Data-Centric Business and Applications: Towards Software Development (Volume 4)
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing AG
2019
|
Schriftenreihe: | Lecture Notes on Data Engineering and Communications Technologies Ser.
v.40 |
Schlagworte: | |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (270 pages) |
ISBN: | 9783030347062 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047693035 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 220119s2019 |||| o||u| ||||||eng d | ||
020 | |a 9783030347062 |9 978-3-030-34706-2 | ||
035 | |a (ZDB-30-PQE)EBC6000770 | ||
035 | |a (ZDB-30-PAD)EBC6000770 | ||
035 | |a (ZDB-89-EBL)EBL6000770 | ||
035 | |a (OCoLC)1134074081 | ||
035 | |a (DE-599)BVBBV047693035 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 658 | |
084 | |a QH 500 |0 (DE-625)141607: |2 rvk | ||
100 | 1 | |a Poniszewska-Marańda, Aneta |e Verfasser |4 aut | |
245 | 1 | 0 | |a Data-Centric Business and Applications |b Towards Software Development (Volume 4) |
264 | 1 | |a Cham |b Springer International Publishing AG |c 2019 | |
264 | 4 | |c ©2020 | |
300 | |a 1 online resource (270 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Lecture Notes on Data Engineering and Communications Technologies Ser. |v v.40 | |
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Intro -- Preface -- Contents -- Towards a Unified Requirements Model for Distributed High Performance Computing -- 1 Introduction and Motivation -- 2 Related Work -- 3 Domain Model for Distributed HPC -- 4 Functional Requirements Model for Distributed HPC -- 5 Reliability and Security of Calculations -- 6 Summary and Future Work -- References -- Requirement Engineering as a Software Development Process -- 1 Introduction -- 2 Related Work -- 3 Key Terms of Requirements Engineering Platform -- 3.1 Key Terms: Requirements Engineering Perspective -- 3.2 Key Terms: Software Engineering Perspective -- 4 Requirements Engineering Platform Perspective -- 4.1 Project Organization on the Platform -- 4.2 Requirements Engineering Processes on the Platform -- 5 Requirement Quality Measures -- 5.1 Verification Rules -- 5.2 Validation Rules -- 5.3 Metrics -- 6 Application and Technology of Implementation -- 7 Conclusion and Future Work -- References -- Information Management System for an Administrative Office with RFID-Tagged Classified Documents -- 1 Introduction -- 2 Objectives -- 3 RFID Technology -- 4 Hardware -- 5 Software -- 6 Business Processes -- 7 System Architecture -- 8 Experimental Evaluation of System Reliability -- 9 Experimental Evaluation of System Efficiency -- 10 Conclusions -- References -- Framework for Processing Behavioral Business Rules Written in a Controlled Natural Language -- 1 Introduction -- 2 Framework Description -- 2.1 Business Vocabulary and Behavioral Business Rules -- 2.2 Framework Architecture -- 2.3 Framework Extensions -- 3 Case Study -- 4 Summary -- References -- Software Defect Prediction Using Bad Code Smells: A Systematic Literature Review -- 1 Introduction -- 2 Related Work -- 2.1 Primary Studies -- 2.2 Secondary Studies -- 3 Research Methodology -- 3.1 Research Questions -- 3.2 Search Strategy -- 3.3 Selection Process | |
505 | 8 | |a 3.4 Quality Assessment -- 3.5 Data Extraction -- 4 Results -- 4.1 Demographics -- 4.2 Code Smells and Bugginess -- 4.3 The Impact of Individual Smells -- 5 Discussion -- 6 Threats to Validity -- 7 Conclusions -- Software Development Artifacts in Large Agile Organizations: A Comparison of Scaling Agile Methods -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Frameworks that Are Being Compared -- 4.1 Nexus Framework for Scaling Scrum -- 4.2 Large Scale Scrum-LeSS -- 4.3 Scaled Agile Framework-SAFe -- 4.4 Agile Programme Management-AgilePgM -- 4.5 Scrum@Scale -- 5 Artifacts Comparison -- 6 Evaluation of Compared Methods -- 7 Discussion and Further Development -- References -- Tabu Search Algorithm for Vehicle Routing Problem with Time Windows -- 1 Introduction -- 2 Vehicle Routing Problem -- 2.1 Formal Problem Definition -- 2.2 Vehicle Routing Problem with Time Windows -- 3 Tabu Search Algorithm -- 3.1 Algorithm -- 3.2 Tabu Search for Vehicle Routing Problem -- 4 Experiments -- 4.1 Experimental Results -- 5 Summary -- References -- Code Smell Prediction Employing Machine Learning Meets Emerging Java Language Constructs -- 1 Introduction -- 2 The Reference Work -- 2.1 Collecting the Datasets -- 2.2 Tooling Approach -- 2.3 Caret Versus RWeka Approach -- 2.4 Reproduction Strategy Overview -- 2.5 Classifier Comparison -- 2.6 Learning Curves -- 2.7 Extracted Rules -- 3 Empirical Study Definition -- 3.1 Objective -- 3.2 Extending Code Smell Detection With Designite -- 3.3 Introducing Datasets Containing Projects with Newer Java Constructions -- 3.4 Filtering And retrieving Information About the Actual Use Of new Java Constructions Using The JavaParser -- 3.5 Manual Tagging -- 4 Results -- 4.1 Classifier Performance -- 4.2 Extracted Rules -- 4.3 Learning Curves -- 5 Discussion -- 6 Conclusions and Future Directions -- References | |
