the authors provide a formal scheme incorporating these two methods, based on an order-sorted algebraic specification language, that incorporates stepwise refinement and modularization. their emphasis is both on rigor...
详细信息
the authors provide a formal scheme incorporating these two methods, based on an order-sorted algebraic specification language, that incorporates stepwise refinement and modularization. their emphasis is both on rigorous formalism and on adaptability to implementation as tool/environments. Without formal definitions, these methods cannot be supported by mechanical means. the authors formalize stepwise refinement in algebraic terms and they give an example of the development process they propose. they consider implementation issues and compare their work with related research.
Ensuring high quality in software systems is a wellknown and big challenge. Infrastructure as Code (IaC) gathered increasing popularity in recent years, but there is only little research done in terms of quality of th...
详细信息
ISBN:
(纸本)9781538658413
Ensuring high quality in software systems is a wellknown and big challenge. Infrastructure as Code (IaC) gathered increasing popularity in recent years, but there is only little research done in terms of quality of this code. Like with programming languages we find a high diversity of languages and technologies. Existing research introduced code smells from traditional software engineering to the popular provisioning tool Puppet, which uses IaC to specify the desired state of environments. Results show that code smells are an adequate method to assess the quality of Puppet code. In this paper we extend the existing research by first applying code the IaC smells to an other technology and investigate if similar results can be achieved. We applied the code smells in two case studies to open and closed source IaC code repositories. the presented results indicate that IaC smells are present in other tools and technologies. Furthermore the results show that IaC smells are agnostic to the applied technology and can be defined on a technology agnostic level. Second, we introduce new code smells from the field of software engineering, which were not covered yet, to the domain of IaC. the paper presents a catalogue of 17 code smells which were applied to Chef and whose implementation is available as Open Source.
Most modern malware use anti-analyze techniques to escape existing detection and analysis solutions. We designed a new methodology DAA to analyze malwares even when they use this predisposition. To this end, we have a...
详细信息
ISBN:
(纸本)9781728116242
Most modern malware use anti-analyze techniques to escape existing detection and analysis solutions. We designed a new methodology DAA to analyze malwares even when they use this predisposition. To this end, we have analyzed several existing approaches aimed to evade malware in order to use the most effective ones. A new open source software tool has been designed and developed. We tested our software with more than 300000 LHS's malwares. this implementation allowed us to confirm the importance of studying the behaviour of malwares in an environment able to counter the anti-analysis techniques.
In order to solve the problems of complicated steps and low accuracy in traditional software function testing, a cloud computing-based software function testing method for aided design is proposed. the software functi...
详细信息
ISBN:
(纸本)9781728121659
In order to solve the problems of complicated steps and low accuracy in traditional software function testing, a cloud computing-based software function testing method for aided design is proposed. the software function scale is extracted by STCEM principle, and the extracted values are classified into functional grades by combining genetic algorithm. According to the grade division results, the test parameters of different grades are adjusted, the standard range and steps of adjustment are defined and standardized, and the research on software function test methods is carried out in pairs according to the requirements of specified steps. Finally, the experiment proves that it is more practical than the traditional software function model detection method.
Privacy related elements have become an essential part of any information system. Previous studies reveal a scarcity of research on privacy in software processes, few engineering practices and a lack of methodological...
详细信息
ISBN:
(纸本)9781538658413
Privacy related elements have become an essential part of any information system. Previous studies reveal a scarcity of research on privacy in software processes, few engineering practices and a lack of methodological support to address privacy requirements in software systems. Introducing Privacy-by-Design (PbD) into software developments is an advantageous solution to tackle privacy related concerns. this paper presents an integration of PbD goals into the ISO/IEC 29110 Basic profile for small software development organizations. the most frequently encountered privacy goals as well as privacy addressing practices from previous methodological proposals were taken into account and included in the form of tasks, work products and roles. As a practical example, we describe a real life project development of a health care system that motivated the creation of the ISO/IEC 29110 PbD extension.
In order to successfully complete projects it is essential for companies to acquire a project management tool that assists in their planning, cost and resource management. Currently, there are several open source proj...
详细信息
ISBN:
(纸本)9789897583827
In order to successfully complete projects it is essential for companies to acquire a project management tool that assists in their planning, cost and resource management. Currently, there are several open source project management tools on the market that have much of the functionality required. thus, it is important to choose the most appropriate one according to the needs of the user. To help withthis choice, open source software evaluation methodologies can be used. In this paper, we use the OSSpal methodology to evaluate three popular open source project management tools: Asana, Odoo, and ProjectLibre.
the paper presents the possibility of simulation of microwave distribution systems using the "Serenade" software (Ansoft Corp.) Described are the models of channels for digital streams interchange between th...
ISBN:
(纸本)9667968006
the paper presents the possibility of simulation of microwave distribution systems using the "Serenade" software (Ansoft Corp.) Described are the models of channels for digital streams interchange between the base (BS) and subscriber stations (SS).
the paper observes software of leading companies in the field of wireless broadband systems development. the basic characteristics of appropriate software and design systems are shown including the most typical exampl...
详细信息
ISBN:
(纸本)9667968006
the paper observes software of leading companies in the field of wireless broadband systems development. the basic characteristics of appropriate software and design systems are shown including the most typical examples for their implementation.
the effects of software execution are typically ignored in network simulators. this leads to inaccurate simulation results for new and emerging network technologies where packet processing in software has a significan...
详细信息
ISBN:
(纸本)9781450366199
the effects of software execution are typically ignored in network simulators. this leads to inaccurate simulation results for new and emerging network technologies where packet processing in software has a significant impact on network performance. In this paper we extend our prior work to develop models that capture the temporal aspects of software execution on both uni- and multi-core devices. When executed in parallel with existing network protocol models in network simulators, they significantly improve the accuracy of the simulation results. We demonstrate the applicability of the extended methodology by modeling the execution of communication software on one multi-core device, the Galaxy Nexus smartphone, and evaluate the resulting models in terms of accuracy and scalability. We find that our models are able to reproduce the behavior of the modeled software, and that the models scale well withthe number of nodes, cores, and threads included in the simulation;i.e., the simulation overhead increases linearly withthe number of nodes.
Enterprise software applications need to be customized in order to meet special requirements from customers. When the customization requirements are beyond the prediction of vendors, deep customization is needed, and ...
详细信息
ISBN:
(纸本)9781538658413
Enterprise software applications need to be customized in order to meet special requirements from customers. When the customization requirements are beyond the prediction of vendors, deep customization is needed, and traditionally customers do deep customizations by directly modifying the application source code. When the applications are moving from on-premises to multi-tenant software as a Service, directly changing code is not feasible because many customers are sharing one instance of the application code. In this paper, we present a new approach to enable deep customization on multi-tenant SaaS, using intrusive microservices. the custom code is implemented as an isolated and self-contained microservice running beside the main service, and it uses callback code to intrusively execute queries or commands inside the main service. We present the key techniques behind intrusive microservices and illustrate how turned an open source online shopping application into a deeply customizable multi-tenant service.
暂无评论