Search results for "Software engineering"

showing 10 items of 1151 documents

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

2021

International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…

business.industryComputer scienceAnomaly (natural sciences)020206 networking & telecommunications02 engineering and technologyIntrusion detection system[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Computer securitycomputer.software_genre[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe Internet[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Electrical and Electronic Engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businesscomputer
researchProduct

Integration of cloud computing tools and knowledge bodies for the management of programming projects

2018

A Body of Knowledge (BOK) is a set of concepts and skills that represent the knowledge of a specific area of engineering or scientific discipline and ensure their common understanding [1]. A BOK can include technical terms and theoretical concepts as well as best practices [2] so in this document we will focus on the context of software engineering specifically in Software Project Management. In addition, Cloud Computing will is becoming the best way to deliver solutions that meet the current need for greater collaboration between companies, education and society. In this context, the learning of Software Project Management is important during the professional life of Informatica since it e…

business.industryComputer scienceBest practiceSoftware developmentInformation technology020207 software engineeringCloud computingContext (language use)02 engineering and technologyBody of knowledgeProduct (business)Engineering management0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessSoftware project management2018 13th Iberian Conference on Information Systems and Technologies (CISTI)
researchProduct

Ontological Analysis and Modularization of CIDOC-CRM

2020

Conference cancelled due to COVID19; International audience; The CIDOC-CRM ontology is a standard for cultural heritage data modeling. Despite its large exploitation, the ontology is primarily maintained in a semi-formal notation, which makes it difficult to homogeneously exploit it in digital environments. In addition, the ontology consists of several classes and relations, whereas one sometimes wishes to reuse it but only partially. The purpose of the paper is to contribute to the use of CIDOC by strengthening its foundations. On the basis of formal ontology theories, we propose a first analysis of the ontology to enhance its conceptual structure. We also present a preliminary modularizat…

business.industryComputer scienceCIDOC-CRM0202 electrical engineering electronic engineering information engineering020206 networking & telecommunications020201 artificial intelligence & image processing02 engineering and technologySoftware engineeringbusinessOntological AnalysisModularization[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]
researchProduct

Experimental BIM applications in Archaeology: a work-flow

2014

In the last few decades various conceptual models, methods and techniques have been studied to allow 3D digital access to Cultural Heritage (CH). Among these is BIM (Building Information Modeling): originally built up for construction projects, it has been already experimented in the CH domain, but not enough in the archaeological field. This paper illustrates a framework to create 3D archaeological models integrated with databases using BIM. The models implemented are queryable by the connection with a Relational Database Management System and sharable on the web. Parametric solid and semantic models are integrated with 3D standardized database models that are finally manageable in the pub…

business.industryComputer scienceCloud computingcomputer.software_genreArchaeologyBIM Archaeology Semantic modelling Data export Web documentationField (computer science)Domain (software engineering)Cultural heritageBuilding information modelingRelational database management systemWork flowbusinesscomputerDatabase model
researchProduct

Domain-Driven Reuse of Software Design Models

2011

This chapter presents an approach to software development where model driven development and software reuse facilities are combined in a natural way. The basis for all of this is a semiformal requirements language RSL. The requirements in RSL consist of use cases refined by scenarios in a simple controlled natural language and the domain vocabulary containing the domain concepts. The chapter shows how model transformations building a platform independent model (PIM) can be applied directly to the requirements specified in RSL by domain experts. Further development of the software case (PSM, code) is also supported by transformations, which in addition ensure a rich traceability within the s…

business.industryComputer scienceComponent-based software engineeringSoftware constructionSoftware developmentDomain engineeringSoftware designDomain analysisbusinessSoftware engineeringDomain (software engineering)Feature-oriented domain analysis
researchProduct

The Aquatic Surface Robot (AnSweR), a Lightweight, Low Cost, Multipurpose Unmanned Research Vessel

2021

Even though a few examples of aquatic surface robots exist, they are generally expensive, relatively large and heavy and tailored to custom-made hardware/software components that are not openly available to a broad public. In this work, the Aquatic Surface Robot (AnSweR), a newly-designed, lightweight, low cost, open-source, multipurpose unmanned research vessel is presented. The AnSweR features a lightweight and compact design that makes it fit in a backpack. Low-noise operation (in and above the surface) is achieved with a propulsion system based on two water-jets. Only affordable commercial-off-the-shelf (COTS) components are adopted. The primary goal of the AnSweR is to map underwater l…

business.industryComputer scienceComponent-based software engineeringSystems engineeringRobotRoboticsArtificial intelligencePropulsionArchitectureUnderwaterModular designSoftware architecturebusiness
researchProduct

Model Driven Architecture (MDA)

2003

business.industryComputer scienceComponent-based software engineeringSystems engineeringSoftware developmentArchitecturebusinessSoftware engineeringInformation SystemsWirtschaftsinformatik
researchProduct

Benchmarking non-photorealistic rendering of portraits

2017

We present a set of images for helping NPR practitioners evaluate their image-based portrait stylisation algorithms. Using a standard set both facilitates comparisons with other methods and helps ensure that presented results are representative. We give two levels of difficulty, each consisting of 20 images selected systematically so as to provide good coverage of several possible portrait characteristics. We applied three existing portrait-specific stylisation algorithms, two general-purpose stylisation algorithms, and one general learning based stylisation algorithm to the first level of the benchmark, corresponding to the type of constrained images that have often been used in portrait-s…

business.industryComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineeringImage processing02 engineering and technologyBenchmarkingMachine learningcomputer.software_genreNon-photorealistic renderingImage (mathematics)Set (abstract data type)0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Key (cryptography)020201 artificial intelligence & image processingArtificial intelligencebusinesscomputerAbstraction (linguistics)
researchProduct

Combination Of Handcrafted And Deep Learning-Based Features For 3d Mesh Quality Assessment

2020

We propose in this paper a novel objective method to evaluate the perceived visual quality of 3D meshes. The proposed method in no-reference, it relies only on the distorted mesh for the quality estimation. It is based on a pre-trained convolutional neural network (i.e VGG to extract features from the distorted mesh) and handcrafted features extracted directly from the 3D mesh (i.e curvature and dihedral angle). A General Regression Neural Network (GRNN) is used to learn the statistical parameters of the feature vectors and estimate the quality score. Experimental results from for subjective databases (LIRIS masking, LIRIS/EPFL generalpurpose, UWB compression and LEETA simplification) and c…

business.industryComputer scienceDeep learningFeature vectorFeature extraction020207 software engineeringPattern recognition02 engineering and technologyCurvatureConvolutional neural networkVisualizationMetric (mathematics)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingPolygon meshArtificial intelligencebusiness2020 IEEE International Conference on Image Processing (ICIP)
researchProduct

Defending Surveillance Sensor Networks Against Data-Injection Attacks Via Trusted Nodes

2018

By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes are available. Our results reveal the performance-security tradeoff of these schemes and can be used to determine the number of trusted nodes required for a given performance target.

business.industryComputer scienceDetector020206 networking & telecommunications020207 software engineering02 engineering and technologyAdversaryRobustness (computer science)Injection attacks0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkSubspace topologyComputer Science::Cryptography and SecurityComputer network
researchProduct