The paper recasts the problem of feature location in source code as a decision-making problem in the presence of uncertainty. The main contribution consists in the combination of two existing techniques for feature lo...
详细信息
The paper recasts the problem of feature location in source code as a decision-making problem in the presence of uncertainty. The main contribution consists in the combination of two existing techniques for feature location in source code. Both techniques provide a set of ranked facts from the software, as result to the feature identification problem. One of the techniques is based on a scenario based probabilistic ranking of events observed while executing a program under given scenarios. The other technique is defined as an information retrieval task, based on the latent semantic indexing of the source code. We show the viability and effectiveness of the combined technique with two case studies. A first case study is a replication of feature identification in Mozilla, which allows us to directly compare the results with previously published data. The other case study is a bug location problem in Mozilla. The results show that the combined technique improves feature identification significantly with respect to each technique used independently
In 1999, Sun et al. proposed a new (t, n) threshold proxy signature scheme based on Zhang's threshold proxy signature scheme. But in 2003 Hsu et al. pointed out that Sun's scheme suffered from a drawback and d...
详细信息
In 1999, Sun et al. proposed a new (t, n) threshold proxy signature scheme based on Zhang's threshold proxy signature scheme. But in 2003 Hsu et al. pointed out that Sun's scheme suffered from a drawback and demonstrated an improvement to counter it. In this paper we point out that Hsu's scheme suffers from an insider attack against their scheme. That is, a malicious proxy signer can forge a valid threshold proxy signature on any message. To thwart this attack, some improvements are further proposed.
Although increasing evidence suggests that superior performance requires alignment between firms' strategies and production processes, it is not known if such alignment is relevant for software development process...
详细信息
Although increasing evidence suggests that superior performance requires alignment between firms' strategies and production processes, it is not known if such alignment is relevant for software development processes. This study breaks new ground by examining how firms align their software processes, products, and strategies in Internet application development. Drawing upon the literatures in strategy, operations management, and information systems, we identify four dimensions that influence alignment: the business unit strategy, the level of product customization, the level of process customization, and the volume of customers. To examine how these dimensions are synchronized, we conducted detailed case studies of Internet application development in nine varied firms including both start-ups and established "brick and mortar" companies. Our analyses reveal that the firms in our study do use differing processes for Internet application development, and that many of the firms match their software process choices to product characteristics, customer volume, and business unit strategies. We develop concept maps for the firms that are in alignment to illustrate how managers configure specific product and process dimensions. We also offer potential explanations for why some firms are misaligned, such as attempting to execute incompatible strategies, the lack of coordination between marketing and production strategies, the too rapid expansion of process scope, and inflexible barriers to rapid adaptation of process. Our study contributes detailed insights into how software processes are customized to complement different types of product requirements and strategies.
To be effective, an information security/IA program must correspond to the reality of today's technology: distributed processing; client/server applications; mobile code; integrated audio, video, image, and textua...
To be effective, an information security/IA program must correspond to the reality of today's technology: distributed processing; client/server applications; mobile code; integrated audio, video, image, and textual data; PLCs; ASICs; embedded systems; wireless communications; and, of course, the Internet. An integrated methodical approach is needed: one that is comprehensive in scope, encompassing safety, reliability, and security engineering. Information security/IA is not just a software challenge; ather, it involves dynamic interactions within and among a multitude of hardware, software, telecommunications, and people.
An algorithm for time division multiple access (TDMA) is found to be applicable in converting existing distributed algorithms into a model that is consistent with sensor networks. Such a TDMA service needs to be self-...
详细信息
Recently, we have defined a formal semantics of Event driven Process Chains (EPCs) that, for the first time, faithfully captures the non-local behaviour of the XOR- and OR-join connectors. This fixed-point characteris...
详细信息
Mobile technology has been increasingly in demand and is widely used to allow people to be connected wirelessly without having to worry about the distance barrier. Location-dependent information services have becoming...
详细信息
Broadcast indexing is necessary to be applied in a wireless broadcast environment as such the scheme helps mobile clients to find the desired data instances efficiently. This is particularly important considering the ...
详细信息
Data broadcasting is a scalable mechanism to disseminate information to a large number of mobile clients in a wireless environment. Our paper concerns with developing a data broadcasting system in a mobile environment...
详细信息
暂无评论