Dependency Link Derivation Process and Theorems of Requirements Traceability Matrix
|
|
- Brook Fitzgerald
- 5 years ago
- Views:
Transcription
1 2016 International Computer Symposium Dependency Link Derivation Process and Theorems of Requirements Traceability Matrix Wen-Tin Lee Department of Software Engineering National Kaohsiung Normal University Kaohsiung, Taiwan Abstract This work proposes traceability link derivation process and theorems to establish the trace links between system objectives, requirements, design models and system/subsystems/components. The traceability relation definitions and three kinds of traceability links are defined by adopting requirements traceability reference models. Based on the definitions and graph theory, the dependency link derivation theorems are provided to derive traceability relations of requirements traceability matrix in an automatic way. The proposed approach can be served as a basis for requirements management that can deal with the requirements traceability issues, such as degree of satisfaction, strength of dependency, dependency link direction and change impact analysis. Keywords-Requirements traceability matrix, dependency link derivation, traceability relation, requirements management. I. MOTIVATION Several studies have shown the importance of using the requirements traceability techniques to trace the requirements with other work products, such as design, source code and test cases, in the software development life-cycle [1], [2], [3], [4], [5], [6], [7], [8]. Establishing and maintaining requirements traceability usually encounter two major problems: (1) the traceability relations to be maintained are often imprecise and outof-date, and (2) the establishment of traceability relations among requirements and work products is not integrated with the development process. Several investigations have been conducted to address the requirements traceability problems, either by generating and maintaining traceability relations [9], [10], [11], [12], [13], [14], or by defining traceability models and relations [15], [1], [16]. However, two main issues are still remained to be explored: Although current approaches are supportive with the establishment of requirements traceability information, they are not systematically integrated with the development process. Although link strength and direction are crucial factors in the structuring of requirements traceability, few attempts have been made to address such issue. Inspired by the requirements traceability reference model proposed by Ramesh and Jarke [15], this work presents traceability relation definitions and link derivation theorems based on graph theory to formulating the trace relations among requirements and software work products. The proposed approach can be served as a basis of requirements traceability theory that can deal with the requirements traceability issues, such as degree of satisfaction, strength of dependency, and dependency link direction. Background work related closely to this research will be outlined in the next section. Section III describes the definitions of requirements traceability relations. Section IV illustrate the traceability link derivation process. Section V presents related work on requirements traceability. Finally, we use a algorithm to summarize the proposed approach and give a conclusion. II. BACKGROUND WORK In the proposed approach, the evolution, dependency, and satisfaction traceability links presented in the reference models [15] are adopted to establish requirements traceability among higher-level objects and lower-level objects. The traceability links are captured in a matrix that can be used to derive links automatically using the proposed theorem based on graph theory. A. Requirements Traceability Reference Model Ramesh [17] reported the factors that influence the traceability practices of high-end and low-end traceability users. The facilitating and impeding characteristics of the factors can be adopted to determine the success of traceability implementation. Following an empirical study on a wide range of traceability practices with low-end and high-end users of traceability, Ramesh and Jarke [15] presented a requirements traceability reference model comprising four submodels, namely requirements management, rationale, design allocation and compliance verification. The reference model can be tailored according to organization/project needs in order to manage requirements traceability. Their model adopts four types of traceability links, satisfies, depends-on, evolves-to and rationale and discusses issues involved in implementing each type of traceability link /16 $ IEEE DOI /ICS
2 Figure 1. Requirements Traceability Reference Model Adopted Figure 1 shows the adopted requirements traceability model which includes three kinds of traceability links, evolution, dependency, and satisfaction links, from the reference models proposed by Ramesh [15]. In figure 1, system objectives can generate requirements which means there exist generate evolution links from system objectives to requirements. In this context, system objectives are higher-level objects and requirements are lower-level objects. The requirements can satisfy system objectives in some degrees which means there exist satisfaction links from requirements to system objectives. The requirements can drive design models which can drive system/subsystems/components. In this case, the drive evolution links are identified from requirements to design models and from design models to system/subsystems/components. The design models, which can be satisfied by system/subsystems/components, can also satisfy requirements in some degree. A system objective can depend on another system objective which means there exist a dependency link between them. The requirement/design model/system/subsystem/component can also has dependency links to its related peer objects. III. DEFINITIONS OF THE REQUIREMENTS TRACEABILITY RELATIONS To capture the links between higher-level objects and lower-level objects, the three link types of traceability relations between higher-level objects and lower-level objects are in need for further evaluation. We first treat traceability links as a kind of impact relation to reflect its applicability to performing impact analysis of requirements change (see Figure 2. Link Types between Higher-level Object and Lower-level Object Definition 1). We then define the evolution, dependency, satisfaction and rationale links as a kind of impact relation between higher-level objects and lower-level objects in Definition 2. Definition 1. Let traceability relations R be the impact relations on the set of work products W defined by x R y if and only if change x may affect y for every x, y W R is transitive because if x impact y and y impact z then it follows that x impact z for every x, y, z W Definition 2. Let evolution link, satisfaction link and dependency link R be a kind of traceability relation. The relations between higher-level objects to lower-level objects are defined by 1) An evolution link from a higher-level object to a lowerlevel object is an impact relation. 