Computer Science Journals

Displaying 1-40 of 75 results

  • White Papers // Sep 2014

    Farthest Neighbor Approach for Finding Initial Centroids in K-Means

    Text document clustering is gaining popularity in the knowledge discovery field for effectively navigating, browsing and organizing large amounts of textual information into a small number of meaningful clusters. Text mining is a semi-automated process of extracting knowledge from voluminous unstructured data. A widely studied data mining problem in the...

    Provided By Computer Science Journals

  • White Papers // Sep 2014

    A Review of Agent-Oriented Development Methodologies and Programming Languages/Frameworks

    Agents are software systems and can be associated with an entity, framework, architecture and even languages. They are piece of program codes that are able to autonomously complete tasks. Before developing an agent, methodology to be used in development should be clarified and based on the methodology, suitable programming language...

    Provided By Computer Science Journals

  • White Papers // Sep 2014

    Banking and Modern Payments System Security Analysis

    Cyber-criminals have benefited from Online Banking (OB), regardless of the extensive research on financial cyber-security. To better be prepared for what the future might bring, the authors try to predict how hacking tools might evolve. They briefly survey the state-of-the-art tools developed by blackhat hackers and conclude that they could...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology

    In recent years, global Online Social Network (OSN) usage has increased sharply as these networks become interwoven into people's everyday lives as places to meet and communicate with others. Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happen to...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection

    Since its introduction in 1994 the Secure Socket Layer (SSL) protocol (later renamed to Transport Layer Security (TLS)) evolved to the de facto standard for securing the transport layer. SSL/TLS can be used for ensuring data confidentiality, integrity and authenticity during transport. A main feature of the protocol is its...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    PI-Tool To Improve Performance of Application In Multi-core Architecture

    Multi-core CPUs become increasingly popular on server-grade hardware as well as end-user desktop PCs or laptops. Necessary efforts are taken in the community towards developing applications optimized for multi-core architecture; still every user is expecting to run applications or programs with more speed than normal execution. In order to achieve...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Using GIS in Designing and Deploying Wireless Network in City Plans

    Site surveys play a very important role in the successful and efficient deployment of wireless networks. The first step is to understand the basic goal of a wireless network, which is mainly to provide an appropriate coverage and throughput to all end users with high efficiency, full coverage and reasonable...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Secure Linear Transformation Based Cryptosystem Using Dynamic Byte Substitution

    The information must be secure while transmission. Cryptography is one of the methods to attain security. Many classical cryptosystems are developed based on simple substitution. Hybrid cryptosystem using byte substitution and variable length sub key groups is a simple nonlinear algorithm but the cryptanalyst can find the length of each...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Designing An Effective Mobile-learning Model By Integrating Student Culture

    Mobile learning is a good technology because it allows communication, collaboration, and sharing information or resources among all of learning members. Mobile learning can be used as perfect solutions to support the learning process. Thither are many concepts and factors influencing effective learning results through creativity, collaboration, and communication. However,...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Relay Networks

    In IEEE 802.16j relay networks, wireless communications are carried out based on TDMA where the wireless network resources are divided into multiple time slots and they are assigned to wireless links between relay nodes as transmission opportunities. The network performance is improved by decreasing the total number of different time...

    Provided By Computer Science Journals

  • White Papers // May 2014

    A Review of RUP (Rational Unified Process)

    RUP (Rational Unified Process) is an iterative process for software development; originally proposed in 1988 as the rational objectory process. The researcher then proposed the unified process. The rational unified process can also be regarded as a software engineering process, delivered through a web-enabled, searchable knowledge base. This paper represents...

    Provided By Computer Science Journals

  • White Papers // May 2014

    DNS Advanced Attacks and Analysis

    Now-a-days DNS is used to load balance, failover, and geographically redirect connections. DNS has become so pervasive it is hard to identify a modern TCP/IP connection that does not use DNS in some way. Unfortunately, due to the reliability built into the fundamental RFC-based design of DNS, most IT professionals...

