The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The incorporation of peer code reviews as being part of a developer's work flow, and hence the software development lifecycle, has steadily grown in popularity over the past three decades. During the process of statically inspecting code, developers of a codebase are able to collaboratively detect possible code defects, as well as use code reviews as a means of transferring knowledge to improve the...
This study reviews the current situation of Self-Access Media (SAM) and independent learning by looking at Self-Access Learning Materials (SALM) available for Computer Graphics (CG) artists. Since past two decades huge progress in software, hardware, Graphical User Interface (GUI) and World Wide Web (WWW) has enabled many individuals to develop an independent learning attitude by using SALM (mostly...
Modern healthcare systems are still struggling to provide patient-centered healthcare instead of clinician-centered, as it is essential to implement major aspects of modern healthcare such as continuity of care, evidence-based treatment and more importantly preventing medical mistakes. In order to implement patient-centered, it is necessary to collect all the relevant clinical /non-clinical data for...
The evolution of software to maintain its performance and usefulness over time occurs in successful software development processes. To address this, Meir Lehman formulated his well-known software-evolution laws. This article evaluates Lehman's laws in the context of two companies' real-world software-product-line projects to gain useful insights about the evolution process.
The rapid growth of computer technologies has resulted in a corresponding increase in the creation of new loopholes in systems which eventually might result in data leak. Data leakage is an incident in which sensitive information is released to any unauthorized party intentionally or unintentionally. There is a large set of software available which can be used to prevent data leak, however they fail...
Despite a widely-acknowledged shortage of software developers, and reports of a gap between industry needs and software education, the possible gap between students' needs and software development education has not been explored in detail. In their university education, students want to take courses and carry out projects that clearly relate to their lives and their goals. This paper reports on a...
We have investigated whether Agile practices can be applied as a pedagogical approach to derive benefit in the areas of encouraging students to take responsibility for their learning (self managed learning), continuous improvement through reflection, alternative approaches for grading, increased engagement by learners, and more effective data collection and assessment of outcomes. Agile is an umbrella...
By using the essence of Tai Chi Thought (TCT), software's characteristics are analyzed, and a new kind of method for solving software problems is provided. The basic elements of TCT are introduced and their application is discussed. Software, in general, not only has a weakness such as abnormality, but also has a strength, namely plasticity. The complexity of software is due to the complexity of human...
Cyber-Physical systems become increasingly interconnected. Mastering the governance of such systems, in particular in the era of the Internet of Things and Industry 4.0, where CPS are part of large (infra)-strcutures that span across boundaries of responsibility and of control, is becoming a challenge per se. We examine the requirements posed by such an evolution of the CPS and discuss some risks...
In the U.S., preventable medical errors claim the lives of about 400,000 patients per year. Much of it is blamed for the lack of interoperable medical information at right time. Often times, personal medical information is stored in multiple clinical institutions in non-sharable format such as paper based. To provide effective and continuity of care, personal medical data need to be shared and patients...
The talk will discuss how open hardware, open software, and disaggregation enable to build efficient data centers in any size from small to super-big. The talk will show a real life Facebook architecture in network, hardware and software that will enable future data centers developers to control their destiny and scale at their own pace the data center capacity and size with the most effective PUI...
Computing field has been revolutionized in last three decades throughout the world. A large number of universities are offering undergraduate Computer Science and Software degrees in Pakistan. It is an imperative for high school students to know convergences and divergences between both degree programs before securing admission. The trend of introducing undergraduate Software Engineering degree in...
Mobile Offshore Units (MOUs) are increasingly dependent on complex software-based controls and automation. However, the industry has been slow to adapt to this software-intensive environment. Delays in commissioning and operational downtime due to software and integration problems are commonplace. This article describes a new standard, OS D-203, Integrated Software Dependent Systems (ISDS), developed...
I juxtapose testimony and research to take notice and illustrate the kind of intervention in the Política Nacional de Informática (P.N.I.) carried out in 1979 by a group of military officials who were members of the Serviço Nacional de Informações (S.N.I.) - the political police of the military dictatorship that ruled Brazil from 1964 to 1986. Very specifically, I focus on an episode: that group of...
Computer science graduates face unprecedented opportunities and unforeseen challenges in today's highly global economy. These students will have to work and to think with international perspectives and cultural awareness. In this paper, we report on our experiences organizing and teaching the Pacific Rim Summer Schools in Global Distributed Software Development. We describe the motivation for our...
This paper puts forward the function requirements of the tooth code system, and according to them describes a design that based on VC++ 6.0 and Access database. The system software can generate all the code combinations automatically according to the tooth stage head (the depth of the valleys on the key) and the number of teeth (number of the valleys) [1], and it also can remove the codes that you...
Nowadays most of the corporations claimed lack of staff . On the contrary , for students , they also have difficulty in finding a job . With this dilemma , this thesis put forword a new teaching method, which is Program design inquiry method. Having a research on the demand of software industry , with the characteristics that most of students like playing games , we can use games for case teaching...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.