505 | 8 | |a Cloud Cognitive Services Based on Machine Learning Methods in Architecture of Modern Knowledge Management Solutions -- 1 Introduction -- 2 Cloud Cognitive Services Landscape -- 2.1 Machine Learning Platform as a Service -- 2.2 Automated Machine Learning -- 3 Cloud Services Providers and Support for Data and Information Processing for Use in the Knowledge Management Solution -- 3.1 Knowledge and Insights: Text Processing APIs Comparison -- 3.2 Knowledge and Insights: Image Processing APIs Comparison -- 4 Knowledge Management Processes and Information Technology Systems -- 4.1 DIKW Pyramid and Knowledge Processing Level -- 4.2 Information Systems and Cognitive Services in Model of Knowledge Formation Process -- 4.3 Information Systems-Knowledge-as-a-Service -- 4.4 Knowledge as a Data Service-Big Data Approach -- 4.5 Knowledge as a Cognitive Service-Machine Learning Approach -- 5 Architecture of IT Knowledge Management System Based on Cognitive Services -- 5.1 Method of Proposed Architecture -- 5.2 Design Evaluation of Proposed Architecture -- 6 Conclusion -- References -- Anti-Cheat Tool for Detecting Unauthorized User Interference in the Unity Engine Using Blockchain -- 1 Introduction -- 2 Classification of Cheating Methods -- 2.1 Exploiting Misplaced Trust -- 2.2 Abusing the Game Procedure -- 2.3 Exploiting Machine Intelligence -- 2.4 Modifying Client Infrastructure -- 2.5 Exploiting the Lack of Secrecy -- 2.6 Exploiting Lack of Authentication -- 2.7 Timing Cheating -- 2.8 Human Factor and Other Methods -- 2.9 Related Work -- 3 Proposed Anti-Cheat Solution -- 3.1 Detection of Interference in the Device Memory -- 3.2 Data Integrity Protection -- 3.3 Timing Cheating -- 3.4 Modifying Client Time Settings -- 4 Practical Tests -- 5 Conclusion and Future Work -- References -- Approaches to Business Analysis in Scrum at StepStone-Case Study | |
505 | 8 | |a 1 Introduction -- 2 What Is Business Analysis -- 2.1 Agile Manifesto Versus Business Analysis -- 2.2 Scrum Versus Business Analysis -- 3 Two Practical Approaches -- 3.1 Approach #1: The BA as a Member of the Development Team -- 3.2 Approach #2: BA Role Distributed -- 3.3 Refinement Process -- 3.4 Tools -- 4 Reasoning for Change -- 5 Comparison -- 6 Transition-BA Skills Improvement Program -- 6.1 Analysis of PO Challenges -- 6.2 Assessment of Programmers' Skills -- 6.3 Improvement Activities -- 6.4 Training -- 6.5 Results -- 7 Other Considerations -- 8 Summary -- 9 About the Company -- 10 About the Author -- References -- Development Method of Innovative Projects in Higher Education Based on Traditional Software Building Process -- 1 Introduction -- 2 Definition of Success Dimensions -- 3 Project Quality -- 3.1 Internal Quality -- 3.2 External Quality -- 4 Project Efficiency -- 4.1 Defining Measurements Units -- 4.2 Productivity and Efficiency Metrics -- 5 Social Factors -- 5.1 Teamwork Quality -- 5.2 Learning Outcomes and Skills -- 6 Conclusions and Discussion -- References -- Light-Weight Congestion Control for the DCCP: Implementation in the Linux Kernel -- 1 Introduction -- 2 DCCP Standards Suite -- 2.1 Ecosystem of DCCP Standards -- 2.2 Datagram Congestion Control Protocol -- 2.3 Security -- 2.4 Service Codes and NAT Traversal -- 2.5 Protocol Stack -- 3 The DCCP Implementation -- 3.1 The Architecture of DCCP Implementation -- 3.2 Connection Management -- 3.3 Data Flow -- 3.4 Socket Interface -- 4 Prototype Implementation of the Congestion Control Module -- 4.1 Current CC Implementations for DCCP in Linux Kernel -- 4.2 The Proposed Congestion Control Mechanism for the DCCP Protocol -- 4.3 Creating New Congestion Control Module -- 4.4 DCCP Features for Congestion Control -- 4.5 Extension to the Socket Interface -- 5 Conclusions -- References | |
650 | 4 | |a Industrial management | |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareentwicklung |0 (DE-588)4116522-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationsmanagement |0 (DE-588)4114012-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationssystem |0 (DE-588)4072806-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | 1 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 2 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 0 | 3 | |a Informationsmanagement |0 (DE-588)4114012-6 |D s |
689 | 0 | 4 | |a Softwareentwicklung |0 (DE-588)4116522-6 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kryvinska, Natalia |e Sonstige |4 oth | |
700 | 1 | |a Jarząbek, Stanisław |e Sonstige |4 oth | |
700 | 1 | |a Madeyski, Lech |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Poniszewska-Marańda, Aneta |t Data-Centric Business and Applications |d Cham : Springer International Publishing AG,c2019 |z 9783030347055 |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033077028 |
Datensatz im Suchindex
_version_ | 1804183179576213504 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Poniszewska-Marańda, Aneta |
author_facet | Poniszewska-Marańda, Aneta |
author_role | aut |
author_sort | Poniszewska-Marańda, Aneta |
author_variant | a p m apm |
building | Verbundindex |
bvnumber | BV047693035 |
classification_rvk | QH 500 |
collection | ZDB-30-PQE |
contents | Intro -- Preface -- Contents -- Towards a Unified Requirements Model for Distributed High Performance Computing -- 1 Introduction and Motivation -- 2 Related Work -- 3 Domain Model for Distributed HPC -- 4 Functional Requirements Model for Distributed HPC -- 5 Reliability and Security of Calculations -- 6 Summary and Future Work -- References -- Requirement Engineering as a Software Development Process -- 1 Introduction -- 2 Related Work -- 3 Key Terms of Requirements Engineering Platform -- 3.1 Key Terms: Requirements Engineering Perspective -- 3.2 Key Terms: Software Engineering Perspective -- 4 Requirements Engineering Platform Perspective -- 4.1 Project Organization on the Platform -- 4.2 Requirements Engineering Processes on the Platform -- 5 Requirement Quality Measures -- 5.1 Verification Rules -- 5.2 Validation Rules -- 5.3 Metrics -- 6 Application and Technology of Implementation -- 7 Conclusion and Future Work -- References -- Information Management System for an Administrative Office with RFID-Tagged Classified Documents -- 1 Introduction -- 2 Objectives -- 3 RFID Technology -- 4 Hardware -- 5 Software -- 6 Business Processes -- 7 System Architecture -- 8 Experimental Evaluation of System Reliability -- 9 Experimental Evaluation of System Efficiency -- 10 Conclusions -- References -- Framework for Processing Behavioral Business Rules Written in a Controlled