Usage scenarios Sample Clauses

Usage scenarios. 38 4.2.1. Motivation and Goal 38 4.2.2. Approach 39 4.2.3. Usage Scenarios 39
AutoNDA by SimpleDocs
Usage scenarios. The usage scenarios of SAFE are manifold. Perhaps the most intuitive scenario for the app feature extraction is monitoring app features health, which is to continuously identify and measure which app features are mentioned in user comments, how frequent, and their associated sentiments. In addition, app store analytics approaches that classify user reviews into bug reports and feature requests or into informative and non-informative can benefit from SAFE. If, for example, a bug report gets enriched by the addressed app feature, the information can help developers to faster trace and solve the bug. Another scenario SAFE provides is the identification of the features delta and new insights. This can be done by identifying the differences between features described by developers and those described in the user reviews. If the delta is identified, one might want to extract further details by distinguishing between different reviews subpopulations into specific regions, stores, or channels like a forum or social media comments. Those could be recommended to stakeholder to turn them into actual requirements. In the paper, we address the different use of language. Developers write their text more formal and often try to emphasize the app features. Users on the other hand often write colloquial, use abbreviations, emoticons, and put strong emotions in their text. Developers and users might learn how to communicate better and bridge their “vocabulary gap”. On the other hand, developers can easily get the list of suggested features by users, which is a useful information for requirements identification, scoping, and prioritization. Current research classifies user reviews in e.g., feature requests and bug reports. But research often simply classifies the complete app review but does not filter the relevant information. With SAFE we might be able to also enable the clustering and aggregation of artifacts (such as comments) based on features.
Usage scenarios. The OpenReq trial partners have large corpora of user comments that provide an important resource for them. Our approach might be employed to a) structure software users’ comments; b) filter and synthesize rationale-backed comments for certain stakeholders, such as developers, analysts, or other users; c) improve communication among stakeholders. In particular, user rationale classifiers might be employed to structure user comments by highlighting polarizations and the broad spectrum of rationale and perspectives in their discussions. This would enable stakeholders to quickly survey the growing number of user feedback and to help users to easily provide feedback or to get involved into existing discussions. User rationale classifiers can be also used for visualization of pro- and contra- users’ stances which highlight contrasting user perceptions on, for example, non-functional requirements (such as pro and contra stances on software usability). For community managers, user rationale can be used to mark, filter, and synthesize potentially low/highly informative comments. Those, for instance, that have a low justification density can be filtered out. Furthermore, rationale-backed comments of special interest can be selected and explored—e.g., comments mentioning conclusive decisions on switching to a new software product. This allows stakeholders to inspect the best user rationale concepts which can be highlighted or searched for within the comments. User rationale classifiers can help in requirements prioritization and negotiation. For instance, an issue can be highly prioritized when it is frequently mentioned along with a reason for abandoning a software product. Alternatives can give insights on how software features are used together and which compatibility requirements should be considered. The broad spectrum of their justifications can help to get insights and to better understand users’ different perspectives (e.g., on usability). In particular, the whole communication among stakeholders can be improved—e.g., by reusing users’ arguments during requirements negotiation. Furthermore, users’ justifications can enrich existing requirements documentation and design decisions.
Usage scenarios. To create a capacity management usage scenario:
Usage scenarios. NCF supports two different types of messaging: - Publish-Subscribe. In this type of message pattern there is a publisher that creates messages and there are zero, one or more listeners that subscribe to those messages. The publisher is not aware of whom is listening. Note that it can be set up in such a way that only one listener will receive the messages.