2) A dependency link between higher-level objects/lowerlevel objects is an impact relation. 3) A satisfaction link from a lower-level object to a higher-level object is an impact relation. Figure 2 illustrates the traceability links between higherlevel objects and lower-level objects. In Figure 2-(a), a higher-level object evolves to a lower-level object. For example, a requirement has an evolution link to its derived design model, by changing the requirement may affect its derived design model. In Figure 2-(b), a higher-level/lower-level object depends on another higher-level/lower-level object. For example, a requirement has a dependency link to its dependent requirement, by changing the requirement may affect its dependent requirement(s). In Figure 2-(c), a lowerlevel object satisfies its related higher-level object to some degree, i.e. a requirement has a satisfaction link to its related system objective, by changing the requirement may affect its related system objective(s) IV. TRACEABILITY LINK DERIVATION PROCESS In this work, a systematic process is presented to evaluate the relations between higher-level objects and lower-level objects. Four steps are proposed to identify and evaluate 562
3 Figure 3. Traceability Link Derivation Process the relations between them, and a matrix, called traceability matrix, is divided into four sub-matrices to capture the traceability links (see Figure 3): 1) Identify Relation from Higher-level Object to Lowerlevel Object: The higher-level object to lower-level Object evolution links are identified and kept in the HL sub-matrix. 2) Identify Relation between Lower-level Objects: The dependency links between lower-level objects are identified and kept in the LL sub-matrix. 3) Evaluate Relation from Lower-level Object to Higherlevel Object: Users will be engaged to identify the satisfaction links related to lower-level object to higherlevel object 4) Analyze Relation between Higher-level Object: The dependency links between higher-level objects are derived automatically by using matrix multiplication based on the notion of graph theory. A. Identify Relation from Higher-level Object to Lower-level Object In the first phase of the traceability relation evaluation process, we begin with identifying the evolution links from higher-level object to lower-level object after they have been modelled. Since each higher-level object is evolved to its associated lower-level objects, the evolution links between are one-to-one or one-to-many relations, and are kept in the HL sub-matrix of the traceability matrix (see HL matrix in Figure 3). The (H i, L j ) entries (for i = 1,..., m, j = 1,...,n; m = number of higher-level objects, n = number of lower-level object) in traceability matrix are marked as 1 to indicate the evolution links between them. B. Identify Relation between Lower-Level Objects When there exists traceability relations between lowerlevel objects, the corresponding entries of LL sub-matrix are marked as 1 based on the dependency links between them (see LL sub-matrix in Figure 3). C. Evaluate Relation from Lower-Level Object to Higher- Level Object Traceability link strength and direction are crucial factors in the structuring of requirements traceability. The satisfaction degree of satisfaction links from lower-level object to higher-level object are evaluated to result in LH matrix. The evaluation process involves measuring the satisfaction degree of LH satisfaction links which are kept in the LH sub-matrix of the traceability matrix (see LH sub-matrix in Figure 3). To analyze the satisfaction links from lower-level to higher-level objects in the third phase of the evaluation process, we examine the relationships among higher-level objects and lower-level objects in a pairwise manner by utilizing Table I, which results in the satisfaction links in LH sub-matrix. The gauge of satisfaction values is from 1 to -1. 1/-1 means that the goal is fully satisfied/fully denied after the use case is performed. 0.2/-0.2 means that the goal is partially satisfied/partially denied after the use case is performed. 0 means that the goal is not affected after the use cases is performed. Others represent the degrees between scores listed above. Detail explanation of the rating of satisfaction degree can be found in Table I. Table I RATINGS DEFINITION OF SATISFACTION VALUES Score Explanation 1 The higher-level object is fully satisfied after the lowerlevel 0.6 The higher-level object is largely satisfied after the lowerlevel 0.2 The higher-level object is partially satisfied after the lower-level 0 The higher-level object is not affected after the lower-level -0.2 The higher-level object is partially denied after the lowerlevel -0.6 The higher-level object is largely denied after the lowerlevel -1 The higher-level object is fully denied after the lower-level 0.4, 0.8, Represent the degrees between scores listed above -0.4, -0.8 D. Analyze Relation between Higher-Level Objects In the final phase of the traceability relation evaluation process (see HH sub-matrix in Figure 3), the HH dependency links between higher-level objects are analyzed to produce HH sub-matrix. In order to derive the dependency links between higher-level objects, we formulate higher-level objects and lower-level objects as a vertex set and traceability links as edges between higher-level objects and lower-level objects in a graph. The HL, LL and LH links identified in previous sections can be captured in the HL, LL and LH sub-matrices. The dependency links between higher-level objects can be generated in the HH sub-matrix automatically using the theorems 1 and 2 based on the notion of graph 563
4 of length 2 from H i to H j with a path H i L i H j.if the (i, j)-entry > 0, then H i has a dependency link to H j, i.e. change H i may affect H j. Proof: If the (i, j)-entry of A 2 > 0, it means that there exist at least one edge sequence through the path H i L i H j. Thus H i has a evolution link to L i, and L i has a satisfaction link to H j. According to Definitions 1 and 2, evolution link and satisfaction link are a kind of impact relation which is transitive, then H i has a impact relation to H j. From Definition 2, the impact relation between higherlevel object is a dependency link, thus Hi has a dependency link to Hj which means that change H i may affect H j. Figure 4. Graph and its Adjacency Matrix theory. After the HH sub-matrix is generated, the four submatrices (HL, LL, LH and HH matrices) are all included in the traceability matrix that can be used for requirements management and change impact anlaysis. Figure 4 illustrates how the concept works behind this formulation. In Figure 4-(a), higher-level object H 1 is evolved to lower-level object L 1, which satisfies higher-level object H 2 to some degree. The adjacency matrix A of graph (a) is identified and