Natural Language -- 1 Introduction -- 2 Framework Description -- 2.1 Business Vocabulary and Behavioral Business Rules -- 2.2 Framework Architecture -- 2.3 Framework Extensions -- 3 Case Study -- 4 Summary -- References -- Software Defect Prediction Using Bad Code Smells: A Systematic Literature Review -- 1 Introduction -- 2 Related Work -- 2.1 Primary Studies -- 2.2 Secondary Studies -- 3 Research Methodology -- 3.1 Research Questions -- 3.2 Search Strategy -- 3.3 Selection Process 3.4 Quality Assessment -- 3.5 Data Extraction -- 4 Results -- 4.1 Demographics -- 4.2 Code Smells and Bugginess -- 4.3 The Impact of Individual Smells -- 5 Discussion -- 6 Threats to Validity -- 7 Conclusions -- Software Development Artifacts in Large Agile Organizations: A Comparison of Scaling Agile Methods -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Frameworks that Are Being Compared -- 4.1 Nexus Framework for Scaling Scrum -- 4.2 Large Scale Scrum-LeSS -- 4.3 Scaled Agile Framework-SAFe -- 4.4 Agile Programme Management-AgilePgM -- 4.5 Scrum@Scale -- 5 Artifacts Comparison -- 6 Evaluation of Compared Methods -- 7 Discussion and Further Development -- References -- Tabu Search Algorithm for Vehicle Routing Problem with Time Windows -- 1 Introduction -- 2 Vehicle Routing Problem -- 2.1 Formal Problem Definition -- 2.2 Vehicle Routing Problem with Time Windows -- 3 Tabu Search Algorithm -- 3.1 Algorithm -- 3.2 Tabu Search for Vehicle Routing Problem -- 4 Experiments -- 4.1 Experimental Results -- 5 Summary -- References -- Code Smell Prediction Employing Machine Learning Meets Emerging Java Language Constructs -- 1 Introduction -- 2 The Reference Work -- 2.1 Collecting the Datasets -- 2.2 Tooling Approach -- 2.3 Caret Versus RWeka Approach -- 2.4 Reproduction Strategy Overview -- 2.5 Classifier Comparison -- 2.6 Learning Curves -- 2.7 Extracted Rules -- 3 Empirical Study Definition -- 3.1 Objective -- 3.2 Extending Code Smell Detection With Designite -- 3.3 Introducing Datasets Containing Projects with Newer Java Constructions -- 3.4 Filtering And retrieving Information About the Actual Use Of new Java Constructions Using The JavaParser -- 3.5 Manual Tagging -- 4 Results -- 4.1 Classifier Performance -- 4.2 Extracted Rules -- 4.3 Learning Curves -- 5 Discussion -- 6 Conclusions and Future Directions -- References Cloud Cognitive Services Based on Machine Learning Methods in Architecture of Modern Knowledge Management Solutions -- 1 Introduction -- 2 Cloud Cognitive Services Landscape -- 2.1 Machine Learning Platform as a Service -- 2.2 Automated Machine Learning -- 3 Cloud Services Providers and Support for Data and Information Processing for Use in the Knowledge Management Solution -- 3.1 Knowledge and Insights: Text Processing APIs Comparison -- 3.2 Knowledge and Insights: Image Processing APIs Comparison -- 4 Knowledge Management Processes and Information Technology Systems -- 4.1 DIKW Pyramid and Knowledge Processing Level -- 4.2 Information Systems and Cognitive Services in Model of Knowledge Formation Process -- 4.3 Information Systems-Knowledge-as-a-Service -- 4.4 Knowledge as a Data Service-Big Data Approach -- 4.5 Knowledge as a Cognitive Service-Machine Learning Approach -- 5 Architecture of IT Knowledge Management System Based on Cognitive Services -- 5.1 Method of Proposed Architecture -- 5.2 Design Evaluation of Proposed Architecture -- 6 Conclusion -- References -- Anti-Cheat Tool for Detecting Unauthorized User Interference in the Unity Engine Using Blockchain -- 1 Introduction -- 2 Classification of Cheating Methods -- 2.1 Exploiting Misplaced Trust -- 2.2 Abusing the Game Procedure -- 2.3 Exploiting Machine Intelligence -- 2.4 Modifying Client Infrastructure -- 2.5 Exploiting the Lack of Secrecy -- 2.6 Exploiting Lack of Authentication -- 2.7 Timing Cheating -- 2.8 Human Factor and Other Methods -- 2.9 Related Work -- 3 Proposed Anti-Cheat Solution -- 3.1 Detection of Interference in the Device Memory -- 3.2 Data Integrity Protection -- 3.3 Timing Cheating -- 3.4 Modifying Client Time Settings -- 4 Practical Tests -- 5 Conclusion and Future Work -- References -- Approaches to Business Analysis in Scrum at StepStone-Case Study 1 Introduction -- 2 What Is Business Analysis -- 2.1 Agile Manifesto Versus Business Analysis -- 2.2 Scrum Versus Business Analysis -- 3 Two Practical Approaches -- 3.1 Approach #1: The BA as a Member of the Development Team -- 3.2 Approach #2: BA Role Distributed -- 3.3 Refinement Process -- 3.4 Tools -- 4 Reasoning for Change -- 5 Comparison -- 6 Transition-BA Skills Improvement Program -- 6.1 Analysis of PO Challenges -- 6.2 Assessment of Programmers' Skills -- 6.3 Improvement Activities -- 6.4 Training -- 6.5 Results -- 7 Other Considerations -- 8 Summary -- 9 About the Company -- 10 About the Author -- References -- Development Method of Innovative Projects in Higher Education Based on Traditional Software Building Process -- 1 Introduction -- 2 Definition of Success Dimensions -- 3 Project Quality -- 3.1 Internal Quality -- 3.2 External Quality -- 4 Project Efficiency -- 4.1 Defining Measurements Units -- 4.2 Productivity and Efficiency Metrics -- 5 Social Factors -- 5.1 Teamwork Quality -- 5.2 Learning Outcomes and Skills -- 6 Conclusions and Discussion -- References -- Light-Weight Congestion Control for the DCCP: Implementation in the Linux Kernel -- 1 Introduction -- 2 DCCP Standards Suite -- 2.1 Ecosystem of DCCP Standards -- 2.2 Datagram Congestion Control Protocol -- 2.3 Security -- 2.4 Service Codes and NAT Traversal -- 2.5 Protocol Stack -- 3 The DCCP Implementation -- 3.1 The Architecture of DCCP Implementation -- 3.2 Connection Management -- 3.3 Data Flow -- 3.4 Socket Interface -- 4 Prototype Implementation of the Congestion Control Module -- 4.1 Current CC Implementations for DCCP in Linux Kernel -- 4.2 The Proposed Congestion Control Mechanism for the DCCP Protocol -- 4.3 Creating New Congestion Control Module -- 4.4 DCCP Features for Congestion Control -- 4.5 Extension to the Socket Interface -- 5 Conclusions -- References |
