The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Constructing a timetable is a widespread problem. Computers can be employed to solve this problem faster and to produce better solutions. Software solutions for this problem already exist and are used by some universities. However, some universities have complex types of constraints that make it hard to use most of the available software solutions. This paper introduces a software solution for the...
Web applications dependent on back-end databases are currently not immune to SQL injection attacks despite huge investment in security artefacts and defensive software mechanisms deployed by organizations. These forms of attacks involve the insertion of malformed strings or specially crafted input encoded as SQL query into web forms or http header requests to web servers. While many techniques have...
This paper examines network-centric warfare (NCW) penetration within the U.S. Army. NCW was intended to be an emerging theory of war for the information age. It was supposed to provide a conceptual framework that would prevent new technology enabled approaches to warfare from being constrained by outmoded ideas. A thematic analysis of the literature was performed using NVivo 10, a computer assisted...
A graph is used to represent data in which the relationships between the objects in the data are at least as important as the objects themselves. Over the last two decades nearly a hundred file formats have been proposed or used to provide portable access to such data. This paper seeks to review these formats, and provide some insight to both reduce the ongoing creation of unnecessary formats, and...
Software projects are not developed in isolation. Recent research has shifted to studying software ecosystems, communities of projects that depend on each other and are developed together. However, identifying technical dependencies at the ecosystem level can be challenging. In this paper, we propose a new method, known as reference coupling, for detecting technical dependencies between projects....
We propose intensity constraint-based closed sequential pattern mining algorithm, called IC-BIDE, for a coding pattern extraction. Source code often contains frequent patterns of function calls or control flows, i.e., "coding patterns." Previous studies used sequential pattern mining to extract coding pattern, however, these algorithms have not been optimized for coding pattern extraction,...
This paper puts forward the function requirements of the tooth code system, and according to them describes a design that based on VC++ 6.0 and Access database. The system software can generate all the code combinations automatically according to the tooth stage head (the depth of the valleys on the key) and the number of teeth (number of the valleys) [1], and it also can remove the codes that you...
Testing has been a cornerstone of agile software development methodologies since early in the history of the field. However, the terminology used to describe the field -- as well as the evidence in existing literature -- is largely inconsistent. In order to better structure our understanding of the field and to guide future work, we conducted a systematic mapping of agile testing. We investigated...
There are often multiple heterogeneous information systems running simultaneously in current enterprise. The data sources of these systems are independent and closed of each other, making it difficult to communicate, share and integrate them. With the deepening of informatization applications, the needs of information exchange in enterprise interior, between enterprise and external, has become increasingly...
The old manuscripts kept in libraries are a part of the richest cultural heritage and legacy of civilizations. Digitalization is a solution for the preservation of this cultural and historical heritage, which is very difficult to handle for users. The automatic or manual transcription of old Arabic manuscripts is an inevitable stage for the indexing and the diffusion of the contents of these manuscripts,...
This paper presents an overview of the design and implementation of a framework for automated test code generation of SQL stored procedures in a .NET managed code environment, using SQL, XML and the C# programming language. The primary knowledge and coding skills required for developing and using the framework are SQL, XML, and C#. The framework is most useful in a software development scenario where...
The globalization trend has been affecting Central and Eastern European countries since the 1990s. A number of countries, each with its distinct language and culture, have been established after the fall of the Soviet Union and Yugoslavia. To successfully target this market a presentation form is needed that takes into account these unique circumstances. Today, the World Wide Web provides a basis...
Digital repositories are popular means for preserving, restoring, and indexing archaeological and cultural content. They provide the base for development of a fauna of related applications including virtual tours and data management. Common difficulties such as the ever changing software specifications from domain experts make this task challenging as the alterations of the database schema lead to...
Because of the critical role that communication plays in a team's ability to coordinate action, the measurement and analysis of online transcripts in order to predict team performance is becoming increasingly important in domains such as global software development. Current approaches rely on human experts to classify and compare groups according to some prescribed categories, resulting in a laborious...
This paper offers a fresh perspective on the aspect of application security, highlighting a sample attack that is not currently being protected against. Here is a case study which discussed identifying poor coding practices that render Web applications vulnerable to attacks such as remote command execution. Given the increased focus on the need for application security, it is now to be hoped that...
SaaS (Software as a Service) is becoming a popular research field for its feature of novel schema in software development. In this schema, service providers are in charge of constructing, managing and maintaining the necessary IT supporting infrastructure and the platform for operating services, while tenants take use of the customization functions to cement their own individual applications on the...
At current date the problem of how to build distributed and replicated software transactional memory (STM) to enhance both dependability and performance is still largely unexplored. This paper fills this gap by presenting D2STM, a replicated STM whose consistency is ensured in a transparent manner, even in the presence of failures. Strong consistency is enforced at transaction commit time by a non-blocking...
Researches show that a reasonable number of projects failed to achieve their desired goals. There could be many different reasons like managing requirements, excessive documentation of code, difficulty to deliver the software with all required functions on time etc. Through proper management of requirements and concept of reusability, an effort could be made to overcome such percentage of failure...
This study examines communication behaviors in global software student teams. The authors of the paper characterize the types of communication behaviors that occur when student teams are engaged in a software development project. The authors present findings from a one-semester study that examined factors contributing to successful distributed programming interactions among students enrolled at the...
Amino acids (AAs) pairs in protein sheets structures have turned out to be important in studying protein tertiary structures and protein folding pathways. Most existing software tools are sophisticated in visualizing and manipulating protein 3-D structures. However, these tools are inconvenient to retrieve strands alignment information and are not so intuitive to illustrate the AAs pairs on strands...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.