Search results for "Software engineering"
showing 10 items of 1151 documents
Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
2021
International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…
Integration of cloud computing tools and knowledge bodies for the management of programming projects
2018
A Body of Knowledge (BOK) is a set of concepts and skills that represent the knowledge of a specific area of engineering or scientific discipline and ensure their common understanding [1]. A BOK can include technical terms and theoretical concepts as well as best practices [2] so in this document we will focus on the context of software engineering specifically in Software Project Management. In addition, Cloud Computing will is becoming the best way to deliver solutions that meet the current need for greater collaboration between companies, education and society. In this context, the learning of Software Project Management is important during the professional life of Informatica since it e…
Ontological Analysis and Modularization of CIDOC-CRM
2020
Conference cancelled due to COVID19; International audience; The CIDOC-CRM ontology is a standard for cultural heritage data modeling. Despite its large exploitation, the ontology is primarily maintained in a semi-formal notation, which makes it difficult to homogeneously exploit it in digital environments. In addition, the ontology consists of several classes and relations, whereas one sometimes wishes to reuse it but only partially. The purpose of the paper is to contribute to the use of CIDOC by strengthening its foundations. On the basis of formal ontology theories, we propose a first analysis of the ontology to enhance its conceptual structure. We also present a preliminary modularizat…
Experimental BIM applications in Archaeology: a work-flow
2014
In the last few decades various conceptual models, methods and techniques have been studied to allow 3D digital access to Cultural Heritage (CH). Among these is BIM (Building Information Modeling): originally built up for construction projects, it has been already experimented in the CH domain, but not enough in the archaeological field. This paper illustrates a framework to create 3D archaeological models integrated with databases using BIM. The models implemented are queryable by the connection with a Relational Database Management System and sharable on the web. Parametric solid and semantic models are integrated with 3D standardized database models that are finally manageable in the pub…
Domain-Driven Reuse of Software Design Models
2011
This chapter presents an approach to software development where model driven development and software reuse facilities are combined in a natural way. The basis for all of this is a semiformal requirements language RSL. The requirements in RSL consist of use cases refined by scenarios in a simple controlled natural language and the domain vocabulary containing the domain concepts. The chapter shows how model transformations building a platform independent model (PIM) can be applied directly to the requirements specified in RSL by domain experts. Further development of the software case (PSM, code) is also supported by transformations, which in addition ensure a rich traceability within the s…
The Aquatic Surface Robot (AnSweR), a Lightweight, Low Cost, Multipurpose Unmanned Research Vessel
2021
Even though a few examples of aquatic surface robots exist, they are generally expensive, relatively large and heavy and tailored to custom-made hardware/software components that are not openly available to a broad public. In this work, the Aquatic Surface Robot (AnSweR), a newly-designed, lightweight, low cost, open-source, multipurpose unmanned research vessel is presented. The AnSweR features a lightweight and compact design that makes it fit in a backpack. Low-noise operation (in and above the surface) is achieved with a propulsion system based on two water-jets. Only affordable commercial-off-the-shelf (COTS) components are adopted. The primary goal of the AnSweR is to map underwater l…
Model Driven Architecture (MDA)
2003
Benchmarking non-photorealistic rendering of portraits
2017
We present a set of images for helping NPR practitioners evaluate their image-based portrait stylisation algorithms. Using a standard set both facilitates comparisons with other methods and helps ensure that presented results are representative. We give two levels of difficulty, each consisting of 20 images selected systematically so as to provide good coverage of several possible portrait characteristics. We applied three existing portrait-specific stylisation algorithms, two general-purpose stylisation algorithms, and one general learning based stylisation algorithm to the first level of the benchmark, corresponding to the type of constrained images that have often been used in portrait-s…
Combination Of Handcrafted And Deep Learning-Based Features For 3d Mesh Quality Assessment
2020
We propose in this paper a novel objective method to evaluate the perceived visual quality of 3D meshes. The proposed method in no-reference, it relies only on the distorted mesh for the quality estimation. It is based on a pre-trained convolutional neural network (i.e VGG to extract features from the distorted mesh) and handcrafted features extracted directly from the 3D mesh (i.e curvature and dihedral angle). A General Regression Neural Network (GRNN) is used to learn the statistical parameters of the feature vectors and estimate the quality score. Experimental results from for subjective databases (LIRIS masking, LIRIS/EPFL generalpurpose, UWB compression and LEETA simplification) and c…
Defending Surveillance Sensor Networks Against Data-Injection Attacks Via Trusted Nodes
2018
By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes are available. Our results reveal the performance-security tradeoff of these schemes and can be used to determine the number of trusted nodes required for a given performance target.