The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Building up effective teams over a distance is achallenging but common problem in global softwareengineering. We propose an approach to help build up teamsthrough collaborative online drawing. Our goal is to evaluatehow drawing, as one activity that can facilitate expression ofpersonal affective status, can benefit distributed teams. Preliminary results indicate positive effects of collaborativeonline...
The fast path, as the cache of exact-match rules in the slow path, is applied in software-based OpenFlow switches to improve the forwarding performance. A microflow in the fast path is the specification of its corresponding rules in the slow path, i.e., every field is explicit in a microflow. A rule can generate multiple microflows in the fast path, and a microflow can be generated from multiple rules...
Context: In order to gain competitive advantages in the global market, many software outsourcing organizations in non- English speaking countries adopted the use of English as the lingua franca mandate in their organizations. Goal: We sought to assess the influence of the English lingua franca mandate on the teamwork in software outsourcing vendors empirically. Approach: We conducted a field experiment...
With network getting progressed, it is very crucial for us to guard the information that we have. One of these methods is the honeypot which is also a very powerful component for security analysts to collect malicious data for a long time. We need to let attackers intrude into a honeypot, so that we can analyze the malicious data we get, and find a method to prevent related attacks. Because it is...
Online programming forums enable programming knowledge sharing across organizational boundaries. Understanding how questions are asked and answered in forums will not only help developer to access the knowledge they need fast but bring important design implications. We report a study of Q&A process on MSDN's visual C# general forum. This study is content oriented instead of conventional social...
Up-conversion module is the core of transmitter, which plays a critical role in millimeter wave communication, radar, guidance and electronic warfare. This paper introduces the design and measurement of a W-band up-conversion module. W-band LO signal is obtained by frequency multiplying, then through up-conversion method, an X-band signal is converted to W-band. By fabricating, assembling and measuring,...
Power analysis attack is an efficient way to retrieve the sensitive information from the hardware implementation of modern cryptographic algorithms, such as Advance Encryption Standard (AES). First-order masking could defend against Differential Power Analysis (DPA) attack without extra hardware support. However, it is vulnerable to Higher-Order Differential Power Analysis (HODPA) attack. HODPA attack...
Collaboration tools support global software engineering (GSE) by providing relevant information and work context to developers, essentially seeking to provide a local context for developers working globally. Although many collaborative tools have been developed, we have insufficient knowledge of how they are used in practice. In this paper, we review the recent empirical studies on collaboration tools...
In order to effectively reduce the hidden trouble of electric window on automobile, many cars now use the electric windows anti-pinch systems. It adds anti-pinch circuit based on the window control module. PIC18F258 micro controller samples and process the current of electric window motor. The method of combining current amplitude and current integral method is used to determine whether the window...
Based on the definition of related concept and importance with regard to basic industry patent information service , this paper analysed the distribution status of basic industry patent information resources, and then pointed out the key issues to be solved with China's basic industry patent information service. At last, this paper purposefully proposed the measures and suggestions on upgrading the...
Functionality Testing is one of the most popular used technologies of black-box testing strategy. Programs to be test were taken as implicit functions mapping inputs into outs. In the view of functionality testing, if the functional behaviors of the program can be predicated correctly, it could be applied as test oracles for newer test cases generation. The main problems of this issue are discussed...
As the core member in a software development team, the project manager's leadership level influences the development process in a great part. The existing literatures have shown the importance of individual's personality to his or her behaviors, which include the leadership behaviors. Exploring how the project managers' personality influences the success of the software development projects has significant...
This paper describes the hardware and algorithms for a realtime social touch gesture recognition system. Early experiments involve a sensate bear test-rig with full body touch sensing, sensor visualization and gesture recognition capabilities. Algorithms are based on real humans interacting with a plush bear. In developing a preliminary gesture library with thirteen symbolic gestures and eight touch...
Refactoring is an increasingly practiced method in industry software development. However, existing research mostly focus on the technical aspect of refactoring, we still know little about the human behavior domain on this issue. Software developer's motivation has been recognized as a key human factor for the software development and maintenance tasks, therefore, identifying what motivates software...
China now is one of the most important places where software outsourcing businesses are flourishing. However, the subcontracting in the current software outsourcing practices has not received enough attentions. This research attempts to further the understanding on this issue. Mixed empirical research approaches were used to explore the extent and the impacts of the outsourcing subcontracting. The...
Integer-based vulnerability is an extremely serious bug for programs written in languages such as C/C++. However,in practice, very few software security tools can efficiently detect and accurately locate such vulnerability. In addition, previous methods mainly depend on source code analysis and recompilation which are impractical when protecting the program without source code. In this paper,we present...
Test Oracle is one of the most important problems to be tackled for automatic software testing. Unlike manual test, by reviewing results to determine whether or not result is what it should expected to be, automatic methods only depend on specified decision rules. Artificial Intelligence is a prominent solution for such work. In this research, Artificial Neural Network was proposed to direct oracles...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.