The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When we think of Marketplaces we think of places where third parties bring their goods for consumers to find them and transact in some convenient way. When we take this idea to the cloud services space we think of third party services providers that bring their cloud services, and services consumers that expect to match the capabilities that best suit their needs with a service offering. Services...
Dominant trends in today's IT research such as service orientation and cloud computing will enable novel business information systems, called Emergent Systems. However, the introduction of Emergent Systems will have a significant impact and pose challenges relating to requirements engineering. In this position paper we propose and describe the so-called SoMBRERO framework that aims to address practical...
Technology business incubator is a kind of knowledge-intensive service organizations and its core function is to provide knowledge service mainly about entrepreneurial knowledge for incubatees. Firstly, this paper gives the definition and connotation of competitiveness of business incubators from the view of knowledge. Then, from the perspective of knowledge flows, knowledge stores and knowledge operational...
The importance of tacit knowledge in Requirements Engineering (RE) is widely acknowledged. While valuable work has developed techniques to expose sources of tacit knowledge during requirements elicitation, such techniques are not universally applied and tacit knowledge, continues to negatively affect the quality of the requirements. In this position paper we present a brief review and interpretation...
Regardless of which networking protocols or technologies form the core of the future Internet it is clear that the environment as a whole will need to support a very broad range of business and user interaction modes. In todays Internet we observe the growing trend for services to be both provided and consumed by loosely coupled value networks of consumers, providers and combined consumer/providers...
Downey et al. laid out a clear path of learning criteria and outcomes for global competence in their 2006 JournalofEngineeringEducation publication. We build on their work by integrating other disciplinary perspectives to expand upon the questions: ldquoHow can global competency be learned?rdquo, and ldquoHow can we assess it?rdquo In this work-in-progress paper, we propose an expanded framework...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Recently, Lee et al. proposed a remote authentication model of information appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network of information appliances to hackers. In this paper, we propose a new secure remote control model for information appliances (SRCMIA) to fix this error. Besides, our model can also achieve both message authentication and one-time secret...
As digital resources increasingly growing and the economic benefit of digital intellectual property rights being increasingly important, people has been increasingly emphasis on information security issues brought by the data remnants in storage devices. They try their best to prevent the potential risks. In this paper, we survey comprehensively related technologies, standards and trends of erasure,...
Improving the productivity of any business process initially requires its measurement. Therefore, automated models for comparison, simulation and analysis of products and the appendant workflows are being developed and improved constantly. Since the results delivered by such automatically trained systems are highly dependent on both quantity and quality of the input data used, gathering a statistically...
We present features of an education system entirely based on a 7-months project, performed by a 6-students team within a virtual company and tutored by an experimented software engineer. We describe some aspects of a past project: functions of the system, technology, deliverables, and assessment. Students' outcomes are drafted in term of roles.
Knowledge representation is a multidisciplinary subject that needs to apply theories and techniques from logic, ontology and computation. There are a great number of languages able to represent knowledge, among them UML can be considered a suitable language for modelling knowledge. It could be included within the category of visual languages for knowledge representation. On the other hand, numerous...
Current fashion systems to interconnect large software architectures are moving toward SOA based solutions. This new paradigm for designing system can be improved, in our opinion, by using semantics. Semantics can a play a main role in boosting interoperability thanks to current technologies to express knowledge and to describe semantic Web services (SWS). This paper tackles the provision of a Software...
We developed a quality of service (QoS) management system to support service level management (SLM) for global enterprise services. The QoS management system is integrated with one of our enterprise services in a preproduction system, an identical system as the production system but in a test environment. Lab experiments showed that our integrated solution helps global enterprise services to better...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.