Search results for "SOFTWARE"

showing 10 items of 7396 documents

Hypotheses engineering : first essential steps of experiment-driven software development

2019

Recent studies have proposed the use of experiments to guide software development in order to build features that the user really wants. Some authors argue that this approach represents a new way to develop software that is different from the traditional requirement-driven one. In this position paper, we propose the discipline of Hypotheses Engineering in comparison to Requirements Engineering, highlighting the importance of proper handling hypotheses that guide experiments. We derive a set of practices within this discipline and present how the literature has tackled them up to now. Finally, we propose a set of research questions that could guide future work towards helping practitioners. …

assumptionsRequirements engineeringComputer sciencebusiness.industrySoftware developmenttietokoneohjelmatvaatimusmäärittelytData scienceexperimentationhypoteesitSoftwareWork (electrical)Order (exchange)hypothesesexperiment driven software developmentPosition paperkokeet (tutkimustoiminta)Research questionsrequirements engineeringhypotheses engineeringbusinessSet (psychology)ohjelmistokehitys
researchProduct

Decision-cache based XACML authorisation and anonymisation for XML documents

2012

Author's version of an article in the journal: Computer Standards and Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.10.007 This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element level. The decision cache is implemented as an XACML obligation service, where a specification of the XML elements to be authorised and anonymised is sent to the Policy Enforcement Point (PEP) during initial authorisation. Further authorisation of individual XML elements according to the authorisation specifi…

authorisationSoftware_OPERATINGSYSTEMSMarkup languageComputer sciencecomputer.internet_protocolXACMLAccess controlIntrusion detection systemcomputer.software_genrecachingXACMLcomputer.programming_languageanonymisationVDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424AuthenticationDatabasebusiness.industryComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSHardware and ArchitectureCacheprivacy policyWeb servicebusinessLawcomputerSoftwareXMLComputer Standards & Interfaces
researchProduct

Anomaly Detection and Classification of Household Electricity Data : A Time Window and Multilayer Hierarchical Network Approach

2022

With the increasing popularity of the smart grid, huge volumes of data are gathered from numerous sensors. How to classify, store, and analyze massive datasets to facilitate the development of the smart grid has recently attracted much attention. In particular, with the popularity of household smart meters and electricity monitoring sensors, a large amount of data can be obtained to analyze household electricity usage so as to better diagnose the leakage and theft behaviors, identify man-made tampering and data fraud, and detect powerline loss. In this paper, the time window method is first proposed to obtain the features and potential periodicity of household electricity data. Combining th…

autoencoderMains electricityComputer Networks and CommunicationsComputer sciencemultilayer hierarchical networkkotitaloudetverkot (järjestelmät)computer.software_genreanomaly detectionComputer Science Applicationshousehold electricitysähkönkulutussähködataclassificationHardware and ArchitectureTime windowspoikkeavuusSignal ProcessingAnomaly detectionData miningcomputerNetwork approachfeedforward networkInformation Systems
researchProduct

Application of a Knowledge Discovery Process to Study Instances of Capacitated Vehicle Routing Problems

2020

Vehicle Routing Problems (VRP) are computationally challenging, constrained optimization problems, which have central role in logistics management. Usually different solvers are being developed and applied for different kind of problems. However, if descriptive and general features could be extracted to describe such problems and their solution attempts, then one could apply data mining and machine learning methods in order to discover general knowledge on such problems. The aim then would be to improve understanding of the most important characteristics of VRPs from both efficient solution and utilization points of view. The purpose of this article is to address these challenges by proposi…

autoencoderreititysbusiness.industryComputer scienceProcess (engineering)capacitated vehicle routing problemsfeature extractionFeature extractionLogistics managementknowledge discoveryRobust statisticsMachine learningcomputer.software_genreAutoencoderkoneoppiminenKnowledge extractionoptimointirobust statisticsVehicle routing problemlogistiikkaGeneral knowledgeArtificial intelligencetiedonlouhintabusinesscomputer
researchProduct

Open source software as a service : provision of open sourcesoftware components to web application developers

2010

Over different periods, open source software and Cloud computing have both been described as the next level of evolution in the software industry. Proponents of both paradigms have investigated different approaches to develop, use and create viable business models around computer software. The advantages offered by open source software and cloud computing are often contrasted against the more traditional approaches to software development and product consumption. However, very few studies have attempted to investigate the possibility of merging the attributes of open source software and cloud computing in order to achieve operational and business efficiency. Previous researches on open sour…

avoin lähdekoodiBusiness ModelsBack end softwareHigh-end userOpen Source Software
researchProduct

Consumer Preference Heterogeneity Evaluation in Fruit and Vegetable Purchasing Decisions Using the Best–Worst Approach

