The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Online auctions are now an immensely popular component of the electronic marketplace. However, there are many fraudulent buying/selling behaviours that can occur during an auction (e.g., shill bidding, bid shielding, etc.). While researchers are proposing methods for combating such fraud, it is extremely difficult to test how effective these countermeasures are. This is primarily due to it being unethical...
As software structures grow, it becomes increasingly difficult for those new to any software source code to conceptualize the mostly invisible structure. Historically program structures have been challenging to visualize. This paper contributes a 3D flythrough approach called FlyThruCode for visualizing facets of program structure. A prototype demonstrates its viability, and an empirical study investigates...
The traditional object model only focuses on single application system, cannot represent the relationship between objects of multiple sample systems in a domain correctly. Moreover, as the current domain feature modeling is doped with too many subjective factors of domain experts, there may be some error or missing feature constraint relationship. Combining with the macroscopic characteristics of...
Dealing with the requirement to produce many different products at the same automated production system, flexible material flow modules, which are connected to a material flow system (MFS) are required. Therefore a definition of the architecture and interfaces of such modules is provided by a model based engineering approach and an appropriate meta model. Hence, a reduced engineering effort for setting...
Software metrics are very helpful in measuring the different aspects of software like cohesion, coupling, polymorphism, inheritance etc. The objective of measuring software metrics are quality assurance, defect prediction, maintainability prediction, cost estimation, debugging, etc. Many authors proposed the use of static metrics for the software maintainability prediction (SMP) and were successful,...
Distributed parallel computing platform performs well in processing big data. However, due to the platform's complexity and distributed characteristics, it is hard to design and achieve. For example, during the platform's design phase, variations are unpredictable. To address these issues, a highly structured object-oriented framework for systematic modeling, which has high flexibility, reusability...
Robotized model time is a creating examination field. A significant number of representations are furthermore given where model checking has been associated for affirmation of various sorts of model. Such delineations are SAT based checks of UML/OCL models, embeded structures model affirmation, et cetera. In all these kind of employments, the complement is model checking. In later past, UML programming...
Now a days, web based applications have become intricate, popular and crucial in every organization which requires high quality and high reliability of web based application. Quality of web based applications effects security and functionalities (including functional and non-functional requirements). Web applications are complex due to its heterogeneous and distributed nature. With the increasing...
UML is actually a standard that is used in the production of software models. Its function is to facilitate the working of visuals of software artifacts. In order to produce a UML diagram, manufacturer has to gather all the software requirements in a natural like English r semi formal like SBVR language. After that he analyzes and produces the activity diagram manually in an available case tool. One...
Targeting the security vulnerabilities of unauthorized access caused by the failed link restriction and session authentication in Web application, a new method of generating Web link safety testing scenario based on UML diagram was proposed. Firstly, this method constructs the UML extended state diagram with the combination of the jump relationship of Web pages and user operation permission, Then...
With the development of worldwide large experimental facilities, like particle accelerators, confinement fusion equipments, and astronomical telescopes, both the type and the amount of devices or instruments have increased significantly, which contributes to a large-scale heterogeneous system. It is challenging our current control system, and requiring a more efficient pattern, in terms of both control...
Model-driven software engineering emphasizes using models as primary development artefacts. In many cases, the static structure of a software system can be automatically generated from static models such as class diagrams. However, hand-written source code is still necessary, either for specifying method bodies or for integrating the generated code with already existing artefacts or frameworks. In...
Model transformations are the key technology of MDE that allows for software development using models as first-class artifacts. While there exist a number of languages that are specifically designed for programming model transformations, in practice, designing and maintaining model transformations still poses challenges. In this paper we demonstrate how mathematical notation of set theory and functions...
Based on core point evolution using water ripplemodel, the thought of software development methodology is thatthe development of a complex system is translated into the waterripple sustainable evolution of core point. However, the corepoint is defined from three levels, which are domain, feature andfunction. And it does not give a general definition of the corepoint. In addition, the evolution of...
Relationship Based Access Control (ReBAC) has been recognized as a distinctive form of access control since the advent of online social networks (OSNs). In the OSN context, ReBAC typically expresses authorization policy in terms of interpersonal relationship between users. OSN-inspired ReBAC models primarily focus on user-to-user relationships, although some have also considered user-to-resource and...
Base on the Extended Object-Oriented Petri Net, and the component evolution processes that has been proposed in our previous research, this paper applies the top-down and bottom-up strategy to stratify component models. The definition of Equivalent Model of EOOPN is given, four types of subnet Equivalent Model are analyzed and the system performance analysis methodologies corresponding to the four...
This paper studies the issue of component refinement on the bases of component evolution processes that has been proposed in authors previous research work focused on Extended Object-Oriented Petri Net. Components are refined through basic elements of software system's architectural components. The detailed idea of component refinement is discussed and a set of methods and rules relating to component...
Based on the Extended Object-Oriented Petri Net, and the component evolution processes that has been proposed in our previous research, the notion of Stochastic Petri Net (SPN) is integrated into EOOPN to facilitate the time aspect of system performance analysis. To simplify the complexity of time performance analysis, the system is further divided into layer subsystems so that the issue of state...
Base on the Extended Object-Oriented Petri Net, and the component evolution processes that has been proposed in our previous research, this paper studies the issue of component refinement. Three types of component refinement under the framework of EOOPN model, namely ABP refinement, ABT refinement and Token refinement, are proposed in this paper along with their definitions and component features...
Increasing numbers of variants and versions in the domain of automated Production Systems (aPS) demand appropriate methods to handle this variability. While software product lines (SPLs), often in combination with feature modelling, are already well established in the domain of information systems, up to now SPLs are rarely used in the domain of aPS. Also, SPLs for aPS need to include variants and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.