Many countries having recognized the importance of engineering in economics are paying serious attention to education in this area. In order to meet labor market needs when developing engineering study programs are en...
详细信息
ISBN:
(纸本)9781509054671
Many countries having recognized the importance of engineering in economics are paying serious attention to education in this area. In order to meet labor market needs when developing engineering study programs are encouraged to consider the opinion of all stakeholders. In this paper, the authors first identify key stakeholders to be considered in the process of study programs development, then argue that online surveys are a preferable method of data collection for this purpose. After that, and being the focus of this paper, the authors address what to consider when planning such surveys by asking key questions and giving guidelines based on practices and experiences at universities, and continue by outlining some common pitfalls to be avoided when designing such surveys. Authors conclude with the presentation of the results of purposeful use of the proposed solutions in the form of curricula of improved Bachelor and Master degree study programs in both Information Security and softwareengineering as well as documents confirming their international recognition. Presented curricula, designed to meet all the requirements of international accreditation, in structure and content can be recommended for dissemination to other specialties and universities. Furthermore, described survey's methodology can be accordingly included in the content of study programs on management and pedagogy.
Reducing energy consumption of software is an increasingly important objective, and there has been extensive research for data centers, smartphones, and embedded systems. However, when it comes to software, we lack wo...
详细信息
ISBN:
(纸本)9781665457019
Reducing energy consumption of software is an increasingly important objective, and there has been extensive research for data centers, smartphones, and embedded systems. However, when it comes to software, we lack working tools and methods to directly reduce energy consumption. For performance, we can resort to configuration options for tuning response time or throughput of a software system. For energy, it is still unclear whether the underlying assumption that runtime performance correlates with energy consumption holds, especially when it comes to optimization via configuration. To evaluate whether and to what extent this assumption is valid for configurable software systems, we conducted the largest empirical study of this kind to date. First, we searched the literature for reports on whether and why runtime performance correlates with energy consumption. We obtained a mixed, even contradicting picture from positive to negative correlation, and that configurability has not been considered yet as a factor for this variance. Second, we measured and analyzed both the runtime performance and energy consumption of 14 real-world software systems. We found that, in many cases, it depends on the software system's configuration whether runtime performance and energy consumption correlate and that, typically, only few configuration options influence the degree of correlation. A fine-grained analysis at the function level revealed that only few functions are relevant to obtain an accurate proxy for energy consumption and that, knowing them, allows one to infer individual transfer factors between runtime performance and energy consumption.
With the rapid development of Android systems and the growing of Android market, Android system has become a focus of the developers and users, but at the same time, the problem of data security along with the Android...
详细信息
ISBN:
(纸本)9781538632215
With the rapid development of Android systems and the growing of Android market, Android system has become a focus of the developers and users, but at the same time, the problem of data security along with the Android system such as malware, privacy leaks are also prominent. In this paper, we research the dm-crypt disk encryption technology, the mobile phone source code and the Android file system and propose a high efficiency encryption scheme of dual data partition for Android devices. We separate a part of storage space as the encrypted data partition from the original data partition and apply the dm-crypt disk encryption technology so that the encrypted data partition is automatically mounted when Android system starts. In the encrypted data partition, users can store their privacy data, and the data are stored encrypted data partition of the cell phone after real-time encryption, so the scheme implement the storage protection and improve the security of the data storage of the Android system.
Many software systems contain large number of classes which make software testing very difficult. As software systems evolve, test suites become very large. It is usually very expensive to execute the entire test suit...
详细信息
ISBN:
(纸本)9781510812277
Many software systems contain large number of classes which make software testing very difficult. As software systems evolve, test suites become very large. It is usually very expensive to execute the entire test suites. Therefore, focusing the testing on the more error-prone classes helps in reducing the testing cost. In this work, we propose an approach for test case selection using software metrics. We examine the ability of several complexity and volume metrics to find the most complex and error-prone classes. Testers can then run test cases that are associated with the complex classes only. We focus our experiments on systems written in Java and tested with the JUnit testing framework. The results reveal that the proposed approach significantly reduce the number of test cases needed while detecting most of seeded errors.
Today, within the engineering design process, we have interactions between different design teams, where each team has its own design objective and continuous need to present and share results with other groups. Commo...
详细信息
ISBN:
(纸本)9780791849019
Today, within the engineering design process, we have interactions between different design teams, where each team has its own design objective and continuous need to present and share results with other groups. Common engineering environments are equipped with advanced modeling and simulation tools, specially designed to improve engineer's productivity. In this paper we propose the use of ontologies, the semantic metadata descriptors, to facilitate the software development process in building such multidisciplinary engineering environments. The important development task is to perform integration of several numerical simulation components (models of data and processes) together with the interactive visualization of the engineering models in a unified 3D scene. In addition, we explore the possibilities on how the prototyped ontologies can become standard components in such software systems, where the presence of the inference engine grants and enables continuous semantic integration of the involved data and processes. The semantic integration is based on: l) mapping discovery between two or more ontologies, 2) declarative formal representation of mappings to enable 3) reasoning with mappings and find what types of reasoning are involved;and we have explored these three dimensions. The proposed solution involves two web based software standards: Semantic Web and X3D. The developed prototype make use of the "latest" available XML-based software technologies, such X3D (eXtensible 3D) and OWL (Web Ontology Language), and demonstrates the modeling approach to integrate heterogeneous data sources, their intcroperability and 3D visual representations to enhance the end-users interactions with the engineering content. We demonstrate that our ontology-based approach is appropriate for the reuse, share and exchange of software constructs, which implements differential-geometric algorithms used in multidisciplinary numerical simulations, by applying adopted ontologies that are
Recent work has highlighted the importance of the constraint-based mining paradigm in the context of frequent itemsets, associations, correlations, sequential patterns, and many other interesting patterns in large dat...