the entries (H 1, L 1 ) and (L 1, H 2 ) are marked as 1 to indicate the evolution and satisfaction links, respectively. The entry (H 1,H 2 )ina 2, the square of matrix A, is 1, which means that there exists an edge sequence of length 2 from H 1 to H 2. This edge sequence is a path through H 1 L 1 H 2, an evolution link from H 1 L 1 and a satisfaction link from L 1 H 2, which implies a dependency link from H 1 to H 2, according to the Definitions 1 and 2. In Figure 4-(b), higher-level object H 3 is evolved to lowerlevel object L 3, and L 3 has a dependency link to lower-level object L 4, i.e. L 3 depends on L 3. L 4 has a satisfaction link with its original goal H 4. The adjacency matrix B of graph (b) is identified and the (H 4,L 4 ), (L 4,L 4 ) and (L 4,H 4 ) entries are marked as 1 to indicate the evolution, dependency and satisfaction links, respectively. The (H 3,H 4 )inb 3, the cube of matrix B, is 1, which means that there exists an edge sequence of length 3 from H 3 to H 4. This edge sequence is a path through H 3 L 3 L 4 H 4 that implies a dependency link from H 3 to H 4. Theorem 1 and 2 are given below to summarize the formulation to derive the higher-level objects to higher-level objects (HH) dependency links, which is based on the graph theory 10.1 in [18]. Dependency Link Derivation Theorem 1. Let T be a graph with vertex set H 1,..., H m,l 1,..., L n and adjacency matrix A with HL, LL and LH traceability links (m=number of higherlevel objects, n=number of lower level objects). The (i, j)- entry of A 2 (i, j = 1...m) is the number of edge sequences Dependency Link Derivation Theorem 2. Let T be a graph with vertex set H 1,..., H m,l 1,..., L n and adjacency matrix A with HL, LL and LH traceability links (m=number of higherlevel objects, n=number of lower level objects). The (i,j)- entry of A 3 (i, j = 1...n) is the number of edge sequences of length 3 from H i to H j. If the (i, j)-entry of A 3 > 0 and the (i, j)-entry of A 2 = 0, then there exists a path H i L i L j H j. Thus, H i has a dependency link to H j, i.e. change H i may affect H j. Proof: If the (i, j)-entry of A 3 > 0 and the (i, j)-entry of A 2 = 0, it means that there exists at least one edge sequence through the path H i L i L j H j. Thus H i has a evolution link to L i, L i has a dependency link to L j, and L j has a satisfaction link to H j. Since evolution link, dependency link and satisfaction link are a kind of impact relation which is transitive, H i has a impact relation to H j. From definition 2, the impact relation between higher-level object is a dependency link, thus Hi has a dependency link to Hj which means that change H i may affect H j. V. RELATED WORK Gotel and Finkelstein [2] investigated and reported the requirements traceability problems, and recommended several solutions. They observed a lack of pre-rs traceability, meaning that no traceability information was available before inclusion in the requirements specification. Dómges [16] proposed a framework of adaptable traceability environments to support the definition and usage of projectspecific trace data and strategies. The organizational learning about project-specific requirements traceability should be empowered to guide stakeholders in trace capture and usage, and support continuous process improvement. Spanoudakis et al. [9] developed a rule-based approach to automatically generate four traceability relations between requirement statement documents, use cases documents and analysis object models of a software system by using two different traceability rules, the requirements-to-object-model (RTOM) and inter-requirement rules (IREQ). 564
5 Egyed proposed a scenario-driven approach [10], [19] to generate and validate trace dependencies among model elements that are related to code. A test scenario or usage scenario are tested to generate observed traces for further trace analysis with other hypothesized traces. The new trace dependencies among model elements and code are then yielded and validated to solve the inconsistencies and incompletenesses. To address the human source issue of requirement traceability, Gotel and Finkelsten [12] presented contribution structure to locate people with their contributed artifacts in the contribution format. The social roles, role relations and commitments can be further inferred to form the personnelbased requirements traceability. Cleland-Huang et al. [14] developed an event-based traceability (EBT) approach, based on event notification, to trace and maintain the artifacts and their related links during the software lifecycle. The EBT s architecture has the following three main parts: Requirements Manager handles requirements evolution with identified change events, and triggers the events by publishing an event message when a change occurs. Event Server manages subscriptions, and receives event messages from the requirement manager. It then customizes event notifications into a specific update directive, and forwards it to the subscriber manager. Subscriber Manager receives and resolves event notifications and restores an artifact and related traceability links to a current state if necessary. Cleland-Huang [13], [20] also presented a goalcentric approach to manage non-function requirements in four steps. First, nonfunctional requirements are modeled by a softgoal interdependency graph (SIG). Second, when the changes occur, the trace links are dynamically generated using probabilistic network model, and filtered by users to remove the irrelevant ones. Third, the affected SIG elements are analyzed and evaluated to determine whether other goals are affected and still satisfied after the changes. Finally, the decision on whether to implement changes is made, and risk mitigation strategies are identified before performing the changes. VI. SUMMARY In a nutshell, the proposed approach can be summarized in Algorithm 1 which outlines the process involved in establishing a requirements traceability matrix and deriving traceability links. The higher-level objects and lower-level objects are denoted as vertex set in Theorem 1 and 2, and adjacency matrix A is used to capture the relations between higher-level objects and lower-level objects. The steps in the algorithm are described in detail below. In Step 1 of Algorithm 1, a square matrix A is created with m+n elements for m higher-level objects and n lowerlevel objects. All the entries in the matrix are initialized to 0, signifying no relation between the higher-level objects and lower-level objects. For phases 1-3 of the higher-level objects and lower-level objects evaluation process, the corresponding traceability matrix are established. The evolution links from higher-level objects to lower-level objects are identified in HL sub-matrix in Step 2. The dependency links between lower-level objects are identified in LL sub-matrix in Step 3. The satisfaction degrees S degree of LH satisfaction links are identified and normalized in LH sub-matrix in step 4. After Steps 2-4 are