The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The development of Virtual Reality (VR) is a difficult task, requiring knowledge and understanding of different areas. Furthermore, the Requirements Engineering (RE) has a key role in the development of VR systems, because the requirements of these systems are imposed directly by human senses and abstracted by the ability of the developers to represent the physical and kinematic models of these environments...
This paper presents a new computer-facilitated approach for incident management to improve typical incident management. Our approach automates typical manual-based incident resolution process by proposing a new semantic similarity measurement between a given incident call and incident cases stored already in a case base. The proposed semantic similarity measurement distinguishes traditional similarity...
Detecting design patterns from object-oriented program source-code can help maintainers understand the design of the program. However, the detection precision of conventional approaches based on the structural aspects of patterns is low due to the fact that there are several patterns with the same structure. To solve this problem, we propose an approach of design pattern detection using source-code...
This demonstration shows how semantic schema matching technology is being incorporated into the BEA AquaLogic data services platform. Specifically, it demonstrates how the manually-intensive task of authoring a correct and complete integration query is enhanced by semantic guidance. It also highlights the pluggable architecture used to incorporate semantic match knowledge into ALDSP by showing the...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
In 1st July 2007, China Government formally started a great project named "The Second Survey for the Land and Resources". China plans to investigate the current landuse status, and realize the land and resource informatization during two and a half years. Vectorization of Scanning Landuse Map plays an important role in land informatization and digital land project. Traditionally, it's very...
Compliance management (CM) is the management process that an organization implements to ensure organizational compliance with relevant requirements and expectations. Compliance auditing (CA) is a child-process of CM where compliance rules and policies are individually checked against the organization to determine the level of compliance achieved by the organization. In this paper, we arrange organizational...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.