The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The debate on replacement of traditional learning by massive open online courses is an ongoing one since the launch and success of million-user platforms like Coursera or Udacity, followed by online courses offered now by the majority of universities. Still, significant share of online courses are IT-, data science, business, theory and humanities oriented, as in these cases the students do not require...
Domain specific languages (DSLs) bring substantial increase in productivity and quality and thus look very appealing to software engineering practitioners. Because language workbenches can drastically reduce the cost of building and maintaining DSLs and associated tooling, they catch the attention of technical leads and project managers in the industry. Effective use of language engineering technologies...
The paper explores the features of functional modeling of the process of development of control and monitoring systems, using the example of the system of energy-saving control of technological objects.
In the technical support division of a large enterprise software provider, customers' technical incidents, problems, and change requests are processed as tickets. Each ticket is assigned to a support engineer for processing. Due to the limited expertise of individuals, resolving a ticket may involve routing the ticket among multiple groups of engineers. Each routing step costs time and resources....
Teaching software architecture to undergraduate students is particularly hard because they typically have no experience with medium or large systems with competing stakeholders. A particularly hard case is ATAM (Architecture Trade-off Analysis Method), which allows the evaluation of architectural designs and quality attributes by competing stakeholders. This article describes ATAM-RPG, a role-playing...
Large enterprises are moving towards Software Defined Network (SDN) adoption, where business-critical applications are being deployed on top of highly programmable network components and orchestrated by a single or multiple controllers using network protocols, such as OpenFlow or NetConf for communication. Just like in traditional networks, low-cost monitoring solutions need to be developed for SDN...
Business processes may accept variants based on specific business requirements of an organization, leading to the definition of a process family. There are many proposals for the modeling of the common and variable parts of a process family, as well as to support the customization of each process variant (i.e., process configuration or tailoring). In this article, we present the results of a detailed...
With the current trend of introducing networking capabilities into traditional industries, Cyber-Physical Production Systems (CPPS) are increasingly targeted by cyber-attacks. Especially with the progression of introducing the industry 4.0 paradigm to sectors that until now worked with strictly sealed environments, new attack surfaces are brought to the attention of cyber-criminals that already possess...
Requirements elicitation is the first crucial stage of a requirements engineering process, which intends to uncover, acquire and elaborate requirements for software systems. When software startups are concerned, requirements elicitation is particularly challenging due to the high uncertainty that a startup is confronted with. Few studies have investigated how software startups conduct requirements...
Context: Software startups need to tackle a lot of challenges as they grow. Therefore, reoccurring strategies are applied that can be captured in form of patterns. Objectives: While more and more of these patterns are published, we aimed to discover to what degree they are applied within different regions of the world. Method: We studied the cases of 7 software startups within 2 incubation hubs in...
The software defined optical network (SDON) service plays an important role in the production and operation of the network system. It's important to solve the problem of how to reduce the risk and distribute the service path more rationally. However, most of the existing algorithms do not take into account service importance. In this paper, a risk balancing routing assignment mechanism based service...
We live in the post-informational era. Nowadays technologies transform many segments of human life. The Internet of things is becoming one of the most important information technologies that can change and has already changed the lives of people around the world. Under the Internet of Things (IoT) is understood the concept of a computer network that unites the most diverse devices, between which interaction...
This publication presents a novel concept for autonomous and decentralised M2M application service provision. The functional architecture of the approach is introduced as well as a detailed description of the system structure and process for application creation. Furthermore, this publication describes details about the proposed process for decentralised M2M application service management and formal...
In the recent times, software security has gained a great deal of attention in the Software Development Life Cycle due to increased cases of reported cyber threats and incidents. A considerable number of cyber-attacks targeting financial systems has made security be the most critical feature in banking systems. However, establishing security requirements for these applications can be a challenging...
Workflow management system (WfMS) should be capable of self-autonomous non-function attributes to experience its resilience to the change of runtime environment in Business Process Management (BPM) domain. With the motivation mentioned above, we propose the resilience mechanism for WfMS, associating with the corresponding methods proposed in our early research work, engaging to achieve our final aim,...
This paper has proposed a formal verification of ABAP by Z specification. An ABAP programming language is used to create a customized program in SAP ERP. The program must satisfy a business requirement. It likely has a defect from the developed program. Since a specification is created as the business requirement and a program should have functioned as in the specification, the formal verification...
Like many other products in the age of the Internet of Things, cars are becoming increasingly augmented with digital technology and connected with their environment. This sea change demands business models that can transform the disruptive power of the "connected car" into a business model innovation. There is a need for further research to advance the industry-specific understanding of...
Content Management Systems (CMS) are popular web application platforms used in multiple domains. CMS allow non-technical users to manage the content and features of websites with web modules that abstract functionality without requiring particular software programming background. However, without the development of specific web modules, a CMS usually cannot support complex scenarios or specific business...
Technical Debt (TD) refers to the long-term consequences of shortcuts taken during different phases of software development life cycle. Lack of attention to monitoring and managing testing and development debt can contribute to unexpectedly large cost overruns and severe quality issues in software development projects. This paper describes a case study conducted with an industry partner to explore...
The task abstraction and aggregation in a business process can help to (1) obtain customized descriptions of a business process for different users, and (2) derive user interfaces of a business process related to the participating users. This paper proposes an approach for task abstraction and aggregation of a business process based on a role-enriched business process model. For each user role, tasks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.