The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The article treats with the integration of an elaborate Lexicon Extended Language which is denoted all in the interconnected reuse process. The eLEL is a lexicon rich in information and allows to describe a software component such as: its identification, its notion, its behavior and its different characteristic. From this lexicon, we proposed a reused environment that included three processes, namely...
This paper explores scalable implementation strategies for carrying out lazy schema evolution in NoSQL data stores. For decades, schema evolution has been an evergreen in database research. Yet new challenges arise in the context of cloud-hosted data backends: With all database reads and writes charged by the provider, migrating the entire data instance eagerly into a new schema can be prohibitively...
Nowadays, software developers often utilize existing third party libraries and make use of Application Programming Interface (API) to develop a software. However, it is not always obvious which library to use or whether the chosen library will play well with other libraries in the system. Furthermore, developers need to spend some time to understand the API to the point that they can freely use the...
During maintenance, software developers deal with numerous change requests made by the users of a software system. Studies show that the developers find it challenging to select appropriate search terms from a change request during concept location. In this paper, we propose a novel technique-QUICKAR-that automatically suggests helpful reformulations for a given query by leveraging the crowdsourced...
Security testing is a pivotal activity in engineering secure software. It consists of two phases: generating attack inputs to test the system, and assessing whether test executions expose any vulnerabilities. The latter phase is known as the security oracle problem. In this work, we present SOFIA, a Security Oracle for SQL-Injection Vulnerabilities. SOFIA is programming-language and source-code independent,...
The quality of skill teaching is vital for higher vocational colleges. From the perspective of sustainable development, we considered the essence of sustainable development in higher vocational education is student oriented and thus the skill teaching should focus on cultivating the students' flexible skill or their sustainability. This paper first analyzes the prevailing inefficient phenomenon in...
In the current context of the information era, the teaching model of universities' environmental artistic design has undergone a great change. The Decoration Materials and Construction is an important professional course of the universities' environmental artistic design major, and also a course with an extremely big difficulty of cultivating talents. Starting from the teaching model of the environmental...
Service chaining is one of the challenges in network function virtualization (NFV), where a sequence of middleboxes apply their service to particular traffic. The challenge of service chaining is that a middlebox may alter the content of packet headers; thus, the context of service chaining for particular traffic gets lost. This paper proposes Segmented Proactive Flow Rule Injection (SPFRI) using...
In the actual competitive software industry, software development organizations need a better and formal estimation approaches in order to increase the success rate of software projects. However, currently the estimation approach typically employed in industry is the expert judgment ('experience-based'). Using measures and estimations that continue to be based on researchers' intuition does not contribute...
The goal of any system in which there is a large set of components that are mostly similar, but have a non-negligible set of differences, is to find the balance between a “one-size-fits-all” approach, and a “unique-per-system-and-customizable” approach. This paper discusses how the balance between these two extremes is achieved as part of the ground segment and flight segment that will support the...
Predictive Analytics analyze the present and the historical informations and make future predictions utilizing data mining or machine learning techniques. Predictive models usually check for some patterns and relationships leading to certain behaviours based on the dependent variables. This paper proposes a mechanism named Analysis and Prediction of Application Usage (APAU) in Android Phones for providing...
Developers use many software applications to process large amounts of diverse information in their daily work. The information is usually meaningful beyond the context of an application that manages it. However, as different applications function independently, developers have to manually track, correlate and re-find cross-cutting information across separate applications. We refer to this difficulty...
The Fynbos Leaf Optical Recognition Application (FLORA) is a software program to automatically identify fynbos plants using leaf photographs. While it is easier to classify fynbos when they are flowering, most fynbos flower for only short periods therefore FLORA was designed to identify plants by leaves instead of flowers. This paper presents the innovation journey of FLORA, highlighting transitions...
Context: The pool of papers published in ESEM. Objective: To utilize citation analysis and automated topic analysis to characterize the SE research literature over the years focusing on those papers published in ESEM. Method: We collected data from Scopus database consisting of 513 ESEM papers. For thematic analysis, we used topic modeling to automatically generate the most probable topic distributions...
This paper examines network-centric warfare (NCW) penetration within the U.S. Army. NCW was intended to be an emerging theory of war for the information age. It was supposed to provide a conceptual framework that would prevent new technology enabled approaches to warfare from being constrained by outmoded ideas. A thematic analysis of the literature was performed using NVivo 10, a computer assisted...
As scientific discovery becomes increasingly data-driven, software platforms are needed to efficiently organize and disseminate data from disparate sources. This is certainly the case in the field of materials science. For example, Materials Project has generated computational data on over 60,000 chemical compounds and has made that data available through a web portal and REST interface. However,...
This paper explores the organization of provenance as a catalogue of non-functional requirement. The aim of this paper is to introduce a systematic approach to design a provenance catalogue for reuse using consolidated software engineering techniques. Provenance captures a derivation history of data products and is essential to the long-term preservation, to reuse, and to determine data quality. We...
As software consumption is shifting to mobile platforms, enterprises are looking for efficient ways to reuse their existing legacy systems by exposing their functionalities as services. Mining services from legacy code is therefore an important problem for the enterprises. In this paper we present a technique for mining service candidates from the database applications. Central to our mining technique...
There is nowadays an increasing pressure to develop complex web applications at a fast pace. The vast majority is built using frameworks based on third-party server-side plugins that allow developers to easily add new features. However, as many plugin developers have limited programming skills, there is a spread of security vulnerabilities related to their use. Best practices advise the use of systematic...
System-of-Systems (SoS) have been considered the new trend of software systems for several reasons, such as the advancement of computer technology and the increasing complexity and size of the systems. The concept of SoS has the central idea of a set of operationally independent software systems that collaborate together to compose a larger and more complex system. For SoS, several quality attributes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.