The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the development of a new software solution, users and developers spend the majority of their effort on modeling the functional requirements. The Non-Functional Requirements (NFR) are treated as a second class requirement, ignored until the end of the development cycle. They are often hidden, overshadowed and therefore, frequently neglected or forgotten. They are neglected because NFRs are often...
Online auctions are now an immensely popular component of the electronic marketplace. However, there are many fraudulent buying/selling behaviours that can occur during an auction (e.g., shill bidding, bid shielding, etc.). While researchers are proposing methods for combating such fraud, it is extremely difficult to test how effective these countermeasures are. This is primarily due to it being unethical...
Web applications have grown very unexpectedly in these recent years but due to difference between web applications and software applications, their development methodologies differ in many ways. The distinction between these two different types of applications acquire for introduction of development methodologies dedicated to web applications. The thesis work represents various development approaches...
Many kinds of open source software (OSS) are used to develop software or systems. In order to develop software using existing forms of OSS, developers have to understand them. However some OSS lacks adequate documentation for its source code. Program diagrams, many of which have been recently proposed, can enhance the understanding of software or systems but developers cannot properly understand these...
The cost of a change is high, but changes are an inevitable part of software development lifecycle, which comes to be recognized under a more general term: software evolution. To mitigate this problem, an approach to aspect-oriented change realization has been proposed earlier based on the idea of representing change by aspect. In many cases, software development relies on graphical modeling, mainly...
In a model-driven engineering (MDE) context, the coordination of different roles such as enterprise architects and developers can be supported when dependencies between roles and artifacts are stated. Similarly, provisioning and deployment of service topologies can be facilitated. For specifying dependencies, an editor permits to define roles, artifacts, services, and service topologies in descriptive...
The competition between cloud providers has led to an impressive set of cloud solutions offered to consumers. The ability to properly design and deploy multi-cloud applications (i.e., Applications deployed on multiple clouds) allows exploiting the peculiarities of each cloud solution and hence optimizing the performance and cost of the applications. However, this is hindered by the large heterogeneity...
Generic Enablers are a specialism of software engineering. They are components used for providing reusable building blocks that enable the construction of applications for future internet technology. The Generic Enablers satisfy requirements of application domains including big data processing, cloud infrastructure and internet-of-things. This overview paper introduces a description for defining them...
Software product line engineering (SPLE) is a software development approach that attempts to maximize reusability. In the domain engineering phase, managing variability poses a great challenge to developers because traditional techniques of software engineering are not applicable in handling variability. In this paper, we apply the Product Family Modeling Language (PFML) approach and the Orthogonal...
Due to the lack of central control in distributed systems, design and implementation of such systems is a challenging task. Interaction of multiple autonomous components can easily result in unwanted behavior in the system. Therefore it is vital to carefully review the design of distributed systems. Manual review of software documents is too inefficient and error prone. It would therefore be beneficial...
In this paper we propose the quantitative analysis of the complexity of a simple reference game implemented on a particular gaming platform as means for characterizing how the platform succeeds in easing the development of networked multiplayer games. We first present our own open source tool based on Sneed's Object-Point (OP) method for the automatic quantitative assessment of the complexity of a...
The increasing scale and complexity of virtualized data centers pose significant challenges to system management software stacks, which still rely on special-purpose controllers to optimize the operation of cloud infrastructures. Autonomic computing allows complex systems to assume much of their own management, achieving self-configuration, self-optimization, self-healing, and self-protection without...
At present, the level of library management way in most universities is still a manual operation. For the problem of the traditional manual operation is time-consuming and inconvenience, this paper proposes a library management system is designed and implemented based on the web service. In this system, the three-layer architecture is employed, applying model building language that UML carries on...
The operation of large scale information systems requires investment into hardware infrastructure and causes running cost for keeping it in a productive state. This especially applies in an enterprise environment where also expenses for software licenses costs or penalties for downtime occur. The deployment of software influences these costs both in their amount and their composition. In order to...
Ontologies have been utilized in many different areas of software engineering. As software systems grow in size and complexity, the need to devise methodologies to manage the amount of information and knowledge becomes more apparent. Utilizing ontologies in requirement elicitation and analysis is very practical as they help to establish the scope of the system and facilitate information reuse. Moreover...
An organisation that had developed a large Information System wanted to embark on a programme of significant evolution for the system. As a precursor to this, it was decided to create a comprehensive architectural description. This undertaking faced a number of challenges, including a low general awareness of software modelling and software architecture practices. The approach taken for this project...
Offering services in the internet requires a dependable operation of the underlying software systems with guaranteed quality of service. The workload of such systems typically significantly varies throughout a day and thus leads to changing resource utilisations. Existing system monitoring tools often use fixed threshold values to determine if a system is in an unexpected state. Especially in low...
Textual specifications and domain models change during development and need to be kept consistent. However, in practice the cost of maintaining consistency is too high. Stakeholders need to be informed about model changes in natural language, software architects need to see the impact of specification changes on their models. Our Requirements Engineering Feedback System (REFS) automates the process...
Useful enhancements to UML for security exist, including for the requirements and analysis/design stages: notably misuse case diagrams/descriptions, mis-sequence diagrams, UMLpac, and security patterns. These all consider security attacks on software functionality. This paper considers the system architecture when analyzing security. The advantage of the proposed misuse deployment diagram is that...
An architectural aspect is a concern that spreads across architecture modularity units and cannot be effectively modularized using conventional Architecture Description Languages (ADLs). Dealing with crosscutting concerns is not trivial task since they effect each other and the base architectural decomposition in multiple heterogeneous ways. Lack of ADLs that support modularly representing such aspectual...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.