Evaluation strategy and instruments Sample Clauses

Evaluation strategy and instruments. In general, the research follows the iterative and incremental paradigm of Design Science. Here, incremental means that a relatively simple solution is developed at first that is then extended or adapted based on the experiences gained resulting in cyclic execution of phases in which solution is provided with more suitable features and evaluations proceeds towards more realistic settings. The phases are roughly based on Xxxxxxx et al (2007), in which the subsequent iterations consist of:
AutoNDA by SimpleDocs
Evaluation strategy and instruments. Several case studies are used to validate the results of OpenReq: ● First, the relevant OpenReq services are tested independently on data of previous (completed) bid projects in a lab environment by the Siemens OpenReq team ● Such tests are implemented as batch jobs and can easily be repeated for new versions of the OpenReq services ● Later, field studies are conducted by the requirements administrator and optionally the stakeholders, based on a proof-of-concept integration of the OpenReq services in the DOORS environment ● The RM process for a completed bid project is repeated using that integration ● Its results are compared with the original results ● Its usability is evaluated based on a questionnaire We use the scientific methods described in section 2, such as quasi-experiments, field studies, usability studies (incl. bid-specific customization), etc. The details are specified in section 4.3.
Evaluation strategy and instruments. OpenReq can be seen as a kind of black-box with 2 explicit inputs: ● Social network data ● Example of requirements And an implicit input: customer usage from antennas. The OpenReq features will be verified at different level through the score model approach. The first level will check the tags within the social network data, the second will check the correspondence between social network data (tags) and tag/basic concept of requirements, the third level will check the analysis of customer usage and the correspondence with phone network capabilities requirement, the last will check the requirements prioritization.

Related to Evaluation strategy and instruments

  • Background and Instructions History of Agreement- This agreement has been drafted by the Texas Student Privacy Alliance (TXSPA). The Alliance is a collaborative group of Texas school districts that share common concerns around student and data privacy. The Texas K-12 CTO Council is the organization that sponsors the TXSPAand the TXSPA is the Texas affiliate of the national Student Data Privacy Consortium (SDPC). The SDPC works with other state alliances by helping establish common data privacy agreements unique to the jurisdiction of each state. This Texas agreement was drafted specifically for K-12 education institutions and included broad stakeholder input from Texas school districts, statewide associations such as TASB, TASA, and TASBO, and the Texas Education Agency. The purpose of this agreement is to set standards of both practice and expectations around data privacy such that all parties involved have a common understanding of expectations. This agreement also provides a mechanism (Exhibit E- General Offer of Terms) that would allow an Operator to extend the ability of other Texas school districts to be covered under the terms of the agreement should an Operator sign Exhibit E. This mechanism is intended to create efficiencies for both Operators and LEAs and generally enhance privacy practices and expectations for K-12 institutions and for companies providing services to K-12 institutions.

  • Dissemination of Research Findings and Acknowledgement of Controlled-Access Datasets Subject to the NIH GDS Policy It is NIH’s intent to promote the dissemination of research findings from use of controlled-access dataset(s) subject to the NIH GDS Policy as widely as possible through scientific publication or other appropriate public dissemination mechanisms. Approved Users are strongly encouraged to publish their results in peer-reviewed journals and to present research findings at scientific meetings.

  • Reporting Unauthorized Transactions You should notify us immediately if you believe your Access Codes or any Access Devices have been lost or stolen, that someone has gained access to the Security Procedure, or that someone has transferred or may transfer money from your Account without your permission or if you suspect any fraudulent activity on your Account. To notify us, call us at the number provided in Section 9.6 between 8:00 a.m. to 4:30 p.m. Central Time during a Business Day.

  • TECHNOLOGY/KNOWLEDGE TRANSFER ACTIVITIES The goal of this task is to develop a plan to make the knowledge gained, experimental results, and lessons learned available to the public and key decision makers. The Recipient shall: • Prepare an Initial Fact Sheet at start of the project that describes the project. Use the format provided by the CAM. • Prepare a Final Project Fact Sheet at the project’s conclusion that discusses results. Use the format provided by the CAM. • Prepare a Technology/Knowledge Transfer Plan that includes: o An explanation of how the knowledge gained from the project will be made available to the public, including the targeted market sector and potential outreach to end users, utilities, regulatory agencies, and others.

  • Reporting and Inspection If you use the Software and/or Services outside the Vendor's Cloud, you are required to purchase Subscription Services in a quantity equal to the total number of Units of that Red Hat Product (including variants or components thereof) that you deploy, install, use or execute as set forth in Appendix 1. You will promptly notify Red Hat and Red Hat will invoice you for each Unit on a pro-rata basis and you will pay for such Units within thirty (30) days of the date of invoice or as otherwise set forth in the Agreement. Failure to comply with this Section 4 will be considered a material breach of this Agreement, and will entitle Red Hat and/or Vendor to suspend the Services or terminate this Agreement.

  • Curriculum and Instruction 7.1 The Board and the Association recognize the importance of adequate teaching reference materials and adequate and appropriate instructional materials and equipment in maintaining a high level of professional performance in the educational process.

  • OBLIGATIONS AND ACTIVITIES OF CONTRACTOR AS BUSINESS ASSOCIATE 1. Contractor agrees not to use or further disclose PHI County discloses to Contractor other than as permitted or required by this Business Associate Contract or as required by law.

  • Course Curriculum, Instruction, and Grading X. Xxxx College courses offered as dual credit, regardless of where they are taught, follow the same syllabus, course outline, textbook, grading method, and other academic policies as the courses outlined in the Hill College catalog.

  • Exception Where Databases Contain Sufficient Information A Reporting Financial Institution is not required to perform the paper record search described in subparagraph D.2. of this section if the Reporting Financial Institution’s electronically searchable information includes the following:

  • Reporting Violations a) When appropriate, faculty members will submit timely written communication to their immediate supervisor any condition that comes to their attention that may, in their judgment, pose a threat to the health or safety of any person associated with the District.

Time is Money Join Law Insider Premium to draft better contracts faster.