The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Complexity is a term that is currently used not only in research articles but also in the methodologies and standards used to manage information and projects. The complexity can represent the size of a system, process, program or project, the number of functions and the cost of their acquisition, operation and maintenance. Within the context of this work, the complexity is a variable that represents...
Previous studies have researched how developer experience affects code quality, but they ignore work difficulty, although experienced developers are more likely to work on the more complex parts of a project. To examine work difficulty, we focus on revised files. Using product metrics, we evaluate file complexity in each type of file origin. Specifically, we analyze three large commercial projects...
The objective of this paper is to illustrate how to monetize infrastructures and services. This is achieved by a combination of measuring consumption, applying pricing strategies and client invoicing. Furthermore, a range of billing solutions are available in order to cover the Rating, Charging and Billing process. The focus here is on the comparison of solution based suitability, which depends on...
Complexity Cybernetics relating to Enterprise Architecture (EA) is a hot topic recently. Although many researchers, organizations made much progress in the past years, common understanding in this domain is still limited. In this paper, a systematic literature analysis on complexity cybernetics in relation to EA was presented, in order to chart a landscape of state-of-the-art and to summarize some...
For organizations undergoing agile and lean transformation, it can be difficult to get meaningful, actionable insights into progress and impediments. Teams and organizations are best understood as complex adaptive human systems. Understanding what is happening in such systems requires approaches grounded in the complexity sciences and social sciences. This paper describes an approach using complexity...
This paper proposes an experimental evaluation of the communication in an Organization-based Multi-Agent System. We defined a set of criteria to evaluate the quality of interactions between agents at run time. The originalities and the advantages of our proposal are threefold: (1) the adaptation of a set of criteria and their corresponding metrics to evaluate communication in an Organization-based...
Design Structure Matrices (DSMs) are a widely extended and useful tool for structuring and analyzing complex systems. Though this is a simple yet quite powerful tool, problems arise in using them, especially during early development phases due to uncertain information and frequent changes within the original system. In this paper, the informative value of selected complexity metrics of DSMs for early...
Many global socio-economic systems are based on flows of information, energy or matter. Typically, various organizations and institutions plan, design, implement and operate part of the physical infrastructure necessary to enable the flow, but none of them are the central controlling instance. Collaboration in such self-organized complex systems of flow enables broader market and system connectivity,...
The development organization often changes during software development. Derivative developments, forks, and change of developers due to acquisition or open-sourcing are some conceivable situations. However, the impact of this change on software quality has yet to be elucidated. Herein we introduce the concept of origins to study the effects of organizational changes on software quality. A file's origin...
The new format of the didactic systems for the organization of the training of engineers are considered. These systems are focused on the rapid development of the technical intelligence of the student. In practice, they have shown the high efficiency.
Software development projects are difficult to manage due to the high uncertainty in their various phases. Simulation is one of the tools that has been used to help software project managers produce project plans. Research into software process simulation modeling (SPSM) shows the dominance of discrete-event simulation and system dynamics. This paper supports the use of ABS in SPSM. We propose a practical...
The atrial activity (AA) of surface ECGs in atrial fibrillation (AF) has been studied to evaluate and compare the ability of several nonlinear metrics in the discrimination of AF events by estimating their regularity. The AA signals were extracted by applying an adaptive QRST can-celation method. Next, the study of surrogate data was performed and revealed the nonlinear behavior of AA. The following...
The attack graph is an abstraction that reveals the ways an attacker can leverage vulnerabilities in a network to violate a security policy. When used with attack graph-based security metrics, the attack graph may be used to quantitatively assess security-relevant aspects of a network. The Shortest Path metric, the Number of Paths metric, and the Mean of Path Lengths metric are three attack graph-based...
Process metrics can be used to establish baselines, to predict the effort required to go from an “as-is” to a “to-be” scenario or to pinpoint problematic ITSM process models. Several metrics proposed in the literature for business process models can be used for ITSM process models as well. This paper formalizes some of those metrics and proposes some new ones, using the Metamodel-Driven Measurement...
Many factors are believed to increase the vulnerability of software system; for example, the more widely deployed or popular is a software system the more likely it is to be attacked. Early identification of defects has been a widely investigated topic in software engineering research. Early identification of software vulnerabilities can help mitigate these attacks to a large degree by focusing better...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.