The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The internal quality of software is often neglected by developers for various reasons like time pressure or a general dislike for certain activities. Yet internal quality is important to speed up development and to keep software maintainable. We present a way to use reputation systems to improve the internal quality of software by putting artifacts like wiki articles and source code under their control...
This study aimed at assessing the students' perceptions about the online learning environment in two b-learning courses in a Portuguese private University. An learning environment, supported on two communication platforms — Moodle for asynchronous interaction and Cisco WebEx for synchronous interaction — was developed for two Information Systems first cycle classes; the institution had no previous...
This paper introduces the concepts of complex networks. An improved multi-local world model is proposed and simulated by Matlab software, and then the generated network is visualized by Pajek software. Finally, the network parameters related to topological properties are calculated and some properties of the network are analyzed.
In this work the ALSWEB framework is presented. The ALSWEB is a virtual linguistic laboratory for linguistic research developed as a web application. The purpose of the framework is to model the entire process regarding the different steps of data acquisition, data transformation, information acquisition from different data and research hypotheses verification in the ALS (Linguistic Atlas of Sicily)...
Security people are constantly presented with circumstances in which causation is rather unclear, and our desire to discover it is irresistible. Code-complexity measures do seem to be highest in applications that have rather a lot to do. Having massive numbers of code paths does make security hard because massive numbers of code paths means a large attack surface, but massive numbers of code paths...
We conducted a quasi-experiment through an online survey to investigate the effects of information security knowledge on users' adoption of security technologies. We found that knowledge can affect adoption decision in multiple ways. On the one hand, knowledge tends to increase a user's self-efficacy in using the technology, which in turn increases the perceived usefulness of the technology, consistent...
The topic of this paper is about prediction of performance anomalies caused by software aging. We have developed a framework for detection of performance anomalies that is targeted to web and component-based applications. In this study, we selected some amount of historical data previously collected and we conducted a correlation analysis with this data. The resulting dataset was then submitted to...
Due to Digital products is different from traditional products, so that we seek to re-examine the marketing strategy which proposed to meet the traditional products with a new perspective, Therefore, we studied the consumers demand of the digital products based on the endogenous evolution mechanism of the consumers implicit demand, then we explorered the influence mode which the exchanged knowledge...
This paper presents the methodology how to utilize sensor networks in order to predict human's thermal comfort and sensation. The neural network was dynamically organized on the basis of correlations with the thermal sensation of the occupants and many other values in the sensor network, and the structure of the neural network was updated cyclically. In this paper, the air-conditioning system in an...
The internet-based educational technology has been widely used in the medical schools all over the world. It gives a way for teachers to create online self-evaluation tests and for students to take tests without having to turn in a grade to the teachers. To test the hypothesis that internet-based online tests participation/performance is positively correlated with the final score of physiology course,...
Although event recording on a computer system (also known as logging) is of utmost importance for reconstructing and detecting security relevant events, currently no adequate and sophisticated solution for complex environments, such as Grid and Cloud Computing, exist. Current LOG file formats lack of several important factors, hindering automatic evaluation needed for distributed systems to comply...
Few studies on the factors affecting use of information and communication technology (ICTs) in various sectors in developing countries have been done. And yet, with the increasing pervasiveness of mobile computing devices and other ICTs in developing countries, much hope is being placed on these technologies to lift socio-economic development in these countries from the doldrums. This paper, investigates...
Defining requirements without satisfying success critical stakeholders often leads to expensive project failures. Enabling interdisciplinary stakeholders to rapidly and effectively collaborate in development of globally-usable software-intensive systems remains a major challenge. At USC, 32 real-client, graduate-level team projects experimented with using the wiki-based requirements negotiation support...
Botnet is a collection of computer hosts exploited by malicious software that is remotely controlled through a command and control channel. More new types of attacks invented based on Botnets. Because of usage of legitimate IRC (Internet Relay Chat) servers to command and control the bots, it is hard to detect and remove Botnets. Flow information may keep the fingerprint of bots and can be used to...
The exponential growth of Web images has created a compelling need for innovative methods to retrieve and manage them. Automatic image annotation is an effective way for resolving this problem. In this paper, we propose a novel system that automatically annotates images by semantic corpus which is constructed by mining Web image data. It includes three parts: 1) constructing the semantic annotation...
This work presents an empirical property-based model to describe Web-based vulnerability. We define a web application using a new descriptive model with pre-condition, behavior, entity and communication property sets. The vulnerable property relationship graph (VPRG) defines a vulnerability as vulnerable properties in application with relations to other properties in cause- and consequence-relationships...
In an empirical study of fourteen widely used open source PHP Web applications, we found that the vulnerability density of the aggregate code base decreased from 8.88 vulnerabilities/KLOC to 3.30 from Summer 2006 to Summer 2008. Individual web applications varied widely, with vulnerability densities ranging from 0 to 121.4 at the beginning of the study. While the total number of security problems...
In the age of cloud, Grid, P2P, and volunteer distributed computing, large-scale systems with tens of thousands of unreliable hosts are increasingly common. Invariably, these systems are composed of heterogeneous hosts whose individual availability often exhibit different statistical properties (for example stationary versus non-stationary behavior) and fit different models (for example Exponential,...
Several kinds of values have been employed with respect to the diversification of individuality in the market. Some of these values are currently supported by only a few people, who are referred to as a ldquominority grouprdquo. However, there is the possibility that such groups will grow into majority groups with changes in historical background or people's sensitivity. It is both important and effective...
The validation of software quality metrics lacks statistical significance. One reason for this is that the data collection requires quite some effort. To help solve this problem, we develop tools for metrics analysis of a large number of software projects (146 projects with ca. 70.000 classes and interfaces and over 11 million lines of code). Moreover, validation of software quality metrics should...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.