3,541 Hits in 4.1 sec

Enhancement in K-mean Clustering to Analyze Software Architecture using Normalization

Shilpa Sharma, Jyoti Godara
2015 International Journal of Computer Applications  
For increasing the software architecture analysis, the K-MEAN clustering will be used which is more efficient then the genetic clustering.  ...  It is very difficult to estimate the correct value of chromosomes, which decreases the efficiency of the software architecture analysis.  ...  Pattern matching is a technique under which architectural clues can be identified.  ... 
doi:10.5120/21230-3973 fatcat:enoz6qdy4ngohdcojwbvdnwmmq

Cyber Resiliency Engineering Overview of the Architectural Assessment Process

Deborah J. Bodeau, Richard D. Graubart, Ellen R. Laderman
2014 Procedia Computer Science  
at a given architectural layer?  ...  Architecture documentation Describes the architectures of the mission / business segment, SoS, common infrastructure, set of shared services, system, and/or components.  ... 
doi:10.1016/j.procs.2014.03.100 fatcat:zoses3erbjbivg26tdrpmf6uvy

AS/400 ImagePlus system view

M. Addink, J. J. Mullen
1990 IBM Systems Journal  
Until recently, technology could not provide a cost-effective method for reducing this paper flow.  ...  Insert a document into a case if one exists for that identifier; if none exists, create a new case (type 3).  ... 
doi:10.1147/sj.293.0451 fatcat:k73tuyv3vzhe3a3qqhucqppnni

Collaborative bug triaging using textual similarities and change set analysis

Katja Kevic, Sebastian C. Muller, Thomas Fritz, Harald C. Gall
2013 2013 6th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE)  
Bug triaging assigns a bug report, which is also known as a work item, an issue, a task or simply a bug, to the most appropriate software developer for fixing or implementing it.  ...  In this paper, we present our approach to identify potential experts by identifying similar bug reports and analyzing the associated change sets.  ...  As a side effect, our approach might also be used to identify software developers who could be affected by a bug fix and provide a starting point for fixing a bug.  ... 
doi:10.1109/chase.2013.6614727 dblp:conf/icse/KevicMFG13 fatcat:sifvxdapnrcllkf2i6rh7rr3lu

Collaborative Software Architectingcollaborative software architecting Through Knowledge Sharing [chapter]

Peng Liang, Anton Jansen, Paris Avgeriou
2010 Collaborative Software Engineering  
In the field of software architecture, there has been a paradigm shift from describing the outcome of the architecting process to documenting architectural knowledge, such as design decisions and rationale  ...  Although the importance of architectural knowledge has been recognized for a considerable period of time, there is still no systematic process emphasizing the use of architectural knowledge in a collaborative  ...  The authors would like to thank Astron for their support and access to the LOFAR software architecture documents.  ... 
doi:10.1007/978-3-642-10294-3_17 fatcat:6iqcr37klrdbhpmtnsstsyb4ym

P4BFT: Hardware-Accelerated Byzantine-Resilient Network Control Plane [article]

Ermin Sakic, Nemanja Deric, Endri Goshi, Wolfgang Kellerer
2019 arXiv   pre-print
Nonetheless, deploying BFT in practice comes at a disadvantage of increased traffic load stemming from replicated controllers, as well as a requirement for proprietary switch functionalities, thus putting  ...  Recently, BFT designs have gained traction in the context of Software Defined Networking (SDN). In SDN, controller replicas are distributed and their state replicated for high availability purposes.  ...  Johannes Riedl and the anonymous reviewers for their useful feedback and comments.  ... 
arXiv:1905.04064v2 fatcat:guu5dzfezfdtbkvcvy5s2c4flu

An Approach of a Technique for Effort Estimation of Iterations in Software Projects

Jose Antonio Pow-Sang, Enrique Jolay-Vasquez
2006 2006 13th Asia Pacific Software Engineering Conference (APSEC'06)  
The results were obtained from software projects of a fourth-year course in Informatics. The technique proposes the use of Function Points and COCOMO II.  ...  This paper shows the results obtained when applying a technique to estimate the effort of each construction iteration in software development projects that use iterative-incremental lifecycles.  ...  Ana María Moreno, professor from Technical University of Madrid, for her invaluable comments to prepare Fall 04 experience.  ... 
doi:10.1109/apsec.2006.20 dblp:conf/apsec/Pow-SangJ06 fatcat:wndqlhgi5jaxhcwgj7hp24ohbi

