Search results for "CONSTRUCTION"
showing 10 items of 2670 documents
A modest but practical software process modeling technique for software process improvement
2002
One of the main problems with software engineering is due to the difficulties in evaluating and improving our software processes, especially in the light of the fact that reuse depends on a process which supports it. Generally used approaches to the evaluation and improvement of software processes are based on the CMM, for example. In this paper we present a technique to improve software processes through modeling and evaluation. The presented technique is fairly easy to use, provides reasonably good results and requires only a fraction of resources required by CMM appraisals. Copyright © 2002 John Wiley & Sons, Ltd.
Software Business Education for Software Engineers: Towards an Integrated Curriculum
2006
All software is developed to create value to its stakeholders. Software engineering decisions and business value are closely linked with each other: technical decisions may have a profound impact on the business potential of software. Yet, software engineering education usually does not provide students with sufficient knowledge on business-related issues. We believe that the general business education is too abstract and unfocused to address the specific characteristics of software business. This paper suggests specific areas of business competencies that should be integrated into the software engineering curriculum. In addition, we compare these topics with software business curricula in …
Improving the Reuse Process is Based on Understanding the Business and the Products: Four Case Studies
2002
The reuse of software engineering assets has been proposed as the most promising alternative for improving productivity and software quality. The improvement of reuse requires understanding of suitable reuse strategies and the software process. In four industrial cases the reuse process is analyzed for the purpose of its improvement and remarkable differences between successful processes are found. Those differences are due to differences in the products and businesses of the analyzed companies. In some cases the product line approach fits the business very well and high level of reuse can be achieved by using it. In other cases the black-box approach to reuse has turned out to suit the bus…
Software Inspections in Practice: Six Case Studies
2006
Software inspections have been acknowledged as an important method in software engineering, but they are not well applied in practice. This paper discusses the current practices and the related problems based on six case studies in industrial settings. The analysis of inspection practices was organized according to ICMM, which is a model for systematically assessing and improving software inspection process maturity. The sample case organizations used inspections relatively regularly. The involved units are compared and the revealed practices, their characteristics, inspection problems and implications of the study discussed. The main problem areas were non-existent inspection training, lim…
Use of Non-IT Testers in Software Development
2007
Because of a shortage of IT specialists, many companies which are not involved in software development business are forced to use employees who have minimal or no any knowledge about software development and IT as testers (let's call them non-IT testers). The author of this paper has used years of experience in working with such testers to provide a description of them, looking also at their most typical testing styles and the problems which occur for testers, their colleagues and bosses, and the overall software development processes. Non-IT testers often feel like second-class employees, because they are forced to work in an environment in which they do not have sufficient skills. This pa…
ValWorkBench: an open source Java library for cluster validation, with applications to microarray data analysis.
2015
Background: Cluster analysis is one of the most well known activities in scientific investigation and the object of research in many disciplines, ranging from statistics to computer science. It is central to the life sciences due to the advent of high throughput technologies, e.g., classification of tumors. In particular, in cluster analysis, it is of relevance to assess cluster quality and to predict the number of clusters in a dataset, if any. This latter task is usually performed via internal validation measures. Despite their potentially important role, both the use of classic internal validation measures and the design of new ones, specific for microarray data, do not seem to have grea…
A metrics suite for evaluating agent-oriented architectures
2010
The Multi-agent Systems (MASs) paradigm continues to consolidate itself as a new branch of software engineering. Traditional software engineering strongly recommends to apply metrics in software developments. However, several research groups of experts in agent-oriented software engineering agree that classical software metrics and object-oriented metrics cannot directly measure the quality of MAS architectures. For this reason, this work proposes a suite of metrics to measure certain quality attributes of MAS architectures, considering agents and their organization. Most of these metrics are inspired by object-oriented metrics but they are adapted to agent-oriented concepts. Proposed metri…
Graph grammar engineering: A software specification method
1987
Graphs as conceptual data models are accepted and used in a wide range of different problem areas. Giving some examples we outline common aspects for modeling complex structures by graphs. We present a formal frame-work based on graph grammars to specify graph classes and the corresponding graph manipulations. We show that such a specification can be written in a systematic, engineering-like manner. This is achieved by an extension of the known programmed, attributed graph grammars. Node-set operators are introduced to facilitate graph queries. Concepts like abstraction, decomposition, refinement, parameterization, and integration have been adopted from software engineering to yield a compr…
Mobile Security with Location-Aware Role-Based Access Control
2012
Published version of an article from the book: Security and privacy in mobile information and communication systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-30244-2_15 This paper describes how location-aware Role-Based Access Control (RBAC) can be implemented on top of the Geographically eXtensible Access Control Markup Language (GeoXACML). It furthermore sketches how spatial separation of duty constraints (both static and dynamic) can be implemented using GeoXACML on top of the XACML RBAC profile. The solution uses physical addressing of geographical locations which facilitates easy deployment of authorisation profiles to the mobile device. Location-aware RBAC c…
Nuove ricerche a Solunto (2021)
2021
New researches in Solunto (2021) · The paper presents an overview of the ongoing researches in Solunto by the University of Palermo. In 2021 stratigraphical sondages were undertaken in two areas of the town: 1) in the great sanctuary above the theatre, in the frame of a major project aimed at addressing several still unresolved issues. That area, as a matter of fact, has never been considered as a whole; the sacred buildings have not been studied, and their mutual relationships and the links with the adjacent terraces have never been properly examined; 2) in the North Baths near the agora, as a corollary of the systematic study of water management, some sondages were made by G. Polizzi. Fin…