    Provided By Computer Science Journals

  • White Papers // May 2014

    A Comparative Study: Gammachirp Wavelets and Auditory Filter Using Prosodic Features of Speech Recognition In Noisy Environment

    Modern Automatic Speech Recognition (ASR) systems typically use a bank of linear filters as the first step in performing frequency analysis of speech. On the other hand, the cochlea, which is responsible for frequency analysis in the human auditory system, is known to have a compressive non-linear frequency response which...

    Provided By Computer Science Journals

  • White Papers // May 2014

    Shared Spectrum Throughput for Secondary Users

    The throughput performance of secondary users sharing radio spectrum with a licensed primary user is analyzed in this paper. An asynchronous transmission, sensing and backoff protocol is proposed for the secondary user and modeled as a six state Markov process. The model parameters are derived as a function of the...

    Provided By Computer Science Journals

  • White Papers // Mar 2014

    SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Architecture

    In this paper, the authors propose an architecture framework for interworking of Long Term Evolution (LTE), Worldwide Interoperability for Microwave Access (WiMAX) and Wireless Local Area Network (WLAN) technologies. The aim is to offer users of various networks seamless high quality IP-based multimedia services access anywhere at any time. IP...

    Provided By Computer Science Journals

  • White Papers // Mar 2014

    Password Security

    In this paper, the authors investigate users' behavior in password utilization. Good password practices are critical to the security of any information system. End users often use weak passwords that are short, simple, and based on personal and meaningful information that can be easily guessed. A survey was conducted among...

    Provided By Computer Science Journals

  • White Papers // Feb 2014

    Efficient Coercion Resistant Public Key Encryption

    The notion of deniable encryption has been known in the literature since its introduction in as coercion resistant encryption schemes that allow the user (sender and/or receiver) to escape a coercion attempted by a coercive adversary. The schemes allow the user to open fake message(s) to the coercer that when...

    Provided By Computer Science Journals

  • White Papers // Feb 2014

    E-payment Security Analysis In Depth

    Technology is the basis of the peoples' lives. The growth of the Internet has made it an ease for consumers to find items for purchase, but no longer is cash a viable way for payment. This increase in e-commerce has driven the need to create an online payment system. Unfortunately...

    Provided By Computer Science Journals

  • White Papers // Jan 2014

    Software Process Control on Ungrouped Data: Log-Power Model

    Statistical Process Control (SPC) is the best choice to monitor software reliability process. It assists the software development team to identify and actions to be taken during software failure process and hence, assures better software reliability. In this paper, the authors propose a control mechanism based on the cumulative observations...

    Provided By Computer Science Journals

  • White Papers // Dec 2013

    Aspect Oriented Programming Through C#.NET

    .NET architecture was introduced by Microsoft as a new software development environment based on components. This architecture permits for effortless integration of classical distributed programming paradigms with Web computing. .NET describes a type structure and introduces ideas such as component, objects and interface which form the vital foundation for distributed...

    Provided By Computer Science Journals

  • White Papers // Oct 2013

    Determining the Barriers Faced by Novice Programmers

    Most of the novice programmers find glitches at various phases while trying to complete a program in their Computer science programming course. These phases can be while constructing the code, finding errors in the code at the time of compilation of the program, debugging these errors while executing the program....

    Provided By Computer Science Journals

  • White Papers // Oct 2013

    Use of Cell Block As An Indent Space In Python

    Unlike most object oriented programming languages, Python does not use braces such as \"{\" and \"}\". Therefore, mixed tabs and spaces are used for indentation. However, they are causing problems in Python. Several approaches are applied to eliminate the problem that is not only for machine-readable form but also for...

    Provided By Computer Science Journals

  • White Papers // Oct 2013

    Review on Sorting Algorithms A Comparative Study

    There are many popular problems in different practical fields of computer sciences, database applications, networks and artificial intelligence. One of these basic operations and problems is sorting algorithm; the sorting problem has attracted a great deal of research. A lot of sorting algorithms has been developed to enhance the performance...

