scholarly journals Dynamic Evolution of Requirement Goal Deployed on Network Environment

2013 ◽  
Vol 756-759 ◽  
pp. 2197-2203
Author(s):  
Yang Liu ◽  
Jin Zhao Wu

Under the network environment, it inevitably exists inconsistency and dynamic information in users requirements because of the complicated and volatile network, update, restructuring and so on. This paper studies how to handle the inconsistent information and keep correctness of the requirement goals from the users. It also provides relevant rules of model evolution under dynamic environment. With maximal consistent set, the inconsistent information can be reserved to keep the indeterminacy in the early stage and expand the function of the software. It is helpful for the next step of the software development.

Author(s):  
Jorge Melegati ◽  
Rafael Chanin ◽  
Afonso Sales ◽  
Rafael Prikladnicki

Abstract In this position paper, our goal is to argue the need for specific software development practices to early-stage startups. In order to reach this goal, we discuss the consequences of innovative and market-driven contexts, which are two of the key elements when describing software startups. We also argue that these practices could be applied to innovative initiatives within established companies since they share similar characteristics and challenges as those from startups.


Urology ◽  
2007 ◽  
Vol 69 (5) ◽  
pp. 941-945 ◽  
Author(s):  
Stephanie L. Snow ◽  
Rachel L. Panton ◽  
Lorna J. Butler ◽  
Derek R. Wilke ◽  
Robert D.H. Rutledge ◽  
...  

2014 ◽  
Vol 536-537 ◽  
pp. 776-781
Author(s):  
Chen Xu ◽  
Ling Long Kong

Based on the development of ship borne Automatic Identification System (AIS) and the expansion of AIS application in maritime management, in this paper, we expound AIS Development in recent years, summarize the additional content of Recommendation ITU-R M.1371-4, analyze the format of AIS message, realize the decoding of AIS message in software development environment and store the dynamic information and static information of the ship to the database, thus provide technical support in marine monitoring system.


Author(s):  
Chuanbin Wang ◽  
Bin Shi ◽  
Chao Wei ◽  
Huaming Ding ◽  
Jinfeng Gu ◽  
...  

Author(s):  
Ching-Pao Chang

Together with the development and integration of software technologies, an increase in the complexity of the software development environment has made identifying software risks challenging. Identifying software risks, which is a critical activity in project management, is challenging because numerous factors may affect software projects. In this paper, an approach to identify software-risk items is proposed in which data collected from past software projects are mined to construct software-risk models. The prediction models obtained can be used to identify potential software risks for subsequent software projects. The advantage of the proposed approach is that the software-risk models can be constructed at an early stage in software projects to facilitate the planning of methods to mitigate software risks. The proposed approach is applied to a business project to demonstrate how software risk items can be identified.


2013 ◽  
Vol 846-847 ◽  
pp. 1546-1549
Author(s):  
Chun Bo Dong

The existing emergency virtual drilling simulation system is built on a set or more sets of static database. Case is extracted from the database or randomly generated from the database according to the condition system.It is basicly static data. The happening and development of the emergency is of great uncertainty, and it is constantly changing with the change of the environment and the rescue process. This article builds a set of dynamic database in the original virtual exercise simulation system, in order to join accident flexibly in the event processing node, and simulate dynamic environment conditions at that time in a timely manner. Data processing model that is by the combination of dynamic and static model can simulate disaster occurrence and development more realisticly and accurately.


Author(s):  
Walid Al-Ahmad

Security is an important and challenging aspect that needs to be considered at an early stage during software development. Traditional software development methodologies do not deal with security issues and so there is no structured guidance for security design and development; security is usually an afterthought activity. This paper discusses the integration of XP with security activities based on the CLASP (Comprehensive Lightweight Application Security Process) methodology. This integration will help developers using XP develop secure software by applying security measures in all phases and activities, thereby minimizing the security vulnerabilities exploited by attackers.


Sign in / Sign up

Export Citation Format

Share Document