The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The MapReduce paradigm is a programming model mainly thought to process big data sets. This model has recently been used in a new proposal of a linguistic fuzzy rule-based learning algorithm. One of the most important aspects of this proposal is the use of a parallel and distributed algorithm. An alternative to this parallel and distributed organization is the use of an incremental learning algorithm...
Constructing complex queries in SQL sometimes necessitates the use of language constructs and the invocation of internal functions which inexperienced developers find hard to comprehend or which are unknown to them. In the worst case, bad usage of these constructs might lead to errors, to ineffective queries, or hamper developers in their tasks.
The best strategy for combating SQL injection, which has emerged as the most widespread website security risk, calls for integrating defensive coding practices with both vulnerability detection and runtime attack prevention methods.
Framework-based1 applications are quite popularly used in current commercial applications. Framework-based applications are often controlled by XML configuration files. However, most of these frameworks are complex or not well documented, which poses a great challenge for programmers to correctly utilize them. To overcome these difficulties, we propose a new method to recommend XML configuration snippets...
To mine popular accessed Web pages items and find out their association rule from the Web server Log database for junior users providing recommendation service. A novel GEP-based algorithm for mining multiple-layers association rules was presented. Firstly, takes generalizing technology as a way to value fitness function in GEP (Gene Expression Programming). Then, relying on the significant self-search...
Because of the critical role that communication plays in a team's ability to coordinate action, the measurement and analysis of online transcripts in order to predict team performance is becoming increasingly important in domains such as global software development. Current approaches rely on human experts to classify and compare groups according to some prescribed categories, resulting in a laborious...
Based on the current learning atmosphere of students and the present employment market situation, we analyze the short semester teaching objectives and characteristics, so that an actual project which regarding database development during the short semester can be assigned for practice purposes. In order to present the practical purpose of the short semester and the training approach of the innovative...
It is very important in HIS (Hospital Information System) to maintain the consistency and integrity of information. A transaction is a group of actions that must all be carried out successfully on one or more tables in a database before they are committed (made permanent). If any of the actions in the group fails, then all actions are rolled back (undone). In this paper, how to use transactions in...
This study examines communication behaviors in global software student teams. The authors of the paper characterize the types of communication behaviors that occur when student teams are engaged in a software development project. The authors present findings from a one-semester study that examined factors contributing to successful distributed programming interactions among students enrolled at the...
Distributed software systems are characterized by increasing autonomy. They often have the capability to sense the environment and react to it, discover the presence of other systems and take advantage of their services, adapt and re-configure themselves in accordance with the internal as well as the global state. Testing this kind of systems is challenging, and systematic and automated approaches...
Software security testing tools and methodologies are presently abundant, and the question no longer seems to be "if to test" for security, but rather "where and when to test" and "then what?". In this paper we present a review of security testing literature, and propose a software security testing scheme that exploits an intra-organisational repository of discovered...
This paper provides an overview of work being done in the EntryPoint project, which is examining the first course work in computing degrees. A key goal of this project is to move away from the traditional CS1/CS2 programming courses as the start of a computing degree. In addition, the project team is looking at how these ideas might be extended to BSSE degree programs. As such, this paper will discuss...
Currently, robots are being used as teaching tools and can be found in K-12 and college classrooms. The primary appeal associated with employing robots is that they tend to capture the attention of the target audience and thereby facilitate the learning process. While there are numerous robotic kits on the market today, few can be used to teach both high-level concepts in computer science and engineering...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.