The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Version information plays an important role in spreadsheet understanding, maintaining and quality improving. However, end users rarely use version control tools to document spreadsheets' version information. Thus, the spreadsheets' version information is missing, and different versions of a spreadsheet coexist as individual and similar spreadsheets. Existing approaches try to recover spreadsheet version...
New technologies involve in health domain as in every field of our entire life. This paper presents a study on the surgical instruments which are an indispensable part of health institutions. In the study, an application-based software approach is introduced to track the surgical instruments on which square barcodes were placed via laser printers. Either in the literature or in the industrial sense,...
Software-Defined Storage (SDS) concept has recently emerged as a new technology inside data centers. It can provide high availability, manageability, performance and cost benefits to both data center owners, application developers and subscribers including Mobile Network Operators (MNO) or Mobile Virtual Network Operators (MVNO). In this paper, based on the assumption that MNOs are competing to access...
The classic vehicle routing problem (VRP) is generally concerned with the optimal design of routes by a fleet of vehicles to service a set of customers by minimizing the overall cost, usually the travel distance for the whole set of routes. Although the problem has been extensively studied in the context of operations research and optimization, there is little research on solving the VRP, where distributed...
This paper presents a three-year participant observation in which the author acted as CTO of a software startup, spanning more than 9,000 hours of direct experience. The author's emails and diary reflections were analyzed and synthesized into a set of nine claims about software engineering work. These claims help shape software engineering research, practice, and education by provoking new questions...
Automated sentiment analysis in software engineering textual artifacts has long been suffering from inaccuracies in those few tools available for the purpose. We conduct an in-depth qualitative study to identify the difficulties responsible for such low accuracy. Majority of the exposed difficulties are then carefully addressed in developing SentiStrength-SE, a tool for improved sentiment analysis...
The continuous increase in data traffic, heterogeneous access networks, and the diversity in the Quality of Service (QoS) requirements of the applications is expected to significantly increase the management complexity of 5G networks. Software Defined Networking provides an effective management architecture enabling more efficient utilization of 5G network resources. In this paper, a novel failure...
Task-parallelism has been exposed as an efficient approach for the solution of dense and sparse linear algebra problems. Hierarchical matrices lie in-between the dense and sparse scenarios and, therefore, it is natural to target this niche of problems via a runtime-based solution that has reported successful results in the recent past for related linear algebra problems. Concretely, in this paper...
Hardware-Assisted Flow Integrity extension (HAFIX) was proposed as a defense against code-reuse attacks that exploit backward edges (returns). HAFIX provides finegrained protection by confining return addresses to only target call sites in functions active on the call stack. We study whether the backward-edge policy in HAFIX is sufficient to prevent code-reuse exploits on real-world programs. In this...
With the constant increase of multimedia internet penetration as well as rapid spread and sharing of various information, people pay more and more attention to the information related to daily power utilization. In order to realize the interaction between power companies and power utilization information of users, the power companies apply and register their public accounts to establish their own...
To find the relation between conflict and employee satisfaction in geographically distributed software development (GDD) team, study the characters of GDD team and put forward four types of team conflict: emotional conflict, task conflict, cognitive conflict, and process conflict. Besides, bring in team interaction as an influencing factor of team conflict. Then come up with hypotheses about the impact...
This research explores the effects of providing on-time automated assessment in a co-located collaborative system for Entity-Relationship design. In addition, students' perceptions about the validity and usefulness of this automated assessment, and its potential for reflection were analyzed. Thirty undergraduate students from computer science participated in the study, a quasi-experimental pre-post...
Reset control refers to an extension of linear controllers with switching mechanisms that reset their states to zero at each zero crossing of the inputs. In this paper we address practical implementations for a class of reset control, the Clegg Integrator (CI) and first order reset element (FORE). Some discrete-time formulation can destabilize the closed-loop system and must be avoided for successful...
Agile software development practices, like Scrum, that allow teams to focus on delivering product and improved communication has made it one of the easiest and best software development techniques. On the other hand, such agile methods have been designed for collocated software development and are thus not directly applicable to distributed agile development. In this paper, we present findings from...
In a large, long-lived project, an effective code review process is key to ensuring the long-term quality of the code base. In this work, we study code review practices of a large, open source project, and we investigate how the developers themselves perceive code review quality. We present a qualitative study that summarizes the results from a survey of 88 Mozilla core developers. The results provide...
The pull-based development model is an emerging way of contributing to distributed software projects that is gaining enormous popularity within the open source software (OSS) world. Previous work has examined this model by focusing on projects and their owners—we complement it by examining the work practices of project contributors and the challenges they face.We conducted a survey with 645 top contributors...
Like most conventional software, spreadsheets are subject to software evolution. However, spreadsheet evolution is rarely assisted by version management tools. As a result, the version information across evolved spreadsheets is often missing or highly fragmented. This makes it difficult for users to notice the evolution issues arising from their spreadsheets. In this paper, we propose a semi-automated...
This research proposes the smart way to solve the common problem of the conventional door-locking system. The important problems of the ordinary door-locking systems are key lost, forgetting to lock the system and cannot check the lock status from remote. To solve these problems, we proposed a method to lock-unlock the system which utilizes the web application and passcode alongside the usual method...
User-item rating data preprocessing is an important factor that influences the accuracy of the collaborative filtering algorithms. When users assign a rating to an item, the rating may be influenced by some external factors, such as users' emotional factor. By analyzing the deviation of the users' ratings, this paper presents a novel recommendation method based on adjusted user-item rating matrix...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.