共查询到20条相似文献,搜索用时 187 毫秒
1.
在“人-机-物”三元融合、泛在计算的时代蓝海下, “开放多变”“需求多样”和“场景复杂”的软件部署和运行环境对开源软件库生态的治理技术提出了更多需求和更高期望. 为进一步推动构建可信软件供应链生态, 围绕泛在计算模式、打造自主可控的技术体系, 聚焦于开源软件库管理生态, 收集近20多年来(2001–2023)发表于软件工程领域较高影响力的学术期刊和会议的348篇论文, 对开源软件库生态治理技术的研究工作进行梳理. 讨论开源软件库生态的建模与分析、演化与维护、质量保证和管理等方面的工作, 总结研究现状、问题、挑战与趋势. 相似文献
2.
3.
MDA模型转换工具的研究 总被引:1,自引:0,他引:1
模型驱动架构MDA(Model Driven Architecture)是由OMG提出的,用于解决企业间应用集成问题的软件开发方法.自提出以来,MDA方法得到很多软件供应商和研究人员的强力支持,在工业界和学术界出现了很多支持MDA开发方法的模型转换工具.这些工具使用了不同技术和实现方法,各有千秋.这些工具的出现有力地促进了MDA开发方法的发展.从模型描述方法、模型转换方法和模型转换工具在软件生命周期中的位置等三个方面分析比较了当前流行的MDA模型转换工具.根据这些分析结果,进一步讨论了MDA模型转换工具的发展前景,并指出了进一步改进MDA模型转换工具的研究方向. 相似文献
4.
2003年8月23日,中国软件行业协会第四届理事会在内蒙古自治区包头市召开。中国软件行业协会的理事和各地方软件行业协会的代表参加了会议,会议由中国软件行业协会顾问委员会杨天行主任主持。 中国软件行业协会理事长陈冲做了题为“2003年中国软件产业发展现状与发展趋势”的报告。报告显示, 2003年中国软件产业整体状况有七个方面:软件产业 规模不断扩大;中国软件产业总额占全球软件产业总 额的比重不断提升;软件出口规模不断增长;软件服务 市场以较快速度增长;应用软件是软件产品市场的主 导力… 相似文献
5.
软件安全漏洞检测技术 总被引:20,自引:0,他引:20
软件安全漏洞检测技术是提高软件质量和安全性、减少软件安全漏洞的重要方法和基本手段,受到学术界和工业界的广泛关注和高度重视.其主要途径包括软件测试、程序分析、模型检验与符号执行等.近年来,综合利用多种研究方法和技术手段来检测软件安全漏洞已成为软件安全领域的研究热点.文中首先回顾了程序分析与软件安全漏洞检测的基本概念、核心问题和传统手段.然后重点介绍该领域的最新进展,主要包括轻量级动态符号执行、自动化白盒模糊测试以及其实现技术和相应的工具.最后,指出了其所面临的挑战和发展趋势. 相似文献
6.
面向Agent 软件工程是近年来软件工程领域出现的一个重要的前沿研究方向,受到了学术界和工业界的高度关注和重视,研究活跃,发展迅速.本文从应用需求和技术发展两个方面阐述了面向Agent软件工程的产生和发展背景;从技术、开发和工具3个视点综述了现阶段面向Agent软件工程的研究内容;分析了面向Agent 软件工程的研究现状;最后讨论了它的应用前景和面临的挑战以指导进一步研究. 相似文献
7.
8.
9.
10.
11.
The relevance of context is particularly stressed in case studies, where it is said that “case study is an empirical method aimed at investigating contemporary phenomena in their context”. In this research, we classify context information and provide a context checklist for industrial software engineering. The checklist serves the purpose of (a) supporting researchers and practitioners in characterizing the context in which they are working; (b) supporting researchers with a checklist to identify relevant contextual information to elicit and report during primary and secondary studies. We utilized a systematic approach for constructing the classification of context information and provided a detailed definition for each item. We collected feedback from researchers as well as practitioners. The usefulness of the checklist was perceived more positively by researchers than practitioners, though they highlighted benefits (raising awareness of the importance of context and usefulness for management). The understandability was perceived positively by both practitioners and researchers. The checklist may serve as a “meta-model”, forming the basis for specific adaptations for different research areas, and as input for researchers deciding which context information to extract in systematic reviews. The checklist may also help researchers in reporting context in research papers. 相似文献
12.
