When reusable software elements are defined in the requirements phase, this raises a number of issues for the measurement of their functional size, when a reusable element implements a business rule or a business sub ...
详细信息
When reusable software elements are defined in the requirements phase, this raises a number of issues for the measurement of their functional size, when a reusable element implements a business rule or a business sub process, for example. A case study is presented with project functional size measurement data to illustrate the impact of reuse on the resulting size and to determine criteria of reuse effectiveness and efficiency.
There are diverse factors involved in the transmission of live video over internet. These factors have direct impact on the quality of the transmitted video. The underlying protocol, encapsulation method and the choic...
详细信息
ISBN:
(纸本)9781467349901
There are diverse factors involved in the transmission of live video over internet. These factors have direct impact on the quality of the transmitted video. The underlying protocol, encapsulation method and the choice of video codec are the, key factors involved in the transmission of video over streaming network. Up to our knowledge various studies have been performed to analyze the impact of these factors individually on the quality of video transmission however their joint impact on video transmission is not yet done. In this paper we characterize the performance of live video streaming setup, while keeping in view the effect of stack-protocol, encapsulation method and the underlying video codec on delay as the key investigating parameter. The results obtained while considering diverse video streaming setups are provided in the results section of this paper. More specifically, it was observed that stack (http, mjpeg, mjpeg) performs best and stack (mms, asf, wmv1) perform worst.
The key feature of Unified Communications (UC) lies in its ability to provide the service that the customer wants, when he wants and regardless of the device being used. At the heart of the UC architecture, which span...
详细信息
ISBN:
(纸本)9781479905058
The key feature of Unified Communications (UC) lies in its ability to provide the service that the customer wants, when he wants and regardless of the device being used. At the heart of the UC architecture, which spans different layers from application layer to network, comes the Quality of Service (QoS) framework that is essential to provide adequate service to different communication session's call participates. The heterogeneity of access networks and diversity of a UC session's participants make it necessary to classify incoming traffic based on its type and the QoS requirements of the participating parties. The existence of different traffic classifications for different existing access networks raises the question of how to classify incoming traffic when it belongs to a diverse set of access networks and devices. In this paper, we investigate different classification methods currently adopted in different access networks and industry standards. We introduce a traffic classification method that should satisfy the requirements of real-time traffic that traverses most of the existing access networks. The classification method has been tested using both First In First Out (FIFO) and Weighted Fair Queuing (WFQ) schedulers to evaluate different classes performance in a shared environment with diverse QoS requirements. The results obtained showed the feasibility of our proposed classification.
Conducting a systematic literature review (SLR) is difficult and time-consuming for an experienced researcher, and even more so for a novice graduate student. With a better understanding of the most common difficultie...
详细信息
Conducting a systematic literature review (SLR) is difficult and time-consuming for an experienced researcher, and even more so for a novice graduate student. With a better understanding of the most common difficulties in the SLR process, mentors will be better prepared to guide novices through the process. This understanding will help researchers have more realistic expectations of the SLR process and will help mentors guide novices through its planning, execution, and documentation phases. Consequently, the objectives of this work are to identify the most difficult and time-consuming phases of the SLR process. Using data from two sources - 52 responses to an online survey sent to all authors of SLRs published in softwareengineering venues and qualitative experience reports from 8 PhD students who conducted SLRs as part of a course - we identified specific difficulties related to each phase of the SLR process. Our findings highlight the importance of planning, teamwork, and mentoring by an experienced researcher throughout the process. The paper also identifies implications for the teaching of the SLR process.
Attack models can be used to assess network security. Purely graph based attack representation models (e.g., attack graphs) have a state-space explosion problem. Purely tree-based models (e.g., attack trees) cannot ca...
详细信息
ISBN:
(纸本)9780729807029
Attack models can be used to assess network security. Purely graph based attack representation models (e.g., attack graphs) have a state-space explosion problem. Purely tree-based models (e.g., attack trees) cannot capture the path information explicitly. Moreover, the complex relationship between the host and the vulnerability information in attack models create difficulty in adjusting to changes in the network, which is impractical for modern large and dynamic network systems. To deal with these issues, we propose hierarchical attack representation models (HARMs). The main idea is to use two-layer hierarchy to separate the network topology information (in the upper layer) from the vulnerability information of each host (in the lower layer). We compare the HARMs with existing attack models (including attack graph and attack tree) in model complexity in the phase of construction, evaluation and modification.
QoS-aware service composition is the generation of a business process to fulfill functional goals and optimize the QoS criteria at the same time. People may focus on the optimization of a single QoS criterion or a set...
详细信息
Simulation is used for developing and testing different scenarios under controlled and reproducible situations. Proper handling of the initial transient effect for steady state simulations, proper selection of simulat...
详细信息
In Wireless Sensor Network (WSN) researches, WSN routing algorithm is one of the hot issues. This article focuses on GPSR (Greedy Perimeter Stateless Routing) and uses the NS2 (Network Simulator-2) to simulate both GP...
详细信息
The paper discusses the concept of innovation experiment systems in the context of long-lived embedded systems. These systems need to evolve continuously to stay competitive and provide value to the customer and end-u...
详细信息
Business and design decisions regarding software development should be based on data, not opinions among developers, domain experts or managers. The company running the most and fastest experiments among the customer ...
详细信息
暂无评论