The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software development process encompasses multiple types of and differentiated versions of artefacts during the corresponding lifecycle. These artefacts are vulnerable to artefact drift or erosion when the product being developed gets changed. As a result different artefacts are subject to differential rates of updates compared to each other. Managing the software artefacts is one of the major problems...
The Integrated Development Environment (IDE) based development tools like .NET framework, Windows Builder, Net beans are popular for easier and comparably faster project development which is also need of an hour. These tools have capabilities of Drag and Drop (DND) with tool box with controls which help developer to design Graphical User Interface (GUI) just with mouse click. But, none of these tools...
IT complexity in enterprise today continues to grow at a dizzying rate. Technology innovation, vendor heterogeneity, and business demands are major reasons why organizations are exposed to new risks, based on the gaps opened between the options and features of each IT element and product, and how they are implemented to support a well-defined policy and company strategy. Moreover, the impact of such...
This case study compares two different technologies - model-driven development (MDD) and aspect-oriented programming (AOP) - both trying to avoid redundant code, but with very different approaches. A real industrial software system, the OpenSOA platform, which had already applied a model-driven XML/XSL-T approach, is used as the basis for implementation and comparison. For evaluation purpose, we have...
To help developers understand and reuse programs, semantic queries on the source code itself is attractive. Although programs in heterogeneous languages are being controlled for collaborative software development, most queries supported by various source code repositories are based either on the metadata of the repositories, or on indexed identifiers and method signatures. Few provide full support...
Constructing complex queries in SQL sometimes necessitates the use of language constructs and the invocation of internal functions which inexperienced developers find hard to comprehend or which are unknown to them. In the worst case, bad usage of these constructs might lead to errors, to ineffective queries, or hamper developers in their tasks.
Examining a large number of software artifacts can provide the research community with data regarding quality and design. We present a dataset obtained by statically analyzing 22730 jar files taken from the Maven central archive, which is the de-facto application library repository for the Java ecosystem. For our analysis we used three popular static analysis tools that calculate metrics regarding...
The Florida Department of Health funds beach water sampling for 34 of Florida's coastal counties. Mote Marine Laboratory, in conjunction with the Gulf of Mexico Coastal Ocean Observing System (GCOOS) developed an automated data harvester that used Web scraping technology to capture the reported data from each monitored county and store the data in a MySQL database. The database was queried nightly...
Current empirical studies on the evolution of software systems are primarily analysing source code. Sometimes, social aspects such as the activity of contributors are considered as well. Very few studies, however, focus on data-intensive software systems (DISS), in which a significant part of the total development effort is devoted to maintaining and evolving the database schema. We report on early...
Database driven web pages play a vital role in multiple domains like online shopping, e-education systems, cloud computing and other. Such databases are accessible through HTML forms and user interfaces. They return the result pages come from the underlying databases as per the nature of the user query. Such types of databases are termed as Web Databases (WDB). Web databases have been frequently employed...
Web-based applications in computational medicine have become increasingly important during the last years. The rapid growth of the World Wide Web supposes a new paradigm in the telemedicine and eHealth areas in order to assist and enhance the prevention, diagnosis and treatment of patients. Furthermore, training of radiologists and management of medical databases are also becoming increasingly important...
The popularity of the Internet and the rapid development of Web technology and its application make the XML technology developed quickly. More and more programmers store the data in XML form. With the large number of XML documents, applications need to continue to deal with XML data, access and update the XML data. Then XQuery is emerged. This paper introduces the XQuery language briefly, discusses...
In order to fully exploit the potential of optimization algorithms for energy savings in factory automation settings, it is needed to bring together engineers that have knowledge of signal processing algorithms with shop floor engineers that are experienced with real manufacturing processes and factory automation settings. This paper presents an open database storing energy-relevant data from a multi-robot...
The shortcoming in development of Mobile value-added business is analyzed firstly, then the Meaning and Purpose of the MISC Platform connected SP's interface project are introduced. The mainframe, key technique and main function of the system are introduced emphasizely. The result of test proves that the system project is logical, reliable and exact.
In this paper, an implementation of a Resource Directory, a directory storing descriptions of resources available in an Internet of Things system, based on a native XML database is described. Its performance is compared with performance of a Resource Directory with the same functionality, but implemented using a relational, SQL database. The evaluation results show hat the XML based Resource Directory...
Recognizing the importance of the public information, countries such as the US, the UK and Korea have been disclosing it on population, crime and health in various ways with a view to revitalizing its use. However, using the disclosed public information in the development of the applications for boosting its public use has difficulties because there is no standard interface for accessing it, therefore,...
An identifier is an important key in mapping program elements onto domain knowledge for the purpose of program comprehension. Therefore, if identifiers in a program have inappropriate names, developers can waste a lot of time trying to understand the program. This paper proposes a method for extracting and gathering verb-object (V-O) relations, as good examples of naming, from source code written...
At present, the Database Application System Interface and access logic are all auto-generated by dragging the data table object from the database server view in the database application system development environment, or by linking the well-designed interface controls with the fields of the table in the database. A new direction of Interface Controls Descriptions (ICD method) is proposed, which is...
Online travel and ticket booking is one of the top E-Commerce industries. As they present a mix of products: flights, hotels, tickets, restaurants, activities and vacational packages, they rely on a wide range of technologies to support them: Javascript, AJAX, XML, B2B Web services, Caching, Search Algorithms and Affiliation; resulting in a very rich and heterogeneous workload. Moreover, visits to...
Business critical applications are increasingly being deployed as web services that access database systems, and must provide secure operations to its clients. Although the open web environment emphasizes the need for security, several studies show that web services are still being deployed with command injection vulnerabilities. This paper proposes a learning-based approach to secure web services...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.