complete, the HH dependency links can be generated by steps 5-7 of Algorithm 1. From Theorem 1, matrix A is squared to calculate the number of links from H i to H j through the path H i L i H j in the HH submatrix of the HHSquareMatrix in Step 5. Matrix A is then cubed to obtain the number of links from H i to H j through the path H i L i L j H j in Step 6. The HH matrix is evaluated to obtain the dependency links between higherlevel objects from the HHSquareMatrix and HHCubeMatrix. In step 7, the links in the HHSquareMatrix are added first into matrix A. If no relation is found in the entries of the HHSquareMatrix, but one exists in the same entry of the HHCubeMatrix, then the links in the HHCubeMatrix are added into matrix A. The HH dependency links are established in the HH sub-matrix of matrix A. Matrix A can be further analyzed using matrix analysis methods, such as DSM partition algorithm [21], [22] to partition the matrix into blocks which include the coupled higher-level and lower-level objects, which bi-directionally influence each other owing to the loop relations among them. The matrix A can also be used to derive traceability trees [23] which can help developers to perform change impact analysis. Algorithm 1. Traceability Link Derivation Algorithm Let G be a graph with vertex set H 1,..., H m,l 1,..., L n and adjacency matrix A. 1. Establish (1) a square matrix A with m+n elements H 1,..., H m,l 1,..., L n, initialize (i, j)-entry = 0 for i = 1,..., m+n, j = 1,...,m+n (2) HHSquareMatrix and HHCubeMatrix with m elements H 1,..., H n 2. Let (i, j)-entry =1ifH i has a evolution link to L j for i=1,..., m, j=m+1,..., m+n 3. Let (i, j)-entry =1ifL i has a dependency link with L j for i = m+1,..., m+n, j = m+1,..., m+n 4. Let (i, j)-entry = S degree,ifl j satisfy H i in S degree value (for i = m+1,..., m+n, j = 1,..., n) 5. Squaring the matrix A, save the (i, j)-entry (i, j = 1...n) of the result matrix ra to HHSquareMatrix 6. Cubing the matrix A, save the (i, j)-entry (i, j = 1...n) of the result matrix ra to HHCubeMatrix 7. for each (i, j)-entry of (i, j = 1...n) of HHSquareMatrix and HHCubeMatrix do if (i, j)-entry of HHSquareMatrix > 0 add the (i, j)-entry in HHSquareMatrix to the matrix A else if (i, j)-entry of HHCubeMatrix > 0 add the (i, j)-entry in HHCubeMatrix to the matrix A end if VII. CONCLUSION To manage requirements change and analyze the impacted work products, establishing requirements traceability 565
6 relations is an inevitable feature during software development life-cycle. This work adopts requirements traceability reference models to define traceability relation definitions and three types of traceability links. The link derivation theorems are provided based on the proposed definitions and graph theory to establish the traceability links between system objectives/requirements/design models/subsystems/components in an automatic way. The proposed approach can be served as basis for a requirements traceability theory that can deal with the requirements traceability issues, such as degree of satisfaction, strength of dependency, and dependency link direction. ACKNOWLEDGMENT This study is conducted under the grant MOST E which is subsidized by the Ministry of Science and Technology REFERENCES [1] B. Ramesh and M. Edwards, Issues in the development of a requirements traceability model, in Proceedings of the International Conference on Requirements Engineering, Jan 1993, pp [2] O. C. Z. Gotel and A. C. W. Finkelstein, An analysis of the requirements traceability problem, in Proceedings of the International Conference on Requirements Engineering, Appril 1994, pp [3] B. Ramesh, T. Powers, C. Stubbs, and M. Edwards, Implementing requirements traceability: a case study, in Proceedings of the Second IEEE International Symposium on Requirements Engineering, March 1995, pp [4] R. Watkins and M. Neal, Why and how of requirements tracing, IEEE Software, vol. 11, no. 4, pp , Jul [5] J.-P. Corriveau, Traceability process for large oo projects, IEEE Computer, vol. 29, no. 9, pp , September [6] M. Jarke, Requirements tracing, Communications of the ACM, vol. 41, no. 12, pp , December [7] P. Arkley and S. Riddle, Overcoming the traceability benefit problem, in Proceedings of the th IEEE International Conference on Requirements Engineering (RE05), 2005, pp [8] J. Dick, Design traceability, IEEE Software, vol. 22, no. 6, pp , November/December [9] G. Spanoudakis, A. Zisman, E. Pe rez-minana, and P. Krause, Rule-based generation of requirements traceability relations, Journal of Systems and Software, vol. 72, no. 2, pp , [11] G. Antoniol, G. Canfora, G. Casazza, A. D. Lucia, and E. Merlo, Recovering traceability links between code and documentation, IEEE Transactions on Software Engineering, vol. 28, no. 10, pp , October [12] O. Gotel and A. Finkelstein, Extended requirements traceability: results of an industrial case study, in Proceedings of the 3rd IEEE International Symposium on Requirements Engineering, Jan 1993, pp [13] J. Cleland-Huang, R. Settimi, O. BenKhadra, E. Berezhanskaya, and S. Christina, Goal-centric traceability for managing non-functional requirements, in Proceedings of the International Conference on Software Engineering, May 2005, pp [14] J. Cleland-Huang, C. K. Chang, and M. Christensen., Eventbased traceability for managing evolutionary change, IEEE Transactions on Software Engineering, vol. 29, no. 9, pp , Septmember [15] B. Ramesh and M. Jarke, Toward reference models for requirements traceability, IEEE Transactions on Software Engineering, vol. 27, no. 1, pp , January [16] R. Dómges and K. Pohl, Adapting traceability environments to project-specific needs, Communications of the ACM, vol. 41, no. 12, pp , December [17] B. Ramesh, Factors influencing requirements traceability practice, Communications of the ACM, vol. 41, no. 12, pp , December [18] R. Garnier and J. Taylor, Discrete Mathematics for New Technology, 2nd edition. Taylor and Francis. [19] A. Egyed, Resolving uncertainties during trace analysis, in Proceedings of the 12th ACM SIGSOFT Symposium on Foundations of Software Engineering (FSE), 2004, pp [20] J. Cleland-Huang, Toward improved traceability of nonfunctional requirements, in Proceedings of the 3rd international workshop on Traceability in emerging forms of software engineering, Nomember 2005, pp [21] S.-H. Cho and S. D. Eppinger, A simulation-based process model for managing complex design projects, IEEE Transactions on Engineering Management, vol. 52, no. 3, pp , August [22] M. Danilovic and T. R. Browning, Managing complex product development projects with design structure matrices and domain mapping matrices, International Journal of Project Management, vol. 25, no. 3, pp , April [23] W.-T. Lee, W.-Y. Deng, J. Lee, and S.-J. Lee, Change impact analysis with a goal-driven traceability-based approach, Int. J. Intell. Syst., vol. 25, no. 8, pp , Aug [10] A. Egyed, A scenario-driven approach to trace dependency analysis, IEEE Transactions on Software Engineering, vol. 29, no. 2, pp , February
