Software

TechRepublic covers the latest trends in software development and implementation.

  • White Papers // Sep 2010

    A Framework for VerifiCation of Software With Time and Probabilities

    Quantitative verification techniques are able to establish system properties such as "The probability of an airbag failing to deploy on demand" or "The expected time for a network protocol to successfully send a message packet". In this paper, the authors describe a framework for quantitative verification of software that exhibits...

    Provided By University of Glasgow

  • White Papers // Oct 2008

    iLLumina - A DL Knowledge Base for Software Engineering

    Software Engineering involves the representation and translation (concretization) of knowledge from mental models to executable language elements. This paper reports specific problems of semantic scatter and references within software engineering. The former occurs when a concept in the problem domain is represented in multiple artifacts and the latter occurs when...

    Provided By Infosys Technologies

  • White Papers // Jan 2009

    The Adoption of Web Based Cash Management Systems Technology

    The Asia-Pacific region is fast emerging as one of the global nerve-centres in the financial services marketplace. A large number of leading companies from different industries are investing heavily in this region. It stands to reason that banks will not be left behind in ensuring that they work closely with...

    Provided By Infosys Technologies

  • White Papers // Jan 2009

    Can Usability Improve Productivity in Banking?

    A good product is a usable product. Usability includes all features that make the software usable for its intended users. It encompasses installation, learning, being able to perform all intended operations of the software in the most effective manner with the quickest turnaround time, thus enhancing productivity. It also means...

    Provided By Infosys Technologies

  • White Papers // Mar 2011

    True Language-Level SQL Debugging

    The authors demonstrate Habitat, a declarative observational debugger for SQL. Habitat facilitates true language-level (not: plan-level) debugging of, probably awed, SQL queries that yield unexpected results. Users may mark arbitrary SQL sub-expressions|ranging from literals, over fragments of predicates, to entire sub-query blocks|to observe whether these evaluate as expected. From the...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2012

    Predicting Development Trajectories to Prevent Collaboration Conflicts

    The benefits of collaborative development are reduced by the cost of resolving conflicts. The authors posit that reducing the time between when developers introduce and learn about conflicts reduces this cost. They outline the state-of-the-practice of managing and resolving conflicts and describe how it can be improved by available state-of-the-art...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2011

    Leveraging Existing Instrumentation to Automatically Infer Invariant-Constrained Models

    Computer systems are often difficult to debug and understand. A common way of gaining insight into system behavior is to inspect execution logs and documentation. Unfortunately, manual inspection of logs is an arduous process and documentation is often incomplete and out of sync with the implementation. This paper presents Synoptic,...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2011

    Crystal: Precise and Unobtrusive Conflict Warnings

    During collaborative development, individual developers can create conflicts in their copies of the code. Such conflicting edits are frequent in practice, and resolving them can be costly. The authors present Crystal, a tool that proactively examines developers' code and precisely identifies and reports on textual, compilation, and behavioral conflicts. When...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2011

    Proactive Detection of Collaboration Conflicts

    Collaborative development can be hampered when conflicts arise because developers have inconsistent copies of a shared project. The authors present an approach to help developers identify and resolve conflicts early, before those conflicts become severe and before relevant changes fade away in the developers' memories. This paper presents three results....

    Provided By Association for Computing Machinery

  • White Papers // Sep 2011

    Synoptic: Studying Logged Behavior With Inferred Models

    Logging is a powerful method for capturing program activity and state during an execution. However, log inspection remains a tedious activity, with developers often piecing together what went on from multiple log lines and across many files. This paper describes Synoptic, a tool that takes logs as input and outputs...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2010

    Speculative Analysis: Exploring Future Development States of Software

    Most software tools and environments help developers analyze the present and past development states of their software systems. Few approaches have investigated the potential consequences of future actions the developers may perform. The commoditization of hardware, multi-core architectures, and cloud computing provide new potential for delivering apparently-instantaneous feedback to developers,...

    Provided By Association for Computing Machinery

  • White Papers // May 2010

    Improving Impact of Self-Adaptation and Self-Management Research Through Evaluation Methodology

    Today, self-adaptation and self-management approaches to software engineering are viewed as specialized techniques and reach a somewhat limited community. In this paper, the author overview the current state and expectation of self-adaptation and self-management impact in industry and in premier publication venues and identify what the authors, as a community,...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Synthesizing Partial Component-Level Behavior Models From System Specifications

    Initial system specifications, such as use-case scenarios and properties, only partially specify the future system. The authors posit that synthesizing partial component-level behavior models from these early specifications can improve software development practices. In this paper, they provide a novel algorithm for deriving a Modal Transition System (MTS) for individual...

