The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the most important knowledge area on Software Engineering is Requirements Engineering and know properly related techniques and methods is crucial to a software practitioners. This article aims to present a method adopted to teach Requirements Engineering and Process Modelling on Software Engineering undergraduate course. It was developed a method to integrate two disciplines and improve learning...
Sustainable energy sources such as renewable energies are replacing dirty sources of energy in order to address the environmental challenges of the century. In order to operate data centres with renewable energies we have to mitigate their volatile and variable nature. In this paper, we present the Energy Adaptive Software Controller (EASC), a generic software controller and interface that developers...
If the applications software supporting your services and essential business systems or the software in your products, is becoming bigger and messier, it is time to consider whether software architecture ought to tbe a core competency of your business. So, it is fair to ask — what is software architecture?” This paper seeks to answer that question, not in terms of a simple definition, but by helping...
Establish an effective security force input mechanism is necessary, in order to establish a corresponding mechanism for the disclosure of accounting information is necessary. Security force input mechanism and the disclosure mechanism of accounting information related to the stakeholders to understand business is an important window in safety, security into the performance area. The software security...
Smart spaces are currently developed for different kinds of applications. We want to describe a smart space for the production of tailor-made clothes. In the paper, we review the production process for tailor-made clothes. Then, we describe the architecture for the smart production space. We describe the advantages of such a model for different commercial services that can be linked to the online...
The advances in cloud computing have presented the global vision of utility computing with promising trends to a new world of information and communication technology. The legacy systems built on the obsolete and older technologies are typically addressed for the modification and alteration processed to leverage the benefits of cloud. Migrating to the cloud deployment models and re-engineering the...
ERP systems have fundamentally changed the way of business data processing. These changes have affected the internal control system of ERP inevitably. Many traditional internal control testing approaches could not work well in ERP environment. In ERP systems, many control criteria and control procedures can be achieved by control data. In this paper, we proposed an applicable approach to test internal...
Today s factory involves more services and customisation. A paradigm shift is towards “Industry 4.0” (i4) aiming at realising mass customisation at a mass production cost. However, there is a lack of tools for customer informatics. This paper addresses this issue and develops a predictive analytics framework integrating big data analysis and business informatics, using Computational Intelligence (CI)...
Business process and software component has relationship on business process execution in the organization or company. Changes in business process affecting the software component. A Method is needed to determine traceability of artifacts between process on business process and software component. The purpose of traceability is to trace the difference between business process of accompany and its...
The popularity smart phones, mobile applications (Apps) have exploded in recent years creating unlimited business opportunities. Today's customers desire to acquire not only software and products, but also memorable experiences. Using O2O (Online to Offline, Offline to Online) marketing strategies, customers interact with software and products in the real world that doing so will help them increase...
Modern software engineering practice allows us tobuild more complex software than ever before. However, onthe other hand, it causes some negative consequences such asbloatware and feature creep which have been observed in manysoftware evolution and iteration lifecycle. In this paper, we proposean approach to customizing Java bytecode by applying staticdataflow analysis and enhanced programming slicing...
Model-driven development techniques have been proposed for cross-platform app development. Typically, an individual domain-specific language (DSL) is used. The MD² framework consists of a DSL for business apps and generators, which transform a domain model to native platform code. Prior research on it focused on language and general generator design, this paper accentuates the code generation stage...
This year the Impacts of Information Technologies on Consumer Activities and on Business Operations minitrack at HICSS has accepted a total of seven papers that explore the increasing complex roles that advanced information technologies play in businesses.
Hardware ventures are emerging entrepreneurial firms that create new market offerings based on development of digital devices. These ventures are important elements in the global economy but have not yet received much attention in the literature. Our interest in examining hardware ventures is specifically in the role that information system (IS) resources play in enabling them. We ask how the role...
Domain-specific modeling languages (DSMLs) are key to empowering organizational experts in interacting with business information systems. For this task, developing DSMLs based on the Unified Modeling Language (UML) has become a popular option. However, a number of design decisions must be considered when developing UML-based DSMLs. In this paper, we extend a systematic literature review (SLR) to cover...
Within software product lines (SPL) similar software products are created based on common features. We applied this versatile approach to cross-platform app development by extending the domain-specific language (DSL) of an established model-driven development framework. The goal was to support the formulation of coherent building blocks of business use cases, referred to as workflow elements. While...
Enterprise Resource Planning (ERP) systems, over the years, have evolved into integral business systems in both medium and large organizations. The strength of an ERP is that it is a computerized transactional information system, with a centralized data repository. This allows for significant data availability and seamless collaboration between business functions. Realizing associated benefits through...
Software that applied in the industrial safety-critical systems are usually developed from reused components. The redundant parts of the safety-critical software introduced by such approach shall therefore be considered from the perspective of avoidance and protection from systematic failure. The large scale and high complexity of modern safety-critical software increase the difficulty on conducting...
One of the challenges confronted by teachers in the context of teaching English as a Second Language (ESL) is to enhance second language learning by using technology based cognitive and socio cognitive approaches. Supportively various research studies have proved that technology plays a major role in supporting the learners in a number of ways in the process of which they become self-directed and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.