    Provided By Computer Science Journals

  • White Papers // Oct 2013

    Face Images Database Indexing for Person Identification Problem

    Face biometric data are with high dimensional features and hence, traditional searching techniques are not applicable to retrieve them. As a consequence, it is an issue to identify a person with face data from a large pool of face database in real-time. This paper addresses this issue and proposes an...

    Provided By Computer Science Journals

  • White Papers // Sep 2013

    Quality Attributes and Software Architectures Emerging Through Agile Development: Pursuit or Overlooking?

    Software architectures play an important role as an intermediate stage through which system requirements are translated into full scale working system. The idea of what a system does, what it does not, and different concerns and requirements can be negotiated and expressed clearly through the software architecture. Software architectures exist...

    Provided By Computer Science Journals

  • White Papers // Jun 2013

    Malicious Node Detection Mechanism for Wireless Ad Hoc Network

    With the popularity of intelligent electronics which rely on wireless communication in the post-PC era, computing devices have become cheaper, smaller, more mobile and more pervasive in daily lives. Construction of wireless ad hoc network becomes more and more convenient. However, the deployment of sensor nodes in an unattended environment...

    Provided By Computer Science Journals

  • White Papers // Jun 2013

    Multimodal Biometrics at Feature Level Fusion Using Texture Features

    In recent years, fusion of multiple biometric modalities for personal authentication has received considerable attention. This paper presents a feature level fusion algorithm based on texture features. The system combines fingerprint, face and off-line signature. Texture features are extracted from curvelet transform. The curvelet feature dimension is selected based on...

    Provided By Computer Science Journals

  • White Papers // May 2013

    Java Implementation based Heterogeneous Video Sequence Automated Surveillance Monitoring

    Automated video based surveillance monitoring is an essential and computationally challenging task to resolve issues in the secure access localities. This paper deals with some of the issues which are encountered in the integration surveillance monitoring in the real-life circumstances. The authors have employed video frames which are extorted from...

    Provided By Computer Science Journals

  • White Papers // May 2013

    Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment

    Cloud computing is a new and most demandable technology in communication environment. Where computing resources such as hardware or/and software are processed as service over networks. SCADA implementation within cloud environment is relatively new and demandable over real time infrastructure (industrial infrastructure).The shifting (moving) of SCADA system (applications and resources)...

    Provided By Computer Science Journals

  • White Papers // Apr 2013

    Cryptography and Authentication Placement to Provide Secure Channel for SCADA Communication

    Distributed Control Systems (DCSs) and Supervisory Control And Data Acquisition (SCADA) systems are widely used in real time industry infrastructures such as water pumping stations, gas, and oil and other real time deployments. SCADA implementation within a cloud computing environment is new and beneficial for real time infrastructures. Using cloud...

    Provided By Computer Science Journals

  • White Papers // Mar 2013

    Semantic Based Model for Text Document Clustering with Idioms

    In this paper, the authors address the task of developing an effective and efficient clustering methodology to take care of semantic structure of the text documents. A method has been developed that performs the following sequence of operations: tagging the documents for parsing, replacement of idioms with their original meaning,...

    Provided By Computer Science Journals

  • White Papers // Jan 2013

    An Android PGP Manager: Towards Bridging End-User Cryptography to Smart Phones

    The great rise in ubiquitous computing in recent years has provided great opportunities for information flow and mobile computations to facilitate the concepts of "Business on the move" to become an essential part of the authors' day-to-day activities. This paper presents a key management and an encryption application for the...

    Provided By Computer Science Journals

  • White Papers // Aug 2012

    New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment

    As a result of integration of many techniques such as grading, clustering, utilization computing and resource's sharing, cloud computing has been appeared as multi element's composition technology, it offers several computing services such as IaaS (Infrastructure as Service), PaaS (Platform as Service) and SaaS (Software as a Service) based on...

