The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
All the domain and vertical applications are scaled up to the Big Data applications because of the volume, variety, velocity of growing real time data. This necessitates the streamlining and alteration in the business processes, software development methodologies, infrastructure of distributed parallel processing, data modeling, data analysis, applications, services as well on the testing. The traditional...
Data mining is to extract the potentially useful knowledge and information from large amounts of data. How to dig up effective, reliable, understandable, and interesting association rules from vast amounts of information to help people make decisions has become an urgent problem to be solved. People want to use a reasonable evaluation method to measure reliability or validity of association rules,...
Basis-path coverage testing is a kind of logic-coverage testing and is based on graph theory and vector theory. Because the combination between path and business logic hasn't been considered, non-executable paths could be generated after executing the Basis-path algorithm. This generation model defines the non-executable path-segment and presents sub-model for acquisition of potential non-executable...
Multi-tenant SaaS software as one of the application pattern in Cloud Computing delivers software thourgh Web to the users by rhe service manner. So, it can reduce the cost of users, and reduce the cost of the maintainess and management by providers. The first problem that must be considered is how to provide the most appropriate tenant to the user according to the business request from the user in...
As processes to obtain the accreditation are almost similar in most universities and higher educational institutions around world, this study tries to design a general business processes reference model to these processes that can be used as a reference for any education institutions to model its own accreditation process. In addition to this, the proposed reference model covers all processes that...
A fuzzy comprehensive evaluation method of user experience is proposed to the problem on user experience quality which is difficult to accurately evaluate on the E-commerce web using. Firstly, being accordance with usability testing theory and the analysis of the user experience elements on E-commerce web using process, a evaluation index architecture is structured with views including human-computer...
Function testing of course websites is helpful to construct and popularize the national-level excellent course. A function testing to the course website of a national-level excellent course, Introduction to E-Commerce, was carried out from the content, main functions, forms and links. This testing practice designed 39 test cases and used the automated testing tools, Winrunner 8.2 and Linkbot Developer...
Credit values are regarded as an important factor in E-commerce trades by both buyer and seller, so they look forward to increasing their credit values. A feasible approach is to gather the credit values distributed in different E-commerce websites. But the protection policies of E-commerce websites result in the difficulty in realizing the integration of credit values in terms of policy and technology...
In a real world, it is often in a group setting that sensitive information has to be stored in databases of a server. Although personal information does not need to be stored in a server, the secret information shared by group members is likely to be stored there. The shared sensitive information requires more security and privacy protection. To our best knowledge, there is no paper which deals with...
We introduce an architecture for unit tests that traces the values of output variables of JavaScript programming. We present an object model that describes the relationships between tracing and other programming components. We also present six types of tracing statements, implementation and automation approach. We created examples of XHTML and JavaScript programming to illustrate the implementation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.