Based on the BW-eLabs platform, the goal of the NETLABS is the development of a software infrastructure, allowing for the interlinking and integration of experimental superstructures and simulations, as well as the so...
详细信息
ISBN:
(纸本)9780889868168
Based on the BW-eLabs platform, the goal of the NETLABS is the development of a software infrastructure, allowing for the interlinking and integration of experimental superstructures and simulations, as well as the software used for evaluation and archiving of data. In addition, a role- and rights-based model is developed, allowing access to experiments or measured data. The necessary components are integrated in the 3D Wonderland engine.
development of Star model for data warehouse (DW) requires ample amount of time, experience, expertise and adequate knowledge of data warehouse designing steps. As an alternative to data warehouse designing steps, tra...
详细信息
ISBN:
(纸本)9781605586427
development of Star model for data warehouse (DW) requires ample amount of time, experience, expertise and adequate knowledge of data warehouse designing steps. As an alternative to data warehouse designing steps, transformation techniques are used. These techniques transform ER model (of relational OLTP) to Star model/s. In this study, we present and evaluate a systematic approach for transformation of ER model to Star model. Based on an experiment, we prove that, by using our approach, inexperienced designers can produce Star models identical to the star models produced by experienced data warehouse designers. Copyright 2009 ACM.
One of the major problems of the software project planning is about understanding how much the project is likely to cost. Accurate cost estimates are critical not only to customers but also to software developers. Thi...
详细信息
ISBN:
(纸本)9781615676590
One of the major problems of the software project planning is about understanding how much the project is likely to cost. Accurate cost estimates are critical not only to customers but also to software developers. This is why, researchers as well as practitioners have been attracted to work on this vital issue from the early days of software development. In this paper, we elaborate on software cost estimation accuracy and propose an experimental cost estimation approach that can be used by the project manager (or any one else in charge of the estimation task) to estimate the project cost with a good degree of accuracy. In this approach, we assume that there are people with different expertise on different areas of software development and/or software project management available and willing to facilitate the process.
Wireless Mesh Network(WMN) is an emerging technology that has developed a lot these years. WMN has the feather of self-organization, distributed structure. The main topological characteristic of WMN is that there are ...
详细信息
ISBN:
(纸本)9781424437702
Wireless Mesh Network(WMN) is an emerging technology that has developed a lot these years. WMN has the feather of self-organization, distributed structure. The main topological characteristic of WMN is that there are only one or several node connecting to the infrastructure network as gateway and all other nodes connect to the gateway through the relay of the neighboring nodes, and then connect with the internet. WMN represents a whole new network concept and because of the nature of wireless and multi-hop, the security vulnerabilities have become crucial problems. Therefore, specified security mechanism should be introduced. The research on the key security theories and detection to intrusion of WMN has become of great significance both theoretically and empirically. This article starts from the introduction of the basic organization and characteristics of WAN, presenting major security problems and key security approach gradually to the reader, and concludes with the comparison of several secure routing protocols.
Assessment of student learning is an important task undertaken by educators. However it can be time consuming and costly for humans to grade student work. technology has been available to assist teachers in grading ob...
详细信息
ISBN:
(纸本)9783642011115
Assessment of student learning is an important task undertaken by educators. However it can be time consuming and costly for humans to grade student work. technology has been available to assist teachers in grading objective tests for several decades;however these true-false and multiple choice tests do not capture the deeper aspects of student learning. Essay writing can be used to assess this deeper learning, which includes a student's ability to synthesize his/her thoughts, and argue for propositions. Automated essay grading systems are now starting to be used in the educational sector with some success. They can reduce the cost of grading, and they also eliminate the inconsistencies that are found amongst human graders when marking the same essay. The next development in essay processing technology is automated essay writing. This development will present a new set of challenges for educators. The detection of automatically generated essays may be difficult, and students may be given credit for writing which does not reflect their true ability. An understanding of how these systems would work, and the characteristics of the generated essays, is thus needed in order to detect them. This paper describes the components we believe an automated essay generator would need to have, and the results of building a prototype of the first of these components, the Gatherer.
In an environment where computer compromises are no longer anomalies, but are frequent occurrences, the field of computer forensics has increasingly gained importance. The development of this forensic field is matched...
详细信息
We describe the development of a portable life support system called the Abnormal Condition Detection System (ACDS) involving the use of a wireless wearable biosensor that can be used to simultaneously observe triaxia...
详细信息
Knowledge has been called the only meaningful economic resource of the Knowledge Society. Then, Knowledge Creation in organizations is a very important issue. Particularly, the development of new software products req...
详细信息
ISBN:
(纸本)9783642106187
Knowledge has been called the only meaningful economic resource of the Knowledge Society. Then, Knowledge Creation in organizations is a very important issue. Particularly, the development of new software products requires the generation of novel and useful ideas. In this paper, software development approaches are analyzed from the perspective of Knowledge Management and Creativity. Here too, we apply these concepts to enhance the creative performance of eXtreme Programming introducing a, new role wich call stimulate the Knowledge Creation and Creativity of the developers.
With a view toward enhancing pest control and achieving organic requirements in wine industry, development of a prototypical autonomous vehicle that automatically applies a band barrier on grapevine is detailed in thi...
详细信息
computer security is undeniably important in IT era nowdays. Most computer users today are fighting for - either by battling viruses, spam, phishing or other malware, or by fending off schemes to compromise privacy an...
详细信息
ISBN:
(纸本)9789639799769
computer security is undeniably important in IT era nowdays. Most computer users today are fighting for - either by battling viruses, spam, phishing or other malware, or by fending off schemes to compromise privacy and extract confidential information. With these worries in mind, the Trusted Computing Group (TCG) was established to develop specifications for trusted computing building blocks and software interfaces that could address the problems and aims to enhance security by using the transitive properties of trust. However, the implementation of this technology seems to have consequences for many people. At present, there is no standard mechanism for establishing trust in the Trusted Computing (TC) on a particular machine. The TC specification is not rigidly defined when it comes to implementation, leaving many open issues for research and development efforts. There are major issues, especially related to privacy. One big worry is the potential loss of anonymity and the threat of unwanted surveillance and even control. TC also affects areas other than purely technical ones. The capabilities of TC technology have legal as well as economic consequences. The main legal concerns are copyright, anti-trust law, data privacy law and digital rights management, the impact on which are not yet clear. This paper will discuss the TC in concept and study on the opportunities and risks of the system in existing computing system environment particularly related to security matters.
暂无评论