    Provided By Computer Science Journals

  • White Papers // Jun 2012

    Proposed an Integrated Model to Detect the Defect in Software Development Projects

    Currently, software quality assurance does not apply completely on the development of software industry and this leads to some challenges in the industry of software, specially, concerning cost and time consuming. While, the success of software development project depends on the application quality assurance standards, which starts by the pre-project...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    Contributors to Reduce Maintainability Cost at the Software Implementation Phase

    Software maintenance is important and difficult to measure. The cost of maintenance is the most ever during the phases of software development. One of the most critical processes in software development is the reduction of software maintainability cost based on the quality of source code during design step, however, a...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    IT & Economic Performance a Critical Review of the Empirical Data

    In this paper, the authors undertake a critical review of the research around the multi-significant issue of the correlation between the IT investments and the economic performance to both micro and macroeconomic level. This paper is to shed light on the interaction of IT with the economy, at corporate, industry...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    An Effectiveness of Human Resource Management Practices on Employee Retention in Institute of Higher Learning: - A Regression Analysis

    An effective human resource management practices namely employee empowerment, training and development, appraisal system compensation are the main factor for the success of a firm on employee retention. In this paper, the authors aim to study how employees regard importance of their empowerment, equity of compensation, job design through training...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    Rethinking Embedded System Design

    Embedded engineering is designed using objects of nature and it also interacts with nature. Therefore, it is forced to obey the laws of nature. Nature does not make any assumptions. But all their mathematical and scientific theories do. Therefore, these theories cannot be valid for embedded engineering applications. In this...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    High Availability Based Migration Analysis to Cloud Computing for High Growth Businesses

    High availability requirement of the network is becoming essential for high growth disruptive technology companies. For businesses which require migration to networks supporting scalability and high availability, it is important to analyze the various factors and the cost effectiveness for choosing the optimal solution for them. The current paper considers...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    Using Meta-modeling Graph Grammars and R-Maude to Process and Simulate LRN Models

    Currently, code mobility technology is one of the most attractive research areas. Numerous domains are concerned, many platforms are developed and interest applications are realized. However, the poorness of modeling languages to deal with code mobility at requirement phase has motivated researchers to suggest new formalisms. Among these, the users...

    Provided By Computer Science Journals

  • White Papers // May 2013

    Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment

    Cloud computing is a new and most demandable technology in communication environment. Where computing resources such as hardware or/and software are processed as service over networks. SCADA implementation within cloud environment is relatively new and demandable over real time infrastructure (industrial infrastructure).The shifting (moving) of SCADA system (applications and resources)...

    Provided By Computer Science Journals

  • White Papers // Mar 2010

    Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Network Processor

    An ideal Network Processor (NP), that is, a programmable multi-processor device must be capable of offering both the flexibility and speed required for packet processing. But current Network Processor systems generally fall short of the above benchmarks due to traffic fluctuations inherent in packet networks, and the resulting workload variation...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    Rethinking Embedded System Design

    Embedded engineering is designed using objects of nature and it also interacts with nature. Therefore, it is forced to obey the laws of nature. Nature does not make any assumptions. But all their mathematical and scientific theories do. Therefore, these theories cannot be valid for embedded engineering applications. In this...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    PI-Tool To Improve Performance of Application In Multi-core Architecture

    Multi-core CPUs become increasingly popular on server-grade hardware as well as end-user desktop PCs or laptops. Necessary efforts are taken in the community towards developing applications optimized for multi-core architecture; still every user is expecting to run applications or programs with more speed than normal execution. In order to achieve...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology

    In recent years, global Online Social Network (OSN) usage has increased sharply as these networks become interwoven into people's everyday lives as places to meet and communicate with others. Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happen to...

    Provided By Computer Science Journals

  • White Papers // Aug 2014

    Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection

    Since its introduction in 1994 the Secure Socket Layer (SSL) protocol (later renamed to Transport Layer Security (TLS)) evolved to the de facto standard for securing the transport layer. SSL/TLS can be used for ensuring data confidentiality, integrity and authenticity during transport. A main feature of the protocol is its...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Designing An Effective Mobile-learning Model By Integrating Student Culture

    Mobile learning is a good technology because it allows communication, collaboration, and sharing information or resources among all of learning members. Mobile learning can be used as perfect solutions to support the learning process. Thither are many concepts and factors influencing effective learning results through creativity, collaboration, and communication. However,...

