Search results for "020207 software engineering"

showing 10 items of 475 documents

Future directions in Agile research: Alignment and divergence between research and practice

2017

Editorial article Since the publication of Agile Manifesto in 2001, agile methods have transited from a grass- root initiative among enthusiastic advocates and developers to a mainstream software development approach adopted by both small and large companies worldwide. Meanwhile research on agile methods has grown rapidly and steadily into an established research area, evidenced by dedicated conferences (e.g., XP conference series, research track of previous Agile Conference series), special issues and sections in top Information Systems and Software Engineering journals. However, practitioners and consultants have largely driven the advancement in agile field, and agile research has lagged…

Root (linguistics)EngineeringDivergence (linguistics)business.industrySoftware development020207 software engineering02 engineering and technologyField (computer science)Agile manifesto0202 electrical engineering electronic engineering information engineeringInformation systemMainstream020201 artificial intelligence & image processingEngineering ethicsbusinessSoftwareAgile software developmentJournal of Software: Evolution and Process
researchProduct

QoS Multi-tree Based Routing Protocol for Inter-mesh Infrastructure Communications

2016

Part 5: Network Protocols; International audience; Quality of service (QoS) in wireless mesh networks (WMN) is an active area of research, which is driven by the increasing demand for real-time and multimedia applications, such as VoIP (Voice over IP) and VoD (Video on Demand). In this paper, we propose a QoS multi-tree based routing protocol for wireless mesh environments, named Inter-Mesh Infrastructure Proactive Routing (IMPR). It is a proactive multi-tree routing protocol enabling QoS guarantee for communications from/towards the Internet network through the Mesh Gateway (MG) of the mesh infrastructure. We describe and analyze the simulation results of different scenarios conducted on t…

Routing protocolDynamic Source RoutingMulti-tree routing[ INFO ] Computer Science [cs]Computer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Enhanced Interior Gateway Routing ProtocolWireless Routing Protocol02 engineering and technology[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0502 economics and business0202 electrical engineering electronic engineering information engineeringQos routing[INFO]Computer Science [cs]IMPRWireless mesh networkZone Routing ProtocolWireless mesh networkbusiness.industry05 social sciencesComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020207 software engineeringLink-state routing protocolPerformance evaluationHazy Sighted Link State Routing ProtocolNetworksbusiness050203 business & managementComputer network
researchProduct

The Effects of Database Complexity on SQL Query Formulation (journal-first)

2020

The learning of practical Structured Query Language (SQL) skills often takes place in digital environments, where the learner writes queries against an exercise database. The exercise database is usually designed and implemented by the teacher, and populated with makeshift data. Although this approach is common, and SQL taught in almost all database courses, little scientific attention has been given to the nature of the exercise database.

SQLDatabaseComputer science05 social sciencesQuery formulationInformationSystems_DATABASEMANAGEMENT020207 software engineering02 engineering and technologycomputer.software_genre0502 economics and businessComputingMilieux_COMPUTERSANDEDUCATION0202 electrical engineering electronic engineering information engineeringStudent learningcomputer050203 business & managementcomputer.programming_language2020 46th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)
researchProduct

Language-Integrated Privacy-Aware Distributed Queries

2019

Distributed query processing is an effective means for processing large amounts of data. To abstract from the technicalities of distributed systems, algorithms for operator placement automatically distribute sequential data queries over the available processing units. However, current algorithms for operator placement focus on performance and ignore privacy concerns that arise when handling sensitive data. We present a new methodology for privacy-aware operator placement that both prevents leakage of sensitive information and improves performance. Crucially, our approach is based on an information-flow type system for data queries to reason about the sensitivity of query subcomputations. Ou…

SQLInformation privacyScalaComputer scienceDistributed computing020207 software engineering02 engineering and technologyQuery languageInformation sensitivitySoftware deployment020204 information systems0202 electrical engineering electronic engineering information engineeringSequential dataSafety Risk Reliability and QualitycomputerSoftwarecomputer.programming_language
researchProduct

The Effects of Database Complexity on SQL Query Formulation

2020

In Structured Query Language (SQL) education, students often execute queries against a simple exercise database. Recently, databases that are more realistic have been utilized to the effect that students find exercises more interesting and useful, as these databases more accurately mimic databases students are likely to encounter in their future work environments. However, using even the most engaging database can be counterproductive to learning, if a student is not able to formulate correct queries due to the complexity of the database schema. Scientific evidence on the effects of database complexity on student’s query formulation is limited, and with queries from 744 students against thr…

SQLoppiminenComputer scienceQuery formulation02 engineering and technologycomputer.software_genrestructured query language (SQL)kyselykieletScientific evidenceSet (abstract data type)Simple (abstract algebra)0502 economics and business0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDEDUCATIONdatabase complexitytietokannatdatabasecomputer.programming_languageeducationSQLDatabaseScale (chemistry)05 social sciencesDatabase schemaInformationSystems_DATABASEMANAGEMENT020207 software engineeringkompleksisuuskoulutusHardware and Architecturestudent learningcomputer050203 business & managementSoftwareInformation Systems
researchProduct

Attribute based access control scheme with controlled access delegation for collaborative E-health environments