The value of cooperative planning in supply chains. A simulative approach

Luis Martín Díaz, Peter Buxmann
2003 European Conference on Information Systems  
Supply Chain Management), which for instance can be realized by implementing Supply Chain Management software for distribution planning purposes.  ...  For this purpose we introduce an XML-based prototype for modeling and simulating cooperative scenarios in supply chains, and illustrate its flexible architecture and the interaction between modeled scenarios  ...  The Simulation of Transportation Planning with the SCOptimizer After describing the architecture of the SCOptimizer we now want to perform a simulation in order to identify the added-value of cooperative  ... 
dblp:conf/ecis/DiazB03 fatcat:i7sjfy5nvjc4fa274dhqzurcpm

10 years of software architecture knowledge management: Practice and future

Rafael Capilla, Anton Jansen, Antony Tang, Paris Avgeriou, Muhammad Ali Babar
2016 Journal of Systems and Software  
The importance of architectural knowledge (AK) management for software development has been highlighted over the past ten years, where a significant amount of research has been done.  ...  Since the first systems using design rationale in the seventies and eighties to the more modern approaches using AK for designing software architectures, a variety of models, approaches, and research tools  ...  Eagle is an architectural knowledge sharing platform that uses a blackboard architecture for effective knowledge sharing.  ... 
doi:10.1016/j.jss.2015.08.054 fatcat:te2hdfmck5hohi6ry7sstevds4

Effect of Cloud Computing System in Education

Zareen Baksh
2018 International Journal for Research in Applied Science and Engineering Technology  
Cloud computing can be identified as a technology that uses the Internet to deliver its services.  ...  Nowadays, information Systems play effective role in the organizations in a way that they cannot be imagined without these systems.  ...  Software As A Service (Saas) Software-as-a-service (SaaS) is a method for delivering software applications over the Internet, on demand and typically on a subscription basis.  ... 
doi:10.22214/ijraset.2018.2122 fatcat:dc5lc3cof5gxjmrygk5x4yo7ae

Clustering Techniques in Data Mining For Improving Software Architecture: A Review

Parneet Kaur, Kamaljit Kaur
2016 International Journal of Computer Applications  
There are many clustering techniques for the improvement of architecture which are discussed in this paper.  ...  Data mining is a set of problem solving skills, instructions and methods applied upon variety of domains to discover and create useful systems that are used to solve practical problems.  ...  Architectural clues can be identified by using pattern matching technique.  ... 
doi:10.5120/ijca2016909303 fatcat:j4dcqwltpndspj2rqanlr2ocxy

Transforming binary code for low-power embedded processors

P. Petrov, A. Orailoglu
2004 IEEE Micro  
It is also programmable and accessible by software, thus enabling design, implementation, and manufacturing of a single, fixed processor architecture.  ...  Applied after compilation, it identifies efficient low-power transformations on a per application hot-spot basis and is completely ISA and architecture independent.  ...  Peter Petrov is pursuing a PhD in computer science and engineering at the University of California, San Diego.  ... 
doi:10.1109/mm.2004.18 fatcat:x24k2hbonrgp3orzf5mpufeudq

Page 411 of SMPTE Motion Imaging Journal Vol. 101, Issue 6 [page]

1992 SMPTE Motion Imaging Journal  
Appendices A and B present illustrative approaches to the design of transport headers and header-decoding software, respectively.  ...  The header/descriptor should provide a number of potential identification codes adequate to serve for decades, and preferably centuries; this im- plies that specific encoding identifiers, once assigned  ... 

Integrated Project Support

H.E. Keus
1991 EurophysicsNews  
Design errors (e.g. deadlock, mutual exclu sion) are identified and the architecture is tuned by reassigning time-consuming tasks or by specifying a faster processor or another real-time kernel (see page  ...  Implementation constraints are once again important so it is useful to for mulate a task model of a general purpose processor's software architecture.  ... 
doi:10.1051/epn/19912202037 fatcat:tkwfsqgypzcj7bjnbtxyzmzh7y

Automated Bug Report Field Reassignment and Refinement Prediction

Xin Xia, David Lo, Emad Shihab, Xinyu Wang
2016 IEEE Transactions on Reliability  
In general, a bug report contains many fields, such as product, component, severity, priority, fixer, operating system (OS), platform, etc., which provide important information for the bug triaging and  ...  Considering that a bug report could have multiple field reassignments and refinements (e.g., the product, component, fixer, and other fields of a bug report can get reassigned and refined), in this paper  ...  Shihab's research interests are in Software Engineering, Software Quality Assurance, Empirical Software Engineering, Mining Software Repositories, Mobile Applications and Software Architecture.  ... 
doi:10.1109/tr.2015.2484074 fatcat:kjf5oeuno5ajre4phnwomdiz3y
« Previous Showing results 1 — 15 out of 3,541 results