The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The challenges of adopting agile software development methods vary from one context to another. This work investigates how the European and Asian cultural backgrounds may impact agile practices adoption. The focus is on three countries: Belgium, Malaysia and Singapore. We gathered data about practices, challenges and impediments encountered by software development teams from interviews of 19 practitioners...
In this paper we present our experience during design, development, and pilot deployments of a data-driven machine learning based application maintenance solution. We implemented a proof of concept to address a spectrum of interrelated problems encountered in application maintenance projects including duplicate incident ticket identification, assignee recommendation, theme mining, and mapping of incidents...
Complex user's needs often require heterogeneous services to be combined together. In this paper, we explore a novel approach to enable flexible and dynamic composition of heterogeneous services for end users who are usually not familiar with technical process models. End-users are only required to model their goals and semantic reasoning is used for the composition itself. The possible service compositions...
The fifth generation of mobile communications is anticipated to open up innovation opportunities for new industries such as vertical markets. However, these verticals originate myriad use cases with diverging requirements that future 5G networks have to efficiently support. Network slicing may be a natural solution to simultaneously accommodate, over a common network infrastructure, the wide range...
We demonstrate a vulnerability in existing content-based message filtering methods, showing how an attacker can use a simple obfuscator to modify any message to a homograph version of the same message, thereby avoiding digest and signature based detection methods. We measure the success of this potential attack against Hotmail, Gmail and Yahoo mail. While the attack is bothersome both in terms of...
Despite the growth and commercial potential of instant messaging service, little is known about what factors create users' satisfaction with a particular service application. In this context, the major contribution is to examine the sources of users' satisfaction with WeChat official account. For this purpose, combining Information System Success theory, Theory of Reasoned Action and Technology Acceptance...
With the gradual improvement of the level of educational information, the idea of education big data has gone deep into people's minds. More and more teaching staff and researchers have the consciousness of the data needs, and expect to do the data mining and learning analysis of education big data. However, the most realistic and basic problem they have in the process of carrying out research is...
Enterprise integration is one of the crucial challenges faced by modern organizations. Existing effort to define Enterprise Integration Patterns (EIPs) helps organizations to build their integration processes. An EIP represents a regularity in mobile agent behavior designs. In a complex distributed environment, such as mobile context, EIPs are a large number of patterns that describes the interactions...
Big data analytics is the hottest new technology which helps turn hidden insights in big data into business value to support a better decision-making. However, current big data analytics has many challenges to do it since there is a big gap between big data analytics and business. This is mainly because lack of business context around the data, lack of expertise to connect the dots, and implicit business...
Big data analysis requires adequate infrastructure and programming paradigms capable of processing large amount of data. Hadoop, the most known open-source implementation of the MapReduce paradigm, is widely employed in big data analysis frameworks. However, in many recent application scenarios data are natively distributed over different geographic regions in data centers which are inter-connected...
Scalability is an important requirement in the development and the operation of applications in a cloud environment. To handling heavy concurrency in the input load, many design-related and operational factors should be considered. The microservice architecture patterns provide better means to increase the scalability than traditional software architecture patterns. However, certain aspects of applications...
Big data analytics is the hottest new practice in Business Analytics today. However, recent industrial surveys find that big data analytics may fail to meet business expectations because of lack of business context and lack of expertise to connect the dots, inaccurate scope and batch-oriented Hadoop system. In this paper, we present IRIS - a goal-oriented big data analytics framework using Spark for...
The research literature informs us that a software development process should be appropriate to its software development context but there is an absence of explicit guidance on how to achieve the harmonization of a development process with the corresponding situational context. Whilst this notion of harmonization may be intuitively appealing, in this paper we argue that interaction between a software...
Security is still the main obstacle that is preventing businesses from moving towards the Cloud, which makes choosing the right Cloud service provider CSP a critical decision. We propose in this paper a methodology for evaluation and selection of Cloud security services based on a Multi-Criteria Analysis (MCA) process using a set of evaluation criteria and quantitative metrics. We then give a general...
Service-oriented architecture (SOA) and microservices insiders Mike Amundsen, James Lewis, and Nicolai Josuttis share their experiences and predictions with department editors Cesare Pautasso and Olaf Zimmermann.
Most of entrepreneurs in software industries in Indonesia have sufficient capabilities for developing their products, but lack of managerial skills in managing business. To achieve business success, the entrepreneurs need not only technical knowledge gathered from their technical education, but also need managerial business knowledge. This paper aims at presenting an integrated competency model for...
With the advent of pervasive social networks and social communication media, people are connected all the time and messages arrive endlessly on their devices, generating an enormous quantity of personal content, such as: textual messages, photos, audio clips and videos. However, when an individual desires to go back in the time, recalling or reflecting on what happened months ago about his/her conversation...
The search for Trendsetters in social networks turned to be a complex research topic that has gained much attention. The work here presented uses big data analytics to find who better spreads the word in a social network and is innovative in their choices. The analysis on the Yelp platform can be divided in three parts: first, we justify the use of Tips frequency as a variable to profile business...
Herein we present a novel big-data framework for healthcare applications. Healthcare data is well suited for bigdata processing and analytics because of the variety, veracity and volume of these types of data. In recent times, many areas within healthcare have been identified that can directly benefit from such treatment. However, setting up these types of architecture is not trivial. We present a...
The evolvement of technology has made tremendous contribution in the field of education. Generally, technology of three-dimensional hologram (3DH) involve spatial displays which detaches the display technology from the user and integrate it into the real environment. This type of technology had been introduced with proven advantages for several decades especially in the field of digital art and medicine...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.