The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When an organization faces new types of collaboration, for example after a company merger, there is a need to consolidate the existing in-house developed software. There are many high-level strategic decisions to be made, which should be based on as good foundation as possible, while these decisions must be made rapidly. Also, one must employ feasible processes and practices in order to get the two...
The open source software (OSS) development approach has become a remarkable option to consider for cost-efficient, high quality software development. Utilizing OSS as part of an in-house software application requires the software company to take the role of a component integrator. In addition, integrating OSS as part of in-house software has a few differences compared to integrating closed source...
We present highlights of an process improvement project at a software center in preparation for CMM level 3, with applicable examples given that relate to CMM level 2, level 3, and the effort needed in transitioning between level 2 and 3. For the efforts taken at this particular software center, the work documented is divided into three parts: the level 2 bases for moving to level 3, the process definition...
Building software is an intellectually intensive activity. The processes and tools that have been developed to support custom software development to ensure that the activity is carried out successfully, do not necessarily address some of the key challenges of creating software systems out of COTS components. Primary among these challenges are component selection and integration where competing requirements...
In this paper we present a comprehensive set of mechanisms that restore to the site administrator the capacity of enforcing traffic engineering (TE) policies in a multiaddressed IPv6 scenario. The mechanisms rely on the ability of SHIM6 to securely perform locator changes in a transparent fashion to transport and application layers. Once an outgoing path has been selected for a communication by proper...
Ajax is a new model for Web applications to provide more responsive and faster user interfaces resembling more closely that of applications. Typical usage areas are user input validation without page submission, integrating small elements from several servers on a single page, and simulating push-services. Especially the latter are promising for enhancing groupware applications and for realizing them...
Like most software products, protocols are continuously enhanced and new protocols are developed. But especially new protocols of the transport layer can not be utilized widely easily. Even if the new protocols are made available, it is still necessary to adapt many applications or the protocols are not used by the majority of applications otherwise. The current situation is that only very limited...
Despite the efforts made to overcome the problems associated with the development of information systems, we must consider that it is still an immature activity, with negative consequences in time, budget and quality. One of the root causes for this situation is the fact that many projects do not follow a structured, standard and systematic approach, like the methodologies and best practices proposed...
Understanding complex component-based systems often requires getting insight in how certain system properties, such as performance, trust, reliability, or structural attributes, correspond to the actual system architecture. Such properties can be seen as defining several 'areas of interest' over the system architecture. We present an interactive tool that efficiently and effectively combines visual...
Dynamic reconfiguration allows modifying a system during its execution, and can be used to apply patches and updates, to implement adaptive systems, dynamic instrumentation, or to support third-party modules. Dynamic reconfiguration is important in embedded systems, where one does not necessarily have the luxury to stop a running system. While several proposals have been presented in the literature...
Inspections are a cost-effective way of finding errors. However, checklist-based inspections of statecharts can only find a limited class of flaws while scenario-based inspections can never practically traverse the vast numbers of possible combinations of states in complex models made up of multiple communicating finite state machines. A technique for systematic and comprehensive validation of such...
Critical to any successful performance improvement initiative is to achieve a state of continuous or institutionalized improvement. Some improvement can happen quickly, but long-term improvement is typically a matter of sustaining focus. This requires an infrastructure that keeps activities focused and drives them forward. In ABB, the IDEALSM model is used as a guide for setting up improvement activities...
Capturing and sharing architectural knowledge is already a complex endeavor when dealing with conventional software systems for single customers. In product line engineering, however, the situation is even more difficult due to architectural variability and complex relationships between features and technical solution components. In this paper, we present our experiences and approaches taken in eliciting...
Instant messaging platforms facilitate coordination in workgroups by providing users with mutual information on their presence and availability, allowing for ad-hoc conversations with little disturbance. For this purpose they typically capture, process, and present information from and to the users involved. Thereby, they have to address a fundamental trade-off: on the one hand users want and need...
The transmission of encoded video streams over heterogeneous networks, characterized by congestion losses in wired links and high bit error rate in the wireless channel, is under consideration in this paper. First of all, it is necessary to make a distinction between the different kinds of losses to achieve a high channel utilization. Then, when dealing with wireless losses, the robustness of the...
The paper presents how parallel program execution control based on monitoring of global application states can be used to co-ordinate workflow execution. Special control processes called synchronizers construct consistent application states based on state messages coming from constituent workflow activities. The synchronizers compute control predicates on consistent activities states and work out...
The ability to accurately detect peer-to-peer (P2P) network traffic associated with different applications has become crucial for a broad range of network management tasks including application-specific traffic engineering and capacity planning. Since traditional methods like port-based identification have become highly inaccurate, as P2P applications nowadays tend to camouflage their communications,...
Software architecture description languages (ADLs) were a particularly active research area in the 1990s. In 2000, the author co-authored an extensive study of existing ADLs, which has served as a useful reference to software architecture researchers and practitioners. However, the field of software architecture and our understanding of it have undergone a number of changes in the past several years...
The aim of this contribution is to present concepts and to propose techniques and a methodical support for automated software composition using "rich" semantic descriptions of components and services which we call annotations. Our approach is based upon a component description reference model for which both, semantic description patterns and inference mechanisms are defined. They offer variability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.