2017

Abstract Modern electronic healthcare (e-health) settings constitute collaborative environments with complex access requirements. Thus, there is a need for sophisticated fine-grained access control mechanisms to cater these access demands and thereby experience the full potential of e-health systems. In order to realize a flexible access control scheme, integrating access delegation is of paramount importance. However, access delegation has to be enforced in a controlled manner so that it will not jeopardize the security of the system. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities. …

Scheme (programming language)Computer access controlDelegationRevocationComputer Networks and CommunicationsComputer sciencebusiness.industrymedia_common.quotation_subject020206 networking & telecommunications020207 software engineeringProvisioningAccess control02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineeringPhysical accessRole-based access controlSafety Risk Reliability and QualitybusinesscomputerSoftwaremedia_commoncomputer.programming_languageJournal of Information Security and Applications
researchProduct

UCS: Ultimate course search

2016

International audience; In this system prototype demonstration we present, Ultimate Course Search (UCS), a learning tool developed to provide students ways to efficiently search electronic educational materials. UCS integrates slides, lecture videos and textbooks into a single platform. The keywords extracted from the textbooks and the slides are the basis of the indexing scheme. For the videos, UCS relies on slide transitions and metadata to establish the correspondence between slides and video segments. The video segmentation is based on the slides being presented using the meta-data provided by the video recording software and image processing techniques.

Scheme (programming language)Computer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage processing02 engineering and technologycomputer.software_genreCourse (navigation)[SPI]Engineering Sciences [physics]Software[ SPI.NRJ ] Engineering Sciences [physics]/Electric power[ SPI ] Engineering Sciences [physics]ComputingMilieux_COMPUTERSANDEDUCATION0202 electrical engineering electronic engineering information engineeringSegmentationcomputer.programming_languageMultimediabusiness.industry4. Education[SPI.NRJ]Engineering Sciences [physics]/Electric powerSearch engine indexing020207 software engineeringImage segmentation[ SPI.TRON ] Engineering Sciences [physics]/Electronics[SPI.TRON]Engineering Sciences [physics]/ElectronicsMetadata020201 artificial intelligence & image processingbusinesscomputer2016 14th International Workshop on Content-Based Multimedia Indexing (CBMI)
researchProduct

An attribute based access control scheme for secure sharing of electronic health records

2016

Electronic health records (EHRs) play a vital role in modern health industry, allowing the possibility of flexible sharing of health information in the quest of provisioning advanced and efficient healthcare services for the users. Although sharing of EHRs has significant benefits, given that such records contain lot of sensitive information, secure sharing of EHRs is of paramount importance. Thus, there is a need for the realization of sophisticated access control mechanisms for secure sharing of EHRs, which has attracted significant interest from the research community. The most prominent access control schemes for sharing of EHRs found in literature are role based and such solutions have…

Scheme (programming language)business.industryComputer scienceInternet privacy020206 networking & telecommunications020207 software engineeringProvisioningAccess control02 engineering and technologyComputer securitycomputer.software_genreInformation sensitivityResource (project management)Health care0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDSOCIETYbusinesscomputerSelective disclosurecomputer.programming_languageDrawback2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)
researchProduct

UWSIO: Towards automatic orchestration for the deployment of 5G monitoring services from bare metal

2018

The next generation mobile networks 5G are currently being intensively developed and standardized globally, with commercial prototyping 5G connections already emerging. At the 5G system level, one of the Key Performance Indicators (KPIs) defining 5G is substantially reduced service creation time for 5G network operators and/or service providers to increase the system efficiency and thus reduce operational costs. In this work, we focus on realize this challenging KPI in terms of speedy creation of monitoring services for 5G operators from scratch (no operating system pre-installed). A new 5G infrastructure orchestrator UWSIO is proposed to achieve fully automated deployment of 5G monitoring …

Service (systems architecture)Computer sciencebusiness.industryTestbed020206 networking & telecommunications020207 software engineeringCloud computing02 engineering and technologyService providerSoftware deployment0202 electrical engineering electronic engineering information engineeringOrchestrationPerformance indicatorOrchestration (computing)businessSoftware engineeringNext Generation Mobile Networks2018 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

Towards Concrete Syntax Based Find for Graphical Domain Specific Languages

2019

One of the main reasons why Model-Driven Engineering (MDE) technologies including Domain-specific modelling languages (DSML) have not reached the expected acceptance in the industry is a poor tool support. One of the features with a limited support even in commercial modelling tools is search (find). Typically, MDE tools support only a simple keyword-based textual search functionality. The same is true for the tools built using Domain-specific language (DSL) tool definition frameworks. It is proposed to provide the concrete syntax-based find functionality as a service of a DSL tool definition framework. The find diagrams are defined in a concrete syntax of a DSL. A definition of a DSL is us…

Service (systems architecture)Domain-specific languageConcrete syntaxDigital subscriber lineProgramming languageComputer scienceSimple (abstract algebra)0202 electrical engineering electronic engineering information engineering020207 software engineering020201 artificial intelligence & image processing02 engineering and technologycomputer.software_genrecomputer2019 ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C)
researchProduct