    Provided By Computer Science Journals

  • White Papers // May 2014

    A Comparative Study: Gammachirp Wavelets and Auditory Filter Using Prosodic Features of Speech Recognition In Noisy Environment

    Modern Automatic Speech Recognition (ASR) systems typically use a bank of linear filters as the first step in performing frequency analysis of speech. On the other hand, the cochlea, which is responsible for frequency analysis in the human auditory system, is known to have a compressive non-linear frequency response which...

    Provided By Computer Science Journals

  • White Papers // Sep 2014

    Banking and Modern Payments System Security Analysis

    Cyber-criminals have benefited from Online Banking (OB), regardless of the extensive research on financial cyber-security. To better be prepared for what the future might bring, the authors try to predict how hacking tools might evolve. They briefly survey the state-of-the-art tools developed by blackhat hackers and conclude that they could...

    Provided By Computer Science Journals

  • White Papers // May 2014

    DNS Advanced Attacks and Analysis

    Now-a-days DNS is used to load balance, failover, and geographically redirect connections. DNS has become so pervasive it is hard to identify a modern TCP/IP connection that does not use DNS in some way. Unfortunately, due to the reliability built into the fundamental RFC-based design of DNS, most IT professionals...

    Provided By Computer Science Journals

  • White Papers // Feb 2014

    Efficient Coercion Resistant Public Key Encryption

    The notion of deniable encryption has been known in the literature since its introduction in as coercion resistant encryption schemes that allow the user (sender and/or receiver) to escape a coercion attempted by a coercive adversary. The schemes allow the user to open fake message(s) to the coercer that when...

    Provided By Computer Science Journals

  • White Papers // Feb 2014

    E-payment Security Analysis In Depth

    Technology is the basis of the peoples' lives. The growth of the Internet has made it an ease for consumers to find items for purchase, but no longer is cash a viable way for payment. This increase in e-commerce has driven the need to create an online payment system. Unfortunately...

    Provided By Computer Science Journals

  • White Papers // Oct 2013

    Review on Sorting Algorithms A Comparative Study

    There are many popular problems in different practical fields of computer sciences, database applications, networks and artificial intelligence. One of these basic operations and problems is sorting algorithm; the sorting problem has attracted a great deal of research. A lot of sorting algorithms has been developed to enhance the performance...

    Provided By Computer Science Journals

  • White Papers // May 2013

    Java Implementation based Heterogeneous Video Sequence Automated Surveillance Monitoring

    Automated video based surveillance monitoring is an essential and computationally challenging task to resolve issues in the secure access localities. This paper deals with some of the issues which are encountered in the integration surveillance monitoring in the real-life circumstances. The authors have employed video frames which are extorted from...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Secure Linear Transformation Based Cryptosystem Using Dynamic Byte Substitution

    The information must be secure while transmission. Cryptography is one of the methods to attain security. Many classical cryptosystems are developed based on simple substitution. Hybrid cryptosystem using byte substitution and variable length sub key groups is a simple nonlinear algorithm but the cryptanalyst can find the length of each...

    Provided By Computer Science Journals

  • White Papers // Mar 2014

    Password Security

    In this paper, the authors investigate users' behavior in password utilization. Good password practices are critical to the security of any information system. End users often use weak passwords that are short, simple, and based on personal and meaningful information that can be easily guessed. A survey was conducted among...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Using GIS in Designing and Deploying Wireless Network in City Plans

    Site surveys play a very important role in the successful and efficient deployment of wireless networks. The first step is to understand the basic goal of a wireless network, which is mainly to provide an appropriate coverage and throughput to all end users with high efficiency, full coverage and reasonable...

    Provided By Computer Science Journals

  • White Papers // Jun 2014

    Design And Evaluation of Time Slot Assignment Algorithm For IEEE 802.16j Relay Networks

    In IEEE 802.16j relay networks, wireless communications are carried out based on TDMA where the wireless network resources are divided into multiple time slots and they are assigned to wireless links between relay nodes as transmission opportunities. The network performance is improved by decreasing the total number of different time...

