Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Obesity has been linked to several types of cancer. Access to adequate health information activates people's participation in managing their own health, which ultimately improves their health outcomes. Nevertheless, the existing online information about the relationship between obesity and cancer is heterogeneous and poorly organized. A formal knowledge representation can help better organize and...
The software composition using high-granularity entities nowadays is a common practice. The process of software composition is supported by various CASE tools. First tools were made on the basis of very simple formalisms (e.g. intuitionistic propositional logic). During the years the tools evolved to more efficient ones, which are able to deal with concurrency, multiparty sessions and other advanced...
We present RDCL 3D, a “model agnostic” web framework for the design and composition of NFV services and components. The framework allows editing and validating the descriptors of services and components both textually and graphically and supports the interaction with external orchestrators or with deployment and execution environments. RDCL 3D is open source and designed with a modular approach, allowing...
With Network Function Virtualization (NFV) generating significant interest in the network operator community, many network functions, including the LTE EPC, are being built as virtualized software appliances running on commodity hardware, as opposed to custom hardware. To provide fault tolerance and scalable performance, the virtualized network functions are typically built in a clustered architecture,...
Servers in a network are typically assigned a static identity. Static assignment of identities is a cornerstone for adversaries in finding targets. Moving Target Defense (MTD) mutates the environment to increase unpredictability for an attacker. On another side, Software Defined Networks (SDN) facilitate a global view of a network through a central control point. The potential of SDN can not only...
Next step of mobile is coming with 5G architecture where Software Defined Networking (SDN) will play a key role. Beyond the centralization of the control that alleviates the data forwarding task, because routing tables can be simply changed to reflect the mobile localization, we propose a new paradigm based on caching function to improve the quality of transfer during handover. Caching policy cooperates...
The emerging trend of network devices with configurable data planes is pushing software switches as convenient playgrounds for experimenting novel programming paradigms and abstractions. OfSoftSwitch is a popular tool for carrying on such experimentation, as it provides a straightforward implementation of a pipeline of match-action tables. Unfortunately, OfSoftSwitch is not performance oriented and...
Software systems have established themselves as the heart of business and everyday living, and as the pillar of the emerging global digital economy. This puts pressure on educational institutions to train people for the continuously evolving software industry, which puts additional demand for new PhDs and educators. While large universities and research centres have the required expertise and infrastructure...
Analytical reasoning is central to code correctness, and every computer science curriculum aims to teach students how to achieve this objective in one form or another. With the acceptance of object-based computing and component-based software engineering, the need for analytical reasoning that is based on formal contracts to establish correctness of software across module boundaries has become ever...
Software testing can be very helpful to students if adopted in programming assignments throughout the Computer Science curriculum. Many testing practices involve students writing their own test cases. This approach implies that students are responsible for the test design task while performing the test activity. On the other hand, some testing practices follow the opposite approach of providing ready-made...
This half-day workshop will demonstrate the use of a lottery-based simulation to teach students how to run an agile project by practicing the routine of daily meetings, coordination by mutual adjustment and tracking and reporting of progress. The objective of the simulation is twofold: to teach students the process' mechanics and provide them with insights about the implications on performance and...
Unified Modeling Language (UML) is a modeling standard that has been commonly used in the software industry. However, students face difficulties while learning how to model complete and correct UML diagrams. One of the reasons is the way UML has been taught. In order to improve the effectiveness of learning it is necessary to employ methods in which the students actively take part in the learning...
Undergraduate programs in software engineering are relatively new. The first ABET accredited programs received accreditation in 2001. There are currently 31 ABET accredited software engineering programs worldwide with additional programs being added each year. In this session, panelists will discuss their experience starting new programs, developing curriculum, and navigating accreditation issues.
Software engineering (SE) educators are challenged to balance the scope and depth in their courses to train students in skills which will fulfill the ever-evolving industry needs. Capstone courses are a tool for educators to transfer hands-on experience into practical knowledge and skills of SE students. This paper describes the design of a Casptone course, at Lappeenranta University of Technology...
The Agile Software Factory (ASF) was created in the Department of Computer Science at Bowling Green State University nearly ten years ago to promote the use of agile methods, improve student education through service-learning opportunities, and to facilitate community engagement by handling the many software requests that regularly arrive in the department. In pursuit of these goals, the ASF has had...
One of the main challenges in teaching Software Engineering as an undergraduate course is making the need for software processes and documentation obvious. Armed with some knowledge of programming, students may feel inclined to skip any development phase not involving coding. This is most pronounced when dealing with the Requirements Engineering practices. In this paper, we describe a practical approach...
The University City of Buea in Cameroon – Africa has been named the Silicon Mountain of Africa due to the growing number of Software-based, technopreneurship activities within the city. The uniqueness in methodological approach used for educating and training graduates from major universities in this city remains undiagnosed, although its impact is already being felt internationally. This paper reports...
Recently, the requirements engineering (RE) community recognized the increasing need for understanding how industry perceives the jobs of requirements engineers and their most important qualifications. This study contributes to the community's research effort on this topic. Based on an analysis of RE job ads in 2015 from the Netherlands' three most popular online IT-job portals, we identified those...
The Extensible Messaging and Presence Protocol (XMPP) is one of the most popular Instant Messaging (IM) protocols which uses a client-server working mode. This protocol uses different connection primitives for both client-to-server (c2s) and server-to-server (s2s) connections. It is actively used in mission-critical operations where the reliability and security of communication systems is always imperative...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.