Search results for "Software engineering"

showing 10 items of 1151 documents

QoS Multi-tree Based Routing Protocol for Inter-mesh Infrastructure Communications

2016

Part 5: Network Protocols; International audience; Quality of service (QoS) in wireless mesh networks (WMN) is an active area of research, which is driven by the increasing demand for real-time and multimedia applications, such as VoIP (Voice over IP) and VoD (Video on Demand). In this paper, we propose a QoS multi-tree based routing protocol for wireless mesh environments, named Inter-Mesh Infrastructure Proactive Routing (IMPR). It is a proactive multi-tree routing protocol enabling QoS guarantee for communications from/towards the Internet network through the Mesh Gateway (MG) of the mesh infrastructure. We describe and analyze the simulation results of different scenarios conducted on t…

Routing protocolDynamic Source RoutingMulti-tree routing[ INFO ] Computer Science [cs]Computer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Enhanced Interior Gateway Routing ProtocolWireless Routing Protocol02 engineering and technology[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0502 economics and business0202 electrical engineering electronic engineering information engineeringQos routing[INFO]Computer Science [cs]IMPRWireless mesh networkZone Routing ProtocolWireless mesh networkbusiness.industry05 social sciencesComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020207 software engineeringLink-state routing protocolPerformance evaluationHazy Sighted Link State Routing ProtocolNetworksbusiness050203 business & managementComputer network
researchProduct

4th International Workshop on Language Engineering (ATEM 2007)

2008

Following the great success of previous editions, ATEM2007 is the 4thedition of the ATEM workshop series. The first two editions were held with WCRE in 2003 and 2004, while the 3rdone was held with MoDELS 2006. ATEM has always been focused on engineering of language descriptions. In order to cover as many aspects of language descriptions important for greater success and adoption of model-driven engineering, ATEM has been evolving so as its scope: The first edition was about metamodelsand schemas. The second about was metamodels, schemasand grammars. The third edition was about metamodels, schemas, grammarsand ontologies.

Rule-based machine translationScope (project management)Computer sciencebusiness.industryLanguage engineeringSoftware engineeringbusinessOn LanguageFull paperCode clone
researchProduct

An ontology-based metamodel for multiagent-based simulations

2014

Multiagent-based simulations enable us to validate dierent use-case scenarios in a lot of application domains. The idea is to develop a realistic virtual environment to test particular domain-specic procedures. This paper presents our general framework for interactive multiagent-based simulations in virtual environments. The major contribution of this paper is the integration of the notion of ontology as a core element to the design process of a behavioral simulation. The proposed metamodel describes the concepts of a multiagent simulation using situated agents moving in a semantically enriched 3D environment. The agents perceive the geometric and semantic data in the surrounding environmen…

SIMPLE (military communications protocol)business.industryComputer scienceOntology (information science)Semantic data modelcomputer.software_genreMetamodelingHardware and ArchitectureVirtual machineModeling and SimulationIndustry Foundation ClassesSituatedSystems engineeringSoftware engineeringbusinessEngineering design processcomputerSoftwareSimulation Modelling Practice and Theory
researchProduct

The Effects of Database Complexity on SQL Query Formulation (journal-first)

2020

The learning of practical Structured Query Language (SQL) skills often takes place in digital environments, where the learner writes queries against an exercise database. The exercise database is usually designed and implemented by the teacher, and populated with makeshift data. Although this approach is common, and SQL taught in almost all database courses, little scientific attention has been given to the nature of the exercise database.

SQLDatabaseComputer science05 social sciencesQuery formulationInformationSystems_DATABASEMANAGEMENT020207 software engineering02 engineering and technologycomputer.software_genre0502 economics and businessComputingMilieux_COMPUTERSANDEDUCATION0202 electrical engineering electronic engineering information engineeringStudent learningcomputer050203 business & managementcomputer.programming_language2020 46th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)
researchProduct

Language-Integrated Privacy-Aware Distributed Queries

2019

Distributed query processing is an effective means for processing large amounts of data. To abstract from the technicalities of distributed systems, algorithms for operator placement automatically distribute sequential data queries over the available processing units. However, current algorithms for operator placement focus on performance and ignore privacy concerns that arise when handling sensitive data. We present a new methodology for privacy-aware operator placement that both prevents leakage of sensitive information and improves performance. Crucially, our approach is based on an information-flow type system for data queries to reason about the sensitivity of query subcomputations. Ou…

SQLInformation privacyScalaComputer scienceDistributed computing020207 software engineering02 engineering and technologyQuery languageInformation sensitivitySoftware deployment020204 information systems0202 electrical engineering electronic engineering information engineeringSequential dataSafety Risk Reliability and QualitycomputerSoftwarecomputer.programming_language
researchProduct

