The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since its founding in 1989, the Studio-based Master of Software Engineering (MSE) Program at Carnegie Mellon University (CMU) has been a trailblazer in advancing the practice of masters-level professional software engineering education. From its inception, the program was designed around a comprehensive development project, the Studio. The Studio provides students with a team-based, mentored, multi-semester...
Personnel operating in tactical environments heavily rely on information sharing to perform their missions. Solutions deployed in these environments need to focus on reliability and performance, in addition to usability to work as unattended as possible due to the often chaotic nature of operations. In this paper we propose a solution for delay-tolerant data sharing, in particular file sharing, using...
Tactical cloudlets are forward-deployed, discoverable, virtual-machine-based servers that can be hosted on vehicles or other platforms to provide a computation offload and data staging infrastructure for mobile devices in the field. Because of the mobility of cloudlets in the field, as well as dynamic missions, a mobile user of a cloudlet might need to migrate active capabilities (computation and...
The context of a software system comprises the knowledge that architects need to have about the environment in which a system is expected to operate. Contextual knowledge, however, is often unknown or overlooked. This results in software architects designing systems based on assumptions that are largely unfounded and can potentially lead to system failures. To address this problem, this paper presents...
The 2009 Symposium on Component-Based Software Engineering (CBSE 2009) was the 12thin a series ofsuccessful eventsthat havegrowninto the main forum for industrial and academic experts to discuss component technology. Component-based software engineering (CBSE) has emerged as the under- ing technology for the assembly of ?exible software systems. In essence, CBSE is about composing computational building...
When establishing communication between two nodes, identification, authentication, and authorization provide the information and assurances necessary for the nodes to trust each other. A common solution for establishing trust between two nodes is to create and share credentials in advance, and then use a third-party, online trusted authority to validate the credentials of the nodes. However, the characteristics...
Perhaps the most common question asked by organizations new to constructing COTS-based systems is how to choose the right product. In particular, they want to know how, starting from system requirements, an efficient and effective set of criteria for COTS selection can be developed. This paper focuses on recommendations and techniques for transforming a set of requirements into a set of product evaluation...
Migration of legacy systems to service-oriented environments has been achieved within a number of domains, including banking, insurance, manufacturing, and development tools, showing that the promise is beginning to be fulfilled. While migration to Service-Oriented Architecture (SOA) environments can have significant value, any specific migration requires a concrete analysis of the feasibility, risk...
From an analysis and design perspective, developers of COTS-based systems face many challenges driven by built-in product paradigms as well as the volatility of the marketplace. One way to deal with these challenges is to adopt a spiral development process that allows for concurrent discovery and negotiation of user needs and business processes, applicable technology and components, the target architecture,...
The increased adoption and support for XML, as well as its clarity, extensibility, platform independence, easy validation, and support for internalization have made it an option for COTS product integration. This paper presents options for COTS product integration using XML, an XML Integration Architecture, and a real case study of how a set of COTS products were successfully integrated using the...
Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. While there is a large amount of research in this area, the reality is that there are not many deployed, operational cyber-foraging systems. As these systems become more prevalent due to their...
Cyber-foraging is a technique for dynamically augmenting the computing power of resource-limited mobile devices by opportunistically exploiting nearby fixed computing infrastructure. Cloudlet-based cyber-foraging relies on discoverable, generic, forward-deployed servers located in single-hop proximity of mobile devices. In particular, we define tactical cloudlets as the infrastructure to support computation...
Energy efficiency is a primary concern for the ICTsector. In particular, the widespread adoption of cloud computing technologies has drawn attention to the massive energy consumption of data centers. Although hardware constantly improves with respect to energy efficiency, this should also be a main concern for software. In previous work we analyzed the literature and elicited a set of techniques for...
Energy efficiency is a primary concern for the ICT sector. In particular, the widespread adoption of cloud computing technologies has drawn attention to the massive energy consumption of data centers. Although hardware constantly improves with respect to energy efficiency, this should also be a main concern for software. In previous work we analyzed the literature and elicited a set of techniques...
Soldiers, first responders and other personnel operating at the tactical edge increasingly make use of mobile devices to help with tasks such as face recognition, language translation, decision-making and mission planning. Tactical-edge environments are characterized by limited resources, dynamic context, high stress and poor connectivity. This paper focuses on three architecture patterns that address...
There are many successful case studies of SOA adoption, mainly in commercial enterprises. Part of what Gartner terms the “period of enlightenment” related to hype cycles for emerging technology is the move from SOA as simply a set of technologies to service-orientation as a mind-set for architecting, implementing, and deploying services that add value to an organization. Regardless of this positive...
Welcome to the 1st International Workshop on International Workshop on the Engineering of Mobile-Enabled Systems (MOBS 2013), held in San Francisco, CA on May 25th 2013, in conjunction with the 35th International Conference on Software Engineering (ICSE 2013).
PESOS 2013 is a forum that brings together software engineering researchers from academia and industry, as well as practitioners working in the areas of service-oriented systems to discuss research challenges, recent developments, novel application scenarios, as well as methods, techniques, experiences, and tools to support engineering, evolution and adaptation of service-oriented systems. The special...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.