    Provided By Computer Science Journals

  • White Papers // May 2014

    Shared Spectrum Throughput for Secondary Users

    The throughput performance of secondary users sharing radio spectrum with a licensed primary user is analyzed in this paper. An asynchronous transmission, sensing and backoff protocol is proposed for the secondary user and modeled as a six state Markov process. The model parameters are derived as a function of the...

    Provided By Computer Science Journals

  • White Papers // Mar 2014

    SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Architecture

    In this paper, the authors propose an architecture framework for interworking of Long Term Evolution (LTE), Worldwide Interoperability for Microwave Access (WiMAX) and Wireless Local Area Network (WLAN) technologies. The aim is to offer users of various networks seamless high quality IP-based multimedia services access anywhere at any time. IP...

    Provided By Computer Science Journals

  • White Papers // Sep 2014

    Farthest Neighbor Approach for Finding Initial Centroids in K-Means

    Text document clustering is gaining popularity in the knowledge discovery field for effectively navigating, browsing and organizing large amounts of textual information into a small number of meaningful clusters. Text mining is a semi-automated process of extracting knowledge from voluminous unstructured data. A widely studied data mining problem in the...

    Provided By Computer Science Journals

  • White Papers // May 2014

    A Review of RUP (Rational Unified Process)

    RUP (Rational Unified Process) is an iterative process for software development; originally proposed in 1988 as the rational objectory process. The researcher then proposed the unified process. The rational unified process can also be regarded as a software engineering process, delivered through a web-enabled, searchable knowledge base. This paper represents...

    Provided By Computer Science Journals

  • White Papers // Jan 2014

    Software Process Control on Ungrouped Data: Log-Power Model

    Statistical Process Control (SPC) is the best choice to monitor software reliability process. It assists the software development team to identify and actions to be taken during software failure process and hence, assures better software reliability. In this paper, the authors propose a control mechanism based on the cumulative observations...

    Provided By Computer Science Journals

  • White Papers // Sep 2011

    Pareto Type II Based Software Reliability Growth Model

    The past 4 decades have seen the formulation of several software reliability growth models to predict the reliability and error content of software systems. This paper presents pareto type II model as a software reliability growth model, together with expressions for various reliability performance measures. Theory of probability, distribution function,...

    Provided By Computer Science Journals

  • White Papers // Sep 2011

    Software Effort Estimation Using Particle Swarm Optimization with Inertia Weight

    Software is the most expensive element of virtually all computer based systems. For complex custom systems, a large effort estimation error can make the difference between profit and loss. Cost (effort) Overruns can be disastrous for the developer. The basic input for the effort estimation is size of project. A...

    Provided By Computer Science Journals

  • White Papers // Dec 2011

    An Agile Software Development Framework

    Agility in software projects can be attained when software development methodologies attain to external factors and provide a framework internally for keeping software development projects focused. Developer practices are the most important factor that has to cope with the challenges. Agile development assumes a project context where the customer is...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    Contributors to Reduce Maintainability Cost at the Software Implementation Phase

    Software maintenance is important and difficult to measure. The cost of maintenance is the most ever during the phases of software development. One of the most critical processes in software development is the reduction of software maintainability cost based on the quality of source code during design step, however, a...

    Provided By Computer Science Journals

  • White Papers // Jan 2012

    Distributed Agile Development: Practices for Building Trust in Team Through Effective Communication

    Agile methods have been now widely popular and have been proved to be delivering high-quality software to the global users in shorter time frames and are effectively handling the continuous change on the requirements from the users. However, due to various reasons such as technical expertise scarcity, functional expertise scarcity,...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    Using Meta-modeling Graph Grammars and R-Maude to Process and Simulate LRN Models

    Currently, code mobility technology is one of the most attractive research areas. Numerous domains are concerned, many platforms are developed and interest applications are realized. However, the poorness of modeling languages to deal with code mobility at requirement phase has motivated researchers to suggest new formalisms. Among these, the users...