Related to Usage scenarios

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Mail Order Catalog Warnings In the event that, the Settling Entity prints new catalogs and sells units of the Products via mail order through such catalogs to California consumers or through its customers, the Settling Entity shall provide a warning for each unit of such Product both on the label in accordance with subsection 2.4 above, and in the catalog in a manner that clearly associates the warning with the specific Product being purchased. Any warning provided in a mail order catalog shall be in the same type size or larger than other consumer information conveyed for such Product within the catalog and shall be located on the same display page of the item. The catalog warning may use the Short-Form Warning content described in subsection 2.3(b) if the language provided on the Product label also uses the Short-Form Warning.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Unbundled Channelization (Multiplexing) 5.7.1 To the extent NewPhone is purchasing DS1 or DS3 or STS-1 Dedicated Transport pursuant to this Agreement, Unbundled Channelization (UC) provides the optional multiplexing capability that will allow a DS1 (1.544 Mbps) or DS3 (44.736 Mbps) or STS-1 (51.84 Mbps) Network Elements to be multiplexed or channelized at a BellSouth central office. Channelization can be accomplished through the use of a multiplexer or a digital cross-connect system at the discretion of BellSouth. Once UC has been installed, NewPhone may request channel activation on a channelized facility and BellSouth shall connect the requested facilities via COCIs. The COCI must be compatible with the lower capacity facility and ordered with the lower capacity facility. This service is available as defined in NECA 4. 5.7.2 BellSouth shall make available the following channelization systems and interfaces: 5.7.2.1 DS1 Channelization System: channelizes a DS1 signal into a maximum of twenty- four (24)

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Local Circuit Switching Capability, including Tandem Switching Capability 4.1.3.1 Definition 4.1.3.2 Notwithstanding BellSouth’s general duty to unbundle local circuit switching, BellSouth shall not be required to unbundle local circuit switching for <<customer_name>> when <<customer_name>> serves end-users with four (4) or more voice-grade (DS-0) equivalents or lines in locations served by BellSouth’s local circuit switches, which are in the following MSAs: Atlanta, GA; Miami, FL; Orlando, FL; Ft. Lauderdale, FL; Charlotte-Gastonia-Rock Hill, NC; Greensboro-Winston Salem-High Point, NC; Nashville, TN; and New Orleans, LA, and BellSouth has provided non-discriminatory cost based access to the Enhanced Extended Link (EEL) throughout Density Zone 1 as determined by NECA Tariff No. 4 as in effect on January 1, 1999. 4.1.3.3 In the event that <<customer_name>> orders local circuit switching for a single end user account name at a single physical end user location with four (4) or more 2-wire voice-grade loops from a BellSouth central office in an MSA listed above, BellSouth shall charge <<customer_name>> the market based rate in Exhibit C for use of the local circuit switching functionality for the affected facilities. 4.1.3.4 A featureless port is one that has a line port, switching facilities, and an interoffice port. A featured port is a port that includes all features then capable or a number of then capable features specifically requested by <<customer_name>>. Any features that are not currently then capable but are technically feasible through the switch can be requested through the NBR/BFR process. 4.1.3.5 BellSouth will provide to <<customer_name>> customized routing of calls: (i) to a requested directory assistance services platform; (ii) to an operator services platform pursuant to Section 10 of Attachment 2; (iii) for <<customer_name>>’s PIC’ed toll traffic in a two (2) PIC environment to an alternative OS/DA platform designated by <<customer_name>>. <<customer_name>> customers may use the same dialing arrangements as BellSouth customers. 4.1.3.6 Remote Switching Module functionality is included in Switching Capability. The switching capabilities used will be based on the line side features they support. 4.1.3.7 Switching Capability will also be capable of routing local, intraLATA, interLATA, and calls to international customer’s preferred carrier; call features (e.g. call forwarding) and Centrex capabilities. 4.1.3.8 Where required to do so in order to comply with an effective Commission order, BellSouth will provide to <<customer_name>> purchasing local BellSouth switching and reselling BellSouth local exchange service under Attachment 1, selective routing of calls to a requested directory assistance services platform or operator services platform. <<customer_name>> customers may use the same dialing arrangements as BellSouth customers, but obtain a <<customer_name>> branded service.

  • System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the NYISO OATT.

  • Start-Up and Synchronization Consistent with the mutually acceptable procedures of the Developer and Connecting Transmission Owner, the Developer is responsible for the proper synchronization of the Large Generating Facility to the New York State Transmission System in accordance with NYISO and Connecting Transmission Owner procedures and requirements.

  • Escorting Visitors Visitors to areas where PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY is 5 contained shall be escorted and such PHI shall be kept out of sight while visitors are in the area.

  • COVID-19 Vaccine Passports Pursuant to Texas Health and Safety Code, Section 161.0085(c), Contractor certifies that it does not require its customers to provide any documentation certifying the customer’s COVID-19 vaccination or post-transmission recovery on entry to, to gain access to, or to receive service from the Contractor’s business. Contractor acknowledges that such a vaccine or recovery requirement would make Contractor ineligible for a state-funded contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!