Cloud computing is profound changing the whole IT industry, and lead traditional software testing to a new direction. In this paper, aiming at the existing framework of cloud computing, we analyze the advantages and d...
详细信息
In this paper, research on low-carbon computing networks in integrated satellite-ground systems is given. We have reviewed the research works in the satellite-earth convergence network and multi-access edge computing ...
详细信息
As graphic modelling languages play an increasingly important role in software development, completeness and consistency have become essential quality attributes of software models This paper presents a framework for ...
详细信息
ISBN:
(纸本)9781627486606
As graphic modelling languages play an increasingly important role in software development, completeness and consistency have become essential quality attributes of software models This paper presents a framework for the formal definition of the abstract syntax and type systems of modelling languages that facilitates formal specification and automatic checking of consistency and completeness constraints on graphic models The approach is illustrated by the specification of CAMLE modelling language and its consistency and completeness constraints An empirical study of the effectiveness of the framework is reported, which shows that about 85% of errors generated by mutation operators can be detected by automatic consistency checking.
Cloud computing is widely used technique for data storage on-demand but involves risk such as data security, privacy protection, access-control and data confidentiality. Present study is a survey of the popularly used...
详细信息
ISBN:
(纸本)9781509015672
Cloud computing is widely used technique for data storage on-demand but involves risk such as data security, privacy protection, access-control and data confidentiality. Present study is a survey of the popularly used encryption techniques that is helpful to secure sensitive information on cloud. A discussion of the fundamental challenges and issues/characteristics of cloud computing has been done. Identification of security and privacy issues within this framework are highlighted. Study of the widely used encryption techniques helpful in securing sensitive information on cloud is debated. Scope has been set for academicians and researchers. Diverse versions of the encryption techniques surveyed and analyzed to identify optimization features for cloud security.
In this paper, we propose software performance testing scheme using virtualization technology. Generally, people have used software performance testing tool such as load runner and silk performer. However, people shou...
详细信息
ISBN:
(纸本)9781424451319
In this paper, we propose software performance testing scheme using virtualization technology. Generally, people have used software performance testing tool such as load runner and silk performer. However, people should perform software performance testing manually in case of the situation that people cannot use testing tool. It needs a lot of resources such as human resource and computing resource. Therefore, we propose software performance testing scheme using virtualization technology to reduce resource consumption. Proposed scheme can reduce computer resource consumption because virtualization technology can make a number of virtual computers with a small number of physical computers. Also proposed scheme can reduce human resource consumption because, in proposed scheme, management computer can control keyboard and mouse of virtual computers automatically. Simulation result shows that proposed scheme has possibility to be used for software performance testing.
The paper describes a softwareengineering subject on system description techniques (SDT). This course explains the system description techniques (SDTs) for describing both the models that arise from analysis as well ...
详细信息
In this paper, we develop an effective P2P-based multimedia content delivery networks model, which seeks to analyze system performance metrics: hit ratios and throughputs, which are affected by system parameters. We f...
详细信息
ISBN:
(纸本)9780769534893
In this paper, we develop an effective P2P-based multimedia content delivery networks model, which seeks to analyze system performance metrics: hit ratios and throughputs, which are affected by system parameters. We find out that there are three key bottlenecks that affect system performance metrics: the performance of the media content providers, the network bandwidth between nodes and disk I/O bandwidth of nodes, Numerical Analysis of system performance under typical configuration gives the impact of these bottlenecks on system performance. Moreover, the analysis method is also suitable for other P2P-based content delivery networks.
softwareengineering (SE) project course is usually a cap-stone of an SE curriculum. With industrial involvement, it may also be one point of mutual interaction. This pa-per considers a collection of best practices tr...
详细信息
In this paper, we show use-case examples of the application of affordable programmable measurement hardware in circuit analysis as part of a graduate course in Electric-circuit theory. Besides basic measurement modes,...
详细信息
All software systems are created on the basis of design decisions that are made during software architecture design. The design decisions are taken in earlier phases of software architecture on the architecturally sig...
详细信息
暂无评论