Usage scenarios Clause Samples

The "Usage Scenarios" clause defines the specific situations or contexts in which a product, service, or agreement may be used. It typically outlines permitted and prohibited uses, providing clear examples or categories to guide users on acceptable applications. By specifying these scenarios, the clause helps prevent misuse, ensures compliance with intended purposes, and reduces ambiguity about how the subject of the agreement should be utilized.
Usage scenarios. NCF supports two different types of messaging: - Publish-Subscribe. In this type of message pattern there is a publisher that creates messages and there are zero, one or more listeners that subscribe to those messages. The publisher is not aware of whom is listening. Note that it can be set up in such a way that only one listener will receive the messages.
Usage scenarios. 38 4.2.1. Motivation and Goal 38 4.2.2. Approach 39 4.2.3. Usage Scenarios 39
Usage scenarios. To create a capacity management usage scenario:
Usage scenarios. The OpenReq trial partners have large corpora of user comments that provide an important resource for them. Our approach might be employed to a) structure software users’ comments; b) filter and synthesize rationale-backed comments for certain stakeholders, such as developers, analysts, or other users; c) improve communication among stakeholders. In particular, user rationale classifiers might be employed to structure user comments by highlighting polarizations and the broad spectrum of rationale and perspectives in their discussions. This would enable stakeholders to quickly survey the growing number of user feedback and to help users to easily provide feedback or to get involved into existing discussions. User rationale classifiers can be also used for visualization of pro- and contra- users’ stances which highlight contrasting user perceptions on, for example, non-functional requirements (such as pro and contra stances on software usability). For community managers, user rationale can be used to mark, filter, and synthesize potentially low/highly informative comments. Those, for instance, that have a low justification density can be filtered out. Furthermore, rationale-backed comments of special interest can be selected and explored—e.g., comments mentioning conclusive decisions on switching to a new software product. This allows stakeholders to inspect the best user rationale concepts which can be highlighted or searched for within the comments. User rationale classifiers can help in requirements prioritization and negotiation. For instance, an issue can be highly prioritized when it is frequently mentioned along with a reason for abandoning a software product. Alternatives can give insights on how software features are used together and which compatibility requirements should be considered. The broad spectrum of their justifications can help to get insights and to better understand users’ different perspectives (e.g., on usability). In particular, the whole communication among stakeholders can be improved—e.g., by reusing users’ arguments during requirements negotiation. Furthermore, users’ justifications can enrich existing requirements documentation and design decisions.
Usage scenarios. The usage scenarios of SAFE are manifold. Perhaps the most intuitive scenario for the app feature extraction is monitoring app features health, which is to continuously identify and measure which app features are mentioned in user comments, how frequent, and their associated sentiments. In addition, app store analytics approaches that classify user reviews into bug reports and feature requests or into informative and non-informative can benefit from SAFE. If, for example, a bug report gets enriched by the addressed app feature, the information can help developers to faster trace and solve the bug. Another scenario SAFE provides is the identification of the features delta and new insights. This can be done by identifying the differences between features described by developers and those described in the user reviews. If the delta is identified, one might want to extract further details by distinguishing between different reviews subpopulations into specific regions, stores, or channels like a forum or social media comments. Those could be recommended to stakeholder to turn them into actual requirements. In the paper, we address the different use of language. Developers write their text more formal and often try to emphasize the app features. Users on the other hand often write colloquial, use abbreviations, emoticons, and put strong emotions in their text. Developers and users might learn how to communicate better and bridge their “vocabulary gap”. On the other hand, developers can easily get the list of suggested features by users, which is a useful information for requirements identification, scoping, and prioritization. Current research classifies user reviews in e.g., feature requests and bug reports. But research often simply classifies the complete app review but does not filter the relevant information. With SAFE we might be able to also enable the clustering and aggregation of artifacts (such as comments) based on features.

Related to Usage scenarios

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Message Screening 7.4.4.4.1 BellSouth shall set message screening parameters so as to accept valid messages from CCI local or tandem switching systems destined to any signaling point within BellSouth’s SS7 network where the CCI switching system has a valid signaling relationship. 7.4.4.4.2 BellSouth shall set message screening parameters so as to pass valid messages from CCI local or tandem switching systems destined to any signaling point or network accessed through BellSouth’s SS7 network where the CCI switching system has a valid signaling relationship. 7.4.4.4.3 BellSouth shall set message screening parameters so as to accept and pass/send valid messages destined to and from CCI from any signaling point or network interconnected through BellSouth’s SS7 network where the CCI SCP has a valid signaling relationship.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Geometric visibility The visibility of the illuminating surface, including its visibility in areas which do not appear to be illuminated in the direction of observation considered, shall be ensured within a divergent space defined by generating lines based on the perimeter of the illuminating surface and forming an angle of not less than 5° with the axis of reference of the headlamp.

  • Unbundled Channelization (Multiplexing) 5.7.1 To the extent NewPhone is purchasing DS1 or DS3 or STS-1 Dedicated Transport pursuant to this Agreement, Unbundled Channelization (UC) provides the optional multiplexing capability that will allow a DS1 (1.544 Mbps) or DS3 (44.736 Mbps) or STS-1 (51.84 Mbps) Network Elements to be multiplexed or channelized at a BellSouth central office. Channelization can be accomplished through the use of a multiplexer or a digital cross-connect system at the discretion of BellSouth. Once UC has been installed, NewPhone may request channel activation on a channelized facility and BellSouth shall connect the requested facilities via COCIs. The COCI must be compatible with the lower capacity facility and ordered with the lower capacity facility. This service is available as defined in NECA 4. 5.7.2 BellSouth shall make available the following channelization systems and interfaces: 5.7.2.1 DS1 Channelization System: channelizes a DS1 signal into a maximum of twenty- four (24)