The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automated testing is a hot topic in computing testing society. The automated test management is an important component in this domain. Workflow Management System(WfMS) is a powerful tool to support software testing process management and automation. Java Business Process Management (jBPM) is a flexible and extensible framework combing the convenience of workflow capabilities and the outstanding scalability...
The next generation network (NGN) is driven by business. The business identification and control is meaningful to management of NGN and safety. Aimed at the accuracy and effectiveness of network business identification mechanism, one systematic model is developed with accurate and intelligent identification function. The research on business flow identification technology is conducted. Through testing...
This paper explored the use of audit evidence gathering techniques by internal audit functions in order to test the effectiveness of controls. The paper focused specifically on the use of audit sampling and computer assisted audit techniques (CAATs). The focus of the paper was the banking sector in South Africa. The increasing volumes of transactions that are processed by banks on a daily basis necessitated...
In China, production safety supervision is greatly valued. Production Safety Gridding Supervision System (PSGSS) came into being. Document processing and Information Push are primarily requirements of the users and core functions of the system. In this paper, these two techniques were analyzed, discussed and implementation.
The global trend of Future Internet related experimentally driven research has gained a strong momentum. In this context sustainability and the best use of developed infrastructures are highly critical. While many facilities have reached a level of maturity that allows them to be opened up to a wider use, mainly the academic sectors have been targeted. The Fanning out Testbeds-as-a-Service for the...
One of the challenges in IT Service Management is an assessment of an innovation benefit introduced into service delivery on performance of IT System Administrator (SA). The question is especially complex when variability of the service requests load is taken into account. We used the sequential probability ratio test to assess effects of innovation for a case when a load of the service teams is constant...
Mobile devices such as smartphones and tablets are widely used for personal and business uses. Compared to personal mobile subscribers, enterprises have more concerns about mobile device security. The challenges an enterprise may face include unlimited access to corporate resources, lack of encryption on corporate data, unwillingness to backup data, etc. Many of these issues have been resolved by...
The contribution of virtualising technology is without doubts. Frequently the defence of contribution of virtualization is ungrounded or with very weak argumentative support. UHK (University of Hradec Kralove) carried out a research to verify the validity of these facts. This paper presents a part of the research output. It particularly deals with approaches how to process expected decrease in electric...
This paper focuses on the importance of test driven development, in an interdisciplinary academic case study, involving unauthorized access and fraud. In it, Problem Based Learning (PBL) enabled the organization of an environment for diverse knowledge and skills, favorable to experimentation and prototyping of new models, methods, techniques, and tools. The application of the principles of agile methods...
Service oriented architectures (SOAs) allow for interesting and flexible software designs for complex problems. Such complex designs, however, require us to pay special attention to ensuring their quality. Extending earlier work on a testing and diagnosis concept for SOAs, we report in this paper on our first experience regarding an experimental setup with a test case generation algorithm based on...
We present Web Mate, a tool for automatically generating test cases for Web applications. Given only the URL of the starting page, Web Mate automatically explores the functionality of a Web application, detecting differences across multiple browsers or operating systems, as well as across different revisions of the same Web application. Web Mate can handle full Web 2.0 functionality and explore sites...
Orthogonal arrays are a powerful tool in quality and statistics. This paper shows new applications for improving testing effectiveness and efficiency in a multi-parameter environment, which is commonly encountered in today's software and systems. Unique aspects of this paper are applications in diverse areas — telecommunications, defense, automotive, information technology, and financial systems....
The agile software development approach makes developing secure software challenging. Existing approaches for extending the agile development process, which enables incremental and iterative software development, fall short of providing a method for efficiently ensuring the security of the software increments produced at the end of each iteration. This article (a) proposes a method for security reassurance...
We are developing a test case generation service that uses symbolic execution technique, to support testing of Java programs. In addition to program under test, we need drivers and stubs to execute the service. However, preparing drivers and stubs manually is a time-consuming and sometimes difficult task. In order to reduce the cost of such manual effort, we developed a tool that automates not only...
Though customer databases are so important, they can be sold under 95/46/EC and Data Protection Act law. This is a potential business. However, this business are encountering a big problem that purchaser wants to illegally distribute his database. We call them attacker. Attacker can use many schemes such as attribute, collusion and complimentary attack to achieve his goal. We have improved the technique...
Ranking areas by popularity of a business category is an essential problem for business planning. Traditional approaches rely on economic and demographic factors nearby. However, the acquisition of relevant data is usually expensive. In this paper we propose a novel approach to address this problem by exploiting user-generated contents from location based social networks, which are cheap, fine-grained,...
Service-Oriented Architecture (SOA) supports loose-coupling and interoperability, where services communicate with each-other through message exchanging protocol and interfaces. SOA supports vendor diversity. In order to full-fill the vendor need, service composition is considered as a key process. Regression testing is inevitable to assure the quality of SOA based applications during their evolution...
This research involves the activities of lesson study that has been running for about five years ago by a Teacher Learning Communities (KGB) in Subang — Cianjur, West Java. These activities consist of Planning (Plan), Implementation (Do) and Reflection(See). After process See is finished, Mobile Learning Lesson Study (MLLS) then built as a learning system based on mobile devices in order to support...
As the core information system, the Unified Process Management (UPM) system covers the critical business processes in large enterprises. To achieve stable operation of the system and high quality of the processes is the key requirements from these enterprises. The original UPM system has ambiguous IT roles and responsibilities and lacks of important management schemes in the course of software development,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.