Towards a Model of Analyst Effort for Traceability Research
Towards a Model of Analyst for Traceability Research Alex Dekhtyar CalPoly San Luis Obispo California 1 + 1 85 756 2387 dekhtyar@calpoly.edu Jane Huffman Hayes, Matt Smith University of Kentucky Lexington
More informationRepresenting Software Traceability using UML and XTM with an investigation into Traceability Patterns
Honours Project 2005 Representing Software Traceability using UML and XTM with an investigation into Traceability Patterns David Hollings University of Cape Town Dept. of Computer Science South Africa
More informationFormulating a Software Traceability Model for Integrated Test Documentation: a Case Study
Formulating a Software Traceability Model for Integrated Test Documentation: a Case Study Azri Azmi and Suhaimi Ibrahim Abstract Software Documentation is a key of quality factor in software development
More informationAn Efficient Approach for Requirement Traceability Integrated With Software Repository
An Efficient Approach for Requirement Traceability Integrated With Software Repository P.M.G.Jegathambal, N.Balaji P.G Student, Tagore Engineering College, Chennai, India 1 Asst. Professor, Tagore Engineering
More informationAn Extensible Architecture for Enterprise-wide Automated Requirements Traceability
An Extensible Architecture for Enterprise-wide Automated Requirements Traceability Jun Lin, Chan Chou Lin 2, Joseph Amaya 3, Massimo Ilario 4, Jane Cleland-Huang 5 Center for Requirements Engineering School
More informationProvenance in Software Engineering - A Configuration Management View
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2005 Proceedings Americas Conference on Information Systems (AMCIS) 2005 Provenance in Software Engineering - A Configuration Management
More informationEA-Tracer: Identifying Traceability Links between Code Aspects and Early Aspects
EA-Tracer: Identifying Traceability Links between Code Aspects and Early Aspects ABSTRACT Alberto Sardinha INESC-ID and Instituto Superior Técnico, Technical University of Lisbon Lisbon, Portugal jose.alberto.sardinha@ist.utl.pt
More informationRequirements Change Impact Analysis Using Event Based Traceability
Requirements Change Impact Analysis Using Based Traceability R. P. Gohil, Swapan Bhattacharya, and Ravirajsinh Chauhan Abstract The growing complexities of software and the demand for shorter time to market
More informationRequirements Evolution. Ch. 6 Lecture Notes IN4MTX 113 February 2010
Requirements Evolution Ch. 6 Lecture Notes IN4MTX 113 February 2010 Chapter 6 Topics Sources of change Versions (Revisions) and Variants Configuration Management Change propagation Trace links Verifiability
More informationImpact of Dependency Graph in Software Testing
Impact of Dependency Graph in Software Testing Pardeep Kaur 1, Er. Rupinder Singh 2 1 Computer Science Department, Chandigarh University, Gharuan, Punjab 2 Assistant Professor, Computer Science Department,
More informationAn Efficient Approach for Requirement Traceability Integrated With Software Repository
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 4 (Nov. - Dec. 2013), PP 65-71 An Efficient Approach for Requirement Traceability Integrated With Software
More informationProject Management Professional (PMP ) Exam Preparation Course
Course Objective Project Management Professional (PMP ) Spring 2018 Syllabus To prepare the student for the PMP certification examination with a rigorous review of Project Management best practices that
More informationA Highly Accurate Method for Managing Missing Reads in RFID Enabled Asset Tracking
A Highly Accurate Method for Managing Missing Reads in RFID Enabled Asset Tracking Rengamathi Sankarkumar (B), Damith Ranasinghe, and Thuraiappah Sathyan Auto-ID Lab, The School of Computer Science, University
More informationIMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING
IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING Pardeep kaur 1 and Er. Rupinder Singh 2 1 Research Scholar, Dept. of Computer Science and Engineering, Chandigarh University, Gharuan, India (Email: Pardeepdharni664@gmail.com)
More informationUsing Fine-Grained Differencing to Evolve Traceability Links
Using Fine-Grained Differencing to Evolve Traceability Links Bonita Sharif and Jonathan I. Maletic Department of Computer Science Kent State University Kent Ohio 44242 {bsimoes, jmaletic}@cs.kent.edu ABSTRACT
More informationReconstructing Requirements Coverage Views from Design and Test using Traceability Recovery via LSI
Reconstructing Requirements Coverage Views from Design and Test using Traceability Recovery via LSI Marco Lormans Delft Univ. of Technology M.Lormans@ewi.tudelft.nl Arie van Deursen CWI and Delft Univ.
More informationImage Classification Using Wavelet Coefficients in Low-pass Bands
Proceedings of International Joint Conference on Neural Networks, Orlando, Florida, USA, August -7, 007 Image Classification Using Wavelet Coefficients in Low-pass Bands Weibao Zou, Member, IEEE, and Yan
More informationModel-based Run-Time Software Adaptation for Distributed Hierarchical Service Coordination
Model-based Run-Time Software Adaptation for Distributed Hierarchical Service Coordination Hassan Gomaa, Koji Hashimoto Department of Computer Science George Mason University Fairfax, VA, USA hgomaa@gmu.edu,
More informationTRACEABILITY MANAGEMENT ARCHITECTURES SUPPORTING TOTAL TRACEABILITY IN THE CONTEXT OF SOFTWARE ENGINEERING
International Book Series "Information Science and Computing" 17 TRACEABILITY MANAGEMENT ARCHITECTURES SUPPORTING TOTAL TRACEABILITY IN THE CONTEXT OF SOFTWARE ENGINEERING Héctor García, Eugenio Santos,
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.
More informationBUG TRACKING SYSTEM. November 2015 IJIRT Volume 2 Issue 6 ISSN: Kavita Department of computer science, india
BUG TRACKING SYSTEM Kavita Department of computer science, india Abstract It is important that information provided in bug reports is relevant and complete in order to help resolve bugs quickly. However,
More informationParallel Evaluation of Hopfield Neural Networks
Parallel Evaluation of Hopfield Neural Networks Antoine Eiche, Daniel Chillet, Sebastien Pillement and Olivier Sentieys University of Rennes I / IRISA / INRIA 6 rue de Kerampont, BP 818 2232 LANNION,FRANCE
More informationWorkshops. 1. SIGMM Workshop on Social Media. 2. ACM Workshop on Multimedia and Security
1. SIGMM Workshop on Social Media SIGMM Workshop on Social Media is a workshop in conjunction with ACM Multimedia 2009. With the growing of user-centric multimedia applications in the recent years, this
More informationKeywords: DSM, DMM, Process simulation, product development, process planning
0 TH INTERNATIONAL DESIGN STRUCTURE MATRIX CONFERENCE, DSM 0 NOVEMBER 00, STOCKHOLM, SWEDEN SIMULATION OF PRODUCT CHANGE EFFECTS ON THE DURATION OF DEVELOPMENT PROCESSES BASED ON THE DSM Thomas Gärtner,
More informationREPORT ON TELECOMMUNICATIONS SERVICE QUALITY WINDSTREAM FLORIDA, INC.