    Provided By Association for Computing Machinery

  • White Papers // May 2011

    Inferring Better Contracts

    Considerable progress has been made towards automatic support for one of the principal techniques available to enhance program reliability: equipping programs with extensive contracts. The results of current contract inference tools are still often unsatisfactory in practice, especially for programmers who already apply some kind of basic Design by Contract...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    A Theory of Sampling for Continuous-Time Metric Temporal Logic

    This paper revisits the classical notion of sampling in the setting of real-time temporal logics for the modeling and analysis of systems. The relationship between the satisfiability of Metric Temporal Logic (MTL) formulas over continuous-time models and over discrete-time models is studied. It is shown to what extent discrete-time sequences...

    Provided By Association for Computing Machinery

  • White Papers // May 2013

    A New ERA of Mobile Backhaul

    To rise above the data storm and improve your bottom line, you need to prepare your backhaul networks for supporting the evolution to the next technological upgrade and the transition to heterogeneous networks comprised of both macro and metro sites. Alcatel-Lucent through its comprehensive portfolio of backhaul products and professional...

    Provided By Alcatel-Lucent

  • White Papers // Aug 2013

    Key Steps to Successfully Migrate to 802.11ac

    802.11ac is well on its way to becoming the standard for next-generation Wi-Fi. The gigabit speed, improved capacity and reliability that 802.11ac brings to wireless LANs (WLANs) are amplified as mobile users, devices and application usage continue to grow rapidly. Whether you are an early adopter who has already started...

    Provided By Alcatel-Lucent

  • White Papers // Sep 2013

    Unify Your Networks For The Mobile Enterprise Infographic

    In order for a corporation to embrace the personal cloud era, offering connectivity and quality delivery of multimedia applications everywhere on any device, it must transform to a mobile enterprise. It will need an infrastructure that includes a right sized core, pervasive WLAN, unified access and an automated network that...

    Provided By Alcatel-Lucent

  • White Papers // Sep 2013

    What to expect from 802.11ac

    With the new 802.11ac Wi-Fi technologies, the IEEE standard takes many of the best techniques the Wi-Fi industry has learned about 802.11n and has made extraordinary improvements on them. This paper provides a detailed look at these improvements such as wider channels, higher-rate modulation and higher-level MIMO.

    Provided By Alcatel-Lucent

  • White Papers // Sep 2013

    The New Next Generation Wi-Fi

    802.11ac is well on its way to becoming the standard for next-generation Wi-Fi. The gigabit speed, improved capacity and reliability that 802.11ac brings to wireless LANs (WLANs) are amplified as mobile users, devices and application usage continue to grow rapidly.

    Provided By Alcatel-Lucent

  • White Papers // Sep 2013

    Top Tips to Improving your Wireless LAN

    Ensuring that all wireless network clients get the service levels they need is a major challenge, especially when smartphones, tablets and other clients control their own connectivity and roaming decisions. Read More.

    Provided By Alcatel-Lucent

  • White Papers // Sep 2013

    The New Next Generation WiFi

    802.11ac is well on its way to becoming the standard for next-generation Wi-Fi. The gigabit speed, improved capacity and reliability that 802.11ac brings to wireless LANs (WLANs) are amplified as mobile users, devices and application usage continue to grow rapidly.

    Provided By Alcatel-Lucent

  • White Papers // Sep 2013

    Tips to Improving your Wireless LAN

    Ensuring that all wireless network clients get the service levels they need is a major challenge, especially when smartphones, tablets and other clients control their own connectivity and roaming decisions. Read More.

    Provided By Alcatel-Lucent

  • White Papers // Sep 2013

    What to expect from 802.11ac WiFi Technologies

    With the new 802.11ac Wi-Fi technologies, the IEEE standard takes many of the best techniques the Wi-Fi industry has learned about 802.11n and has made extraordinary improvements on them. This paper provides a detailed look at these improvements such as wider channels, higher-rate modulation and higher-level MIMO.

    Provided By Alcatel-Lucent

  • White Papers // Sep 2013

    The New Next Generation Wi-Fi (German)

    802.11ac is well on its way to becoming the standard for next-generation Wi-Fi. The gigabit speed, improved capacity and reliability that 802.11ac brings to wireless LANs (WLANs) are amplified as mobile users, devices and application usage continue to grow rapidly.

    Provided By Alcatel-Lucent

  • White Papers // Jan 2010

    Global Delivery Readiness Assessment

    The first step of a Readiness Assessment is determining what role offshore will play. The paper analyzes what elements of your IT workload are viable to be executed using a remote delivery model. The best-practice approach for this uses a quantitative model that will determine the suitability and relative ease...

    Provided By Syntel

  • White Papers // Jul 2009

    Multi-Path Routing in Mobile Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is a collection of mobile wireless devises or nodes that communicate with each other. These wireless devises have limited battery power, hindering long distance communication, resulting in multi-hop routing. The mobility of nodes creates further problems, making fixed routing unlikely. Solutions to this problem...

