The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The creation of a suite of unit testing is preceded by the selection of which components (code units) should be tested. This selection is a significant challenge, usually made based on the team member's experience or guided by defect prediction or fault localization models. We modeled the selection of components for unit testing with limited resources as a multi-objective problem, addressing two different...
This paper details the process to inject and measure the understanding of student's knowledge and application of software coding standards. As with most other educational processes, consistent repetition enforces the learned concept. This process and techniques to reinforce the use of coding standards can be applied from freshman through graduate level embedded software courses.
The emergence of Systems of Systems (SoS) arrangements, with their high level of complexity, mainly due to the different characteristics of the individual systems and their integration into the respective SoS, has brought about new challenges in terms of Configuration Management (CM) in general, and change management in particular. Novel change management frameworks are needed to appropriately address...
Web applications are nowadays being used to support enterprise-level business operations and usually rely on back-end databases to deliver service to clients. Research and industry reports indicate the huge impact the quality of the data can have on businesses, especially when applications are not prepared for handling low quality data. In fact, even in widely tested and used applications, the presence...
This paper explores the proposition that teaching programming for application development differs from established methods in computer science, engineering, and MIS, and requires a re-framing of pedagogical models. In addition to programming fundamentals, algorithms, and data structures, application development also requires understanding the foundations of human-computer interaction and the nature...
The article touches upon issues pertaining to the domain of IT infrastructure modeling in electronic university. It describes the approach of IT infrastructure modeling based on system and process principals, and decomposition method. The functional modeling of business processes of providing e-learning services and designing IT infrastructure has been performed. Supporting ITIL/ITSM processes with...
The article is dedicated to give an assessment of possibility of the applicability of web-based geographic information systems (GIS) within the micro geo-marketing researches. Description of micro geo-marketing data domain, its key features and objectives are given. Functional model of the data collection process is presented. Authors formulate requirements for micro geo-marketing web-GIS and suggests...
Relatively little research has addressed the role of LI in the perception of English speech contrasts by Chinese learners of English as L3. The present study investigates the role of LI in the perception of the English alveolar-velar nasal coda contrast (/n/ vs. /η/) after the vowels /i Λ æ/ by bilingual Changsha Chinese speakers, whose LI is Changsha Chinese and L2 is Standard Mandarin. Changsha...
Zero-day vulnerabilities — weaknesses in software that are unknown to the parties who can mitigate their specific negative effects — are gaining a prominent role in the modern-day intelligence, national-security, and law-enforcement operations. At the same time, the lack of transparency and accountability in their trade and adoption, their possible overexploitation or abuse, the latent conflict of...
With the spread of Internet application, the software products need update quickly to adapt the dynamic application environments and diverse business requirement. How to efficiently select the regression test cases based on existing test cases set directly affect the evolution quality of software products. Basic paths coverage is a popular structure-oriented test way in academia and industry. A method...
Business goals monitoring and control measures are important process to achieve the target of business systematically in specified business area or project. Monitoring and control provide business goals with a measurable index to align directly in a specific area or project. In this paper, we generate all of the business process improvement goals by Capability Maturity Model Integration (CMMI) model...
Collaboration in business processes and projects requires a division of responsibilities among the participants. Version control systems allow us to collect profiles of the participants that hint at participants' roles in the collaborative work. The goal of this paper is to automatically classify participants into the roles they fulfill in the collaboration. Two approaches are proposed and compared...
This paper presents a software toolkit that can be used to analyze event data streams in real-time. It has a specific focus on stochastic analysis of business processes, based on event data that is produced during the execution of those processes. The toolkit provides a software environment that facilitates easy connection to event data streams and quick development and testing of analysis and visualization...
Phishing website-based attacks remain pervasive, with high user susceptibility continuing to be a major factor. In this study we use cluster analysis coupled with an elaborate controlled experiment involving hundreds of participants to identify and examine high susceptibility user segments in terms of their perceptions, demographics, and phishing website traversal behavior. The results reveal three...
With the emergence of Internet of Things (IoT), the requirements for scalability and flexibility are continuously increasing, thus easy reconfigurable systems such as Software Defined Radio (SDR) are gaining more popularity. The paper provides an overview of the related work in the field of SDR technologies and solutions for convergence of SDR applications. Furthermore, we analyze how the convergence...
Network packet capture and analysis technology is a cornerstone of network security and protocol analysis technology. On the analysis of the LAN IP network traffic monitoring requirements, this paper detailed introduces the design ideas of traffic monitoring system based on WinPcap technology, expounds the key technologies and features in the process of system implementation, focusing on huge amounts...
This industrial research paper outlines an outcome of a machine leaning approach to dynamically generate context sensitive Application User Interfaces (Adaptive UI) on top of a monolithic enterprise software product.
Requirements Engineering has recently been greatly influenced by the way how firms use Open Source Software (OSS) and Software Ecosystems (SECOs) as a part of their product development and business models. This is further emphasized by the paradigm of Open Innovation, which highlights how firms should strive to use both internal and external resources to advance their internal innovation and technology...
In this keynote talk we propose the use of a capability-driven approach to enterprise modeling in order to capture the intertwined relationship among design requirements and environment, as well as the interplay of requirements and design artifacts for the purpose of facilitating enterprise agility.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.