ctrlnum | (ZDB-30-PQE)EBC6000770 (ZDB-30-PAD)EBC6000770 (ZDB-89-EBL)EBL6000770 (OCoLC)1134074081 (DE-599)BVBBV047693035 |
dewey-full | 658 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658 |
dewey-search | 658 |
dewey-sort | 3658 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>09830nmm a2200601zcb4500</leader><controlfield tag="001">BV047693035</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220119s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030347062</subfield><subfield code="9">978-3-030-34706-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC6000770</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC6000770</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL6000770</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1134074081</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047693035</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QH 500</subfield><subfield code="0">(DE-625)141607:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Poniszewska-Marańda, Aneta</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data-Centric Business and Applications</subfield><subfield code="b">Towards Software Development (Volume 4)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing AG</subfield><subfield code="c">2019</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (270 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture Notes on Data Engineering and Communications Technologies Ser.</subfield><subfield code="v">v.40</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Intro -- Preface -- Contents -- Towards a Unified Requirements Model for Distributed High Performance Computing -- 1 Introduction and Motivation -- 2 Related Work -- 3 Domain Model for Distributed HPC -- 4 Functional Requirements Model for Distributed HPC -- 5 Reliability and Security of Calculations -- 6 Summary and Future Work -- References -- Requirement Engineering as a Software Development Process -- 1 Introduction -- 2 Related Work -- 3 Key Terms of Requirements Engineering Platform -- 3.1 Key Terms: Requirements Engineering Perspective -- 3.2 Key Terms: Software Engineering Perspective -- 4 Requirements Engineering Platform Perspective -- 4.1 Project Organization on the Platform -- 4.2 Requirements Engineering Processes on the Platform -- 5 Requirement Quality Measures -- 5.1 Verification Rules -- 5.2 Validation Rules -- 5.3 Metrics -- 6 Application and Technology of Implementation -- 7 Conclusion and Future Work -- References -- Information Management System for an Administrative Office with RFID-Tagged Classified Documents -- 1 Introduction -- 2 Objectives -- 3 RFID Technology -- 4 Hardware -- 5 Software -- 6 Business Processes -- 7 System Architecture -- 8 Experimental Evaluation of System Reliability -- 9 Experimental Evaluation of System Efficiency -- 10 Conclusions -- References -- Framework for Processing Behavioral Business Rules Written in a Controlled Natural Language -- 1 Introduction -- 2 Framework Description -- 2.1 Business Vocabulary and Behavioral Business Rules -- 2.2 Framework Architecture -- 2.3 Framework Extensions -- 3 Case Study -- 4 Summary -- References -- Software Defect Prediction Using Bad Code Smells: A Systematic Literature Review -- 1 Introduction -- 2 Related Work -- 2.1 Primary Studies -- 2.2 Secondary Studies -- 3 Research Methodology -- 3.1 Research Questions -- 3.2 Search Strategy -- 3.3 Selection Process</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.4 Quality Assessment -- 3.5 Data Extraction -- 4 Results -- 4.1 Demographics -- 4.2 Code Smells and Bugginess -- 4.3 The Impact of Individual Smells -- 5 Discussion -- 6 Threats to Validity -- 7 Conclusions -- Software Development Artifacts in Large Agile Organizations: A Comparison of Scaling Agile Methods -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Frameworks that Are Being Compared -- 4.1 Nexus Framework for Scaling Scrum -- 4.2 Large Scale Scrum-LeSS -- 4.3 Scaled Agile Framework-SAFe -- 4.4 Agile Programme Management-AgilePgM -- 4.5 Scrum@Scale -- 5 Artifacts Comparison -- 6 Evaluation of Compared Methods -- 7 Discussion and Further Development -- References -- Tabu Search Algorithm for Vehicle Routing Problem with Time Windows -- 1 Introduction -- 2 Vehicle Routing Problem -- 2.1 Formal Problem Definition -- 2.2 Vehicle Routing Problem with Time Windows -- 3 Tabu Search Algorithm -- 3.1 Algorithm -- 3.2 Tabu Search for Vehicle Routing Problem -- 4 Experiments -- 4.1 Experimental Results -- 5 Summary -- References -- Code Smell Prediction Employing Machine Learning Meets Emerging Java Language Constructs -- 1 Introduction -- 2 The Reference Work -- 2.1 Collecting the Datasets -- 2.2 Tooling Approach -- 2.3 Caret Versus RWeka Approach -- 2.4 Reproduction Strategy Overview -- 2.5 Classifier Comparison -- 2.6 Learning Curves -- 2.7 Extracted Rules -- 3 Empirical Study Definition -- 3.1 Objective -- 3.2 Extending Code Smell Detection With Designite -- 3.3 Introducing Datasets Containing Projects with Newer Java Constructions -- 3.4 Filtering And retrieving Information About the Actual Use Of new Java Constructions Using The JavaParser -- 3.5 Manual Tagging -- 4 Results -- 4.1 Classifier Performance -- 4.2 Extracted Rules -- 4.3 Learning Curves -- 5 Discussion -- 6 Conclusions and Future Directions -- References</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cloud Cognitive Services Based on Machine Learning Methods in Architecture of Modern Knowledge Management Solutions -- 1 Introduction -- 2 Cloud Cognitive Services Landscape -- 2.1 Machine Learning Platform as a Service -- 2.2 Automated Machine Learning -- 3 Cloud Services Providers and Support for Data and Information Processing for Use in the Knowledge Management Solution -- 3.1 Knowledge and Insights: Text Processing APIs Comparison -- 3.2 Knowledge and Insights: Image Processing APIs Comparison -- 4 Knowledge Management Processes and Information Technology Systems -- 4.1 DIKW Pyramid and Knowledge Processing Level -- 4.2 Information Systems and Cognitive Services in Model of Knowledge Formation Process -- 4.3 Information Systems-Knowledge-as-a-Service -- 4.4 Knowledge as a Data Service-Big Data Approach -- 4.5 Knowledge as a Cognitive Service-Machine Learning Approach -- 5 Architecture of IT Knowledge Management System Based on Cognitive Services -- 5.1 Method of Proposed Architecture -- 5.2 Design Evaluation of Proposed Architecture -- 6 Conclusion -- References -- Anti-Cheat Tool for Detecting Unauthorized User Interference in the Unity Engine Using Blockchain -- 1 Introduction -- 2 Classification of Cheating Methods -- 2.1 Exploiting Misplaced Trust -- 2.2 Abusing the Game Procedure -- 2.3 Exploiting Machine Intelligence -- 2.4 Modifying Client Infrastructure -- 2.5 Exploiting the Lack of Secrecy -- 2.6 Exploiting Lack of Authentication -- 2.7 Timing Cheating -- 2.8 Human Factor and Other Methods -- 2.9 Related Work -- 3 Proposed Anti-Cheat Solution -- 3.1 Detection of Interference in the Device Memory -- 3.2 Data Integrity Protection -- 3.3 Timing Cheating -- 3.4 Modifying Client Time Settings -- 4 Practical Tests -- 5 Conclusion and Future Work -- References -- Approaches to Business Analysis in Scrum at StepStone-Case Study</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1 Introduction -- 2 What Is Business Analysis -- 2.1 Agile Manifesto Versus Business Analysis -- 2.2 Scrum Versus Business Analysis -- 3 Two Practical Approaches -- 3.1 Approach #1: The BA as a Member of the Development Team -- 3.2 Approach #2: BA Role Distributed -- 3.3 Refinement Process -- 3.4 Tools -- 4 Reasoning for Change -- 5 Comparison -- 6 Transition-BA Skills Improvement Program -- 6.1 Analysis of PO Challenges -- 6.2 Assessment of Programmers' Skills -- 6.3 Improvement Activities -- 6.4 Training -- 6.5 Results -- 7 Other Considerations -- 8 Summary -- 9 About the Company -- 10 About the Author -- References -- Development Method of Innovative Projects in Higher Education Based on Traditional Software Building Process -- 1 Introduction -- 2 Definition of Success Dimensions -- 3 Project Quality -- 3.1 Internal Quality -- 3.2 External Quality -- 4 Project Efficiency -- 4.1 Defining Measurements Units -- 4.2 Productivity and Efficiency Metrics -- 5 Social Factors -- 5.1 Teamwork Quality -- 5.2 Learning Outcomes and Skills -- 6 Conclusions and Discussion -- References -- Light-Weight Congestion Control for the DCCP: Implementation in the Linux Kernel -- 1 Introduction -- 2 DCCP Standards Suite -- 2.1 Ecosystem of DCCP Standards -- 2.2 Datagram Congestion Control Protocol -- 2.3 Security -- 2.4 Service Codes and NAT Traversal -- 2.5 Protocol Stack -- 3 The DCCP Implementation -- 3.1 The Architecture of DCCP Implementation -- 3.2 Connection Management -- 3.3 Data Flow -- 3.4 Socket Interface -- 4 Prototype Implementation of the Congestion Control Module -- 4.1 Current CC Implementations for DCCP in Linux Kernel -- 4.2 The Proposed Congestion Control Mechanism for the DCCP Protocol -- 4.3 Creating New Congestion Control Module -- 4.4 DCCP Features for Congestion Control -- 4.5 Extension to the Socket Interface -- 5 Conclusions -- References</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industrial management</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationsmanagement</subfield><subfield code="0">(DE-588)4114012-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Informationsmanagement</subfield><subfield code="0">(DE-588)4114012-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kryvinska, Natalia</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jarząbek, Stanisław</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Madeyski, Lech</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Poniszewska-Marańda, Aneta</subfield><subfield code="t">Data-Centric Business and Applications</subfield><subfield code="d">Cham : Springer International Publishing AG,c2019</subfield><subfield code="z">9783030347055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033077028</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV047693035 |
illustrated | Not Illustrated |
index_date | 2024-07-03T18:57:25Z |
indexdate | 2024-07-10T09:19:20Z |
institution | BVB |
isbn | 9783030347062 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033077028 |
oclc_num | 1134074081 |
open_access_boolean | |
physical | 1 online resource (270 pages) |
psigel | ZDB-30-PQE |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Springer International Publishing AG |
record_format | marc |
series2 | Lecture Notes on Data Engineering and Communications Technologies Ser. |
