The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Graphics processing units(GPUs) have been increasingly used to accelerate general purpose computations. By exploiting massive thread-level parallelism (TLP), GPUs can achieve high throughput as well as memory latency hiding. As a result, a very large register file (RF) is typically required to enable fast and low-cost context switching between tens of thousands of active threads. However, RF resource...
Modern organizations are challenged to understand and put in action latest procedures and rules in order to constantly improve their service quality while coping with quickly changing contexts and decreasing resources. Such are defined by means of several kind of models that are in general quite interrelated. In this paper, we propose a Learning Architecture using Zachman Framework that allows us...
The paper aims to identify the elements that make possible the appearance of emergent properties in organizations structured as social networks, considered as adaptive multi-agent complex systems. The dynamics of these communities (referring primarily to the increasing number of members who interact) was analyzed by the specific rules of scale-free networks growth and the specific principles of multi-agent...
Sexual harassment at workplace has been a criticalchallenge for women, especially in the service sector due to oddworking hours. Companies and Government on their part havetaken up measures to protect women employees but theproblem seems persistent. To address this, we have designed aregulatory solution based on operant conditioning. Operantconditioning argues that people's behaviors are primarilycontrolled...
Software development teams apply security practices to prevent vulnerabilities in the software they ship. However, vulnerabilities can be difficult to find, and security practices take time and effort. Stakeholders can better guide software development if they have empirical data on how security practices are applied by development teams. The goal of this paper is to inform managers and developers...
Neural machine translation (NMT) has shown promising results and rapidly gained adoption in many large-scale settings. With the NMT model being widely used in empirical productions, its long-standing weakness in handling the rare and out of vocabulary words has been amplified a lot. In order to release the model from the stress of “understanding” the rare words, copy mechanism has been proposed to...
We propose a framework to preserve confidential information in a crowdsourced software development. The software industry is moving towards gig economy where majority of workforce is freelancers. The freelancers may have varying level of trust. Hence, protection of confidential information is becoming an increasingly important subject. In this paper, we discuss various challenges in protecting sensitive...
Scheduling tasks is one of the critical duties of software project managers. The main objective of the scheduling is typically reducing the project's cost and duration. However, the numerous possible assignments of tasks to the team members and the dependencies between tasks make task scheduling an NP-hard problem. In the context of Global Software Development (GSD) projects, specifically, reducing...
In order to develop efficient and effective framework for managing any conflict between security and privacy Non-Functional requirements and to reduce risk impact in software system, the goals set by the stakeholders need to be ascertained, and then the modeling language, tools, implementation and validation procedures need to be altered accordingly. Overall, this research is aimed for constructing...
[Context] Defect Causal Analysis (DCA) represents an efficient practice to improve software processes. While knowledge on cause-effect relations is helpful to support DCA, collecting cause-effect data may require significant effort and time. [Goal] We propose and evaluate a new DCA approach that uses cross-company data to support the practical application of DCA. [Method] We collected cross-company...
The evolution of the economy, competition, development of new technologies and globalization explain the blooming of inter-organizations cooperation. The interorganizations cooperation represents a new opportunity to answer to complex challenges that a single organization can't face alone. Cloud Computing is an emerging computation paradigm in information technology and networking. Most recently business...
As a part of a project exploring ways to define transition to Territorial AgroEcological System (tTAES), researchers and rural stakeholders (policymakers and farmers) organized territorial participatory design (TPD) workshops. Such TPD workshops are especially challenging since actors projecting their activity into the future confront many viewpoints or controversial dimensions (farming systems, natural...
Software architecting is about making decisions that have system-wide impact and that shape software product and process alike. While researchers and practitioners have tried to define and scope the role of the architect, social and organizational impacts on the architect and the architecting process are often neglected. The SODA workshop focuses on the social and organizational dimensions in which...
This study empirically tests the model of the Technology Threats Avoidance Theory (TTAT) in a healthcare context to investigate health information technology (HIT) avoidance behaviors when used in unsecure environment. Testing the model in this new context explained avoidance behaviors towards HIT in a holistic way. It is found that the HIT avoidance is predicted by levels of perceived threat, avoidance...
The context of a software system comprises the knowledge that architects need to have about the environment in which a system is expected to operate. Contextual knowledge, however, is often unknown or overlooked. This results in software architects designing systems based on assumptions that are largely unfounded and can potentially lead to system failures. To address this problem, this paper presents...
Free and Open Source Software (FOSS) has come to play a critical role in the global software industry. Organizations are widely adopting FOSS and interacting with open source communities, and hence organizations have a considerable interest in seeing these communities flourishing. Little research has focused on the tools used to develop that software. Given the absence of formal mandate that would...
Software development consists to a large extend of human-based processes with continuously increasing demands regarding interdisciplinary team work. Understanding the dynamics of software teams can be seen as highly important to successful project execution. Hence, for future project managers, knowledge about non-technical processes in teams is significant. In this paper, we present a course unit...
Throughout a semester students use textbooks to reference key fragments especially in response to assigned homework problems. We present an extension to an existing web-based Question and Answer (Q&A) system by incorporating the course textbook as a collection of annotated and chunked resources in a website. To characterize student interaction with the textbook contents, we capture the progress...
In this paper, novel method is introduced to establish content driving of engineering model entity definition and generation at computer description and representation of multidisciplinary industrial product system. Main objective of this work was developing new structure of driving content which made construction of requirements, functional, logical, and physical (RFLP) structured product model easier...
Cloud computing is an emerging economic modelthat provides a broad network access to services with manybenefits to many tenants at the same time. Although it createsa large potential to develop new online services the evolution ofcloud computing has been accompanied by the proliferation ofvarious attacks against the services on the cloud infrastructures. The importance of risk management in cloud...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.