The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, Online Social Networks (OSNs) has become one of the most common ways among people to facilitate communication. This has made it a target for attackers to steal information from influential users and has brought new forms of customized attacks for OSNs. Attackers take advantage of the user's trustworthiness when using OSN. This exploitation leads to attacks with a combination of both classical...
The purpose of this study is to investigate the best practices in the transdisciplinary field of knowledge management system implementation and measurement of IT Complain in a telecommunication company (PT Telkomsel). This paper examines three variables of Knowledge Management (People, Process and Technology) and IT Complain Variable. This research used two methods such as a qualitative and quantitative...
The earlier result of his research showed that most Taiwanese SME designers were frustrated in innovations since it takes hard evidences to persuade their managements, but they are in lack of resources. Thus, this research proposed the SSFD model with ready templates to help them. This paper focused on the third stage of the SSFD Model, i.e. "The Stage of Strategy Formulation". It will help...
Currently, the electricity demand is exponentially increasing due to the population growth. Therefore, the demand side management (DSM) is becoming unavoidable especially with the increasing use of renewable energy sources. One of the most known tactics of DSM is the use pricing strategies to threaten users to schedule their loads by controlling their own appliances. In this paper, a new model of...
The new generation of R&D personnel has unique personality characteristics and work values, which brings challenge for the human resource management in enterprises. Based on the literature analysis and in-depth interviews, this paper puts forward a five-dimension model of work values for the new generation of R&D personnel and makes an empirical test through the questionnaire survey and statistical...
This paper presents a graphical interface allowing the integration of free SPICE simulator into the Cadence Design Environment which is commonly used for integrated circuits Design. The developed interface is based on the SKILL language and does not require additional license. The capability of the developed interface to perform multiple simulation set-up, component parameterization, output results...
Identifying strengths and weaknesses in requirements engineering (RE) activities and deriving corresponding improvement and rectification recommendations are the main goals of the presented content-based RE assessment approach, which relies on a well-founded RE reference model. Two representative examples from our case study pool, carried out for companies with established RE practices in different...
In this paper, related to system simulation theory, based on Flexsim simulation software, dynamic simulation models of packaging workshop in a meat food distribution center are built. The running condition of packaging workshop is realized through analyzing the simulation result. Evaluated the utilization of testing, packaging and other equipment to assess the system performance, then identified bottlenecks...
The increasing awareness about the importance of requirements engineering (RE) has tempted many enterprises to invest effort in the improvement of their corresponding RE processes. Many small and medium sized enterprises (SME) have less budget and effort available for improvement work and lack the in-house competence to make the improvements on their own. To compensate the lack of know-how in RE,...
In this paper we present the results of a two day workshop - a set of functional roles performed by software engineers during their first year and the knowledge and skill requirements that enable them in playing these roles. An effective curriculum that is aligned with needs of our business units is designed (for our entry level training program) based on the results of the workshop.
Experimental teaching is considered to become more and more important in economics and management, at present, there are some problem in information and management laboratories. In this article, a new experimental teaching system is proposed, which is based on virtual company, and students are encouraged to think lonely in the system, there are simulation of environment of IS development and jobs...
This paper studies the impact of intra-die random variability on low-power digital circuit designs, specifically, circuit timing failures due to intra-die variability. We identify a new low-Vdd statistical failure mode that is strongly supply-voltage dependent and also introduce a simple yet novel method for quantifying the effects of process variability on digital timing - a delay overlapping stage...
In agent bilateral multi-issue bidding negotiation protocol, how to make the negotiation agents gain satisfying result farthest and negotiate efficiently is a key issue. As for this problem, a genetic algorithm based on metropolis rule is present in the protocol and the algorithm is applied in bilateral multi-issue simultaneous bidding negotiation protocol in E-commerce. In the protocol, the negotiation...
Systems verification requires first to model the system to be verified, then to formalize the properties to be satisfied, and finally to describe the behaviour of the environment. This last point, known as the proof context, is often neglected. It could, however, be of great importance in order to reduce the complexity of the proof. The question is then how to formalize such a proof context. This...
We present features of an education system entirely based on a 7-months project, performed by a 6-students team within a virtual company and tutored by an experimented software engineer. We describe some aspects of a past project: functions of the system, technology, deliverables, and assessment. Students' outcomes are drafted in term of roles.
Modern business process modeling languages such as BPMN or EPC provide users with more constructs to represent real world situations than their predecessors such as IDEF or Petri Nets. But this apparent increase in expressiveness is accompanied by an increase in language complexity. In practice many organizations choose to only use a subset of the available modeling constructs. Using a well established...
SEAM is an enterprise architecture method based on RM-ODP part 2. In this paper, we present an example of a SEAM hierarchical model where the behavioral part is formalized in Alloy. We introduce four kinds of actions and their relationships to properties that specify object state. We show that the Alloy formalization enables us to check that the SEAM model conforms to the required aspects of the universe...
Process modeling and rule modeling languages are both used to document organizational policies and procedures. However, little work has been done to understand their synergies and overlap. Understanding the relationship between the two modeling types would allow organizations to maximize synergies and reduce their modeling effort. In this paper we use the well-established Bunge-Wand-Weber (BWW) representation...
An important issue to the adoption of any enterprise architectural approach is the availability of tools to support the development, storage, presentation, analysis, improvement and evolution of enterprise architecture representations. As with enterprise architecture methodologies, enterprise architecture tools to support the architectural development process are still emerging. Most important software...
Information privacy typically concerns the confidentiality of personal identifiable information (PII) and protected health information (PHI) such as electronic medical records. Thus, the information access control mechanism for e-health services must be embedded with privacy-enhancing technologies. Role-based access control (RBAC) model has been widely investigated and applied to various applications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.