The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The objective of our research is to define a requirements model for Adaptive Multi-organizational Systems. Our work considers the functional complexity of contemporary internet-based, multi-organizational systems. Not only the business functions, but also the interactions between the components of such systems are highly dynamic and global. Furthermore, these systems function in extremely uncertain...
This paper outlines the effects of educational and casual software applications on young children, and defines a framework for monitoring, assessing, and improving their knowledge and skills. It shows how the use of such applications improves children skills in the main learning domains and increases their familiarity with the world. After analyzing specific abilities developed by different categories...
Due to the constant evolution of technology, each day brings new programming languages, development paradigms, and ways of evaluating processes. This is no different with source code metrics, where there is always new metric classes. To use a software metric to support decisions, it is necessary to understand how to perform the metric collection, calculation, interpretation, and analysis. The tasks...
Traditional lighting is focused on the prevention of hardware failures. With the trend towards controlled and connected systems, other components will start playing an equal role in the reliability of it. Here reliability need to be replaced by availability and other modelling approaches are to be taken into account. System prognostics and health management is the next step to service the connected...
NFV (Network Function Virtualization) promises reducing management cost by moving network functions (NFs) from proprietary hardware to software on VMs (Virtual Machines) running on commodity servers [1]. NFV promises the benefit of virtualization to network applications. New NFs are easily deployed as VMs without specially packaged hardware. Virtualization ensures high availability through failover,...
In practical application scenarios, direct attacking on a target system to test the impact of attack methods may expose an attacker's intent and result in the difficulty in evaluating the attack method. Therefore, it is essential to design a controllable target range for testing and evaluating the attack impact. In this paper, we construct an attack test platform in order to evaluate the attack impact...
ASML began collecting data off tools in fabs from ca 1986 for the purpose of diagnostics and troubleshooting. This continued on a manual basis through the 1980's and into the early 1990's when tools began to be connected to the fab network and to the internet. Following manual collection, networked data collection began to take shape and then remote collection began ca 1996. It was from then for the...
Networked activity trackers have become an important tool for assessing physical activity, as part of behavior change interventions, within epidemiological studies, or driven by personal interest. However the use of activity trackers is often abandoned after a few months, and their effect on health behavior is unclear. We conducted a longitudinal study observing the use of activity trackers by 34...
Goal: This work aims to identify metrics to estimate the effort to develop Business Intelligence (BI) system. Methodology: It was conducted a secondary study in order to identify metrics related to BI and to business process complexity. The results conducted to a hypothesis that relates business process complexity to effort required to implement it on BI System. This hypothesis was developed on a...
The increasing number of complex embedded systems used in safety relevant tasks produces major challenges in the field of safety analysis. This paper presents a simulation-based safety analysis that will overcome these challenges. The presented approach consists of two parts: an Error Effect Simulation (EES) and a graph-based specification. The EES is composed of a system simulation with fault injection...
This paper shows how the McCabe cyclomatic complexity measure can be applied to enterprise architectures using standard enterprise architecture framework tools.
Current trend is to increase the overall use of electronic systems in daily life. Exemplarily, the complexity of automotive electronic control unit (ECU) systems is rising due to the number of components involved and the tighter interactions between these heterogeneous components (analog, digital hardware, or software), resulting in a more and more challenging verification. In this paper, we show...
Contextual privacy is an essential concept in social software communication. Managing privacy in social software strongly depends on the context to avoid misappropriation of data. The sheer amount of data and large audiences make context control complex. Current contextual privacy management approaches can be either too complex to use, or too simple to offer fine-grained control. In many cases, it...
Measurement in software engineering is an important activity for successful planning and management of projects under development. However knowing what to measure and how is crucial for the correct interpretation of the measurement results. In this paper, we assess the applicability of a number of software metrics for measuring a set of meta-model properties - size, length, complexity, coupling and...
To break the complexity of the formalisation process, we propose to model a functional requirement document of a control system as composeable monitored, controlled, mode and commanded sub-models. Influenced by the problem frame approach and the decomposition of the four-variable model, we suggest decomposing requirements of a control system into monitored, controlled, mode and commanded sub-problems...
Software evolution is an essential activity that adapts existing software to changes in requirements. Localizing the impact of changes is one of the most efficient strategies for successful evolution. We exploit requirements descriptions in order to extract loosely coupled components and localize changes for evolution. We define a process of elaboration for the goal model that extracts a set of control...
Providing high-quality software in the face of uncertainties, such as dealing with new user needs, changing availability of resources, and faults that are difficult to predict, raises fundamental challenges to software engineers. These challenges have motivated the need for self-adaptive systems. One of the primary claimed benefits of self-adaptation is that a design with external feedback loops provide...
A large number of intelligent components for managing the Future Internet have been proposed recently or are currently being investigated. However, before these network components can be deployed in real-life networks, they need to be thoroughly validated through realistic and large scale experiments. Testbed facilities provide a means to set up large scale network topologies but offer only a limited...
As the construction of malicious software has shifted from novices to commercial, malware attacks grew considerably in frequency and traditional antivirus software fails to detect many modern malware and its increasing complexity has resulted in vulnerabilities that are being exploited by many malwares. In this paper we advocate an artificial immune system (AIS) based cloud security model for malware...
Pointing to the problem of extra monitoring cost of injected runtime software monitoring technologies, this paper proposes a method MCAM, which is used to analyze the extra software monitoring cost. Analyzing and disposing obtained monitoring information, reducing to inject the unnecessary monitoring probes; we propose an optimization analysis method OCAM, which can reduce the software monitoring...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.