The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Third party services can change without notification as they are usually under the control of external providers. Unexpected changes can clash the integrity of a composition and monitoring approaches have been proposed to detect such changes. Many of these approaches are based on executing all test cases of a regression test set to check whether the behavior of the monitored service remains the same...
Service Oriented Architectures (SOAs) are increasingly being used to support the information infrastructures of organizations. SOAs are dynamic and evolve after deployment in order to adapt to changes in the requirements and infrastructure. Consequently, traditional validation approaches based on offline testing conducted before deployment are not adequate anymore, demanding for new techniques that...
This paper deals with a software development process framework intended to act as a testbed in a service-oriented digital ecoSystem. After short introduction to software ecosystems a concise overview of the framework and its role in such environment is given. After that, the main software engineering components of the framework are described with few examples of how it works.
Transactions are a key issue to develop reliable web service based applications. The advanced models used to manage this kind of transactions rely on the dependencies between the involved activities (subtransactions). Dependencies are constraints on the processing produced by the concurrent execution of interdependent subtransactions. Existing works use formal approaches to verify the consistency...
Comparing with the testing of conventional software systems, the testing of service-oriented systems (SOS) is considerably more challenging. Fault injection is a standard software testing approach that can be applied to the SOS. It is used in this paper as a base for testing of web service business processes at communication channel level as well as message level. The proposed approach provides simulation...
This paper analyzes the processing characteristics and execution mechanisms of the classical RETE algorithm and points out its limitations when performing multi-entity match and multi-rule match. By employing several technologies such as nodes sharing, types preprocessing, and index-based searching optimization, we propose an improved version of the RETE algorithm, IRETE, which is tested under multi-entity...
The purpose of this study is to manipulate the presentation timing of declarative and procedural information in the e-instruction of Chi-square testing and to examine the effect of four different presentation formats on cognitive load and instructional efficiency. The 160 participants were randomly assigned to receive one of the following four types of e-instruction formats: declarative information...
The rational expectations hypothesis (REH) serves as an appealing mechanism in forming expectations because of its consistency with the basic principles of maximizing behavior. The present study intends to provide empirical support of forecast rationality in the context of survey-based business expectations, particularly in agriculture-based entities in Malaysia. Three rationality tests which include...
Electronic commerce for tourism has a trend of rapid development. The operation mode for Caissa China Travel Agency official web site is analyzed, and the advantages and disadvantages of network marketing operation mode for Caissa Travel Agency in electronic commerce are studied by SWOT analysis method. The convenience and satisfaction of Caissa Travel Agency web site for network group is analyzed...
This paper reports on ongoing work on SWAT, a new toolkit for security workflow analysis. SWAT provides a platform for the realization and testing of well-founded methods to detect information leaks in workflows, both for the workflow certification and for audit based upon the execution traces. Besides presenting the SWAT's functionality and high-level architecture, an example illustrates its operation.
To meet the complex and variable characteristics of spacecraft testing business, and to increase the expandability of automated testing system, this paper proposed an architecture of spacecraft test executing system which is composed of test executing engine, business component library and registration center based on workflow. And discussed the key issues involved by the three parts of the architecture...
Complex Event Processing (CEP) is a powerful technology for implementing real time applications. It offers efficient processing of occurring information pieces, so called events, based on an architecture that provides strong decoupling of its components: event producer, event processors and event consumer [4]. For this CEP is seen as an important contribution in future information systems. CEP applications...
A good estimation tool offers a "model" of a project and is usually used to estimate cost and schedule, but it can also be used to help make trade decisions that affect cost and schedule as well as to estimate risks and opportunities. It was evident that Rolls-Royce needed a cost model to underpin decisions when they launched a Software Product Line initiative. The first generation cost...
The tutorial provides practical guidance for project managers and architects facing the "PLE challenge". It demonstrates practices and concrete activities we use to make a product line an economical and technical success
The Disaster Tolerant backup System is an important aspect of constructing management information system security. In terms of the analysis on management information system data, this paper offer principles, steps and strategies to construct the backup system.
With powerful features and cross platform character, web service has been applied in the field of information technology widely. To meet dynamic needs of enterprises, it tends to generate new web applications through service compositions. Due to flaw of designed process or incorrect input, to composite service may encounter various faults during execution. Moreover, the faults often continue to accumulate...
Based on digital, interactive, multimedia computer network teaching platform, which has become an important application of contemporary education means. Digital image processing technology curriculum for teaching the practical requirements of the network was designed and developed based on J2EE architecture, digital image processing technology course online teaching platform, the overall structure...
with the development of supply chain and logistic, the commodity classification and amount provided by E-commerce system rise increasingly. The traditional web-centered searching commerce model has become the bottleneck hindering value-adding of e-commerce enterprises, while personalized e-commerce system is one effective way to solve this problem. Incorporating the demand for personalized e-commerce...
Gap Inc. Direct is using Agile methodologies for IT project delivery. This paper discusses how building systems starting from the customer facing pieces allows Gap to deliver projects faster.
Topic Based Vector Space Model (TVSM) proposed a new vector space that its dimensions is composed of topics. Every term and document is represented by vectors inside this vector space. By using topics as dimensions TVSM tries to overcome word-mismatch between terms with similar topics in finding relevant documents to query. This study proposes to develop relations between terms using WordNet and thesaurus...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.