The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We describe an approach to the representation of requirements using answer set programming and how this leads to a vision for the role of artificial intelligence techniques in software engineering with a particular focus on adaptive business systems. We outline how the approach has developed over several years through a combination of commercial software development and artificial intelligence research,...
Usability has gained a paramount significance in the recent trends of software application development. Application usage (AU) means the data, which consists of history of user interactions of an application. Knowledge of usage patterns in the AU is required for developing an application with rich features and that appeal to majority of users, with good usability. Monitoring the user interactions...
Cloud computing technologies have recently been intensively exploited for the development and management of large-scale IoT systems, due to their capability to integrate diverse types of IoT devices and to support big IoT data analytics in an elastic manner. However, due to the diversity, complexity and scale of IoT systems, the need to handle large volumes of IoT data in a nontrivial manner, and...
The Software Development under the Business Processes paradigm and Web Services has become a key foundation for business. As a support to the above, several Software Development Life Cycle Methodologies involving Business Processes and Web Services have emerged; however literature still reports unmet needs. The following study aims to present a comparative analysis of Methodological proposals of software...
Requirements for business processes can change over time. Adapting a process to meet the changed requirements is not always possible, especially for long running processes, where stopping the execution of process instances might be necessary and/or instance migration or compensation scenarios must be implemented. Adaptations for processes can be described in a generic way using adaptation patterns...
It is widely accepted that the network of the future will require a greater degree of service awareness and optimal use of network resources. This article presents an architectural design for an open software-defined network infrastructure that enables the composition of fast and guaranteed services in an efficient manner and the execution of these services in an adaptive way, taking into account...
Software cockpits (software project control centers) provide systematic support for monitoring and controlling the activities in a software development project. Important aspects are to track progress, to visualize team performance, and to provide feedback about the quality of delivered results. Therefore, software cockpits integrate and visualize data from various data sources such as project plans,...
As the amount of data generated by today's pervasive environments increases exponentially, there is a stronger need to decipher the important information that is hidden among it. By using complex event processing, we can obtain the information that really matters to our organization and use it to improve our processes. However, even when this information is retrieved, business processes remain static...
Sophisticated event-pattern rules are the key to successful applications of Complex Event Processing (CEP). However, creating such rules may place heavy demands on business users. In this paper we propose a novel approach to rule composition for the event-based system SARI: Via a web-based user interface, users can compose ruling logic from abstracted, configurable buildings block as previously prepared...
We studied how a middle-sized Finnish company employing agile methods governs its software product development. Through observations and interviews we followed the trace from strategic plans in the form of roadmaps to various backlogs and all the way to daily work. The governance roles, responsibilities and deliverables seemed to be in place on different organizational levels. However, closer inspection...
AO4BPEL applied Aspect Oriented Programming to executable business processes. Although modularized, AO4BPEL aspects do not have an explicit interface and the implicit one, based on XPath, is often fragile, hence reusing aspects in different processes is quite hard. Cooperative Aspect Oriented Programming aims at making aspects reusable by means of cooperative work between base code and aspects, realized...
Workflow in interactive media and software development can be used to improve the development process as well as adding new features to the system as opposed to using classical software development approaches. Three types of workflow are distinguished to be sequential, state-machine, and rule-based workflow. This paper shows how these approaches can be used to improve the software quality and the...
Recently the technology of CBSD (component-based software development) and workflow become research focus, and they are important in software development. CBSD is a method of building system from down to up, which builds models for each subsystem ignoring the interaction among them, then composes all the subsystems to form the entire system. Workflow describes the relationship among business actions...
Business processes are increasingly complex and open because they rely on services that are distributed geographically and across organizations. As a result, they are prone to several points of failure. Monitoring, therefore, remains an important concern. We describe services monitoring support that integrates monitoring into common development activities. A flexible monitoring toolkit, REQMON, is...
As digital resources increasingly growing and the economic benefit of digital intellectual property rights being increasingly important, people has been increasingly emphasis on information security issues brought by the data remnants in storage devices. They try their best to prevent the potential risks. In this paper, we survey comprehensively related technologies, standards and trends of erasure,...
Distributed software systems are characterized by increasing autonomy. They often have the capability to sense the environment and react to it, discover the presence of other systems and take advantage of their services, adapt and re-configure themselves in accordance with the internal as well as the global state. Testing this kind of systems is challenging, and systematic and automated approaches...
A generic test process should support all approaches "formal to informal" and mixed approaches within, and across, all test levels. But widely-accepted formal approaches, from current standards, certification syllabi and tools, have explicitly-defined test cases as the key underlying entity: not all real-life approaches use explicit test cases. Also, testing is maturing beyond merely "finding...
Due to the continuously growing possibilities provided by technology and its wider application, today's IT products are becoming more and more complex both from technical and managerial standpoints. Very often, multiple parties are involved in their development. Consequently, the organization of the integration and testing of these products gets increasingly complex. Organisations already encounter...
This position paper proposes a research agenda for the field of security testing. It gives a critical account of the state of the art as seen by a practitioner and identifies questions that research failed to answer so far, or failed to answer in such a way that it would have had an impact in the real world. Three categories of research problems are proposed: theory of vulnerabilities, theory of security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.