    Provided By Northern Kentucky University

  • White Papers // Feb 2010

    Intelligent Middleware

    Cisco has partnered with Frost & Sullivan to compose an industry White Paper focused on assessing the need for Intelligent Middleware and Intelligent Building Systems (IBS) solutions. Cisco is a global leader in Intelligent Building Systems and a key advocate and innovator towards the convergence of building systems and IT....

    Provided By Frost & Sullivan

  • White Papers // Apr 2009

    Data Warehouses, Metadata, and Middleware

    Middleware is software that lets systems talk to one another while hiding the complexities of network connectivity. Middleware is an important data warehouse component since it's the means by which applications communicate with the data warehouse. Middleware technology lets clients talk to servers, but more critically, it shields the application...

    Provided By Baseline Consulting Group

  • White Papers // Nov 2008

    Multi-Language Programming: Part I - An Overview

    There are several runtime environments with different programming languages available on Symbian OS. Symbian C++ is the native language of Symbian because the operating system itself is written in Symbian C++. Additionally, Java is also included as the most common runtime environment on mobile phones. More recently, Flash Lite, the...

    Provided By Symbian

  • White Papers // Mar 2010

    Enabling Service-Based Application Development Through Social Objects

    Software development is typically a social activity; development is most often performed by a team of people who must collaborate effectively. Application development enablers, such as web services and their APIs, can be viewed as social objects that can be interacted with just as one may interact with other people...

    Provided By Alcatel-Lucent

  • White Papers // Aug 2010

    Embedded SFE: Offloading Server and Network Using Hardware Tokens

    The authors consider Secure Function Evaluation (SFE) in the client server setting where the server issues a secure token to the client. The token is not trusted by the client and is not a trusted third party. This paper shows how to take advantage of the token to drastically reduce...

    Provided By Alcatel-Lucent

  • White Papers // Jul 2011

    Unlocking Network Potential

    With today's mobile application explosion and evolution to 4G Long Term Evolution (LTE) technologies, wireless service providers have an opportunity to transform their networks and services to deliver a truly next-generation Web 2.0 experience - profitably. The Alcatel-Lucent vision helps these providers take advantage of innovative business models that leverage...

    Provided By Alcatel-Lucent

  • White Papers // Apr 2011

    Beyond Core Telecommunication Businesses

    The global market for telecommunications services generated over 1.8 trillion US dollars in 2009. But service providers need to grow beyond their basic strengths - extending their brand beyond traditional telecommunications to protect and increase revenues. Application Enablement helps service providers achieve this goal, by facilitating collaboration with third-party developers...

    Provided By Alcatel-Lucent

  • White Papers // Jan 2011

    Bringing Rich Communications to the Web

    Despite the remarkable growth of online applications, Communication Service Providers (CSPs) have not yet taken full advantage of a web-based business opportunity. However, CSPs have unique strengths that can add value to today's most popular web offerings, including social network sites. The key is to find a secure, manageable way...

    Provided By Alcatel-Lucent

  • White Papers // May 2010

    High Leverage Residential Service Delivery

    The consumer market shows an expanding universe of blended multimedia applications, content and devices that revolve around the Internet. However, profit margins are shrinking because incremental revenues cannot keep up with the increasing delivery cost of high bandwidth multimedia traffic. This is not a sustainable situation for service providers and...

    Provided By Alcatel-Lucent

  • White Papers // May 2010

    Delivering Quality of Experience in Multimedia Networks

    Next-generation multimedia networks need to deliver applications with a high Quality of Experience (QoE) for users. Many network elements provide the building blocks for service delivery, and element managers provide performance data for specific network elements. However, this discrete measurement data is not sufficient to assess the overall end user...

    Provided By Alcatel-Lucent

  • White Papers // Jun 2009

    Creating More Time for Patient Care With Dynamic Communications

    Dynamic communications solutions that enable the real-time flow of information and knowledge in clinical and administrative workflows can dramatically reduce the time between a patient event and its outcome. When this time is reduced, patients receive higher quality care, outcomes are improved, clinicians are more satisfied and operations are more...

    Provided By Alcatel-Lucent

  • White Papers // Feb 2009

    Real-World Emergency Call Handling Services: Saving Lives and Reducing Costs

    This paper describes the technical solution implemented with the participation of multiple partners. One conclusion of this experience is that both e-Call Service providers and Public Safety Answering Points (PSAP) are instrumental for the deployment of automated emergency call handling. In this paper, new functional scope of PSAPs is presented...

    Provided By Alcatel-Lucent

  • White Papers // Nov 2010

    Picking Pockets on the Lawn: The Development of Tactics and Strategies in a Mobile Game

    This paper presents Treasure, an outdoor mobile multiplayer game inspired by Weiser's notion of seams, gaps and breaks in different media. Playing Treasure involves movement in and out of a wi-fi network, using PDAs to pick up virtual 'Coins' that may be scattered outside network coverage. Coins have to be...

    Provided By University of Glasgow