40,519 research outputs found

    A method for tailoring the information content of a software process model

    Get PDF
    The framework is defined for a general method for selecting a necessary and sufficient subset of a general software life cycle's information products, to support new software development process. Procedures for characterizing problem domains in general and mapping to a tailored set of life cycle processes and products is presented. An overview of the method is shown using the following steps: (1) During the problem concept definition phase, perform standardized interviews and dialogs between developer and user, and between user and customer; (2) Generate a quality needs profile of the software to be developed, based on information gathered in step 1; (3) Translate the quality needs profile into a profile of quality criteria that must be met by the software to satisfy the quality needs; (4) Map the quality criteria to set of accepted processes and products for achieving each criterion; (5) Select the information products which match or support the accepted processes and product of step 4; and (6) Select the design methodology which produces the information products selected in step 5

    Context Aware Computing for The Internet of Things: A Survey

    Get PDF
    As we are moving towards the Internet of Things (IoT), the number of sensors deployed around the world is growing at a rapid pace. Market research has shown a significant growth of sensor deployments over the past decade and has predicted a significant increment of the growth rate in the future. These sensors continuously generate enormous amounts of data. However, in order to add value to raw sensor data we need to understand it. Collection, modelling, reasoning, and distribution of context in relation to sensor data plays critical role in this challenge. Context-aware computing has proven to be successful in understanding sensor data. In this paper, we survey context awareness from an IoT perspective. We present the necessary background by introducing the IoT paradigm and context-aware fundamentals at the beginning. Then we provide an in-depth analysis of context life cycle. We evaluate a subset of projects (50) which represent the majority of research and commercial solutions proposed in the field of context-aware computing conducted over the last decade (2001-2011) based on our own taxonomy. Finally, based on our evaluation, we highlight the lessons to be learnt from the past and some possible directions for future research. The survey addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT. Our goal is not only to analyse, compare and consolidate past research work but also to appreciate their findings and discuss their applicability towards the IoT.Comment: IEEE Communications Surveys & Tutorials Journal, 201

    The circular economy: An interdisciplinary exploration of the concept and application in a global context

    Get PDF
    There have long been calls from industry for guidance in implementing strategies for sustainable development. The Circular Economy represents the most recent attempt to conceptualize the integration of economic activity and environmental wellbeing in a sustainable way. This set of ideas has been adopted by China as the basis of their economic development (included in both the 11th and the 12th ‘Five Year Plan’), escalating the concept in minds of western policymakers and NGOs. This paper traces the conceptualisations and origins of the Circular Economy, tracing its meanings, and exploring its antecedents in economics and ecology, and discusses how the Circular Economy has been operationalized in business and policy. The paper finds that while the Circular Economy places emphasis on the redesign of processes and cycling of materials, which may contribute to more sustainable business models, it also encapsulates tensions and limitations. These include an absence of the social dimension inherent in sustainable development that limits its ethical dimensions, and some unintended consequences. This leads us to propose a revised definition of the Circular Economy as “an economic model wherein planning, resourcing, procurement, production and reprocessing are designed and managed, as both process and output, to maximize ecosystem functioning and human well-being”

    A method for tailoring the information content of a software process model

    Get PDF
    The framework is defined for a general method for selecting a necessary and sufficient subset of a general software life cycle's information products, to support new software development process. Procedures for characterizing problem domains in general and mapping to a tailored set of life cycle processes and products is presented. An overview of the method is shown using the following steps: (1) During the problem concept definition phase, perform standardized interviews and dialogs between developer and user, and between user and customer; (2) Generate a quality needs profile of the software to be developed, based on information gathered in step 1; (3) Translate the quality needs profile into a profile of quality criteria that must be met by the software to satisfy the quality needs; (4) Map the quality criteria to a set of accepted processes and products for achieving each criterion; (5) select the information products which match or support the accepted processes and product of step 4; and (6) Select the design methodology which produces the information products selected in step 5

    Towards Automating the Construction & Maintenance of Attack Trees: a Feasibility Study

    Full text link
    Security risk management can be applied on well-defined or existing systems; in this case, the objective is to identify existing vulnerabilities, assess the risks and provide for the adequate countermeasures. Security risk management can also be applied very early in the system's development life-cycle, when its architecture is still poorly defined; in this case, the objective is to positively influence the design work so as to produce a secure architecture from the start. The latter work is made difficult by the uncertainties on the architecture and the multiple round-trips required to keep the risk assessment study and the system architecture aligned. This is particularly true for very large projects running over many years. This paper addresses the issues raised by those risk assessment studies performed early in the system's development life-cycle. Based on industrial experience, it asserts that attack trees can help solve the human cognitive scalability issue related to securing those large, continuously-changing system-designs. However, big attack trees are difficult to build, and even more difficult to maintain. This paper therefore proposes a systematic approach to automate the construction and maintenance of such big attack trees, based on the system's operational and logical architectures, the system's traditional risk assessment study and a security knowledge database.Comment: In Proceedings GraMSec 2014, arXiv:1404.163

    Cooperation Modeling for Integrating Organizational Change into the System Development Process

    Get PDF
    Cooperation modeling is crucial for the alignment of system development with the organizational change where the future system will operate. Since the nature of cooperative work and its changing are both knowledge-intensive and mediated through human decisions, traditional modeling approaches do not immediately provide concepts and techniques that are well suited for describing such alignment. We take advantage from “ontologies” research area to enrich semantically the representations of cooperative work enabling the generation of situated userassisted cooperative processes meta-models. In this paper we propose an ontological framework (OFCP) where not only socio-technical aspects are taken into account in the system development life cycle, but also cognitive aspects informing the design of such systems
    • 

    corecore