spelling | Poniszewska-Marańda, Aneta Verfasser aut Data-Centric Business and Applications Towards Software Development (Volume 4) Cham Springer International Publishing AG 2019 ©2020 1 online resource (270 pages) txt rdacontent c rdamedia cr rdacarrier Lecture Notes on Data Engineering and Communications Technologies Ser. v.40 Description based on publisher supplied metadata and other sources Intro -- Preface -- Contents -- Towards a Unified Requirements Model for Distributed High Performance Computing -- 1 Introduction and Motivation -- 2 Related Work -- 3 Domain Model for Distributed HPC -- 4 Functional Requirements Model for Distributed HPC -- 5 Reliability and Security of Calculations -- 6 Summary and Future Work -- References -- Requirement Engineering as a Software Development Process -- 1 Introduction -- 2 Related Work -- 3 Key Terms of Requirements Engineering Platform -- 3.1 Key Terms: Requirements Engineering Perspective -- 3.2 Key Terms: Software Engineering Perspective -- 4 Requirements Engineering Platform Perspective -- 4.1 Project Organization on the Platform -- 4.2 Requirements Engineering Processes on the Platform -- 5 Requirement Quality Measures -- 5.1 Verification Rules -- 5.2 Validation Rules -- 5.3 Metrics -- 6 Application and Technology of Implementation -- 7 Conclusion and Future Work -- References -- Information Management System for an Administrative Office with RFID-Tagged Classified Documents -- 1 Introduction -- 2 Objectives -- 3 RFID Technology -- 4 Hardware -- 5 Software -- 6 Business Processes -- 7 System Architecture -- 8 Experimental Evaluation of System Reliability -- 9 Experimental Evaluation of System Efficiency -- 10 Conclusions -- References -- Framework for Processing Behavioral Business Rules Written in a Controlled Natural Language -- 1 Introduction -- 2 Framework Description -- 2.1 Business Vocabulary and Behavioral Business Rules -- 2.2 Framework Architecture -- 2.3 Framework Extensions -- 3 Case Study -- 4 Summary -- References -- Software Defect Prediction Using Bad Code Smells: A Systematic Literature Review -- 1 Introduction -- 2 Related Work -- 2.1 Primary Studies -- 2.2 Secondary Studies -- 3 Research Methodology -- 3.1 Research Questions -- 3.2 Search Strategy -- 3.3 Selection Process 3.4 Quality Assessment -- 3.5 Data Extraction -- 4 Results -- 4.1 Demographics -- 4.2 Code Smells and Bugginess -- 4.3 The Impact of Individual Smells -- 5 Discussion -- 6 Threats to Validity -- 7 Conclusions -- Software Development Artifacts in Large Agile Organizations: A Comparison of Scaling Agile Methods -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Frameworks that Are Being Compared -- 4.1 Nexus Framework for Scaling Scrum -- 4.2 Large Scale Scrum-LeSS -- 4.3 Scaled Agile Framework-SAFe -- 4.4 Agile Programme Management-AgilePgM -- 4.5 Scrum@Scale -- 5 Artifacts Comparison -- 6 Evaluation of Compared Methods -- 7 Discussion and Further Development -- References -- Tabu Search Algorithm for Vehicle Routing Problem with Time Windows -- 1 Introduction -- 2 Vehicle Routing Problem -- 2.1 Formal Problem Definition -- 2.2 Vehicle Routing Problem with Time Windows -- 3 Tabu Search Algorithm -- 3.1 Algorithm -- 3.2 Tabu Search for Vehicle Routing Problem -- 4 Experiments -- 4.1 Experimental Results -- 5 Summary -- References -- Code Smell Prediction Employing Machine Learning Meets Emerging Java Language Constructs -- 1 Introduction -- 2 The Reference Work -- 2.1 Collecting the Datasets -- 2.2 Tooling Approach -- 2.3 Caret Versus RWeka Approach -- 2.4 Reproduction Strategy Overview -- 2.5 Classifier Comparison -- 2.6 Learning Curves -- 2.7 Extracted Rules -- 3 Empirical Study Definition -- 3.1 Objective -- 3.2 Extending Code Smell Detection With Designite -- 3.3 Introducing Datasets Containing Projects with Newer Java Constructions -- 3.4 Filtering And retrieving Information About the Actual Use Of new Java Constructions Using The JavaParser -- 3.5 Manual Tagging -- 4 Results -- 4.1 Classifier Performance -- 4.2 Extracted Rules -- 4.3 Learning Curves -- 5 Discussion -- 6 Conclusions and Future Directions -- References Cloud Cognitive Services Based on Machine Learning Methods in Architecture of Modern Knowledge Management Solutions -- 1 Introduction -- 2 Cloud Cognitive Services Landscape -- 2.1 Machine Learning Platform as a Service -- 2.2 Automated Machine Learning -- 3 Cloud Services Providers and Support for Data and Information Processing for Use in the Knowledge Management Solution -- 3.1 Knowledge and Insights: Text Processing APIs Comparison -- 3.2 Knowledge and Insights: Image Processing APIs Comparison -- 4 Knowledge Management Processes and Information Technology Systems -- 4.1 DIKW Pyramid and Knowledge Processing Level -- 4.2 Information Systems and Cognitive Services in Model of Knowledge Formation Process -- 4.3 Information Systems-Knowledge-as-a-Service -- 4.4 Knowledge as a Data Service-Big Data Approach -- 4.5 Knowledge as a Cognitive Service-Machine Learning Approach -- 5 Architecture of IT Knowledge Management System Based on Cognitive Services -- 5.1 Method of Proposed Architecture -- 5.2 Design Evaluation of Proposed Architecture -- 6 Conclusion -- References -- Anti-Cheat Tool for Detecting Unauthorized User Interference in the Unity Engine Using Blockchain -- 1 Introduction -- 2 Classification of Cheating Methods -- 2.1 Exploiting Misplaced Trust -- 2.2 Abusing the Game Procedure -- 2.3 Exploiting Machine Intelligence -- 2.4 Modifying Client Infrastructure -- 2.5 Exploiting the Lack of Secrecy -- 2.6 Exploiting Lack of Authentication -- 2.7 Timing Cheating -- 2.8 Human Factor and Other Methods -- 2.9 Related Work -- 3 Proposed Anti-Cheat Solution -- 3.1 Detection of Interference in the Device Memory -- 3.2 Data Integrity Protection -- 3.3 Timing Cheating -- 3.4 Modifying Client Time Settings -- 4 Practical Tests -- 5 Conclusion and Future Work -- References -- Approaches to Business Analysis in Scrum at StepStone-Case Study 1 Introduction -- 2 What Is Business Analysis -- 2.1 Agile Manifesto Versus Business Analysis -- 2.2 Scrum Versus Business Analysis -- 3 Two Practical Approaches -- 3.1 Approach #1: The BA as a Member of the Development Team -- 3.2 Approach #2: BA Role Distributed -- 3.3 Refinement Process -- 3.4 Tools -- 4 Reasoning for Change -- 5 Comparison -- 6 Transition-BA Skills Improvement Program -- 6.1 Analysis of PO Challenges -- 6.2 Assessment of Programmers' Skills -- 6.3 Improvement Activities -- 6.4 Training -- 6.5 Results -- 7 Other Considerations -- 8 Summary -- 9 About the Company -- 10 About the Author -- References -- Development Method of Innovative Projects in Higher Education Based on Traditional Software Building Process -- 1 Introduction -- 2 Definition of Success Dimensions -- 3 Project Quality -- 3.1 Internal Quality -- 3.2 External Quality -- 4 Project Efficiency -- 4.1 Defining Measurements Units -- 4.2 Productivity and Efficiency Metrics -- 5 Social Factors -- 5.1 Teamwork Quality -- 5.2 Learning Outcomes and Skills -- 6 Conclusions and Discussion -- References -- Light-Weight Congestion Control for the DCCP: Implementation in the Linux Kernel -- 1 Introduction -- 2 DCCP Standards Suite -- 2.1 Ecosystem of DCCP Standards -- 2.2 Datagram Congestion Control Protocol -- 2.3 Security -- 2.4 Service Codes and NAT Traversal -- 2.5 Protocol Stack -- 3 The DCCP Implementation -- 3.1 The Architecture of DCCP Implementation -- 3.2 Connection Management -- 3.3 Data Flow -- 3.4 Socket Interface -- 4 Prototype Implementation of the Congestion Control Module -- 4.1 Current CC Implementations for DCCP in Linux Kernel -- 4.2 The Proposed Congestion Control Mechanism for the DCCP Protocol -- 4.3 Creating New Congestion Control Module -- 4.4 DCCP Features for Congestion Control -- 4.5 Extension to the Socket Interface -- 5 Conclusions -- References Industrial management Unternehmen (DE-588)4061963-1 gnd rswk-swf Softwareentwicklung (DE-588)4116522-6 gnd rswk-swf Informationsmanagement (DE-588)4114012-6 gnd rswk-swf Informationssystem (DE-588)4072806-7 gnd rswk-swf Informationstechnik (DE-588)4026926-7 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Unternehmen (DE-588)4061963-1 s Informationstechnik (DE-588)4026926-7 s Informationssystem (DE-588)4072806-7 s Informationsmanagement (DE-588)4114012-6 s Softwareentwicklung (DE-588)4116522-6 s DE-604 Kryvinska, Natalia Sonstige oth Jarząbek, Stanisław Sonstige oth Madeyski, Lech Sonstige oth Erscheint auch als Druck-Ausgabe Poniszewska-Marańda, Aneta Data-Centric Business and Applications Cham : Springer International Publishing AG,c2019 9783030347055 |
spellingShingle | Poniszewska-Marańda, Aneta Data-Centric Business and Applications Towards Software Development (Volume 4) Intro -- Preface -- Contents -- Towards a Unified Requirements Model for Distributed High Performance Computing -- 1 Introduction and Motivation -- 2 Related Work -- 3 Domain Model for Distributed HPC -- 4 Functional Requirements Model for Distributed HPC -- 5 Reliability and Security of Calculations -- 6 Summary and Future Work -- References -- Requirement Engineering as a Software Development Process -- 1 Introduction -- 2 Related Work -- 3 Key Terms of Requirements Engineering Platform -- 3.1 Key Terms: Requirements Engineering Perspective -- 3.2 Key Terms: Software Engineering Perspective -- 4 Requirements Engineering Platform Perspective -- 4.1 Project Organization on the Platform -- 4.2 Requirements Engineering Processes on the Platform -- 5 Requirement Quality Measures -- 5.1 Verification Rules -- 5.2 Validation Rules -- 5.3 Metrics -- 6 Application and Technology of Implementation -- 7 Conclusion and Future Work -- References -- Information Management System for an Administrative Office with RFID-Tagged Classified Documents -- 1 Introduction -- 2 Objectives -- 3 RFID Technology -- 4 Hardware -- 5 Software -- 6 Business Processes -- 7 System Architecture -- 8 Experimental Evaluation of System Reliability -- 9 Experimental Evaluation of System Efficiency -- 10 Conclusions -- References -- Framework for Processing Behavioral Business Rules Written in a Controlled Natural Language -- 1 Introduction -- 2 Framework Description -- 2.1 Business Vocabulary and Behavioral Business Rules -- 2.2 Framework Architecture -- 2.3 Framework Extensions -- 3 Case Study -- 4 Summary -- References -- Software Defect Prediction Using Bad Code Smells: A Systematic Literature Review -- 1 Introduction -- 2 Related Work -- 2.1 Primary Studies -- 2.2 Secondary Studies -- 3 Research Methodology -- 3.1 Research Questions -- 3.2 Search Strategy -- 3.3 Selection Process 3.4 Quality Assessment -- 3.5 Data Extraction -- 4 Results -- 4.1 Demographics -- 4.2 Code Smells and Bugginess -- 4.3 The Impact of Individual Smells -- 5 Discussion -- 6 Threats to Validity -- 7 Conclusions -- Software Development Artifacts in Large Agile Organizations: A Comparison of Scaling Agile Methods -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Frameworks that Are Being Compared -- 4.1 Nexus Framework for Scaling Scrum -- 4.2 Large Scale Scrum-LeSS -- 4.3 Scaled Agile Framework-SAFe -- 4.4 Agile Programme Management-AgilePgM -- 4.5 Scrum@Scale -- 5 Artifacts Comparison -- 6 Evaluation of Compared Methods -- 7 Discussion and Further Development -- References -- Tabu Search Algorithm for Vehicle Routing Problem with Time Windows -- 1 Introduction -- 2 Vehicle Routing Problem -- 2.1 Formal Problem Definition -- 2.2 Vehicle Routing Problem with Time Windows -- 3 Tabu Search Algorithm -- 3.1 Algorithm -- 3.2 Tabu Search for Vehicle Routing Problem -- 4 Experiments -- 4.1 Experimental Results -- 5 Summary -- References -- Code Smell Prediction Employing Machine Learning Meets Emerging Java Language Constructs -- 1 Introduction -- 2 The Reference Work -- 2.1 Collecting the Datasets -- 2.2 Tooling Approach -- 2.3 Caret Versus RWeka Approach -- 2.4 Reproduction Strategy Overview -- 2.5 Classifier Comparison -- 2.6 Learning Curves -- 2.7 Extracted Rules -- 3 Empirical Study Definition -- 3.1 Objective -- 3.2 Extending Code Smell Detection With Designite -- 3.3 Introducing Datasets Containing Projects with Newer Java Constructions -- 3.4 Filtering And retrieving Information About the Actual Use Of new Java Constructions Using The JavaParser -- 3.5 Manual Tagging -- 4 Results -- 4.1 Classifier Performance -- 4.2 Extracted Rules -- 4.3 