The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Spreadsheets serve as a basis for decision-making processes in many companies and bugs in spreadsheets can therefore represent a considerable risk to businesses. Systematic tests can help to locate such bugs, but providing test cases can be cumbersome and complex for large real-world spreadsheets. To make the specification of test cases easier, we propose to split spreadsheets into smaller logically...
Information security is built on top of three basic building blocks: people, processes and technology. Even when organization has very refined processes and state of the art technology, people usually remain the weakest link in the security chain. Social engineering is the practice of obtaining confidential information or valuable assets by manipulation of legitimate users or owners. Large telecommunication...
In this paper, we develop a combinatorial testing technique for tree-structured test models. First, we generalize our previous test models for combinatorial testing based on and-xor trees with constraints limited to a syntactic subset of propositional logic, to allow for constraints in full propositional logic. We prove that the generalized test models are strictly more expressive than the limited...
Having IT Service management as the main professional focus we perform projects for local and international companies in various industries including banking. It is not difficult to see that even in the most mature companies signs of "island-thinking" between Development and Operations are present. Lack of cooperation between these two IT teams often appears to be the root cause of various...
F-Secure is a global leader in providing security as a service through ISP's and mobile operators [1]. The company first used Agile more than 5 years ago and is still in the transition and building the true Agile culture. Test automation (TA) is one of Agile practices that the company has been focusing on and improving lately [2]. This paper describes how TA has been implemented in the company, benefits...
It is no secret that a pattern “greedy for money e-lancer” exists. Outsourcing teams think only about their profit and try to increase project budget. Therewith the worst of them work with low quality. Of course this pattern hasn't arisen from scratch. There were precedents. Precedents happen. And precedents will happen. But they can be prevented. To do this we should admit these problems and begin...
Last fall I received an email with the software requirements from a potential customer that would establish us in an important new market. We had been brought in when the client had only two months left before deploying their chosen solution. The customer requirements list is vague and long, but the prize is big. Could we design and deploy major functionality in just two months? Thanks to agile development...
This paper reviews recent experimental confirmations that the intrinsic radiation robustness of commercial CMOS technologies naturally improves with the down-scaling. When additionally using innovative design techniques, it becomes now possible to assure that performance and radiation-hardness are both met. An illustration is given with an original nano-power and radiation-hardened 8 Mb SRAM designed...
In this paper, the short-term scheduling of cascaded hydroelectric chain plants with pumped-storage units is considered. Some integer variables are carefully introduced such that the original problem is successfully formulated as a mixed-integer linear programming. The model given in this paper admits of many complex characteristics such as nonlinear hydroelectric production function, minimum/maximum...
For several decades, the output from semiconductor manufacturers has been high volume products with process optimisation being continued throughout the lifetime of the product to ensure a satisfactory yield. However, product lifetimes are continually shrinking to keep pace with market demands. Furthermore there is an increase in dasiafoundrypsila business where product volumes are low; consequently...
In a real world, it is often in a group setting that sensitive information has to be stored in databases of a server. Although personal information does not need to be stored in a server, the secret information shared by group members is likely to be stored there. The shared sensitive information requires more security and privacy protection. To our best knowledge, there is no paper which deals with...
In this paper, an improved Locally Linear Embedding method is proposed and used in the multi-pose ear recognition. In the traditional LLE method, the neighbors of a data point are selected by using k-nearest neighbor algorithm or e-nearest neighbor algorithm. Both of these methods neglect the different neighborhood of each data point and use a uniform way to select neighbors which leads to the sensitiveness...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.