The crowdsourcing, as a service pattern in cloud environment, usually aims at the cross-disciplinary cooperation and creating value together with customers and becomes increasingly prevalent. Software process, as a ki...The crowdsourcing, as a service pattern in cloud environment, usually aims at the cross-disciplinary cooperation and creating value together with customers and becomes increasingly prevalent. Software process, as a kind of software development and management strategy, is defined as a series of activities implemented by software life cycle and provides a set of rules for various phases of the software engineering to achieve the desired objectives. With the current software development cycle getting shorter, facing more frequent needs change and fierce competition, a new resource management pattern is proposed to respond to these issues agilely by introducing the crowdsourcing service to agile software development for pushing the agility of software process. Then, a user-oriented resource scheduling method is proposed for rational use of various resources in the process and maximizing the benefits of all parties. From the experimental results, the proposed pattern and resources scheduling method reduces greatly the resource of project resource manager and increases the team resource utilization rate, which greatly improves the agility of software process and delivers software products quickly in crowdsourcing pattern.展开更多
The contemporary environment within which command,control,communications,computers and intelligence (C4I platforms exist, have a number of characteristics. These characteristics may be most obviously identified as int...The contemporary environment within which command,control,communications,computers and intelligence (C4I platforms exist, have a number of characteristics. These characteristics may be most obviously identified as interconnectivity, international networking, speed of data transfer, the compact nature of electronic information and rapidly changing technology. Information security professionals employ a variety of approaches in order to counter risks within this complex and fluid environment. The gamut of potential security activities ranges form access control through a variety of auditing techniques to secure data communications. This field is broad and well documented. Indeed, the discipline of network risk management and data security is both well developed and sophisticated.This paper addresses twin themes:i.The fundamental issue of the method by which specific approaches are employed. This is a precursor to the adoption of an eventual strategy.ii.The crucial issues revolving around the展开更多
基金Projects(61304184,61672221)supported by the National Natural Science Foundation of ChinaProject(2016JJ6010)supported by the Hunan Provincial Natural Science Foundation of China
文摘The crowdsourcing, as a service pattern in cloud environment, usually aims at the cross-disciplinary cooperation and creating value together with customers and becomes increasingly prevalent. Software process, as a kind of software development and management strategy, is defined as a series of activities implemented by software life cycle and provides a set of rules for various phases of the software engineering to achieve the desired objectives. With the current software development cycle getting shorter, facing more frequent needs change and fierce competition, a new resource management pattern is proposed to respond to these issues agilely by introducing the crowdsourcing service to agile software development for pushing the agility of software process. Then, a user-oriented resource scheduling method is proposed for rational use of various resources in the process and maximizing the benefits of all parties. From the experimental results, the proposed pattern and resources scheduling method reduces greatly the resource of project resource manager and increases the team resource utilization rate, which greatly improves the agility of software process and delivers software products quickly in crowdsourcing pattern.
文摘The contemporary environment within which command,control,communications,computers and intelligence (C4I platforms exist, have a number of characteristics. These characteristics may be most obviously identified as interconnectivity, international networking, speed of data transfer, the compact nature of electronic information and rapidly changing technology. Information security professionals employ a variety of approaches in order to counter risks within this complex and fluid environment. The gamut of potential security activities ranges form access control through a variety of auditing techniques to secure data communications. This field is broad and well documented. Indeed, the discipline of network risk management and data security is both well developed and sophisticated.This paper addresses twin themes:i.The fundamental issue of the method by which specific approaches are employed. This is a precursor to the adoption of an eventual strategy.ii.The crucial issues revolving around the