REPORT ON TELECOMMUNICATIONS SERVICE QUALITY For WINDSTREAM FLORIDA, INC. Alachua, Brooker, High Springs, Melrose, and Waldo s February 4 March 14, 2008 Division of Service, Safety & Consumer Assistance
More informationAspect Design Pattern for Non Functional Requirements
Aspect Design Pattern for Non Functional Requirements FAZAL-E-AMIN¹, ANSAR SIDDIQ², HAFIZ FAROOQ AHMAD³ ¹ ²International Islamic University Islamabad, Pakistan ³NUST Institute of Information Technology,
More informationAn Introduction to Graph Theory
An Introduction to Graph Theory CIS008-2 Logic and Foundations of Mathematics David Goodwin david.goodwin@perisic.com 12:00, Friday 17 th February 2012 Outline 1 Graphs 2 Paths and cycles 3 Graphs and
More informationTaxonomy Dimensions of Complexity Metrics
96 Int'l Conf. Software Eng. Research and Practice SERP'15 Taxonomy Dimensions of Complexity Metrics Bouchaib Falah 1, Kenneth Magel 2 1 Al Akhawayn University, Ifrane, Morocco, 2 North Dakota State University,
More informationSome Results on the Incidence Coloring Number of Chordal Rings *
Some Results on the Incidence Coloring Number of Chordal Rings * Kung-Fu Ding, Kung-Jui Pai,+ and Ro-Yu Wu Department of Industrial Engineering and Management, Ming Chi University of Technology, New Taipei
More informationFinancial Planning Institute of Southern Africa SETTING THE STANDARD. Continuous Professional Development (Cpd) Policy
FPI FPI Financial Planning Institute of Southern Africa SETTING THE STANDARD Continuous Professional Development (Cpd) Policy Table of Contents Definitions 3-4 Introduction 4 Primary Responsibility 5 Mandatory
More informationUSTGlobal INNOVATION INFORMATION TECHNOLOGY. Using a Test Design Tool to become a Digital Organization
USTGlobal INNOVATION INFORMATION TECHNOLOGY Using a Test Design Tool to become a Digital Organization Overview: Automating test design reduces efforts and increases quality Automated testing resolves most
More informationIntroducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence
Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence Ratko Orlandic Department of Computer Science and Applied Math Illinois Institute of Technology
More informationSingularity Analysis of an Extensible Kinematic Architecture: Assur Class N, Order N 1
David H. Myszka e-mail: dmyszka@udayton.edu Andrew P. Murray e-mail: murray@notes.udayton.edu University of Dayton, Dayton, OH 45469 James P. Schmiedeler The Ohio State University, Columbus, OH 43210 e-mail:
More informationEmpirical Study on Impact of Developer Collaboration on Source Code
Empirical Study on Impact of Developer Collaboration on Source Code Akshay Chopra University of Waterloo Waterloo, Ontario a22chopr@uwaterloo.ca Parul Verma University of Waterloo Waterloo, Ontario p7verma@uwaterloo.ca
More informationGraph similarity. Laura Zager and George Verghese EECS, MIT. March 2005
Graph similarity Laura Zager and George Verghese EECS, MIT March 2005 Words you won t hear today impedance matching thyristor oxide layer VARs Some quick definitions GV (, E) a graph G V the set of vertices
More informationOpenChain Conformance 2016-H1 Specification
Contents Introduction... 3 Definitions... 4 Requirements... 5 G1: Know Your FOSS Responsibilities... 5 G2: Assign Responsibility for Achieving Compliance... 6 G3: Review and Approve FOSS Content... 7 G4:
More informationWeb Data mining-a Research area in Web usage mining
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 1 (Jul. - Aug. 2013), PP 22-26 Web Data mining-a Research area in Web usage mining 1 V.S.Thiyagarajan,
More informationGENERALIZED TRACEABILITY CODES
U.P.B. Sci. Bull., Series A, Vol. 78, Iss. 2, 2016 ISSN 1223-7027 GENERALIZED TRACEABILITY CODES Majid MAZROOEI 1, Ali ZAGHIAN 2 In this paper, we introduce generalizations of frameproof, secure frameproof,
More informationUsing ITIL to Measure Your BCP
Using ITIL to Measure Your BCP 1 Agenda ITIL v3 Overview Why Use ITIL ITIL Continual Improvement Process Critical Success Factors and Key Performance Indicators Creating Metrics Scoring System Sample BCP
More informationWhite Box Testing with Object Oriented programming
White Box Testing with Object Oriented programming Mrs.Randive R.B 1, Mrs.Bansode S.Y 2 1,2 TPCT S College Of Engineering,Osmanabad Abstract:-Software testing is one of the best means to affirm the quality
More informationInferring Variable Labels Considering Co-occurrence of Variable Labels in Data Jackets
2016 IEEE 16th International Conference on Data Mining Workshops Inferring Variable Labels Considering Co-occurrence of Variable Labels in Data Jackets Teruaki Hayashi Department of Systems Innovation
More informationIntegrated Framework for Automating the Structural Design Iteration
Integrated Framework for Automating the Structural Design Iteration P. Mujumdar a and J.U. Maheswari b a,b Department of Civil Engineering, Indian Institute of Technology Delhi, India E-mail: purvamujumdar@gmail.com
More informationREGULAR GRAPHS OF GIVEN GIRTH. Contents
REGULAR GRAPHS OF GIVEN GIRTH BROOKE ULLERY Contents 1. Introduction This paper gives an introduction to the area of graph theory dealing with properties of regular graphs of given girth. A large portion
More informationA Novel Method for the Comparison of Graphical Data Models
3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS DEVELOPMENT (ISD01 CROATIA) A Novel Method for the Comparison of Graphical Data Models Katarina Tomičić-Pupek University of Zagreb, Faculty of Organization
More information350 Index 2005 GOAL/QPC
Index abstract testing, 274 acceptance criteria, 270 acceptance tests, 270 activity diagrams, 113, 114, 174-175, 321 actor catalog, 144 actor description, 144 actor hierarchy, 148 actor map, 59, 114, 144,
More informationOverview of SBSE. CS454, Autumn 2017 Shin Yoo
Overview of SBSE CS454, Autumn 2017 Shin Yoo Search-Based Software Engineering Application of all the optimisation techniques we have seen so far, to the various problems in software engineering. Not web
More informationDSM (Dependency/Design Structure Matrix)
DSM (Dependency/Design Structure Matrix) L T JayPrakash Courtsey: DSMweb.org Organization of the Talk 1 Different DSM Types How to Read a DSM Building and Creating a DSM Hands-on Exercises Operations on
More informationTesting! Prof. Leon Osterweil! CS 520/620! Spring 2013!
Testing Prof. Leon Osterweil CS 520/620 Spring 2013 Relations and Analysis A software product consists of A collection of (types of) artifacts Related to each other by myriad Relations The relations are
More informationOG0-091 Q&As TOGAF 9 Part 1
CertBus.com OG0-091 Q&As TOGAF 9 Part 1 Pass The Open Group OG0-091 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance
More informationSummary of Raptor Codes
Summary of Raptor Codes Tracey Ho October 29, 2003 1 Introduction This summary gives an overview of Raptor Codes, the latest class of codes proposed for reliable multicast in the Digital Fountain model.
