The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Increasingly software can be considered to be critical, due to the business or other functionality which it supports. Upgrades or changes to such software are expensive and risky, primarily because the software has not been designed and built for ease of change. Expertise, tools and methodologies which support the design and implementation of software systems that evolve without risk (of failure or...
Real-time control systems software running in a chemical, refinery, steel plant or in electric power grid is complex. The system has to run reliability for several years without interruptions with availability close to 100%, deterministic response time in milliseconds, sometimes in microseconds, and be secure against increasing cyber threats. Increasing connectivity, evolving concepts like Industrial...
Aadhaar, India's Unique Identity Project, has become the largest biometric identity system in the world, already covering more than 920 million people. Building such a massive system required significant design thinking, aligning to the core strategy, and building a technology platform that is scalable to meet the project's objective. Entire technology architecture behind Aadhaar is based on principles...
The last few years have seen two key trends maturing in the industry: IoT and Big Data. These trends build on more than a decade of research in both academia and industry. As the cost of instrumentation and microprocessor chips has declined, it is now possible to monitor the environment on a widening scale. The cost decline is matched by cloud computing (exposed as web services) that provides infrastructure...
The objective of the tutorial is to discuss the emerging concept of Software Defined Storage (SDS) with practical example. The overall objective of the tutorial: Participants can view a complete picture of storage -- the traditional storage, storage in the cloud and the emerging Software Defined Storage. Providers of storage hardware and software solutions can understand the software defined storage...
Software testing laboratory is a professional software evaluation organization of university or state institution. Through the analysis and study of the characteristics of software testing process, we intend to customize a model of software testing process quality measurement which is applicable to the software testing laboratory. The model describes seven characteristics namely compliance of process,...
Model checking is a mainstream method for formal verification of communicating sequential processes (CSP). Existing CSP Model Checkers are incapable of verifying multiple properties concurrently in one run of a model checker. In addition, the properties to be verified are described with CSP in most model checkers, which is good for refinement checking, but leads to limited description power and weak...
Informal and semi-formal specifications are commonly adopted for requirements engineering (RE), especially for customer-oriented system development projects, but their validity with respect to the user's requirements is usually difficult to perform. The common reason for the difficulty is that the specifications are often misinterpreted by the stakeholders due to the ambiguity of the natural language...
Software productivity is influenced by how efficiently programmers execute tasks assigned to them. For executing a task, programmers execute several steps. How the execution of these steps is organized by a programmer is referred to as task process. While overall software process has been well studied, the impact of task processes has not been studied much. In this work, we study the impact of task...
Process models are becoming more and more widespread in contemporary organizations. For the purpose of reducing cost and improve model quality, the ability to rapidly tailor a reference process to satisfy the changing of business requirements is necessary for organizations. In this context, how to provide a suitable reference process model for a specific domain becomes a challenging question. This...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.