详细信息
ISBN:
(纸本)0769510019
Recent work has highlighted the importance of the constraint-based mining paradigm in the context of frequent itemsets, associations, correlations, sequential patterns, and many other interesting patterns in large databases. In this paper Mle study constraints which cannot be handled with existing theory and techniques. For example, avg(S) theta v, median(S) theta v, sum(S) theta v (S can contain items of arbitrary values) (theta is an element of {greater than or equal to, less than or equal to}), are customarily regarded as "tough" constraints in that they cannot be pushed inside an algorithm such as Apriori. We develop a notion of convertible constraints and systematically analyze, classify, and characterize this class. We also develop techniques which enable them to be readily pushed deep inside the recently developed FP-growth algorithm for frequent itemset mining. Results from our detailed experiments show the effectiveness of the techniques developed.
The c-Approximate Furthest Neighbor (c-AFN) search is a fundamental problem in many applications. However, existing hashing schemes are designed for internal memory. The old techniques for external memory, such as fur...
详细信息
ISBN:
(纸本)9781509065431
The c-Approximate Furthest Neighbor (c-AFN) search is a fundamental problem in many applications. However, existing hashing schemes are designed for internal memory. The old techniques for external memory, such as furthest point Voronoi diagram and the tree-based methods, are only suitable for the low-dimensional case. In this paper, we introduce a novel concept of Reverse Locality-Sensitive Hashing (RLSH) family which is directly designed for c-AFN search. Accordingly, we propose two novel hashing schemes RQALSH and RQALSH* for highdimensional c-AFN search over external memory. Experimental results validate the efficiency and effectiveness of RQALSH and RQALSH*.
There are at least two natural ways to approach measurement in softwareengineering. One may focus on developing metrics for particular applications, or one may focus on developing a foundation for software measuremen...
详细信息
ISBN:
(纸本)9781604231847
There are at least two natural ways to approach measurement in softwareengineering. One may focus on developing metrics for particular applications, or one may focus on developing a foundation for software measurement and then from this foundation define specific metrics. In this paper, we begin the latter approach though we do not proceed to the point of defining software metrics. We look at measurement theory and ask how the ideas and principles of measurement theory apply to software measurement. The "apply" question really has two parts. One is whether the principles of measurement theory are applicable to software measurement, and the other is how are the principles used or applied in software measurement. These two questions and their answers are, of course, interwoven. Logically, the first question should probably be asked first though it is probably easier to begin a discussion about measurement theory and software measurement by beginning with the second question. In this paper, in addition to looking at measurement theory and software measurement, we also look at measurement in psychology. Historically, there is a rich discussion about measurement in psychology. We hope, by looking at measurement in psychology, to be able to give some direction to the future development of software measurement.
作者:
Hacker, WolfgangUniversity of Vienna
Department of Computer Science Department of Knowledge and Business Engineering 1210 Vienna Bruenner Straße 72 Austria
The Information Technology Infrastructure Library V3 (ITIL V3) was published in June 2007. ITIL V3 is a lifecycle model about integrated IT-Service-Management (ITSM) processes, which documents best practice of IT serv...
详细信息
ISBN:
(纸本)9780889867154
The Information Technology Infrastructure Library V3 (ITIL V3) was published in June 2007. ITIL V3 is a lifecycle model about integrated IT-Service-Management (ITSM) processes, which documents best practice of IT services. It covers the process areas Service Strategy, Service Design, Service Transition, Service Operation and Continual Service Improvement. The extensive process descriptions within the lifecycle model intersect with process descriptions of the software development processes. IT organisations with software development units, as well as data processing centres, face the problem of adopting at least two different process models. This paper demonstrates the overlapping of software methodologies and ITIL V3 processes and makes a recommendation for the coexistence of both philosophies.
Infusing new technologies and methods is hard and can often be described as "banging ones head on a brick wall". The is especially true when trying to get project managers, systems, engineers and cost analys...
详细信息
ISBN:
(纸本)9781467397759
Infusing new technologies and methods is hard and can often be described as "banging ones head on a brick wall". The is especially true when trying to get project managers, systems, engineers and cost analysts to add a radically new tool to their tool box. In this paper we suggest that the underlying causes are rooted in the fact that the different players have fundamental differences in mental models, vocabulary and objectives. We based this work on lessons learned from ten years of working on the infusion of software costing models into NASA. The good news is that, lately, a crack has begun to appear in what was previously a brick wall.
暂无评论