The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Innovative mobile applications bring radical changes to people's life around the globe. With its unique characteristics of anywhere, anytime accessibility, thousands of mobile apps are developed, distributed, and executed over the Internet. To understand the selection criteria for different end users when facing a mobile application, this paper quests for an evaluation framework for mobile apps based...
In this paper the key indicators of sports tourism competitiveness were selected through the factor analysis method, by using the factor analysis method in Spss22.0 software, all kinds of sports tourism data in each city and county of Hainan were analyzed according to the factor analysis method and the sports tourism competitiveness of each city and county were also evaluated in comprehensive scores...
As government agencies and enterprises become increasingly interested in including the climate factors into their decision making and management processes, there is growing demand for easy-to-use cost-effective climate characterization tools. Among the various kinds of climate characterization tools, climate models are most commonly accepted as an effective tool for summarizing known climate information...
This paper argues about a new conceptual modeling language for the White-Box (WB) security analysis. In the WB security domain, an attacker may have access to the inner structure of an application or even the entire binary code. It becomes pretty easy for attackers to inspect, reverse engineer, and tamper the application with the information they steal. The basis of this paper is the 14 patterns developed...
Software reuse aims to eliminate repetitive system development efforts, and improve the quality of software by using proven solutions to business analysis, system design and implementation. This paper proposes the combined use of multiple modelling languages to support the reuse of engineering artifacts at different abstraction levels. In particular, an agent-oriented requirement modelling language,...
In the services computing era, technologies are developed to serve for the purpose of putting existing information services assets into new use, creating new value for both the providers and customers. To this end, the range of requirements can be satisfied by the existing services has to be understood better. At the same time, different ways to compose, decompose, configure and reconfigure services...
Various governmental or academic institutes survey current security trends, and report vulnerabilities, security breaches, and their costs. However, it is unclear whether (and how) practitioners analyze these vulnerabilities and attacks to arrive at security requirements and decide on security solutions. What modeling methods are used for eliciting, analyzing, and documenting security requirements...
Traditional, software development was normally treated as an engineering process, which can be a lengthy and inflexible process. Recently, as the demand for software is increasing dramatically, new ways of developing software have been sought, among which developing software creatively is attracting attention. Media products are normally creatively developed and naturally learning how these products...
Numerical reservoir simulation is one of the effective tools for complex fluid analysis in the oil industry. This paper analyzed the principle of thermal recovery simulation, and designed and implemented a parallel program of the thermal recovery simulation based on PESTc toolkit. The improved domain decomposition with load-balance control was presented to partition the computation into different...
Today, software systems are moving towards online deployment as collaborative composite services, the operating environments and users' needs for which are continuously changing. Thus, it is important to understand how to cope with run-time requirements by dynamic adaption at different levels. This paper aims to summarize our general position and understanding of this problem. In particular, we introduce...
Requirements engineering has gained growing attention in both academia and industry, as today's software intensive systems are expected to provide highly user-centric functions and qualities. Thus, it is important to understand under what situations existing requirements engineering practice is not working well. Continuing our probe into the industrial practices status quo, this paper reports the...
In the field of software developing, project is almost the most common organizational form. But with the enhancement of software products' complexity and the constant change of customers' demand, the importance of communication in software development projects is increasingly prominent.Based on literature review about communication management and software development life cycle, the paper identified...
Security requirements analysis is gaining growing attention as new vulnerabilities and threats are emerging on daily basis, the systematic evaluation of security requirements is of utmost importance among the various decisions to be made related to security. This short contribution proposes using a 3-dimensional vector for quantitative evaluation of security requirements, which takes into account...
Rapid changes in the social and technical environment bring about many new challenges to system requirements engineering, amongst which out-sourcing or off-shoring of certain design tasks to countries with more human resources and broader markets becomes promising business leverage. This paper reports the results from a survey of requirements practices in China and points out their implications. The...
Risk management and assessment of software project is highly relevant to the social and culture context of the development activities. This paper proposes a risk analysis approach which represents the organizational settings of a project as a social dependency network, and identifies risks originated from broken role dependency relations, unsatisfied goals, unfinished tasks, and unavailable resources...
As people start to realize how poorly documented and managed requirements can affect the success of a software project, requirements engineering education start to attract growing attention in software institutes and companies in China. This paper reports our considerations regarding course materials selection, course projects design and evaluation to better balance the needs of training future requirements...
Based on the survey results of Chinese requirements engineering practices, this paper reports a few general patterns of Chinese-culture-related ways of thinking and their influence to requirements elicitation activities. A multimedia enhanced goal oriented requirement elicitation method is proposed, in which media measures are used to help capture user requirements and preferences more easily. The...
Requirements elicitation, as the first phase of the software life cycle, its importance is becoming more and more prominent. How fast and accurate user requirements can be elicited, is a problem that people wants to solve for a long time. This paper proposes to establish an automated elicitation system based on domain knowledge on user requirements. By gradually perfecting and refining the original...
At the present time, requirements knowledge is mainly in the possession of requirements experts and senior experienced practitioners, which is often implicit and pragmatic to share with novices. Requirements patterns aim to help derive complete, consistent, and implementable requirements specifications from rough sketches of the problem context. In this paper, we propose to use semi-formal approaches...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.