In 1999 The software engineering program at University of Houston-Clear Lake elected to be one to participate in the development and delivery of official Web-based course offerings. The software engineering program ha...
详细信息
In 1999 The software engineering program at University of Houston-Clear Lake elected to be one to participate in the development and delivery of official Web-based course offerings. The software engineering program had operated as a distance education program for the past six years via two-way live interactive video broadcast into multiple receiving sites. The new venture into Web-based delivery would prove to be quite different from the live broadcast distance courses since the lecture components and live classroom interactions were not provided. With the live broadcast method heavy use was made of the Web to provide easy access to all assignments, supplementary material, lecture notes, class messages, bulletin boards and an ftp site for assignment submission. This reduced phone and email time with the distance students dramatically and if certainly helped with the transition to the development of strictly Web-based courses. However, the content-related materials that had been provided to support the broadcast courses were found to be inadequate once the live lecture component was removed and the course become strictly Web-based. Fall 2000 will see the completion of the design, development and testing of three strictly Web-based softwareengineering courses that will form the basis for a certificate in Fundamentals of softwareengineering which will be issued by the School of Natural and Applied Science. The paper presents an overview of the activities that took place during the effort and the basic process used.
Risk management is an important part of software development. Risk identification is the first major step in the risk management process that determines possible risks in a software project and dictates how effective ...
详细信息
ISBN:
(纸本)9781538633038
Risk management is an important part of software development. Risk identification is the first major step in the risk management process that determines possible risks in a software project and dictates how effective the risk management process will be. However, there are several approaches used to identify risk. The approaches depend on subjective decisions of risk or domain experts which increase cost and workload. Therefore, to make the risk identification more effective, a systematic and automated approach is necessary. In this paper, we propose an alternative risk identification scheme using knowledgeable ontology representing risk taxonomy and CMMI project planning guideline. The ontology provides the relations among risk factors and software project risks according to the structure of risk taxonomy and the relevant process areas in CMMI. In this paper, we focus and demonstrate the CMMI project planning process area as an initiative to construct our ontology. The resulting ontology is supportive as expected and scalable to handle more on the other process areas of CMMI and the addition of the software project risks.
Information technology is introduced to agriculture in order to improve all the cultivating process and the quality of the products. In this article, we propose a method to organize the cultivated knowledge with a foc...
详细信息
Information technology is introduced to agriculture in order to improve all the cultivating process and the quality of the products. In this article, we propose a method to organize the cultivated knowledge with a focus on the life cycle process, based on the concept of lightweight ontology. We also propose a method for acquiring the knowledge easily by applying the technology of softwareengineering. We interviewed the farmers cultivating high quality mandarin orange and organized the ontology using the proposed method, and show the effectiveness of the proposed method.
Effective intelligence work must uncover possible scenarios, however improbable, that need to be tracked until they can be eliminated from consideration. What is most important is identifying and maintaining contact w...
详细信息
The goal of our software assurance (SwA) landscape project is to create a usable framework that describes assurance participants, assurance technologies, and their contributions to accelerate the formation and adoptio...
详细信息
SQL antipatterns are frequently-made missteps that are commonly found in the design of relational databases, the use of SQL, and the development of database applications. They are intended to solve certain problems bu...
详细信息
ISBN:
(纸本)9781509055050
SQL antipatterns are frequently-made missteps that are commonly found in the design of relational databases, the use of SQL, and the development of database applications. They are intended to solve certain problems but will eventually lead to other problems. The motivation of this paper is how to assist database administrators in diagnosing SQL antipatterns and suggest refactoring techniques to solve the antipatterns. Specifically, we attempt to automate the detection of logical database design antipatterns by developing a tool that uses Transact-SQL language to query and analyze the database schema. The tool reports on potential antipatterns and gives an instruction on how to refactor the database schema. In an evaluation based on three databases from the industry, the performance of the tool is satisfactory in terms of recall of the antipatterns but the tool detects a number of false positives which affect its precision. It is found that SQL antipatterns detection still largely depends on the semantics of the data and the detection tool should rather be used in a semi-automated manner, i.e it can point out potential problematic locations in the database schema which require further diagnosis by the database administrators. This approach would be useful especially in the context of large databases where manual antipatterns inspection is very difficult.
Hard disk failure is a serious problem in term of product quality and credibility to customers. All hard disk drive companies need to be aware and address how to get rid of failure and prevent the repeat of the proble...
详细信息
Hard disk failure is a serious problem in term of product quality and credibility to customers. All hard disk drive companies need to be aware and address how to get rid of failure and prevent the repeat of the problem in their products. The quality of failure analysis process depends on the person who has most experience. It would not be so efficient if the company has no experienced person to perform the analysis. A knowledge management system can store the knowledge of experienced engineers. It can help new engineers to learn the craft. It would reduce a knowledge gap issues and bring up efficiency for failure solving process. This paper presents a design and implementation of knowledge management system for failure analysis in hard disk with case-based reasoning. The existing cases are stored and a new case can be compared to the existing one in order to retrieve the relevant existing knowledge to help the analysis. Once the new case is solved, it can be stored to aid the future cases. A prototype of the system has been implemented and the assessment of user satisfaction shows that it can improve the failure analysis process effectively.
Identity management (IDM) refers to a security discipline that employs technologies to manage information about the identity of users and control their access to organization resources. Various IDM products are in the...
详细信息
ISBN:
(纸本)9781509055050
Identity management (IDM) refers to a security discipline that employs technologies to manage information about the identity of users and control their access to organization resources. Various IDM products are in the market to offer corporate customers productivity and security while lowering costs of identity management. System integrators who implement the IDM solutions for their corporate customers often face problems when choosing the right IDM products for integrating with the customers' enterprise systems. This paper proposes a decision model for IDM product selection which is used in evaluating and ranking IDM products based on the proposed customer requirements questionnaire. The model is comprehensive in that its decision criteria comprise not only the technical specifications of the products but also other important aspects including price and accountability of system integrators and product vendors. Based on the decision model, product selection is conducted using a multi-criteria decision making technique called fuzzy analytic hierarchy process (fuzzy AHP). In an evaluation, a leading system integrator company in Thailand applies the proposed approach to IDM product selection for its customer and the result is quite satisfactory.
We created a customize DNS operator to address the shortcoming of CoreDNS in Kubernetes. While Kubernetes is gaining popularity in orchestrating containers, many organizations with Virtual Machine (VM) based legacy ap...
详细信息
ISBN:
(纸本)9781665462730
We created a customize DNS operator to address the shortcoming of CoreDNS in Kubernetes. While Kubernetes is gaining popularity in orchestrating containers, many organizations with Virtual Machine (VM) based legacy applications still struggle to containerize. Rehost strategy seems to be a faster method. On Kubernetes, KubeVirt can be used to manage rehosted VM. However, there is a huge difference between the long-term use of the VMs and containers. For example, container IP addresses change over time is problematic for VMs that need a static IP. In addition, some VM-based applications may require multiple network interfaces or a specific domain name for service discovery. These issues prevent some VMs from functioning properly after the migration to KubeVirt. We developed an operator framework to solve network problems that arise in the application layer such as DNS queries. In addition, we provide a guideline on how to use open-source projects like the Multus Container Network Interface, NMState to enable the migration of VMs with applications related to network function properly. Our operator and guideline allow most VMs to function properly with few modifications (to none) after migrating to KubeVirt. This facilitated the adoption of Kubernetes in more organizations.
暂无评论