The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Active-on-Arrow Network Chart is the most popularity tool in Network Planning Technology, but it is difficult to draw in complex project. The best way is drawing the network chart automatically by software. An automatically drawing method of network chart is described in this paper. Firstly, the paper analyzes the characteristics of the Active-on-Arrow Network Chart and summarizes the steps to...
LNS arithmetic can achieve high performance in some specific applications that involve a lot of complex functions and/or consecutive multiplications and divisions. We proposed that application-specific instruction design for LNS addition/subtraction computation is implemented on an Altera Nios-II SOPC system. The direct-computation of LNS addition/subtraction is executed by three custom instructions...
Recently it was shown that a unique permanent network for words exists in the brain. Here words are represented by (mirror-) neurons and interconnected through nerves. However it is an open question how the nervous connections should be chosen so that meaningful sentences arise. Neurons situated far above the word level must be responsible for this purpose, both for generating and for understanding...
Several problems exist in traditional analysis and design for e-government: few solutions to dynamic user demand, heavy workload of document processing, complicated affair schemes and so on. Mind map is a method embodying radiant thinking. This paper adapts mind map for demand analysis, bringing many benefits to e-government planning, such as grasping emphasis immediately, affording a broad overall...
A common static software bug detection technique is to use path simulation. Each execution path is simulated using symbolic variables to determine if any software errors could occur. The scalability of this and other path-based approaches is dependent on the number of paths in the program. This paper explores the number of paths in 15 different programs. Often, there are one or two functions that...
Assigning bug reports to individual developers is typically a manual, time-consuming, and tedious task. In this paper, we present a framework for automated assignment of bug-fixing tasks. Our approach employs preference elicitation to learn developer predilections in fixing bugs within a given system. This approach infers knowledge about a developer's expertise by analyzing the history of bugs previously...
Comprehending an unfamiliar code fragment requires an awareness of explicit usage directives that may be present in the documentation of some invoked functions. Since it is not practical for developers to thoroughly investigate every call, directives may be missed and errors may occur. We previously reported on a tool called eMoose, which highlights calls to methods with associated directives, and...
Faced with the challenges of understanding the source code of a program, software developers are assisted by a wealth of software visualization research. This work explores how visualization can be supplemented by sonification as a cognitive tool for code comprehension. By engaging the programmer's auditory senses, sonification can improve the utility of program comprehension tools. This paper reports...
Unlike other wireless technologies, the deployment of 802.11 networks is not limited to operators: access points can easily be installed by end-users for domestic use. This singular type of deployment is the reason why 802.11 networks are omnipresent in our urban landscapes. Indeed, in metropolitan areas, laptops frequently detect tens of 802.11 access points from the same location. In this work,...
For the realization of language-independent, effective, and user-friendly model versioning systems, generic and efficient conflict detection is essential for correct and complete identification of conflicts caused by parallel modifications on one artifact. Usually, the genericity of the conflict detection costs a high price: language-specific operations and refactorings often remain undetected. Consequently,...
Motivation is one of the most frequently cited causes of software development project failure, reportedly impacting on project productivity, software quality and the overall success of the project. Much of the previous research into software engineers' motivation cites the job itself as the main motivator, yet little research has focused on why software engineers stay in the profession. This paper...
Many corporate code developers are the beta testers of open source software. They continue testing until they are sure that they have a stable version to build their code on. In this respect defect predictors play a critical role to identify defective parts of the software. Performance of a defect predictor is determined by correctly finding defective parts of the software without giving any false...
Effective governance of agile software teams is challenging but required to enable wide adoption of agile methodologies, in particular for large-scale projects. In this paper we apply a full lifecycle governance model to agile projects, focused on the iteration level. The concept is demonstrated via a case study of a large-scale, enterprise-critical software project that implemented agile practices...
Determining whether a set of features can be composed, or safe composition, is a hard problem in software product line engineering because the number of feature combinations can be exponential. We argue that synergies between current approaches to safe composition should be exploited and propose a combined approach. At the heart of our proposal is a merge operation that creates a behavioural description...
Researchers are often inspired by ingenious problem solving strategies of nature. This paper is motivated by the seemingly infinite expressive power of genes (in terms of variability). To bring in the flexibility required for dealing with variable requirements and volatile assumptions in software engineering, we consider genetic variability to be a role model for software variability management. We...
Existing black-box adaptation techniques are insufficiently powerful for a large class of real-world tasks. Meanwhile, white-box techniques are language-specific and overly invasive. We argue for the inclusion of special-purpose adaptation features in a configuration language, and outline the benefits of targetting binary representations of software. We introduce Cake, a configuration language with...
Recent research results have shown more benefits of the management of code clones, rather than detecting and removing them. However, existing clone management approaches are still unsatisfactory, and either incomplete or inefficient, due to the lack of incremental clone detection tool supports. In this paper, we introduce such an incremental clone detection tool, called ClemanX. Our empirical evaluation...
A critical factor in work group coordination, communication has been studied extensively. Yet, we are missing objective evidence of the relationship between successful coordination outcome and communication structures. Using data from IBM's Jazztrade project, we study communication structures of development teams with high coordination needs. We conceptualize coordination outcome by the result of...
Software development teams exchange source code in shared repositories. These repositories are kept consistent by having developers follow a commit policy, such as ldquoProgram edits can be committed only if all available tests succeed.rdquo Such policies may result in long intervals between commits, increasing the likelihood of duplicative development and merge conflicts. Furthermore, commit policies...
While the use of independent test agencies is on the rise - currently estimated to be a $25B marketplace - there are a number of challenges to successful collaboration between these agencies and their client software development organizations. These agencies offer independent verification of software, skilled testing experts, and economic advantages that arise from differential global labor rates...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.