The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Arctic conditions and the territorial politico-economic crisis in Ukraine are two different types of extreme conditions, where civilian authorities need to use Remotely Piloted Aircraft Systems (RPAS) to support manned processes and other information systems. Due to the lack of adequate research and publications, best practice may remain unshared. Therefore authorities may not be aware of potential...
The focus of this paper is a discussion on the organizational integration of BDIM activities into an IT infrastructure. In particular, this paper provides a definition of the usefulness of a center of excellence within information systems, its structure and measurement of capabilities. The organizational capabilities pertaining to BDIM can be measured through the introduction of a maturity model,...
Owning a SOC is an important status symbol for many organizations. Although the concept of a 'SOC' can be considered a hype, only a few of them are actually effective in counteracting cybercrime and IT abuse. A literature review reveals that there is no standard framework available and no clear scope or vision on SOCs. In most of the papers, specific implementations are described, although often with...
Chinese monitorial System has played a certain positive role in the process of higher education increasingly popular. This paper made some investigation on its origin, its existence category, the role played in practical work. Combining with the teaching practice, the author analyzed the problem resulted from the management mode and discussed it in detail from the students' ideological work orientation,...
This position paper explores the possibility of building autonomic systems using super-agents, virtual organizations of one or more agents that seek to govern a complex resource. The paper discusses first a control-loop suitable for building self-governed agents as an attempt to extend the original idea of autonomic managers with self-governance. It then sketches the structure of super-agents and...
The purpose of this article is to present a case study of an action plan as a service management tool in the Thai public sector. The case will show how the Thai public sector formulates, implements, evaluates, and improves its development plans. In addition, it shows how relevant organizations coordinate and cooperate with one another at national, provincial, and individual team levels. This article...
The acquisition by developers of e-science applications of a thorough understanding of the requirements of end-users has been recognized as playing a critical role in the usability of such applications. However, there is another dimension to such an understanding that also plays an important role, namely the extent to which these developers converge on a shared understanding of these requirements...
It is hard to judge whether one subject is to be trusted where federation identity management only focuses on identity trust achieved by credentials the subject hold. So we propose a behavior trust-based federation identity management mechanism. The trust value was modified according to the subjectpsilas behavior and it will be employed in identity management procedure including identity mapping and...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
A fast inter mode decision algorithm for H.264 is proposed in this paper. Computational savings are achieved by identifying macroblocks (MBs) that are likely to be skipped in advance. This early prediction are made by three steps: 1) Based on the correlation of MBs and threshold, prior to motion estimation (ME), SKIP mode can be decided; 2) After ME, if the distortion for SKIP is less than or equal...
An organizational level test strategy needs to incorporate metrics to make the testing activities visible and available to process improvements. The majority of testing measurements that are done are based on faults found in the test execution phase. In contrast, this paper investigates metrics to support software test planning and test design processes. We have assembled metrics in these two process...
Due to the continuously growing possibilities provided by technology and its wider application, today's IT products are becoming more and more complex both from technical and managerial standpoints. Very often, multiple parties are involved in their development. Consequently, the organization of the integration and testing of these products gets increasingly complex. Organisations already encounter...
A process is an important concept in modern software development. Only when the activities are organized in process descriptions, can these be communicated, followed, observed, and improved. The basis for understanding what testing is, is therefore the understanding of the testing process. This paper presents the general concept of a process, and expands on this to present a suggestion for a generic...
Too often projects deliver software of which the quality is difficult to predict. Sometimes the project completion is delayed due to the continuous change of requirements while the software is still being built. The quality level must align with the company needs. It is extremely important that the planned benefits of an IT system are reached. When the benefits are not achieved it will cause much...
Management of testing provides high level control on testing and monitoring of testing provides both high level and detailed insight in the testing activities. The combination of management and monitoring gives a strong grip on test processes and test projects. This is required to manage risk, to increase efficiency and to provide transparency into development and test processes for various stakeholders...
Software security testing tools and methodologies are presently abundant, and the question no longer seems to be "if to test" for security, but rather "where and when to test" and "then what?". In this paper we present a review of security testing literature, and propose a software security testing scheme that exploits an intra-organisational repository of discovered...
The UNICORE grid system provides a seamless, secure and intuitive access to distributed grid resources. In recent years, UNICORE 5 is used as a well-tested grid middleware system in production grids (e.g. DEISA, D-Grid) and at many supercomputer centers world-wide. Beyond this production usage, UNICORE serves as a solid basis in many European and International research projects and business scenarios...
Compliance management (CM) is the management process that an organization implements to ensure organizational compliance with relevant requirements and expectations. Compliance auditing (CA) is a child-process of CM where compliance rules and policies are individually checked against the organization to determine the level of compliance achieved by the organization. In this paper, we arrange organizational...
Requirements modeling has been recently introduced in the UML world with the form of a new profile called SysML. This paper explores the possibility to link concepts used to describe requirements with those of the enterprise language of RM-ODP. Some correspondence rules are proposed and illustrated on a case study.
The Open Distributed Processing Reference Model (ODP-RM) provides viewpoints and abstract infrastructure guidelines that can be used for a basis for enterprise architecture, especially for an inter-enterprise architecture. The ODP-RM does not prescribe methodology for modeling itself, but provides common vocabulary and focus for description. This paper performs a brief analysis of the ODP-RM (and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.