The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The emergence of Massive Open Online Courseware (MOOC) has garnered widespread attention for revolutionizing open access learning and it is considered as the main driver of education innovation. The literature on MOOC is steadily growing. However, there is not much effort being conducted to systematically curate, review and analyse the emergent trends on MOOC in higher educational institutions. For...
Along with the wide use of web application, XSS vulnerability has become one of the most common security problems and caused many serious losses. In this paper, on the basis of database query language technique, we put forward a static analysis method of XSS defect detection of java web application by analyzing data flow reversely. This method first converts the JSP file to a Servlet file, and then...
Biometric measurements are now often routinely adopted as a robust means of determining individual identity. Such an approach is clearly beneficial in a variety of scenarios, including those relating to medical environments. In the medical context, however, the use of biometric data can potentially offer other valuable opportunities for harnessing the power of biometrics which have a more direct bearing...
This paper presents two primary results: (1) an adaptation of a Scrum-based, software-tools enabled process used in international service-learning project courses in the Computer and Information Sciences and other disciplines and (2) the software applications resulting from this process. The paper begins with an overview of Scrum and the challenges of applying it in the classroom. We survey the literature...
It has become easier to create a lifelog by using smart phones. Lifelogs can be used in several ways. However, some problems exist in memory recollection; as many lifelogs owned by a person are partial information, it is impractical to remember days themselves. Therefore, a lifelog sharing system for memory recollection is proposed. The system elicits related information from other people's lifelogs...
Assuring quality in software development processes is often a complex task. In many cases there are numerous needs which cannot be fulfilled with the limited resources given. Consequently it is crucial to identify the set of necessary requirements for a software project which needs to be complete and conflict-free. Additionally, the evolution of single requirements (artifacts) plays an important role...
Producing precise and helpful type error messages has been a challenge for the implementations of functional programming languages for over 3 decades now. Many different approaches and methods have been tried to solve this thorny problem, but current type-error reporting tools still suffer from a lack of precision in many cases. Based on the rather obvious observation that different approaches work...
After a service failure, customers want to be treated with fairness. They expect the firm to perform quickly without having to wait for the failure resolution. The primary goal of this study is to investigate whether the service recovery paradox (SRP) exists. In addition, the study also explores whether timeliness and compensation can influence it and whether gender differences occur. SRP appears...
This paper reviews peer-reviewed empirical studies on gamification. We create a framework for examining the effects of gamification by drawing from the definitions of gamification and the discussion on motivational affordances. The literature review covers results, independent variables (examined motivational affordances), dependent variables (examined psychological/behavioral outcomes from gamification),...
Managing variability in a software family is crucial to software product line engineering. The existing variability management techniques, however do not particularly address database design in the context of information systems poduct lines. This paper presents a practical approach to handle variability in database design for families of software. We use the technique of Delta-Oriented Programming...
To study data dependencies over the data in schema transformation between data and metadata (DM-transformation for short), we define a general dependency form, namely pivot dependency (PD for short), which specifies constraints not only on values but also on names of attribute and relation. PDs, an extension to conventional FDs, formalize constraints in context that data and metadata are treated uniformly...
Queries against the large size XML database are often exploratory and users often find their queries return too many answers, this paper proposed a user preference-based top-k ranking approach to deal with this “information overload” problem. We first presented a user preference model which can embody both the partial relations and the interest degree of preferences. And then, the elements orders...
Preserving data quality is an important issue in data collection management. One of the crucial issues hereby is the detection of duplicate objects (called coreferent objects) which describe the same entity, but in different ways. In this paper we present a method for detecting coreferent objects in metadata, in particular in XML schemas. Our approach consists in comparing the paths from a root element...
The aim of this paper is to introduce procedure capable of compressing the representation of causal graphs, removing the redundant information introduced. In previous works we have presented several algorithms to extract causal information from text documents by means of a semi-automatic process. As result we obtained a causal graph connecting concepts related to a given topic.
Functional dependencies may be considered the skeleton of the Relational Database Model. They describe binary relations between sets of attributes and they characterize the database structure. A way to ensure solid specifications is to transform set of functional dependencies into an equivalent one with less redundancy. In this work we consider a fuzzy extension of the notion of functional dependencies...
Asynchronous communication using text messaging is a major mode of o n l i n e communication. It is simple and easy to use, however, there is often an inconsistency between the sender's intended tone and how the recipient perceives it. Emoticons, additional textual expression using icons for facial expressions, are often used to supplement or adjust the verbal part of t h e text, though the problem...
Context-aware query aims to make the user get suitable query results based on the users' contexts. When a user as a leader or a representative issues a query, s/he often needs to consider a group of people. To this end, context-aware database should meet most of the people's contexts in this situation. In this paper, we propose an approximation algorithm to compute context-aware group top-k query...
With the proliferation of context-awareness, there is a great demand for providing the database users with suitable query results in the right place at the right time. Efficient and contextual ranking with the query results is one of the most promising way to achieve this goal. Because the users are often unwilling to show all their preferences, it is necessary to rank the query results according...
The popularity of the Internet and the rapid development of Web technology and its application make the XML technology developed quickly. More and more programmers store the data in XML form. With the large number of XML documents, applications need to continue to deal with XML data, access and update the XML data. Then XQuery is emerged. This paper introduces the XQuery language briefly, discusses...
Follow-the-Sun (FTS) is a strategy in Global Software Development (GSD) focusing on software development twenty-four hours, seven days per week with physically distributed teams. Many companies have tried to implement FTS strategy, but have abandoned it after some point because of the difficulty to put it into practice. Thus, this article aims to presents a research plan for developing a software...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.