    Provided By Computer Science Journals

  • White Papers // Jun 2012

    Proposed an Integrated Model to Detect the Defect in Software Development Projects

    Currently, software quality assurance does not apply completely on the development of software industry and this leads to some challenges in the industry of software, specially, concerning cost and time consuming. While, the success of software development project depends on the application quality assurance standards, which starts by the pre-project...

    Provided By Computer Science Journals

  • White Papers // Sep 2013

    Quality Attributes and Software Architectures Emerging Through Agile Development: Pursuit or Overlooking?

    Software architectures play an important role as an intermediate stage through which system requirements are translated into full scale working system. The idea of what a system does, what it does not, and different concerns and requirements can be negotiated and expressed clearly through the software architecture. Software architectures exist...

    Provided By Computer Science Journals

  • White Papers // Oct 2013

    Determining the Barriers Faced by Novice Programmers

    Most of the novice programmers find glitches at various phases while trying to complete a program in their Computer science programming course. These phases can be while constructing the code, finding errors in the code at the time of compilation of the program, debugging these errors while executing the program....

    Provided By Computer Science Journals

  • White Papers // Oct 2013

    Use of Cell Block As An Indent Space In Python

    Unlike most object oriented programming languages, Python does not use braces such as \"{\" and \"}\". Therefore, mixed tabs and spaces are used for indentation. However, they are causing problems in Python. Several approaches are applied to eliminate the problem that is not only for machine-readable form but also for...

    Provided By Computer Science Journals

  • White Papers // Sep 2014

    A Review of Agent-Oriented Development Methodologies and Programming Languages/Frameworks

    Agents are software systems and can be associated with an entity, framework, architecture and even languages. They are piece of program codes that are able to autonomously complete tasks. Before developing an agent, methodology to be used in development should be clarified and based on the methodology, suitable programming language...

    Provided By Computer Science Journals

  • White Papers // Sep 2010

    Particle Swarm Optimization in the fine-tuning of Fuzzy Software Cost Estimation Models

    Software cost estimation deals with the financial and strategic planning of software projects. Controlling the expensive investment of software development effectively is of paramount importance. The limitation of algorithmic effort prediction models is their inability to cope with uncertainties and imprecision surrounding software projects at the early development stage. More...

    Provided By Computer Science Journals

  • White Papers // Sep 2010

    Integrating Fuzzy Mde- AT Framework For Urban Traffic Simulation

    Software modeling plays an important role in order to develop better usability and understandability of the system. This paper advocates the use of model driven language and activity oriented modeling. This paper focuses on modeling of urban traffic system using Model Driven Engineering (MDE) and Activity Theory (AT) concept. It...

    Provided By Computer Science Journals

  • White Papers // Sep 2010

    Requirement Engineering Challenges in Development of Software Applications and Selection of Customer-off-the-Shelf (COTS) Components

    Requirement engineering acts as foundation for any software and is one of the most important tasks. Entire software is supported by four pillars of requirement engineering processes. Functional and non-functional requirements work as bricks to support software edifice. Finally, design, implementation and testing add stories to construct entire software tower...

    Provided By Computer Science Journals

  • White Papers // Jan 2011

    Evaluation of QoS Based Web- Service Selection Techniques for Service Composition

    In service oriented computing, services are the basic construct that aims to facilitate building of business application in a more flexible and interoperable manner for enterprise collaboration. To satisfy the needs of clients and to adapt to changing needs, service composition is performed to compose the various capabilities of available...

    Provided By Computer Science Journals

  • White Papers // Jan 2011

    Defect Management Practices and Problems in Free/Open Source Software Projects

    With the advent of Free/Open Source Software (F/OSS) paradigm, a large number of projects are evolving that make use of F/OSS infrastructure and development practices. Defect management system is an important component in F/OSS infrastructure which maintains defect records as well as tracks their status. The defect data comprising more...

    Provided By Computer Science Journals

  • White Papers // May 2011

    Next-Generation Search Engines for Information Retrieval

    In the recent years, there have been significant advancements in the areas of scientific data management and retrieval techniques, particularly in terms of standards and protocols for archiving data and metadata. Scientific data is rich, and spread across different places. In order to integrate these pieces together, a data archive...

    Provided By Computer Science Journals