ISSA2012 is the annual conference for the information security community that continues on the successful recipe established in *** are pleased to announce, however, that from 2010, ISSA is co-sponsored by the IEEE Sy...
ISSA2012 is the annual conference for the information security community that continues on the successful recipe established in *** are pleased to announce, however, that from 2010, ISSA is co-sponsored by the IEEE Systems, Man and Cybernetics Society (SMCS) Chapter, a chapter of the IEEE South Africa Section. The upcoming conference is held under the auspices of the University of Johannesburg Academy for Computer science and softwareengineering, the University of South Africa School of computing and the University of Pretoria School of Information Technology.
For more than 30 years, knowledge-based product configuration systems have been successfully applied in many industrial domains. Correspondingly, a large number of advanced techniques and algorithms have been develope...
详细信息
For more than 30 years, knowledge-based product configuration systems have been successfully applied in many industrial domains. Correspondingly, a large number of advanced techniques and algorithms have been developed in academia and industry to support different aspects of configuration reasoning. While traditional research in the field focused on the configuration of physical artefacts, recognition of the business value of customizable software products led to the emergence of software product line engineering. Despite the significant overlap in research interests, the two fields mainly evolved in isolation. Only limited attempts were made at combining the approaches developed in the different fields. In this paper, we first aim to give an overview of commonalities and differences between software product line engineering and product configuration. We then identify opportunities for cross-fertilization between these fields and finally develop a research agenda to combine their respective techniques. Ultimately, this should lead to a unified configuration approach.
Context: Research shows that one of the main reasons of project failure is changing requirements. The success or failure of software projects largely depends upon how we respond to changing requirements. The knowledge...
详细信息
ISBN:
(纸本)9781622762538
Context: Research shows that one of the main reasons of project failure is changing requirements. The success or failure of software projects largely depends upon how we respond to changing requirements. The knowledge about the causes of requirements change can improve our ability to make better decisions and manage changing requirements effectively. Objective: In this paper we present findings from an empirical study that was aimed at identifying the causes of requirement change and the frequency of these causes in different software development phases. Methods: We performed a systematic literature review and went through all the stages required by the process. Although our search strings yielded a large amount of papers but after careful filtration we were left with only five papers (six studies) which reported empirical knowledge about the causes of requirement change. Results: We have identified different causes and their frequency in software development phases. We have classified the extracted causes of requirements change into two major types i.e., essential and accidental causes. Conclusions: It is surprising to find little empirical evidence on the causes of requirements change as requirements change has been widely quoted as one of the major challenges faced by requirements engineers. With this small number of evidences, it is hard to generalize the research results. There is a need for further empirical research to identify and fully understand the causes of requirement change.
It is well recognized that visualizing traceability links between software artifacts helps developers to recover, browse, and maintain these inter-relationships effectively and efficiently. However, it is a major chal...
详细信息
It is well recognized that visualizing traceability links between software artifacts helps developers to recover, browse, and maintain these inter-relationships effectively and efficiently. However, it is a major challenge for researchers to efficiently visualize traceability links for big software systems because of scalability and visual clutter issues. In this paper we present a new approach that combines treemap and hierarchical tree visualization techniques to provide a global structure of traces and a detailed overview of each trace. These both reduce visual clutter while still being highly scalable and interactive. Our usability study shows that our approach can support comprehension, browsing, and maintenance of traceability links.
In this paper, a super integrable equation hierarchy is considered based on a Lie superalgebra and supertrace identity. Then, a super integrable equation hierarchy with self-consistent sources is established. Furtherm...
详细信息
In this paper, a super integrable equation hierarchy is considered based on a Lie superalgebra and supertrace identity. Then, a super integrable equation hierarchy with self-consistent sources is established. Furthermore, we introduce two variables F and G to construct conservation laws of the super integrable equation hierarchy and the first two conserved densities and fluxes are listed. It would be specially mentioned that the Fermi variables play an important role in super integrable systems which is different from the ordinary integrable systems.
Virtual machine (VM) based state machine approaches, i.e. VM replication, provide high availability without source code modifications, unfortunately, existing VM replication approaches suffer from excessive replicatio...
详细信息
Virtual machine (VM) based state machine approaches, i.e. VM replication, provide high availability without source code modifications, unfortunately, existing VM replication approaches suffer from excessive replication overheads. On the other hand, machine state replication is an overly strong (and therefore less efficient) requirement for high availability in the networked client-server system. In this paper, we propose a generic and highly efficient high availability solution through output continuity. Output continuity considers a backup server as a valid replica as long as the responses generated so far are the same between the backup and primary servers, the server state is propagated from the primary server to the backup server if and only if the previous outputs from the backup and primary servers are different.
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur...
详细信息
Multi-document summarization aims to extract information from the original multiple unstructured text documents or other types of multimedia about the same topic and this paper will focus on eventbased multi-document ...
详细信息
Multi-document summarization aims to extract information from the original multiple unstructured text documents or other types of multimedia about the same topic and this paper will focus on eventbased multi-document summarization. Event-based extractive summarization attempts to extract sentences and re-organize them in a summary according to the important events that the sentences describe. Events are defined by the event terms and the associated entities at the sentence level. In this paper, we emphasize on the event semantic relations derived from external linguistic resource. Firstly, the graph based on the event semantic relations is constructed and the events in the graph are grouped into clusters using the revised DBSCAN clustering algorithm. Then, we select one event as the representative event for each cluster or one cluster to present the main topic of the documents. Lastly, we generate the summary by extracting the sentences which contain more informative representative events from the documents. The evaluation on the DUC 2001 document sets shows it is necessary to take the semantic relations among the events into consideration and our summarization approach based on event semantic relation graph clustering is effective.
Workflow is a technology which software system uses highly frequent. A good workflow system can replace the traditional manual way document circulation and greatly simplify office process. It has become an indispensab...
详细信息
Workflow is a technology which software system uses highly frequent. A good workflow system can replace the traditional manual way document circulation and greatly simplify office process. It has become an indispensable constituent part of the business or government software. For the convenience of workflow converting to code, workflow process definition language is designed combined with web technology XML.
We study the asymptotic networking-theoretic multicast capacity bounds for random extended networks (REN) under Gaussian channel model, in which all wireless nodes are individually power-constrained. During the transm...
详细信息
We study the asymptotic networking-theoretic multicast capacity bounds for random extended networks (REN) under Gaussian channel model, in which all wireless nodes are individually power-constrained. During the transmission, the power decays along path with attenuation exponent α >; 2. In REN, n nodes are randomly distributed in the square region of side length √n. There are n s randomly and independently chosen multicast sessions. Each multicast session has n d + 1 randomly chosen terminals, including one source and n d destinations. By effectively combining two types of routing and scheduling strategies, we analyze the asymptotic achievable throughput for all n s = ω(1) and nd. As a special case of our results, we show that for n s = Θ(n), the per-session multicast capacity for REN is of order Θ(1/√n d n) when nd = O(n/(log n) a+1 ) and is of order Θ(1/n d · (log n) -n/2 ) when n d = Ω(n/log n).
暂无评论