2019

This study assesses consumer preferences during fruit and vegetable (FV) sales, considering the sociodemographic variables of individuals together with their choice of point of purchase. A choice experiment was conducted in two metropolitan areas in Northwest Italy. A total of 1170 consumers were interviewed at different FV purchase points (mass retail chains and open-air markets) using a paper questionnaire. The relative importance assigned by consumers to 12 fruit and vegetable product attributes, including both intrinsic and extrinsic quality cues, was assessed by using the best&ndash

best–worst scaling; cluster analysis; consumer preferences; fruits and vegetablesHealth (social science)Point of saleconsumer preference030309 nutrition & dieteticsmedia_common.quotation_subjectfruits and vegetablesSample (statistics)Plant Sciencelcsh:Chemical technologycomputer.software_genreHealth Professions (miscellaneous)MicrobiologyArticle03 medical and health sciencesSettore AGR/01 - Economia Ed Estimo Ruralecluster analysiconsumer preferenceslcsh:TP1-1185Quality (business)best–worst scalingMarketingConsumer behaviour040502 food sciencemedia_common0303 health sciencesfood and beverages04 agricultural and veterinary sciencesOrganic certificationPreferenceLatent class modelPurchasingSettore AGR/03 - Arboricoltura Generale E Coltivazioni ArboreeBusiness0405 other agricultural sciencescomputercluster analysisFood ScienceFoods
researchProduct

Unification of Graphs and Relations in Mizar

2020

Summary A (di)graph without parallel edges can simply be represented by a binary relation of the vertices and on the other hand, any binary relation can be expressed as such a graph. In this article, this correspondence is formalized in the Mizar system [2], based on the formalization of graphs in [6] and relations in [11], [12]. Notably, a new definition of createGraph will be given, taking only a non empty set V and a binary relation E ⊆ V × V to create a (di)graph without parallel edges, which will provide to be very useful in future articles.

binary relationUnificationgraph theoryApplied Mathematics020207 software engineering0102 computer and information sciences02 engineering and technologyMizar system68v2001 natural sciencesAlgebraComputational Mathematics010201 computation theory & mathematicsQA1-9390202 electrical engineering electronic engineering information engineering05c62MathematicsMathematicsofComputing_DISCRETEMATHEMATICSMathematicsFormalized Mathematics
researchProduct

Model transformation language MOLA

2005

The paper describes a new graphical model transformation language MOLA. The basic idea of MOLA is to merge traditional structured programming as a control structure with pattern-based transformation rules. The key language element is a graphical loop concept. The main goal of MOLA is to describe model transformations in a natural and easy readable way.

biologyComputer sciencebusiness.industryProgramming languageTransitive closureStructured programmingbiology.organism_classificationcomputer.software_genreTransformation languageMolaArtificial intelligenceGraphical modelbusinesscomputerModel transformation languagecomputer.programming_languageMerge (linguistics)
researchProduct

Palaeoclimatic applications of large databases: developing and testing methods of palaeotemperature reconstruction using nonmarine ostracods

2008

Non-analogue methods for Quaternary palaeoclimatic reconstruction, such as the coleopteran Mutual Climate Range method and the Mutual Ostracod Temperature Range (MOTR) method, use large geographical databases combined with modern climate datasets to establish the modern climate/temperature ranges of species, which can then be applied to the interpretation of fossil assemblages. Such approaches have been criticized for their lack of attention to variation in the distributions of species within their climate ranges. The MOTR method, for example, assumes that a species has an equal probability of occurring anywhere within its temperature range (e.g. mean July air temperature range), but tests …

biologyDatabaseCalibration (statistics)Range (biology)BiodiversityPaleontologybiology.organism_classificationcomputer.software_genreOstracodAir temperatureAssemblage (archaeology)Table (landform)QuaternarycomputerSenckenbergiana lethaea
researchProduct

A database of Triassic conodonts from a comprehensive revisión of literature

2013

The revision of a comprehensive amount of bibliography has made possible the development of a database containing the stratigraphic ranges of the conodont species from the uppermost Permian and the Triassic, with a total of 336 species in 52 genera. This database is aimed at biostratigraphy and studies related to biological, evolutional and palaeodiversity dynamics. La revisión de una amplia cantidad de bibliografía ha hecho posible el desarrollo de una base de datos en la que figuran los rangos estratigráficos de las especies de conodontos presentes desde el Pérmico superior y el Triásico, con un total de 336 especies y 52 géneros. Esta base de datos está dirigida a la bioestratigrafía y a…

biologyDatabasePermianEstratigrafia TerciariPaleontologyPaleontologiaBiostratigraphybiology.organism_classificationcomputer.software_genreQE701-760conodonts stratigraphic ranges database triassicPaleontologyGeographyConodontcomputer
researchProduct