An Approach to Data Quality Evaluation

2018

This research proposes a new approach to data quality evaluation comprising 3 aspects: (1) data object definition, which quality will be analyzed, (2) quality requirements specification for the data object using Domain Specific Language (DSL), (3) implementation of an executable data quality model that would enable scanning of data object and detect its shortages. Like the Model Driven Architecture (MDA) the data quality modelling is divided into platform independent (PIM) and platform-specific (PSM) models. PIM comprises informal specifications of data quality, PSM describes implementation of data quality model, thus making the data quality model executable. The approbation of the proposed…

SQLbusiness.industryComputer sciencemedia_common.quotation_subjectSoftware requirements specificationcomputer.file_formatLinked dataData modelingData integrityData qualityQuality (business)ExecutableSoftware engineeringbusinesscomputermedia_commoncomputer.programming_language2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)
researchProduct

The Effects of Database Complexity on SQL Query Formulation

2020

In Structured Query Language (SQL) education, students often execute queries against a simple exercise database. Recently, databases that are more realistic have been utilized to the effect that students find exercises more interesting and useful, as these databases more accurately mimic databases students are likely to encounter in their future work environments. However, using even the most engaging database can be counterproductive to learning, if a student is not able to formulate correct queries due to the complexity of the database schema. Scientific evidence on the effects of database complexity on student’s query formulation is limited, and with queries from 744 students against thr…

SQLoppiminenComputer scienceQuery formulation02 engineering and technologycomputer.software_genrestructured query language (SQL)kyselykieletScientific evidenceSet (abstract data type)Simple (abstract algebra)0502 economics and business0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDEDUCATIONdatabase complexitytietokannatdatabasecomputer.programming_languageeducationSQLDatabaseScale (chemistry)05 social sciencesDatabase schemaInformationSystems_DATABASEMANAGEMENT020207 software engineeringkompleksisuuskoulutusHardware and Architecturestudent learningcomputer050203 business & managementSoftwareInformation Systems
researchProduct

Checkpointing Workflows for Fail-Stop Errors

2017

International audience; We consider the problem of orchestrating the exe- cution of workflow applications structured as Directed Acyclic Graphs (DAGs) on parallel computing platforms that are subject to fail-stop failures. The objective is to minimize expected overall execution time, or makespan. A solution to this problem consists of a schedule of the workflow tasks on the available processors and of a decision of which application data to checkpoint to stable storage, so as to mitigate the impact of processor failures. For general DAGs this problem is hopelessly intractable. In fact, given a solution, computing its expected makespan is still a difficult problem. To address this challenge,…

ScheduleComputer scienceworkflowDistributed computing[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]010103 numerical & computational mathematics02 engineering and technologyParallel computing[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]01 natural sciencesTheoretical Computer Science[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]checkpointfail-stop error0202 electrical engineering electronic engineering information engineeringOverhead (computing)[INFO]Computer Science [cs]0101 mathematicsresilienceClass (computer programming)020203 distributed computingJob shop schedulingProbabilistic logic020206 networking & telecommunications[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationDynamic programmingTask (computing)[INFO.INFO-PF]Computer Science [cs]/Performance [cs.PF]WorkflowComputational Theory and MathematicsHardware and Architecture[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Task analysis[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Software
researchProduct

Serial In-network Processing for Large Stationary Wireless Sensor Networks

2017

International audience; In wireless sensor networks, a serial processing algorithm browses nodes one by one and can perform different tasks such as: creating a schedule among nodes, querying or gathering data from nodes, supplying nodes with data, etc. Apart from the fact thatserial algorithms totally avoid collisions, numerous recent works have confirmed that these algorithms reduce communications andconsiderably save energy and time in large-dense networks. Yet, due to the path construction complexity, the proposed algorithmsare not optimal and their performances can be further enhanced. To do so, in the present paper, we propose a new serial processing algorithm that, in most of the case…

ScheduleVisual sensor networkbusiness.industryComputer science020206 networking & telecommunications02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation020202 computer hardware & architectureSerial memory processing[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingKey distribution in wireless sensor networks[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Sensor nodeScalability0202 electrical engineering electronic engineering information engineeringMobile wireless sensor network[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkComputer network
researchProduct

Attribute based access control scheme with controlled access delegation for collaborative E-health environments

2017

Abstract Modern electronic healthcare (e-health) settings constitute collaborative environments with complex access requirements. Thus, there is a need for sophisticated fine-grained access control mechanisms to cater these access demands and thereby experience the full potential of e-health systems. In order to realize a flexible access control scheme, integrating access delegation is of paramount importance. However, access delegation has to be enforced in a controlled manner so that it will not jeopardize the security of the system. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities. …

Scheme (programming language)Computer access controlDelegationRevocationComputer Networks and CommunicationsComputer sciencebusiness.industrymedia_common.quotation_subject020206 networking & telecommunications020207 software engineeringProvisioningAccess control02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineeringPhysical accessRole-based access controlSafety Risk Reliability and QualitybusinesscomputerSoftwaremedia_commoncomputer.programming_languageJournal of Information Security and Applications
researchProduct