The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software development always faces unexpected events like changes in technology, platform, environment and market needs. Hence, uncertainty is a challenge to estimate project cost and schedule. To address the challenge, Event Chain Methodology (ECM) is a proposed approach in recent years to model risk events separately from activities. It reveals how events interact with each other and affect activities...
SaaS (Software as a Service) is a kind of application services which is provided via Internet, and customers can order and receive their peculiar types of software application services from the SaaS provider via the Internet according to their actual needs. This paper analysis current development of SaaS, by means of comparing SaaS model with traditional software model, a new engineering method is...
Realizing the software based on MIDI (Musical Instrument Digital Interface), with which MIDI instruments geographically distributed over Internet could be real-time played or synthetic performed. By access local MIDI input instruments to obtain signals, the software can help access local MIDI input instruments to implement local play. At the same time it can also obtain MIDI message in real-time and...
Practical training of software skill is important for software talents who urgently required by services outsourcing industry. We build a self-training system based on campus network which can provide services to those students or teachers to train themselves at the free time. The system is integrated on whSaaS together with TrustIE and an enterprise background. The portal shows resources integration...
Information security is more important in network days. A kind of adversary pattern based on probabilistic method to find out information security bug is raised. We discuss the software decomposition ways and how to use the adversary pattern, put forward an attack-proof theorem which shows a method of computing average number of attack times before a software system having concealed bugs becomes invalid...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.