The application of the "Agile" methodology to a Military Application software production line is not to be taken for granted. The adoption of the new production style has implied the solution of multiple pro...
详细信息
ISBN:
(数字)9783319278964
ISBN:
(纸本)9783319278964;9783319278940
The application of the "Agile" methodology to a Military Application software production line is not to be taken for granted. The adoption of the new production style has implied the solution of multiple problems and the generation of a custom version of the basic "Scrum" theory. One of the major changes has been imposed by the need to include Military Test Beds and Military Units in the workflow. Even if the "Agile Scrum" methodology has been around for over a decade now, there are many successful implementation stories the Italian Army experience and clearly show there is more conceptual work to be done. There are a number of open issues to be tackled and a growth potential to be exploited. AMINSEP tackles the area of monitoring and measuring using noninvasive tools (Italian Army choice) necessary to keep high the product quality level and monitor criticalities. Those tools need to evolve. The evolution has to take into account the peculiar environment of the agile teams. The current tools are based on complexity metrics borne for the old fashion software factories. The collected data do not give a complete picture of the team-based code development cycle. A new set of metrics is needed to complement the existing ones. The basic concept and the structure of the research project are presented.
Security is increasingly becoming an important issue in the design of multimedia applications. However, existing scheduling schemes for real-time multimedia services over heterogeneous networks generally do not take i...
详细信息
ISBN:
(纸本)9781450300629
Security is increasingly becoming an important issue in the design of multimedia applications. However, existing scheduling schemes for real-time multimedia services over heterogeneous networks generally do not take into account security requirements when making control decisions. In this paper, we develop and evaluate a security-aware multimedia scheduling scheme in heterogeneous environment. Firstly, we exploit a multimedia transmission model in the context of heterogeneous wireless networks. Then, a security-aware scheduling scheme is proposed by taking into account applications' timing and security requirements in addition to precedence constraints. Furthermore, the proposed scheme is applied to heuristically find resource allocations, which maximize the quality of security and the probability of meeting deadlines for all the multimedia applications. Additionally, extensive experiments are provided to demonstrate the effectiveness of the proposed scheme. Copyright 2010 ACM.
This paper presents an I/O acceleration technology for network computing: iSCSI transparent reliable multicast (iTRM) protocol. The iTRM protocol introduces double I/O paths for iSCSI network computing system: the mul...
详细信息
Cloud computing is to take the Internet technology as the main processing capacity of information technology to integrate. Its purpose is to realize the expansion with great scale and offer service to multiple externa...
详细信息
Cloud computing recently emerged as a new paradigm that aims to deploy services via Internet. Under hybrid cloud environment, cloud bursting is a technique that combines local (organizations or in-house) resources wit...
详细信息
ISBN:
(纸本)9780769550053
Cloud computing recently emerged as a new paradigm that aims to deploy services via Internet. Under hybrid cloud environment, cloud bursting is a technique that combines local (organizations or in-house) resources with public cloud resources, these resources are leased based on a pay-per-use basis. It used to process the overload work within local resource or to accelerate the execution time of distributed applications with respect of the required level of QoS, also to achieve the efficient use of private resources. When Cloud bursting is applied, the important issues are determining how many and which type of resources will be provisioned. Also, the important issues that should be considered before cloud bursting decision are which workload will be burst to public cloud and when these resources will be released. These issues attract the attention of researchers to tackle them. In this paper we intend to review the recent researches that concern on cloud bursting and resource provisioning. We will explore how each study address the problem, what are the proposed solutions and what are the differences between them, the main researches are compared in terms of several criteria such as type of application, which was targeted by the research, environment that used to implement the experiment, results, and limitations.
As the requirement of the user increases, complexity in the development of software is also increases. It is a great challenge in softwareengineering to understand, measure, manage, control, and even to low the softw...
详细信息
ISBN:
(纸本)9781479970025
As the requirement of the user increases, complexity in the development of software is also increases. It is a great challenge in softwareengineering to understand, measure, manage, control, and even to low the software complexity and also increases quality. To improve performance of software, web sites and services is a holy grail of software industry. A new approach for implementation of Poka-Yoke method in software performance engineering is proposed. Poka-Yoke is a mistake proofing technique used in product design. In previous work, proposed a new framework for High Quality in Large Scale (HQLS) software development. Now, in this paper, quantitatively validating the Poka-Yoke approach for a product called Personal Secretary (PS). The quantitative of PS was evaluated using Regression Coefficients and Analysis of Variance (ANOVA). Regression analysis showed that PokaYoke has a greater impact on software quality that uses the current state of the art software development models. Improved UGAM scores also showed linearity and justified Poka-Yoke implementation. Our findings recommend usage of techniques for mistake proofing for overall software performance. The aim is to reduce errors in the software development process.
Rapid growth of competition on the electronic market place calls for innovative comm unication modes with web users. Considering the emergence of dynamic media objects containing temporal infromation sue h as animated...
详细信息
ISBN:
(纸本)0769511988
Rapid growth of competition on the electronic market place calls for innovative comm unication modes with web users. Considering the emergence of dynamic media objects containing temporal infromation sue h as animated character agents, web page scripts nowadays cannot satisfy users' increasing requirements well. We will develop a Dynamic Web Markup Language (DWML) as a software platform for authoring animated web pages with character agents. We assume that both primary media objects (text, image, etc.) and animated characters can be dynamic objects carrying time-based information, and that a c haracter agent is a special dynamic medium as part of a multimedia interface. DWML, having a distributed structure and timeline flow, is used to generate both dynamic and static media objects, as well as characters' verbal and non-verbal behaviors.
Supporting study of a method to solve cloud computing security issue with private face recognition. The method has three parts: user part provides face images;cloud initialization part has a face subspace and template...
详细信息
Although Smart-Phones are becoming major in computer systems nowadays, and as multimedia is the most important applications running on the mobile platforms, there is no clear branch for smart phone software engineerin...
详细信息
Although Smart-Phones are becoming major in computer systems nowadays, and as multimedia is the most important applications running on the mobile platforms, there is no clear branch for smart phone softwareengineering. In this paper, we make a survey on the latest and most well-known frameworks on mobile multimediasoftwareengineering. Categorizing the mobile application frameworks is also a main issue that will be discussed. The concentration will be on the cross-platform environments (tools) as the most important applications resulted from the market statistics.
The objective of this paper is to present a graphical-user-interface (GUI) in support of a decision support system (KASER) for machine understanding. In order to provide information between the user and the KASER duri...
详细信息
ISBN:
(纸本)9781605606170
The objective of this paper is to present a graphical-user-interface (GUI) in support of a decision support system (KASER) for machine understanding. In order to provide information between the user and the KASER during the learning process, the approach is to combine information science and cognitive science in the form of several virtual and physical multimedia screens (e.g., a whiteboard running a pen-based OS ensemble, a menu-driven touch-screen, or a multimedia output screen). The touch-screen will also facilitate navigation between virtual screens. An application to homeland security is provided as an example;however the approach has vast applicability to many problems in which a graphical form of learning is required. The integration between human and machine is to be seamless which allows the user to pose questions and retrieve answers through the multimedia system, thus accelerating the learning process.
暂无评论