More informationStar Decompositions of the Complete Split Graph
University of Dayton ecommons Honors Theses University Honors Program 4-016 Star Decompositions of the Complete Split Graph Adam C. Volk Follow this and additional works at: https://ecommons.udayton.edu/uhp_theses
More informationObstacle-Aware Longest-Path Routing with Parallel MILP Solvers
, October 20-22, 2010, San Francisco, USA Obstacle-Aware Longest-Path Routing with Parallel MILP Solvers I-Lun Tseng, Member, IAENG, Huan-Wen Chen, and Che-I Lee Abstract Longest-path routing problems,
More informationTaccumulation of the social network data has raised
International Journal of Advanced Research in Social Sciences, Environmental Studies & Technology Hard Print: 2536-6505 Online: 2536-6513 September, 2016 Vol. 2, No. 1 Review Social Network Analysis and
More informationBipolar Fuzzy Line Graph of a Bipolar Fuzzy Hypergraph
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 1 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0002 Bipolar Fuzzy Line Graph of a
More informationUnsupervised Clustering of Requirements
Technology Volume 1, Issue 2, October-December, 2013, pp. 183-188, IASTER 2013 www.iaster.com, Online: 2347-5099, Print: 2348-0009 Unsupervised Clustering of Requirements 1 B. Saranya, 2 R. Subha, 3 Dr.S.
More informationThe Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements
Journal of Software Engineering and Applications, 2016, 9, 112-127 Published Online April 2016 in SciRes. http://www.scirp.org/journal/jsea http://dx.doi.org/10.4236/jsea.2016.94010 The Analysis and Proposed
More informationStable sets, corner polyhedra and the Chvátal closure
Stable sets, corner polyhedra and the Chvátal closure Manoel Campêlo Departamento de Estatística e Matemática Aplicada, Universidade Federal do Ceará, Brazil, mcampelo@lia.ufc.br. Gérard Cornuéjols Tepper
More informationModeling Issues Modeling Enterprises. Modeling
Modeling Issues Modeling Enterprises SE502: Software Requirements Engineering Modeling Modeling can guide elicitation: It can help you figure out what questions to ask It can help to surface hidden requirements
More informationCYBER SECURITY POLICY REVISION: 12
1. General 1.1. Purpose 1.1.1. To manage and control the risk to the reliable operation of the Bulk Electric System (BES) located within the service territory footprint of Emera Maine (hereafter referred
More informationIntegrated Cyber Defense Working Group (ICD WG) Introduction
Integrated Cyber Defense Working Group (ICD WG) Introduction Cory Huyssoon Allison Cline October 16, 2017 2017 by The Johns Hopkins Applied Physics Laboratory. Material is made available under the Creative
More informationOpenChain Specification Version 1.3 (DRAFT)
OpenChain Specification Version 1.3 (DRAFT) 2018.10.14 DRAFT: This is the draft of the next version 1.3 of the OpenChain specification. Recommended changes to be made over the current released version
More informationA method for solving unbalanced intuitionistic fuzzy transportation problems
Notes on Intuitionistic Fuzzy Sets ISSN 1310 4926 Vol 21, 2015, No 3, 54 65 A method for solving unbalanced intuitionistic fuzzy transportation problems P Senthil Kumar 1 and R Jahir Hussain 2 1 PG and
More informationAttribute-Driven Design
Attribute-Driven Design Minsoo Ryu Hanyang University msryu@hanyang.ac.kr Attribute-Driven Design The ADD method is an approach to defining a software architecture in which the design process is based
More informationCompression of RADARSAT Data with Block Adaptive Wavelets Abstract: 1. Introduction
Compression of RADARSAT Data with Block Adaptive Wavelets Ian Cumming and Jing Wang Department of Electrical and Computer Engineering The University of British Columbia 2356 Main Mall, Vancouver, BC, Canada
More informationDSM Modelling for Digital Design Using Verilog HDL
DSM Modelling for Digital Design Using Verilog HDL Xing Xue 1, Yao Chen 2, and Junchao Wei 3 1 Faculty of economics and management, ShangLuo University, 726000 ShangLuo, China, chenyao3505@gmail.com 2
More informationSynology Security Whitepaper
Synology Security Whitepaper 1 Table of Contents Introduction 3 Security Policy 4 DiskStation Manager Life Cycle Severity Ratings Standards Security Program 10 Product Security Incident Response Team Bounty
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationIPv6 Migration Framework Case of Institutions in Ethiopia
IPv6 Migration Framework Case of Institutions in Ethiopia Kidist Mekonnen Zemen Bank, Addis Ababa, Ethiopia kidistmt@yahoo.com Taye Abdulkadir HiLCoE School of Computer Science and Technology, Addis Ababa,
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationA Modified Inertial Method for Loop-free Decomposition of Acyclic Directed Graphs
MACRo 2015-5 th International Conference on Recent Achievements in Mechatronics, Automation, Computer Science and Robotics A Modified Inertial Method for Loop-free Decomposition of Acyclic Directed Graphs
More informationTraceability for Managing Evolutionary Change
Traceability for Managing Evolutionary Change Patrick Maeder, Matthias Riebisch and Ilka Philippow Technical University of Ilmenau Department of Software Systems/Process Informatics D-98693 Ilmenau, Germany
More informationIntroduction to Triangulated Graphs. Tandy Warnow
Introduction to Triangulated Graphs Tandy Warnow Topics for today Triangulated graphs: theorems and algorithms (Chapters 11.3 and 11.9) Examples of triangulated graphs in phylogeny estimation (Chapters
More informationUsing Reverse Semantic Traceability for Quality Control in Agile MSFbased
Using Reverse Semantic Traceability for Quality Control in Agile MSFbased Projects Konstantin Zhereb1, Vladimir Pavlov1, Anatoliy Doroshenko 1, and Victor Sergienko 1 1International Software & Productivity
More information2 nd UML 2 Semantics Symposium: Formal Semantics for UML
2 nd UML 2 Semantics Symposium: Formal Semantics for UML Manfred Broy 1, Michelle L. Crane 2, Juergen Dingel 2, Alan Hartman 3, Bernhard Rumpe 4, and Bran Selic 5 1 Technische Universität München, Germany
More informationString Vector based KNN for Text Categorization
458 String Vector based KNN for Text Categorization Taeho Jo Department of Computer and Information Communication Engineering Hongik University Sejong, South Korea tjo018@hongik.ac.kr Abstract This research
More informationNetwork Topology for the Application Research of Electrical Control System Fault Propagation
Available online at www.sciencedirect.com Procedia Engineering 15 (2011 1748 1752 Advanced in Control Engineering and Information Science Network Topology for the Application Research of Electrical Control
