Testing plays an important role in the maintenance of Component Based software Development. Test adequacy for component testing is one of the hardest issues for component testing. To tackle this problem, it is a natur...
详细信息
We present a unique Geographical Information System (GIS) that seamlessly integrates 2D and 3D views of the same spatial and aspatial data. Multiple layers of information are continuously transformed between the 2D an...
详细信息
Distributed collaboration over the Internet has become increasingly common in recent years, supported by various technologies such as virtual workspace systems. Often such collaboration is ad-hoc, and virtual workspac...
详细信息
ISBN:
(纸本)9781604235531
Distributed collaboration over the Internet has become increasingly common in recent years, supported by various technologies such as virtual workspace systems. Often such collaboration is ad-hoc, and virtual workspaces are set up anew for each new instance of collaboration. We propose that much of the ad-hoc collaboration can be captured and transformed into patterns for reuse in future collaboration. This paper presents the results of the past five years of our work in this area. We introduce the notion of patterns of virtual collaboration;present a framework for extracting patterns of work in virtual workspace systems;and introduce an information model of virtual collaboration. We then present an overview of our data and process mining methods and reverse engineering techniques for discerning work processes carried out through virtual workspace systems. Finally we present our visual mining techniques that we use to discern aspects of work processes in virtual workspaces.
Web applications exhibit dynamic behaviour through such features as animation, rapidly changing presentations, and interactive forms. The growing complexity of web applications requires a rigorous modelling approach c...
详细信息
Fault tree analyses (FTA) are embedded into UML component models. The UML component models are constructed by employing UML's extension mechanisms in conjunction with component-based software techniques. Taking an...
详细信息
Fault tree analyses (FTA) are embedded into UML component models. The UML component models are constructed by employing UML's extension mechanisms in conjunction with component-based software techniques. Taking an application's safety-related requirements into consideration, the elements of FTA are defined as component attributes, and assigned to a UML component model, which is collected in UML profile for safety analyses and architectural design. Based on the thus enhanced architecture specification of the UML component model, it becomes possible to handle hazard analyses and to model safety mechanisms at the same time.
Quality of Services (QoS) management in compositions of services requires careful consideration of QoS characteristics of the services and effective QoS management in their execution. A Web service is a software syste...
详细信息
ISBN:
(纸本)0769524095
Quality of Services (QoS) management in compositions of services requires careful consideration of QoS characteristics of the services and effective QoS management in their execution. A Web service is a software system that supports interoperable application-to-application interaction over the Internet. Web services are based on a set of XML standards such as Simple Object Access Protocol (SOAP). The interactions of SOAP messages between Web services form the theoretical model of SOAP Message Exchange Patterns (MEP). Web Services Business Process Execution Language (WSBPEL) defines an interoperable integration model that facilitates automated process integration in intra- and inter-corporate environments. A service-level agreement (SLA) is a formal contract between a Web services requestor and provider guaranteeing quantifiable issues at defined levels only through mutual concessions. Based on a prior research work on Message Detail Record (MDR), this paper further proposes a SOAP message tracking model for supporting QoS end-to-end management in the context of WSBPEL and SLA. This paper motivates the study of QoS management in a Web service composition framework with the evolution of a distributed toolkit in an industrial setting.
A5 encryption/decryption algorithm depends on the use of linear feedback shift registers (LFSR) in order to generate the key-stream bits. The A5-1 algorithm uses three different LFSRs with a majority function to add n...
详细信息
A5 encryption/decryption algorithm depends on the use of linear feedback shift registers (LFSR) in order to generate the key-stream bits. The A5-1 algorithm uses three different LFSRs with a majority function to add non-linearity, while A5-2 uses four LFSRs. In this paper a new multi-configurable LFSR design variant of the A5 algorithm is proposed, in which the inverse taps of the LFSR are used to generate the output key-stream bits. The new LFSR design, called a complex LFSR, techniques can be effectively applied in software or hardware to a communications stream to provide a low cost and high speed encryption capability
This paper explores the use of online self assessment as a tool for guiding the assignment marking process. The study was motivated by a desire to assist staff in more efficiently completing assessment and to involve ...
详细信息
Several challenges and problems of developing, using and maintaining object-oriented application frameworks have been identified. It was discovered that companies attempting to build or use large-scale reusable framew...
详细信息
暂无评论