The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the flaws in wireless networks such as instable transmission and bandwidth fluctuation, the TCP conducts live streaming better than the UDP in a wireless network. In the TCP streaming, a sender has to select which data is to be aborted or which one to be passed, when a given bandwidth is not enough to process the entire stream. Faced with the difficulty, the data marginal to video quality should...
Battery exhaustion attack is a ldquodenial of servicerdquo attack on mobile devices, causing more battery discharge than normally necessary. The excessive discharge arises out of the limitation in battery capacity. Researches have been conducted to discover the cause of the abnormal usage of handset battery by employing power estimation techniques. It is also important, however, to automatically respond...
The growth in the size of networks and the number of vulnerabilities is increasingly challenging to manage network security. Especially, difficult to manage are multi-step attacks which are attacks using one or more vulnerabilities as stepping stones. Attack graphs are widely used for analyzing multi-step attacks. However, since these graphs had large sizes, it was too expensive to work with. In this...
Over the past few years, a considerable number of studies have been made on the Return on Security Investment (ROSI) in connection with security policy. However, it is necessary to quantity types of projected damages, cyber threats, security safeguards and ROSI, since the size of information system and its investment factors are growing continuously. Accordingly, in this paper, we propose a way of...
For rapid and good quality software development, many researchers are actively studying the area of software process improvement. The personal software process is a popular process with individual software engineers, which was proposed by SEI in Carnegie Mellon University. In this paper, we present the lessons learned from participating in a PSP training program and apply a cost-benefit analysis approach...
In this paper we propose Rank-Based Broadcast (RBB) algorithm using High Order Markov Chain (HOMC) with weight values in mobile p2p ad-hoc networks (MOPNET) for ubiquitous. RBB using HOMC focuses on the first step to improve the performance of Ubiquitous broadcast computing. The proposed model is characterized by its ability to optimize the receiving query and sending report for broadcasting with...
Recognizing links between offender patterns is one of the most crucial skills of an investigator. Early recognition of similar patterns can lead to focusing resources, improving clearance rates, and ultimately saving lives in terms of digital forensics. In this paper we propose a forensics methodology using Markov chain during a given time interval for tracking and predicting the degree of criminal...
Value-innovative requirements engineering guides software development organizations in creating new markets based on new product values for potential customers. Most requirements-engineering techniques and practices focus on eliciting requirements from existing, known customers. However, these techniques and practices aren't sufficient for surviving in current highly competitive markets. In particular,...
In ubiquitous computing environments, smart home system is the one of major applications that offers appropriate service reacting user's specific activity intelligently. Therefore, in contrast to a traditional system, the intelligent service device in smart home system needs various user data and the information about the environment. However, it is difficult for the device to obtain the information...
The user requirements of many web-based services are dynamically and continuously changing even during the service time itself. For that reason, web service companies always keep trying to satisfy users' needs from the market. Requirements elicitation, among the processes in requirements engineering, is a process requiring high costs and time. Thus, a company planning to conduct the process wants...
Prevention is normally recognized as one of the best defense strategy against malicious hackers or attackers. The desire of deploying better prevention mechanisms has motivated many security researchers and practitioners, who are studies threat trend analysis models. However, threat trend is not directly revealed from the time-series data because the trend is implicit in its nature. Besides, traditional...
In this paper we show how Theory-W and the WinWin requirements negotiation approach have influenced software engineering education in a number of institutions worldwide. After a short summary of Theory-W and the WinWin negotiation model, processes, and tools the paper discusses how students can benefit from WinWin in their software engineering education. We explore different options for teaching the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.