More informationLeveraging Transitive Relations for Crowdsourced Joins*
Leveraging Transitive Relations for Crowdsourced Joins* Jiannan Wang #, Guoliang Li #, Tim Kraska, Michael J. Franklin, Jianhua Feng # # Department of Computer Science, Tsinghua University, Brown University,
More informationDEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS
DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS Todd Waskiewicz and Peter LaMonica Air Force Research Laboratory Information and Intelligence Exploitation Division {Todd.Waskiewicz,
More informationA Rough Set Approach for Generation and Validation of Rules for Missing Attribute Values of a Data Set
A Rough Set Approach for Generation and Validation of Rules for Missing Attribute Values of a Data Set Renu Vashist School of Computer Science and Engineering Shri Mata Vaishno Devi University, Katra,
More informationA Forward-Secure Signature with Backward-Secure Detection
A Forward-Secure Signature with Backward-Secure Detection Dai-Rui Lin and Chih-I Wang Department of Computer Science and Engineering National Sun Yat-sen University, Kaohsiung 804, Taiwan June 17, 2007
More informationInformation modeling and reengineering for product development process
ISSN 1 746-7233, England, UK International Journal of Management Science and Engineering Management Vol. 2 (2007) No. 1, pp. 64-74 Information modeling and reengineering for product development process
More informationGenerating (n,2) De Bruijn Sequences with Some Balance and Uniformity Properties. Abstract
Generating (n,) De Bruijn Sequences with Some Balance and Uniformity Properties Yi-Chih Hsieh, Han-Suk Sohn, and Dennis L. Bricker Department of Industrial Management, National Huwei Institute of Technology,
More informationMulti-color graph pebbling
Multi-color graph pebbling DIMACS REU Final Presentation CJ Verbeck DIMACS REU, Rutgers July 17th, 2009 CJ Verbeck (DIMACS REU, Rutgers) Multi-color graph pebbling July 17th, 2009 1 / 22 An introduction
More informationA Comparative Analysis of Architecture Frameworks
A Comparative Analysis of Architecture Frameworks Antony Tang Jun Han Pin Chen School of Information Technology DSTO C3 Research Centre Swinburne University of Technology Department of Defence Melbourne,
More informationEfficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest.
Efficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest. D.A. Karras, S.A. Karkanis and D. E. Maroulis University of Piraeus, Dept.
More informationRobust DWT Based Technique for Digital Watermarking
Robust DWT Based Technique for Digital Watermarking Mamta Jain Department of Electronics & Communication Institute of Engineering & Technology Alwar er.mamtajain@gmail.com Abstract Hiding the information
More informationOpenChain Specification Version 1.2 pc6 (DRAFT) [With Edit Markups Turned Off]
OpenChain Specification Version 1.2 pc6 (DRAFT) [With Edit Markups Turned Off] DRAFT: This is the near final draft of the 1.2 version of the OpenChain Specification. We have recently completed the final
More informationInformation Extraction of Important International Conference Dates using Rules and Regular Expressions
ISBN 978-93-84422-80-6 17th IIE International Conference on Computer, Electrical, Electronics and Communication Engineering (CEECE-2017) Pattaya (Thailand) Dec. 28-29, 2017 Information Extraction of Important
More informationTiling Rectangles with Gaps by Ribbon Right Trominoes
Open Journal of Discrete Mathematics, 2017, 7, 87-102 http://www.scirp.org/journal/ojdm ISSN Online: 2161-7643 ISSN Print: 2161-7635 Tiling Rectangles with Gaps by Ribbon Right Trominoes Premalatha Junius,
More informationCollaborative Filtering using Euclidean Distance in Recommendation Engine
Indian Journal of Science and Technology, Vol 9(37), DOI: 10.17485/ijst/2016/v9i37/102074, October 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Collaborative Filtering using Euclidean Distance
More informationVersion Control on Database Schema and Test Cases from Functional Requirements Input Changes
, March 15-17, 2017, Hong Kong Control on Database Schema and Test Cases from Functional Requirements Input Parichat Kiatphao and Taratip Suwannasart Abstract In software engineering, version control is
More informationModeling the Knowledge Sharing Barriers using an ISM approach
2012 International Conference on Information and Knowledge Management (ICIKM 2012) IPCSIT vol.45 (2012) (2012) IACSIT Press, Singapore Modeling the Knowledge Sharing Barriers using an ISM approach B. P.
More informationWeighting Selection in GRA-based MADM for Vertical Handover in Wireless Networks
216 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation Weighting Selection in GRA-based MADM for Vertical Handover in Wireless Networks Ali F. Almutairi Electrical Engineering
More informationOn the Balanced Case of the Brualdi-Shen Conjecture on 4-Cycle Decompositions of Eulerian Bipartite Tournaments
Electronic Journal of Graph Theory and Applications 3 (2) (2015), 191 196 On the Balanced Case of the Brualdi-Shen Conjecture on 4-Cycle Decompositions of Eulerian Bipartite Tournaments Rafael Del Valle
More information1. Discovering Important Nodes through Graph Entropy The Case of Enron Database
1. Discovering Important Nodes through Graph Entropy The Case of Enron Email Database ACM KDD 2005 Chicago, Illinois. 2. Optimizing Video Search Reranking Via Minimum Incremental Information Loss ACM MIR
More informationCopyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see
TOGAF 9 Certified Study Guide 4th Edition The Open Group Publications available from Van Haren Publishing The TOGAF Series: The TOGAF Standard, Version 9.2 The TOGAF Standard Version 9.2 A Pocket Guide
More informationLATIN SQUARES AND THEIR APPLICATION TO THE FEASIBLE SET FOR ASSIGNMENT PROBLEMS
LATIN SQUARES AND THEIR APPLICATION TO THE FEASIBLE SET FOR ASSIGNMENT PROBLEMS TIMOTHY L. VIS Abstract. A significant problem in finite optimization is the assignment problem. In essence, the assignment
More informationStandard Development Timeline
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Description of Current Draft
More informationMath.3336: Discrete Mathematics. Chapter 10 Graph Theory
Math.3336: Discrete Mathematics Chapter 10 Graph Theory Instructor: Dr. Blerina Xhabli Department of Mathematics, University of Houston https://www.math.uh.edu/ blerina Email: blerina@math.uh.edu Fall
More informationDirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure
DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure Change Control Date Version Description of changes 15-December- 2016 1-December- 2016 17-March- 2016 4-February- 2016 3-February-
More information