an example. Read more April 2013 · Journal of Vibration and Acoustics
A preliminary exploration is carried out of the utility of the Groebner basis method for implementing the harmonic balance analysis of nonlinear steady state vibrations. The method is found to be worthy of further investigation.
Read more December 2015
In this paper, the implementation of an X band Tx-to-Rx leakage cancellation network to achieve bandwidth improvement and high isolation performance is presented. The circuit architecture and leakage cancellation theory are described in detail. The operation principle of leakage cancellation network is based on phase cancellation technique. This architecture is made up of three two-section
... [Show full abstract] Wilkinson power dividers and a hybrid-ring, which miniaturizes the leakage cancellation network, compared with conventional ferrite circulators. The proposed architecture has been completely implemented and measurements have been carried out for verification. The simulated bandwidth is presented with 83% fractional bandwidth above 30dB isolation, and the corresponding measured fractional bandwidth is 31.2%. Meanwhile, the simulated bandwidth is presented with 16% fractional bandwidth above 40dB isolation, and the corresponding measured fractional bandwidth is 6.4% The measured peak isolation is 46.2dB@9.361GHz. Although the measured fractional bandwidth is decreased, the high isolation bandwidth between Tx port and Rx port based on the circuit architecture proposed in this paper, is still enhanced, especially compared with other conventional high isolation networks. Read more April 2009
In this paper, the remote operating system detection is discussed and some detection methods which contain active detection and passive detection are studied and compared. The implement of remote operating system detection based on Libnet is provided and the architecture of total system is presented. The principle of Libnet is studied and it can improve detection performance and scalability. The
... [Show full abstract] detection that combines TCP/IP fingerprinting with ICMP detection is used in the scanning system and it can get high accuracy of remote operating system detection. Read more February 1993
Instruction set architecture, processor implementation, compiler, performance, and cost all influence the design of a superscalar implementation of a pipelined processor. The authors focus on processor implementation and performance by presenting a methodology to explore the superscalar implementation design space. After the parameters in the design space have been identified, this methodology is
... [Show full abstract] applied to the Intel 80960CA instruction set architecture and compiler to produce performance curves to obtain performance differences of various implementation features. For a given performance range, regions of the design space which do not satisfy the performance requirements are discarded, and regions of the design space which do satisfy the performance requirements need to be examined further. The performance curves serve as a guide to reducing the design space. Read more Conference Paper
Full-text available
November 2009
This paper presents an iterative technique to accurately reverse engineer models of the behaviour of software systems. A key
novelty of the approach is the fact that it uses model-based testing to refine the hypothesised model. The process can in
principle be entirely automated, and only requires a very small amount of manually generated information to begin with. We
have implemented the
... [Show full abstract] technique for use in the development of Erlang systems and describe both the methodology as well as our
implementation. View full-text November 1994 · IEEE Micro
Not Available
Read more Article
Full-text available
October 2012 · Serbian Journal of Electrical Engineering
In this paper, the design of a Finite Impulse Response (FIR) filter based on the residue number system (RNS) is presented. We chose to implement it in the (RNS), because the RNS offers high speed and low power dissipation. This architecture is based on the single RNS multiplier-accumulator (MAC) unit. The three moduli set 1 {2 ,2 ,2 1} n n n + − , which avoids 2 1 n + modulus, is used to design
... [Show full abstract] FIR filter. A numerical example illustrates the principles of residue encoding, residue arithmetic, and residue decoding for FIR filters. View full-text January 1979 · Metallography
A description is given of a methodology for design of engineering software which is simple to use and which yields programs that are easy to code, implement, test and modify. The methodology consists of definitions, design principles and design guidelines. It has been tested in many practical software development projects.
Read more Last Updated: 05 Jul 2022
Looking for the full-text? You can request the full-text of this chapter directly from the authors on ResearchGate.
Request full-text