The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Capstone project-based learning courses generate a suitable space where students can put into action knowledge specific to an area. In the case of Software Engineering (SE), students must apply knowledge at the level of Analysis, Design, Development, Implementation and Management of Software Projects. There is a large number of supportive resources for SE that one can find on the web, however, information...
Nowadays, visual object recognition is one of the key applications for computer vision and deep learning techniques. With the recent development in mobile computing technology, many deep learning framework software support Personal Digital Assistant systems, i.e., smart phones or tablets, allowing developers to conceive innovative applications. In this work, we intend to employ such ICT strategies...
The evolution rate of mobile applications is much higher than regular software applications having shorter release deadlines and smaller code base. Mobile applications tend to be evolved quickly by developers to meet several new customer requirements and fix discovered bugs. However, evolving the existing features and design may introduce bad design practices, also called code smells, which can highly...
Open Source Software (OSS) has substantial impact on how software-intensive firms develop products and deliver value to the customers. These companies need both strategic and operational support on how to adapt OSS as a part of their products and how to adjust processes and organizations to increase the benefits from OSS participation. This work presents the key insights from the journey that Sony...
Information and Communication Technology (ICT) is one of the key enablers for including underserved communities in economic and societal development across the world. Our research analyzes several banking service projects developing technical solutions for rural India. This poster presents an experience report based on systematic debriefing of involved project leaders and initiators, triangulated...
Software-intensive systems have become increasingly ubiquitous, large, and complex, with dissemination in several application domains and tightly dependent upon different technologies. Such systems are usually centered in a software platform so that increasing attention has been paid to influence and interdependency in relationships among all the involved players, forming software ecosystems (SECO)...
This paper reports a large-scale study that aims to understand how mobile application (app) vulnerabilities are associated with software libraries. We analyze both free and paid apps. Studying paid apps was quite meaningful because it helped us understand how differences in app development/maintenance affect the vulnerabilities associated with libraries. We analyzed 30k free and paid apps collected...
Software-Defined Storage (SDS) concept has recently emerged as a new technology inside data centers. It can provide high availability, manageability, performance and cost benefits to both data center owners, application developers and subscribers including Mobile Network Operators (MNO) or Mobile Virtual Network Operators (MVNO). In this paper, based on the assumption that MNOs are competing to access...
In this paper, we describe the need, requirements and challenges for implementing a global information grid. The grid connects all participating elements in a military mission and provides them with all mission-relevant information in a timely and secure manner, independent of the used command and control information systems (C2IS), the available communication technologies, the degree of mobility,...
Significant research efforts have been put in refining concept/requirements of novel systems innovated by experts or crowds. However, there is scarce evidence of refinement techniques developed for and/or applied to the concept/requirements of novel systems innovated with participatory design. Arguably, general idea assessment and refinement techniques can be applied to participatory innovations....
In this paper we envision and discuss the idea of the Web of Augmented Things (WoAT). The idea is about the integration of Web of Things with Augmented Worlds, i.e. distributed software systems augmenting the physical space with virtual entities and holograms in an Augmented Reality perspective, eventually coupled with smart things that are part of the same environment.
Since the use of internet has incredibly increased, it becomes an important source of knowledge about anything for everyone. Therefore, the role of search engine as an effective approach to find information is critical for internet's users. The study of search engine users' behavior has attracted considerable research attention. These studies are helpful in developing more effective search engine...
Mobile attack approaches can be categorized as Application Based Attacks and Frequency Based Attacks. Application based attacks are reviewed extensively in the literature. However, frequency based attacks to mobile phones are not experimented in detail. In this work, we have experimentally succeeded to attack an Android smartphone using a simple software based radio circuit. We have developed a software...
This article describes the problematic of ambulance service for chronic patients, that need a preferential care; supporting the improvement in pre-hospital assistance, executed at the moment of the emergency. Based on the above, technology surveillance is used as a tool to find feasible options, bringing up an architecture oriented to services that allows an easier communication between systems through...
Developers have to to constantly improve their apps by fixing critical bugs and implementing the most desired features in order to gain shares in the continuously increasing and competitive market of mobile apps. A precious source of information to plan such activities is represented by reviews left by users on the app store. However, in order to exploit such information developers need to manually...
One of the most critical activities in software product development is the decisional process that assigns features to subsequent releases under technical, resource, risk, and budget constraints. This decision-centric process is referred to as software release planning (SRP).This briefing will expose a state of the art on SRP. A survey of the most relevant approaches will be presented. Emphasis will...
Smartphones and tablets have established themselves as mainstays in the modern computing landscape. It is conceivable that in the near future such devices may supplant laptops and desktops, becoming many users primary means of carrying out typical computer assisted tasks. In turn, this means that mobile applications will continue on a trajectory to becoming more complex, and the primary focus of millions...
App developers naturally want to know which of their releases are successful and which are unsuccessful. Such information can help with release planning and requirements prioritisation and elicitation. To address this problem, I performed causal analysis on 52 weeks of popular app releases from Google Play and Windows Phone Store. The results reveal properties of successful releases in multiple app...
Nowadays, software development projects produce a large number of software artifacts including source code, execution traces, end-user feedback, as well as informal documentation such as developers' discussions, change logs, StackOverflow, and code reviews. Such data embeds rich and significant knowledge about software projects, their quality and services, as well as the dynamics of software development...
To test a Software Product Line (SPL), the test artifacts and the techniques must be extended to support variability. In general, when new SPL products are developed, more tests are generated to cover new or modified features. A dominant source of extra effort for such tests is the concretization of newly generated tests. Thus, minimizing the amount of new nonconcretized tests required to perform...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.