Search results for "020207 software engineering"
showing 10 items of 475 documents
Future directions in Agile research: Alignment and divergence between research and practice
2017
Editorial article Since the publication of Agile Manifesto in 2001, agile methods have transited from a grass- root initiative among enthusiastic advocates and developers to a mainstream software development approach adopted by both small and large companies worldwide. Meanwhile research on agile methods has grown rapidly and steadily into an established research area, evidenced by dedicated conferences (e.g., XP conference series, research track of previous Agile Conference series), special issues and sections in top Information Systems and Software Engineering journals. However, practitioners and consultants have largely driven the advancement in agile field, and agile research has lagged…
QoS Multi-tree Based Routing Protocol for Inter-mesh Infrastructure Communications
2016
Part 5: Network Protocols; International audience; Quality of service (QoS) in wireless mesh networks (WMN) is an active area of research, which is driven by the increasing demand for real-time and multimedia applications, such as VoIP (Voice over IP) and VoD (Video on Demand). In this paper, we propose a QoS multi-tree based routing protocol for wireless mesh environments, named Inter-Mesh Infrastructure Proactive Routing (IMPR). It is a proactive multi-tree routing protocol enabling QoS guarantee for communications from/towards the Internet network through the Mesh Gateway (MG) of the mesh infrastructure. We describe and analyze the simulation results of different scenarios conducted on t…
The Effects of Database Complexity on SQL Query Formulation (journal-first)
2020
The learning of practical Structured Query Language (SQL) skills often takes place in digital environments, where the learner writes queries against an exercise database. The exercise database is usually designed and implemented by the teacher, and populated with makeshift data. Although this approach is common, and SQL taught in almost all database courses, little scientific attention has been given to the nature of the exercise database.
Language-Integrated Privacy-Aware Distributed Queries
2019
Distributed query processing is an effective means for processing large amounts of data. To abstract from the technicalities of distributed systems, algorithms for operator placement automatically distribute sequential data queries over the available processing units. However, current algorithms for operator placement focus on performance and ignore privacy concerns that arise when handling sensitive data. We present a new methodology for privacy-aware operator placement that both prevents leakage of sensitive information and improves performance. Crucially, our approach is based on an information-flow type system for data queries to reason about the sensitivity of query subcomputations. Ou…
The Effects of Database Complexity on SQL Query Formulation
2020
In Structured Query Language (SQL) education, students often execute queries against a simple exercise database. Recently, databases that are more realistic have been utilized to the effect that students find exercises more interesting and useful, as these databases more accurately mimic databases students are likely to encounter in their future work environments. However, using even the most engaging database can be counterproductive to learning, if a student is not able to formulate correct queries due to the complexity of the database schema. Scientific evidence on the effects of database complexity on student’s query formulation is limited, and with queries from 744 students against thr…
Attribute based access control scheme with controlled access delegation for collaborative E-health environments
2017
Abstract Modern electronic healthcare (e-health) settings constitute collaborative environments with complex access requirements. Thus, there is a need for sophisticated fine-grained access control mechanisms to cater these access demands and thereby experience the full potential of e-health systems. In order to realize a flexible access control scheme, integrating access delegation is of paramount importance. However, access delegation has to be enforced in a controlled manner so that it will not jeopardize the security of the system. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities. …
UCS: Ultimate course search
2016
International audience; In this system prototype demonstration we present, Ultimate Course Search (UCS), a learning tool developed to provide students ways to efficiently search electronic educational materials. UCS integrates slides, lecture videos and textbooks into a single platform. The keywords extracted from the textbooks and the slides are the basis of the indexing scheme. For the videos, UCS relies on slide transitions and metadata to establish the correspondence between slides and video segments. The video segmentation is based on the slides being presented using the meta-data provided by the video recording software and image processing techniques.
An attribute based access control scheme for secure sharing of electronic health records
2016
Electronic health records (EHRs) play a vital role in modern health industry, allowing the possibility of flexible sharing of health information in the quest of provisioning advanced and efficient healthcare services for the users. Although sharing of EHRs has significant benefits, given that such records contain lot of sensitive information, secure sharing of EHRs is of paramount importance. Thus, there is a need for the realization of sophisticated access control mechanisms for secure sharing of EHRs, which has attracted significant interest from the research community. The most prominent access control schemes for sharing of EHRs found in literature are role based and such solutions have…
UWSIO: Towards automatic orchestration for the deployment of 5G monitoring services from bare metal
2018
The next generation mobile networks 5G are currently being intensively developed and standardized globally, with commercial prototyping 5G connections already emerging. At the 5G system level, one of the Key Performance Indicators (KPIs) defining 5G is substantially reduced service creation time for 5G network operators and/or service providers to increase the system efficiency and thus reduce operational costs. In this work, we focus on realize this challenging KPI in terms of speedy creation of monitoring services for 5G operators from scratch (no operating system pre-installed). A new 5G infrastructure orchestrator UWSIO is proposed to achieve fully automated deployment of 5G monitoring …
Towards Concrete Syntax Based Find for Graphical Domain Specific Languages
2019
One of the main reasons why Model-Driven Engineering (MDE) technologies including Domain-specific modelling languages (DSML) have not reached the expected acceptance in the industry is a poor tool support. One of the features with a limited support even in commercial modelling tools is search (find). Typically, MDE tools support only a simple keyword-based textual search functionality. The same is true for the tools built using Domain-specific language (DSL) tool definition frameworks. It is proposed to provide the concrete syntax-based find functionality as a service of a DSL tool definition framework. The find diagrams are defined in a concrete syntax of a DSL. A definition of a DSL is us…