The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Collaboration in business processes and projects requires a division of responsibilities among the participants. Version control systems allow us to collect profiles of the participants that hint at participants' roles in the collaborative work. The goal of this paper is to automatically classify participants into the roles they fulfill in the collaboration. Two approaches are proposed and compared...
This paper presents a software toolkit that can be used to analyze event data streams in real-time. It has a specific focus on stochastic analysis of business processes, based on event data that is produced during the execution of those processes. The toolkit provides a software environment that facilitates easy connection to event data streams and quick development and testing of analysis and visualization...
Phishing website-based attacks remain pervasive, with high user susceptibility continuing to be a major factor. In this study we use cluster analysis coupled with an elaborate controlled experiment involving hundreds of participants to identify and examine high susceptibility user segments in terms of their perceptions, demographics, and phishing website traversal behavior. The results reveal three...
With the emergence of Internet of Things (IoT), the requirements for scalability and flexibility are continuously increasing, thus easy reconfigurable systems such as Software Defined Radio (SDR) are gaining more popularity. The paper provides an overview of the related work in the field of SDR technologies and solutions for convergence of SDR applications. Furthermore, we analyze how the convergence...
Network packet capture and analysis technology is a cornerstone of network security and protocol analysis technology. On the analysis of the LAN IP network traffic monitoring requirements, this paper detailed introduces the design ideas of traffic monitoring system based on WinPcap technology, expounds the key technologies and features in the process of system implementation, focusing on huge amounts...
This industrial research paper outlines an outcome of a machine leaning approach to dynamically generate context sensitive Application User Interfaces (Adaptive UI) on top of a monolithic enterprise software product.
Requirements Engineering has recently been greatly influenced by the way how firms use Open Source Software (OSS) and Software Ecosystems (SECOs) as a part of their product development and business models. This is further emphasized by the paradigm of Open Innovation, which highlights how firms should strive to use both internal and external resources to advance their internal innovation and technology...
In this keynote talk we propose the use of a capability-driven approach to enterprise modeling in order to capture the intertwined relationship among design requirements and environment, as well as the interplay of requirements and design artifacts for the purpose of facilitating enterprise agility.
Background: Code smells are considered detrimental to maintainability. To plan QA preventive initiatives (e.g. refactoring actions) it is important to know if the application domain is likely to affect the incidence of those problems. Objective: The main goal of this paper is to check if the application domain has a statistically significant impact on the incidence of code smells. Methods: We conducted...
This paper proposes a mapping between two product quality and software processes models used in the industry, the CERTICS Brazilian national model and the CMMI-DEV international model. The focus of this mapping is in the Technological Development Competence Area of CERTICS, which directs the response to the key question on whether "the software is the result of technological development in the...
There is no doubt that agile methods have become mainstream and with their increased use unanswered questions start to appear: How do we address cross-cutting concerns when software is developed vertically? Does value prioritization lead to increases in technical debt by promoting feature development over refactoring? Isn’t the reticence to write initial specifications on the premise of change an...
Traceability supports various activities of the software development process, such as impact analysis of changes, reuse, maintenance, verification and validation. The graphical representation of traceability information is very important to its effective use in those activities. Visualization tools can help in the interaction with large amount of data, in the identification of characteristics, patterns...
This paper presents an approach called InnoStartup that provides ways to address issues related to innovation such as business design, market analysis, creative problem solving and stakeholders' feedback in the software development process. Therefore, the InnoStartup approach uses as reference the stages of an innovation management process, as well tools provided by the following innovation-driven...
English, though not being the native language, is the language of instruction across the schooling years in Mauritius. Indeed, English literacy is introduced to young students at the pre-primary level as it is a pre-requisite for all other subjects, except French language in Standard One of primary level. In consequence, it is imperative that students acquire English literacy skills at pre-primary...
Model transformation is a method for transforming elements of one Meta model into other Meta model elements. System like software or business model checking is significant research domain. Question is that when Model Transformation is performed for transforming a model to another model how much accurately it was performed. There is a method that I have used is Traceability to find out that natural...
Gone are the days when business and IT executives considered change as a risk to mitigate or to avoid. Changes in businesses and IT implementations are nowadays part of the business itself. Managing businesses today includes managing changes, being ready for them, and reacting to them in an effective manner. In this paper, the application of agility principles and methodologies on Enterprise Architecture...
UML is actually a standard that is used in the production of software models. Its function is to facilitate the working of visuals of software artifacts. In order to produce a UML diagram, manufacturer has to gather all the software requirements in a natural like English r semi formal like SBVR language. After that he analyzes and produces the activity diagram manually in an available case tool. One...
Metro has been proved to be the most efficient public urban transportation way. To support daily operation, Clearance house system of auto fare collection (AFC) system should be operated continuously. Beijing metro introduces operation support for clearance house system. Then the thesis elaborates general goal, basic approach, scope, frame work and key performance indicator of operation support. After...
Electronic commerce is a relatively new phenomenon in Romania, dating back to the early 2000's. During its short history, however, it has grown rapidly, particularly due to the advantages entailed for businesses, government and consumers alike. Specific disadvantages such as security risks, risks of fraud, piracy, corruption, low internet penetration rates and a culture prone towards traditional commerce...
In recent years, with the gradual development of mobile Internet technology, the number of mobile applications increases dramatically. Users facing numerous mobile applications are often caught off guard. It is necessary to automatically classify the applications according to the applications' information, so as to recommend appropriate applications to users. However, the text information directly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.