The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Agile Software Factory (ASF) was created in the Department of Computer Science at Bowling Green State University nearly ten years ago to promote the use of agile methods, improve student education through service-learning opportunities, and to facilitate community engagement by handling the many software requests that regularly arrive in the department. In pursuit of these goals, the ASF has had...
This paper gives a brief overview of the 12th Workshop on Trends in Enterprise Architecture Research (TEAR) held at EDOC 2017. The paper introduces the Workshop research topics and presents the accepted papers.
Knowledge is seen as one of the main resources for organizations providing knowledge-intensive services. Therefore, sharing and reusing are the main goals of the modern knowledge management (KM) approach, driven by information and communication technologies (ICT). However, one must ask for the details in order to provide the means and tools to design and deploy an environment able to fulfil these...
The 2017 International Conference on Engineering Technologies and Computer Science (EnT 2017) was held at the S.I. Vavilov Institute for the History of Science and Technology of the Russian Academy of Sciences (IHST) the leading Russian research institute for the history of Science and technology, on September 28, 2017. It was the fourth international conference EnT. The conference EnT 2017 was devoted...
Understanding computer system hardware is basic for the undergraduate student which study in the computer area. System user always needs a faster, cheap and reliable process which is conducted by it computer system self. To fulfill that process is required how a computer works from their design and how they operate. That course is conducted by Computer Architecture and Organization (CAO) course. Two...
Cloud computing is undoubtedly considered one of the most discussed topics in recent times, both in the research and business sectors. Various schools of thought have attempted to provide a fitting definition from many aspects. This computing paradigm can be defined as a web-based computing model designed to allow both off-site storage and easy data and digital file sharing. The SQL injection, which...
Child abuse has been one of global issue recently. There are big number of child abuse case in every country in the world. It drives most of country in this world form their private organization to handle the child abuse issue. While running their organization, they also form child abuse policy. Recently, the presence of technology has changed the way people in doing activities. In this paper, we...
Knowledge Management system is a system that can provide accommodation and storage of knowledge. Storage of useful knowledge for the business processes necessary to sustain existing knowledge. Knowledge management system can accommodate knowledges, so that if needed at any time can be reused. Storage of knowledge in this system, to get it back to do a search string to facilitate the search for knowledge...
Human behavior inside organizations is considered the main threat to organizations. Moreover, in information security the human element consider the most of weakest link in general. Therefore it is crucial to create an information security culture to protect the organization's assets from inside and to influence employees' security behavior. This paper focuses on identifying the definitions and frameworks...
This paper proposes a knowledge creation model for graduate students and introduces a checklist of evaluation of research ability and research environment based on this model. The model is derived from three academic knowledge creation models, which were proposed with reference to a famous organizational knowledge creation model. A questionnaire survey, using the checklist at a graduate school of...
Existing approach to model sensor movement data as pairwise connections in networks implicitly assumes the Markov property and loses higher-order movement patterns. While the higher-order network (HON) captures higher-order movement patterns, there has not yet been a visualization tool tailored for HON. Based on our prior work, in this demo we present HoNVis, a comprehensive visualization and interactive...
Business processes change over time in response to changing circumstances, it is crucial for process managers to discover and understand such changes from event logs. While existing techniques in process mining cannot efficiently detect and locate concept drifts in uncompleted event logs. Hence, an appropriate method, which could prompt to unravel the process evolution, may greatly assist organizations...
Open experimental teaching reform has been carried out for 6 years in Huazhong Agricultural University, in which the experimental items can be set up scientifically and rationally according to different majors. Because the experimental time, the experimental space and the experimental contents are completely open to the whole college students, the experiments can be reserved through the online experimental...
In the most basic sense, a network is any collection of objects in which some pairs of these objects are connected by links. In a network of objects, objects can be people or computers, which we refer to them as nodes of the network. Social links among friends play an important role in dictating their behavior. In online social networks (OSNs), these social links determine the flow of information...
Security and privacy in cloud computing are critical components for various organizations that depend on the cloud in their daily operations. Customers' data and the organizations' proprietary information have been subject to various attacks in the past. In this paper, we develop a set of Moving Target Defense (MTD) strategies that randomize the location of the Virtual Machines (VMs) to harden the...
OpenGIS SQL is a standard for incorporating GIS and spatial concepts into SQL. Two types of methods are part of OpenGIS SQL: (1) boolean methods for topological relationships among spatial objects, and (2) methods for specifying spatial operations. We prove that the complete set of 2-dimensional spatial relationships defined by Egenhofer can all be specified using OpenGIS SQL operations and relationships...
Online networks, including Facebook and MySpace, provide an easy way to create circles of friends. These applications enable the people to connect with a worldwide community. Debate platforms have been investigated into many types of online applications, as a way to encourage the users to participate for enhancements, e.g., debate applications that based on some type of collaborative filtering. Here...
Real-world knowledge is growing rapidly nowadays. New entities arise with time, resulting in large volumes of relations that do not exist in current knowledge graphs (KGs). These relations containing at least one new entity are called emerging relations. They often appear in news, and hence the latest information about new entities and relations can be learned from news timely. In this paper, we focus...
Magnetic disk capacities have grown over the last decades by a factor of at least ten thousand. While the minicomputer disk drives of the late eighties could only store 600 MB of data [5], 8TB or 10TB disk drives are common today. The same is not true for disk transfer rates: they are just one hundred times higher than those of the late eighties. As a result, copying the entire contents of a disk...
Challenges in bioinformatics include tools to treat large-scale processing, mainly due to the large volumes of data generated by high-throughput sequencing machines. Besides, many of these tools are not user friendly, and do not distribute their workloads properly. In federated cloud environments, even though services and resources are shared and available online, the processes of a workflow execution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.