The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Voice over Internet Protocol based systems become more and more part of business critical IT infrastructures. To increase the robustness of voice applications, automated security testing is required to detect security vulnerabilities in an efficient way. In this paper we present a fuzzer framework to detect security vulnerabilities in Voice over Internet Protocol Softphones, which implement Session...
Voice over IP (VoIP) is in wide use today, replacing phone lines in many scenarios. However, often, security isn't considered well enough, even though many security attacks are already known. More research on VoIP security is needed to enhance the level of security of VoIP systems and to show the implications of failing to take appropriate security measures. This paper presents an architecture and...
Maintenance of software is risky, potentially expensive - and inevitable. The main objective of this study is to examine the relationship of code change, referred to as maintenance effort, with source-level software metrics. This approach varies from the typical approach of evaluating software metrics against failure data and provides a different angle on the validation of software metrics. The goal...
Based on the definition of the European Commission, small enterprises can be defined as companies with less than 50 employees. Medium size companies are companies with less than 250 employees. For small and medium enterprises some research in regards to ERP selection criteria has been done. But this research did not distinguish further in the different behaviors that can be found during the ERP selection...
This paper describes the industrial experience in performing database reverse engineering on a large scale software reengineering project. The project in question deals with a highly heterogeneous in-house information system (IS) that has grown and evolved in numerous steps over the past three decades. This IS consists of a large number of loosely coupled single purpose systems with a database driven...
The paper discusses foundations and requirements for testing security robustness aspects in operational environments while adhering to defined protection values for data. It defines the problem space and special characteristics of security testing in large IT infrastructures. In this area there are different environments with varying characteristics, e.g., regarding confidentiality of data. Common...
The common use and variety of social software services has rapidly increased over the past years. The big success of established services like Facebook, Twitter or YouTube accelerates the transformation of the whole Web. Next generation services are characterized by strong social interaction and collaboration tools. Significantly affected by this movement, conventional commerce platforms and online...
In this paper we suggest the ceiling as a new physical surface for information visualization. To provide a design framework for application designers, we present the notion of 'information sky'. This concept is based on (1) the metaphor of the natural sky, (2) historical examples of ceiling art and (3) recent computing paradigms, including mediatecture, ubiquitous computing and ambient display. We...
Most developed countries get into an ldquointegration bottleneckrdquo when they try to establish a homogeneous e-Health network infrastructure providing high bandwidth for future uses of telemedicine as well as a common ground for effective interoperability. While in that case the challenge lies in the alignment existing infrastructures, in case of an emerging country we face the chance of building...
Within the project management community, the concept of project management maturity models has recently been receiving a lot of business and research attention. Although the structure of most models has now been well defined and is quite sophisticated, a lot of potential exists in extending the currently described best practices that are part of these models by additions for specific problem areas,...
Living and working have become more and more mobile. This may have negative impacts on the quality of relationships. Recent research work on emotional communication showed the potential of new technologies to improve intimate long-distance communication. The goal of this project is to suggest the ceiling as a projection space in order to create a continuous feeling of remote awareness. We conducted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.