FLM-2A: Towards Automated HCI Modeling of Android Applications Based on a Modified Version of the Keystroke Level Model

Author(s):  
Savvas Theofilou ◽  
Nikolas Vardas ◽  
Christos Katsanos
Author(s):  
J. Allègre ◽  
P. Lefebvre ◽  
J. Camassel ◽  
B. Beaumont ◽  
Pierre Gibart

Time-resolved photoluminescence spectra have been recorded on three GaN epitaxial layers of thickness 2.5 μm, 7 μm and 16 μm, at various temperatures ranging from 8K to 300K. The layers were deposited by MOVPE on (0001) sapphire substrates with standard AlN buffer layers. To achieve good homogeneities, the growth was in-situ monitored by laser reflectometry. All GaN layers showed sharp excitonic peaks in cw PL and three excitonic contributions were seen by reflectivity. The recombination dynamics of excitons depends strongly upon the layer thickness. For the thinnest layer, exponential decays with τ ~ 35 ps have been measured for both XA and XB free excitons. For the thickest layer, the decay becomes biexponential with τ1 ~ 80 ps and τ2 ~ 250 ps. These values are preserved up to room temperature. By solving coupled rate equations in a four-level model, this evolution is interpreted in terms of the reduction of density of both shallow impurities and deep traps, versus layer thickness, roughly following a L−1 law.


2013 ◽  
Vol 61 (3) ◽  
pp. 569-579 ◽  
Author(s):  
A. Poniszewska-Marańda

Abstract Nowadays, the growth and complexity of functionalities of current information systems, especially dynamic, distributed and heterogeneous information systems, makes the design and creation of such systems a difficult task and at the same time, strategic for businesses. A very important stage of data protection in an information system is the creation of a high level model, independent of the software, satisfying the needs of system protection and security. The process of role engineering, i.e. the identification of roles and setting up in an organization is a complex task. The paper presents the modeling and design stages in the process of role engineering in the aspect of security schema development for information systems, in particular for dynamic, distributed information systems, based on the role concept and the usage concept. Such a schema is created first of all during the design phase of a system. Two actors should cooperate with each other in this creation process, the application developer and the security administrator, to determine the minimal set of user’s roles in agreement with the security constraints that guarantee the global security coherence of the system.


Author(s):  
Eunyoung Kim ◽  
◽  
Soonbum Kwon ◽  
Meejung Chin ◽  
◽  
...  

Author(s):  
Alan Baron ◽  
John Hassard ◽  
Fiona Cheetham ◽  
Sudi Sharifi

The final chapter brings together a series of conclusions based on the preceding study of workplace attitudes, behaviour, and experiences within an English hospice. Initially it examines the nature of relationships between the three concepts that form the analytical core of this study—culture, identity, and image. This includes a wide-ranging critical review of these concepts in relation to the relevant fields of literature in management and organization theory. Subsequently a number of limitations are considered with regard to the use of Schein’s well-known three-level model of culture as a framework for guiding empirical research. The chapter ends by discussing some metaphorical issues relevant to the study and specifically makes proposals for perceiving organization culture as something that is philosophically fluid, uncertain, and in flux.


Sign in / Sign up

Export Citation Format

Share Document