PD Dr. Guido Schryen 《WIRTSCHAFTSINFORMATIK》2010,52(4):225-237
The economic relevance of information systems has been studied for many years and has attracted an abundance of research papers. However, the “productivity paradoxon” of the 1990s, Carr’s widely recognized paper “IT doesn’t matter”, and several studies that do not find a positive correlation between IS investments and economic performance reveal long-lasting difficulties for IS researchers to explain “IS business value”. Business executives and researchers also continue to question the value of IS investments. This raises the question of whether literature reviews have tapped their potential to address the concerns by covering key research areas of IS business value and preserving their key findings. In order to address this question, this paper identifies and describes 12 key research areas, and synthesizes what literature reviews published in pertinent academic outlets have done to preserve knowledge. The analysis of 22 literature reviews shows that some crucial areas have not been (sufficiently) covered. They provide fertile areas for future literature reviews. As this work is based on the results of more than 200 research papers, it is capable of drawing a comprehensive picture of the current state-of-the-art in IS business value research. 相似文献
13.
Employees' personal devices are increasingly evident in the workplace; the use of non‐enterprise sanctioned hardware and software is now commonplace. This phenomenon, frequently referred to as IT consumerization, is gaining momentum. Employees increasingly are using their own devices and choosing their own software (eg, Google Apps, Skype or Dropbox) in addition to—or instead of—enterprise IT. Employees are turning from consumers of enterprise IT to IT deciders, bypassing the IS department to use what critics call “rogue IT.” While discouraged in some contexts, the influx of consumer IT into the workplace has been suggested to influence innovative behaviours among employees. Although the phenomenon is very prevalent, research lags in the operationalization of an IT consumerization model. In this paper, we take a close look at the antecedents and consequences of consumerization behaviours. We examine to what extent an individual's level of satisfaction with enterprise IT in juxtaposition with the level of perceived relative advantage of consumer IT over enterprise IT influences an individual's usage of consumer IT in the workplace; we also examine how organizational mandates and IT empowerment influences IT consumerization behaviours. Finally, we investigate the influence of IT consumerization on innovative behaviours at work. 相似文献
14.
Informationstechnologie, Governance und Compliance 总被引:1,自引:0,他引:1
The paper presents the results of a World Wide Web research on the relationships between information technology (IT) on the one hand and governance and compliance on the other. The research sheds light on two different roles IT can take up in governance and compliance. Firstly, IT is used as an instrument or tool in support of implementing governance and compliance in organizations. Secondly, IT is an important concern in governance and assurance of compliance in organizations, resulting in IT-governance and IT-compliance as issues of their own. Since the domains of governance and compliance overlap in some respect, both areas are not always properly distinguished. This can especially be observed in offerings of IT consulting firms and in the positioning of products of software developers and vendors which are often vaguely labeled as “Governance, Risk and Compliance (GRC) Software”. An imprecise and somewhat inflationary use of the terms governance and compliance impedes a systematic analysis of the field. 相似文献
15.
B. Ya. Ryabko A. E. Gus’kov I. V. Selivanova 《Problems of Information Transmission》2017,53(3):294-304
We consider a method for automatic (i.e., unmanned) text classification based on methods of universal source coding (or “data compression”). We show that under certain restrictions the proposed method is consistent, i.e., the classification error tends to zero with increasing text lengths. As an example of practical use of the method we consider the classification problem for scientific texts (research papers, books, etc.). The proposed method is experimentally shown to be highly efficient. 相似文献
16.
元建模在面向对象数据库模式演进中的应用 总被引:1,自引:0,他引:1
将元建模引入面向对象数据库模式演进的研究中,把面向对象数据库模式演进按照元建模的体系分为四个层次,确定了每个层次的内容以及模式演进的约束,为检测模式演进冲突提供了准则. 相似文献
17.
