The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A significant number of techniques dedicated to requirements specification and documentation is described in the available sources. As there is no purpose to use all of them, a selection has to be made, taking into consideration the context of a given software project, for example its size, usage of agile approach or stakeholders' technical competency. This paper is intended to provide guidelines...
Much like the proliferation of different Automatic Test Equipment (ATE) within the DoD Services, there has been a similar proliferation of various programming languages for developing Test Program Sets (TPS) to be used on those same ATE. The use of multiple languages leads to a variety of unfavorable situations, including, among others: • Complexity of re-hosting software to new ATE • Difficulty transitioning...
Self-Organizing Maps (SOM) [ ] are a popular clustering and visualization algorithm. Several implementations of the SOM algorithm exist in different mathematical/statistical softwares, the main one being probably the SOM Toolbox [2]. In this presentation, we will introduce an R package, SOMbrero, which implements several variants of the stochastic SOM algorithm. The package includes several diagnosis...
Agile methods have gained wide acceptance over the past several years, to the point that they are now a standard management and execution approach for small-scale software development projects. While conventional Agile methods are not generally applicable to large multi-year and mission-critical systems, Agile hybrids are now being developed (such as SAFe) to exploit the productivity improvements...
Agile software development methodology is an iterative and incremental method in making interactions more important than process and tools. The method also emphasizes more on developing software rather than making a comprehensive documentation. Therefore, web developers like to adapt agile software development methodology in their web development. The reason is because the methodology delivers web...
Model transformations are the key technology of MDE that allows for software development using models as first-class artifacts. While there exist a number of languages that are specifically designed for programming model transformations, in practice, designing and maintaining model transformations still poses challenges. In this paper we demonstrate how mathematical notation of set theory and functions...
Traceability has been an important subject in the research world to be investigated. In software engineering, traceability has been crucial for software development processes. In food domain, traceability has also been seen as an important topic for tracing food content of various food products and operations. In this paper, we present a software product line (SPL) based traceability model for food...
Just-in-time (JIT) requirements drive agile teams in planning and implementing software systems. In this paper, we start with the hypothesis that performing informal verification of JIT requirements is useful. For this purpose we propose a framework for quality criteria for JIT requirements. This framework can be used by JIT teams to define 'just-enough' quality criteria. The framework also includes...
Over the years of software development, a vast amount of source code has been accumulated. Many code search tools were proposed to help programmers reuse previously-written code by performing free-text queries over a large-scale codebase. Our experience shows that the accuracy of these code search tools are often unsatisfactory. One major reason is that existing tools lack of query understanding ability...
The directive 2006/42/EC sets out essential safety requirements that a machine manufacturer has to meet, before its products may be sold on the European market. The core procedure to meet the provisions of the directive is the so called risk assessment. At present, the risk assessment in the industrial environment is often carried out in an unsystematic way and isolated from the entire product development...
In this paper, we implement the SHA-256 FPGA hardware module for the security protocol of the IEEE 1609.2 vehicle communication (VC). VC requires high-throughput and low-latency hardware architectures. For fast and efficient design, we exploit parallel structures for preprocessing and hash computation in SHA-256. The proposed design is im- plemented in Vertex-5 and verified for correct hash operation...
Personalized medicine seems to be a potential solution to the known challenges facing clinical research and drug development. However, the personalized approach requires many new software tools that are able to interact with each other. These applications are often developed by academic groups as part of a research project. To be employed in clinical trials, these tools must undergo a process called...
Companies expect higher productivity of their software teams when introducing new software development methods. Productivity is commonly understood as the ratio of output created and resources consumed. Whereas the measurement of the resources consumed is rather straightforward, there are several definitions for counting the output of a software development. Source code-based metrics create a set...
Software architecture (SA) documentation provides a blueprint of a software-intensive system for the communication between stakeholders about the high-level design of the system. In open source software (OSS) development, a lack of SA documentation may hinder the use and further development of OSS, but how much "architecture" documentation is enough and appropriate is largely dependent on...
At present, security-related engineering usually requires a big up-front design (BUFD) regarding security requirements and security design. In addition to the BUFD, at the end of the development, a security evaluation process can take up to several months. In today's volatile markets customers want to influence the software design during the development process. Agile processes have proven to support...
Distributed software development is a globally accepted practice by large organizations for achieving significant cost savings in research and development. However when it comes to product quality, defect prevention and early detection has always been a challenge. Factors such as differences in language, coding standards and documentation styles across distributed teams can aggravate the situation...
Much effort has been spent to investigate the organization of distributed teams and their collaboration patterns. It is, however, not fully understood to which extent and how agile software processes are feasible to support distributed software projects. Practices and challenges that arise from the demands for communication are often in scope of current research. Still, it remains unclear what is...
Agile development methods are growing in popularity with a recent survey reporting that more than 80% of organizations now following an agile approach. Agile methods were seen initially as best suited to small, co-located teams developing non-critical systems. The first two constraining characteristics (small and co-located teams) have been addressed as research has emerged describing successful agile...
The article concerns the process of developing biometric devices with a view to submit them for certification in compliance with ISO/IEC 15408 Common Criteria. The author points at the assurance paradigm which shows that the source of assurance is a rigorous process of the product development along with methodical and independent evaluation in an accredited laboratory. The state of the art of certified...
Complex software is becoming an important component of modern safety-critical systems. To assure the correct function of such software, the development processes are heavily regulated by international standards, often making the process very rigid, unable to accommodate changes, causing late integration and increasing the cost of development. Agile methods have been introduced to address these issues...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.