Learning Curves -- 5 Discussion -- 6 Conclusions and Future Directions -- References Cloud Cognitive Services Based on Machine Learning Methods in Architecture of Modern Knowledge Management Solutions -- 1 Introduction -- 2 Cloud Cognitive Services Landscape -- 2.1 Machine Learning Platform as a Service -- 2.2 Automated Machine Learning -- 3 Cloud Services Providers and Support for Data and Information Processing for Use in the Knowledge Management Solution -- 3.1 Knowledge and Insights: Text Processing APIs Comparison -- 3.2 Knowledge and Insights: Image Processing APIs Comparison -- 4 Knowledge Management Processes and Information Technology Systems -- 4.1 DIKW Pyramid and Knowledge Processing Level -- 4.2 Information Systems and Cognitive Services in Model of Knowledge Formation Process -- 4.3 Information Systems-Knowledge-as-a-Service -- 4.4 Knowledge as a Data Service-Big Data Approach -- 4.5 Knowledge as a Cognitive Service-Machine Learning Approach -- 5 Architecture of IT Knowledge Management System Based on Cognitive Services -- 5.1 Method of Proposed Architecture -- 5.2 Design Evaluation of Proposed Architecture -- 6 Conclusion -- References -- Anti-Cheat Tool for Detecting Unauthorized User Interference in the Unity Engine Using Blockchain -- 1 Introduction -- 2 Classification of Cheating Methods -- 2.1 Exploiting Misplaced Trust -- 2.2 Abusing the Game Procedure -- 2.3 Exploiting Machine Intelligence -- 2.4 Modifying Client Infrastructure -- 2.5 Exploiting the Lack of Secrecy -- 2.6 Exploiting Lack of Authentication -- 2.7 Timing Cheating -- 2.8 Human Factor and Other Methods -- 2.9 Related Work -- 3 Proposed Anti-Cheat Solution -- 3.1 Detection of Interference in the Device Memory -- 3.2 Data Integrity Protection -- 3.3 Timing Cheating -- 3.4 Modifying Client Time Settings -- 4 Practical Tests -- 5 Conclusion and Future Work -- References -- Approaches to Business Analysis in Scrum at StepStone-Case Study 1 Introduction -- 2 What Is Business Analysis -- 2.1 Agile Manifesto Versus Business Analysis -- 2.2 Scrum Versus Business Analysis -- 3 Two Practical Approaches -- 3.1 Approach #1: The BA as a Member of the Development Team -- 3.2 Approach #2: BA Role Distributed -- 3.3 Refinement Process -- 3.4 Tools -- 4 Reasoning for Change -- 5 Comparison -- 6 Transition-BA Skills Improvement Program -- 6.1 Analysis of PO Challenges -- 6.2 Assessment of Programmers' Skills -- 6.3 Improvement Activities -- 6.4 Training -- 6.5 Results -- 7 Other Considerations -- 8 Summary -- 9 About the Company -- 10 About the Author -- References -- Development Method of Innovative Projects in Higher Education Based on Traditional Software Building Process -- 1 Introduction -- 2 Definition of Success Dimensions -- 3 Project Quality -- 3.1 Internal Quality -- 3.2 External Quality -- 4 Project Efficiency -- 4.1 Defining Measurements Units -- 4.2 Productivity and Efficiency Metrics -- 5 Social Factors -- 5.1 Teamwork Quality -- 5.2 Learning Outcomes and Skills -- 6 Conclusions and Discussion -- References -- Light-Weight Congestion Control for the DCCP: Implementation in the Linux Kernel -- 1 Introduction -- 2 DCCP Standards Suite -- 2.1 Ecosystem of DCCP Standards -- 2.2 Datagram Congestion Control Protocol -- 2.3 Security -- 2.4 Service Codes and NAT Traversal -- 2.5 Protocol Stack -- 3 The DCCP Implementation -- 3.1 The Architecture of DCCP Implementation -- 3.2 Connection Management -- 3.3 Data Flow -- 3.4 Socket Interface -- 4 Prototype Implementation of the Congestion Control Module -- 4.1 Current CC Implementations for DCCP in Linux Kernel -- 4.2 The Proposed Congestion Control Mechanism for the DCCP Protocol -- 4.3 Creating New Congestion Control Module -- 4.4 DCCP Features for Congestion Control -- 4.5 Extension to the Socket Interface -- 5 Conclusions -- References Industrial management Unternehmen (DE-588)4061963-1 gnd Softwareentwicklung (DE-588)4116522-6 gnd Informationsmanagement (DE-588)4114012-6 gnd Informationssystem (DE-588)4072806-7 gnd Informationstechnik (DE-588)4026926-7 gnd |
subject_GND | (DE-588)4061963-1 (DE-588)4116522-6 (DE-588)4114012-6 (DE-588)4072806-7 (DE-588)4026926-7 (DE-588)4143413-4 |
title | Data-Centric Business and Applications Towards Software Development (Volume 4) |
title_auth | Data-Centric Business and Applications Towards Software Development (Volume 4) |
title_exact_search | Data-Centric Business and Applications Towards Software Development (Volume 4) |
title_exact_search_txtP | Data-Centric Business and Applications Towards Software Development (Volume 4) |
title_full | Data-Centric Business and Applications Towards Software Development (Volume 4) |
title_fullStr | Data-Centric Business and Applications Towards Software Development (Volume 4) |
title_full_unstemmed | Data-Centric Business and Applications Towards Software Development (Volume 4) |
title_short | Data-Centric Business and Applications |
title_sort | data centric business and applications towards software development volume 4 |
title_sub | Towards Software Development (Volume 4) |
topic | Industrial management Unternehmen (DE-588)4061963-1 gnd Softwareentwicklung (DE-588)4116522-6 gnd Informationsmanagement (DE-588)4114012-6 gnd Informationssystem (DE-588)4072806-7 gnd Informationstechnik (DE-588)4026926-7 gnd |
topic_facet | Industrial management Unternehmen Softwareentwicklung Informationsmanagement Informationssystem Informationstechnik Aufsatzsammlung |
work_keys_str_mv | AT poniszewskamarandaaneta datacentricbusinessandapplicationstowardssoftwaredevelopmentvolume4 AT kryvinskanatalia datacentricbusinessandapplicationstowardssoftwaredevelopmentvolume4 AT jarzabekstanisław datacentricbusinessandapplicationstowardssoftwaredevelopmentvolume4 AT madeyskilech datacentricbusinessandapplicationstowardssoftwaredevelopmentvolume4 |