Software productivity has always been one of the most critical metrics for measuring software development. However, with the open-source community (e.g., GitHub), new software development models are emerging. The traditional productivity metrics do not provide a comprehensive measure of the new software development models. Therefore, it is necessary to build a productivity measurement model of open source software ecosystem suitable for the open-source community’s production activities. Based on the natural ecosystem, this paper proposes concepts related to the productivity of open source software ecosystems, analyses influencing factors of open source software ecosystem productivity, and constructs a measurement model using these factors. Model validation experiments show that the model is compatible with a large portion of open source software ecosystems in GitHub. This study can provide references for participants of the open-source software ecosystem to choose proper types of ecosystems. The study also provides a basis for ecosystem health assessment for researchers interested in ecosystem quality. 相似文献
18.
M. Korpela 《Information Technology for Development》2013,19(1):29-42
Abstract The literature on informatics in developing countries seldom thoroughly discusses the crucial concept “developing countries”. Most authors seem to implicitly adopt the view that developing countries are “latecomers” which will sooner or later become similar to the “already developed” countries. In this view, the problems of IT development observed in organizations in developing countries are due to the hierarchical “traditional culture”. In this paper, indigenous computer‐related activities in South‐Western Nigeria (Yorubaland) are used as a case, and the organizational problems observed are compared with aspects of the traditional Yoruba culture of that region. The comparison does not support the cultural hypothesis. An alternative explanation is briefly introduced, based on a concrete historical analysis along a world‐system approach. Finally, the roles of ‘cultural’ and ‘socio‐economic’ factors in national brands of IT development are discussed more generally. 相似文献
19.
Bashar Alyousef Peter Hoonakker Ann Schoofs Hundt Doreen Salek Janet Tomcavage 《International journal of human-computer interaction》2017,33(4):313-321
ABSTRACTCare managers play a key role in coordinating care, especially for patients with chronic conditions. They use multiple health information technology (IT) applications in order to access, process, and communicate patient-related information. Using the work system model and its extension, the Systems Engineering Initiative for Patient Safety (SEIPS) model, we describe obstacles experienced by care managers in managing patient-related information. A web-based questionnaire was used to collect data from 80 care managers (61% response rate) located in clinics, hospitals, and a call center. Care managers were more likely to consider “inefficiencies in access to patient-related information” and “having to use multiple information systems” as major obstacles than “lack of computer training and support” and “inefficient use of case management software.” Care managers who reported “inefficient use of case management software” as an obstacle were more likely to report high workload. Future research should explore strategies used by care managers to address obstacles, and efforts should be targeted at improving the health information technologies used by care managers. 相似文献
20.
Xi Zhang Hui Chen Weiguang Wang Patricia Ordóñez de Pablos 《Behaviour & Information Technology》2016,35(12):1130-1143
With the wide diffusion of information technology (IT) in our daily life and work, it is clear that product innovation and service innovation have more and more connection with IT, and IT has become an important tool or component in innovation. The purpose of this paper is to provide insights into future studies pertaining to this area by investigating the research development of IT innovation using bibliometric analysis. The status of IT innovation study is analysed through citation analysis with the help of CiteSpace. Influential references, hot topics, top-tier journals and important institutes are all detected, and the intellectual structure of recent studies is also mapped in this study, and we find that research on IT innovation is mainly from two directions, innovation study group and information systems study group. Finally, we follow the logic of Nambisan [2013. “Information Technology and Product/Service Innovation: A Brief Assessment and Some Suggestions for Future Research.” Journal of the Association for Information Systems 14 (4): 215–226] to explore the relationship between IT and innovation through reviewing papers in the top journals in this field. We find that most studies treat IT as an enabler of innovation. Although some recent studies try to pay attention to the role of IT as a trigger for innovation and give some rationale for the IT–innovation relationship, further studies are still required to uncover the trigger effect mechanism. 相似文献