The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Object-role modeling (OEM) is a fact-oriented approach for specifying, transforming, and querying information at a conceptual level. Unlike entity-relationship (ER) modeling and unified modeling language (UML) class diagrams, ORM is attribute-free, treating all elementary facts as relationships. For information modeling, fact-oriented graphical notations are typically far more expressive than other...
Software development life cycle involves the activities of project management, requirement analysis and specification, architectural and system design, algorithm design, coding, testing, quality assurance, maintenance, and if necessary performance tuning. Throughout the development cycle, visual means have been playing an important rule in almost all the development activities, such as visual modeling...
Fine grained concurrency and accurate timing can be essential for embedded hardware and software systems. These requirements should be reflected in the specification and must be consistently enforced by the actual implementation. Automated synthesis of the implementation from such specifications appears to be a straightforward way to ensure this consistency. However, especially for software systems...
We describe the evolution of a statistical survey design visual language from a standalone design-time modelling language into an environment supporting design, coordination, execution and publication of complex statistical surveys. This involved, firstly, elaboration of the notation to support additional requirements, notably in the area of task modelling. Secondly, tool support has been extended...
Today metamodeling and domain-specific languages represent many promising beginnings to create non-generic tool support for project specific modeling tasks. Due to the inherent complexity and numerous variants of human-machine interfaces (HMIs) model-driven development becomes increasingly interesting for manufacturers and suppliers in the automobile industry. Particularly, the development of powerful...
A key enabler of the recently adopted, assembly-centric development approach for distributed real-time software systems is QoS-enabled middleware, which provides reusable building blocks in the form of design patterns that codify solutions to commonly recurring problems. These patterns can be customized by choosing an appropriate set of configuration parameters. The configuration options of a pattern...
The UML is a collection of 13 diagram notations to describe different views of a software system. The existing diagram types display model elements and their relations. Software engineering is becoming more and more model-centric, such that software engineers start using UML models for more tasks than just describing the system. Tasks such as analysis or prediction of system properties require additional...
This paper reports on the development of a method for extracting and verifying an image of the hard drive of an iPod in a forensically sound manner via a USB2 connection, so as to create a standard operating procedure for Australian Law Enforcement. It also establishes an understanding of the nature of proprietary data stored on the iPod and indicates how this can be used as a guide within a forensic...
The subject of digital forensics can be quite challenging. Digital forensics is in its infancy and teaching digital forensics includes the techniques as well as the tools that assist in the process. This article discusses the tools used in computer forensics, compares an open source tool to two commercial tools, and the advantages and disadvantages of all three tools in an academic environment. A...
Applications in information security, data mining, e-commerce, information retrieval and network management require the analysis of large graphs in order to discover homogeneous groupings of rows and columns, called cross associations. We show that finding an optimal cross association is NP-complete. Furthermore, we give a heuristic algorithm with an O(n4) running time for finding good cross associations
The generation, application, and exploitation of knowledge are becoming critical to how companies, countries, and economies develop and sustain competitive advantage. Some firms are better able to utilize externally generated technologies and scientific knowledge, such as knowledge transferred from universities. This paper examines the following questions: 1) does a collaborative culture better enable...
The focus of this research is on outsourcing partnerships - what is the process involved in the formation and management of a software research and development (R & D) outsourcing partnership. A complete picture of a software outsourcing partnership life cycle cannot be found in the literature. Because of that a synthesis outsourcing partnership life cycle model has been created based on the models...
Recently, the focus of IT outsourcing has been shifting from the "what" and "why" issues to "how" companies manage outsourcing process, during which the relationship management becomes vitally important for the overall success of IT outsourcing. Simultaneously, trust, as a component of relationship, plays a central role in the success of IT outsourcing relationship. In...
The advent of the Internet has made the transmission of personally identifiable information common and often inadvertent to the user. As a consequence, individuals worry that companies misuse their information. Firms have tried to mitigate this concern in two ways: (1) offering privacy policies regarding the handling and use of personal information, (2) offering benefits such as financial gains or...
We examine the question of which services are tradable within a concrete setting: the outsourcing of IT services across a broad cross-section of establishments in the US. We analyze outsourcing decisions from 52,191 establishments with over 100 employees at the end of 2002, for two types of IT services: programming and design and hosting. Supply of programming and design services are more sensitive...
Information displayed on an e-commerce site can be used not just by the intended customers but also by competitors. In the paper, we examine the effect of such proactive information use in the setting of e-commerce retailing where duopoly e-tailers set their prices of a commodity that is in short supply. While e-tailers enhance their service quality by making stockout information available online,...
A key success factor for a successful company in a dynamic environment is effective and efficient information technology (IT) supporting business strategies and processes. In recent surveys however it is concluded that in most companies IT is not aligned with business strategy. The alignment between business needs and IT capabilities is therefore still a prominent area of concern. This paper reports...
E3-value has proven to be a useful modeling technique and method to support the analysis of business models. However, for strategic analysis, the representation of a business model is not sufficient, as it does not include the rationale behind the model. In this paper, we propose an extension of e3-value to support strategic analysis on three dimensions: competition analysis, customer analysis and...
The Internet is widely valued for distributing control over information to a lateral network of individuals, but it is not clear how these networks can most effectively organize themselves. This paper describes the distributed networks of volunteers that emerged online following Hurricane Katrina. Online communities responded to the disaster by facilitating the distribution of donated goods from ordinary...
Massive, multiplayer online role-playing games foster rich social environments. Within the game, players can interact with other players, make friends, create and cultivate new online forms of community. Using participant observation and content analysis approaches, this study examines the World of Warcraft as an online community, and investigates the degree to which it exhibits characteristics of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.