Engineering Wireless-Based Software Systems and Applications for a Listing of Recent Titles in the Artech House Computing Library, Turn to the Back of This Book

Total Page:16

File Type:pdf, Size:1020Kb

Engineering Wireless-Based Software Systems and Applications for a Listing of Recent Titles in the Artech House Computing Library, Turn to the Back of This Book Engineering Wireless-Based Software Systems and Applications For a listing of recent titles in the Artech House Computing Library, turn to the back of this book. Engineering Wireless-Based Software Systems and Applications Jerry Zeyu Gao Simon Shim Hsing Mei Xiao Su a r techhouse. com Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the U.S. Library of Congress. British Library Cataloguing in Publication Data Engineering wireless-based software systems and applications.—(Artech House computing library) 1. Software engineering 2. Wireless communications systems I. Gao, Jerry 005.1 ISBN-10: 1-58053-820-7 ISBN-13: 978-1-58053-820-6 Cover design by Yekaterina Ratner © 2006 ARTECH HOUSE, INC. 685 Canton Street Norwood, MA 02062 All rights reserved. Printed and bound in the United States of America. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, includ- ing photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Artech House cannot attest to the accuracy of this informa- tion. Use of a term in this book should not be regarded as affecting the validity of any trade- mark or service mark. 10 9 8 7 6 5 4 3 2 1 To my wife Tracy and my lovely son Kevin To my parents Ming Gao and Ye-Fang Qin —Jerry Zeyu Gao To my Mom and Dad —Simon Shim To my wife Teresa, my son Wesley, and my daughter Emily —Hsing Mei To Tao and our precious one—Jolie To my parents Mingzhao Su and Yunjun Xu —Xiao Su Contents Preface xvii PART I Introduction 1 CHAPTER 1 Engineering in the Wireless World 3 1.1 Moving to the Wireless World 3 1.1.1 Wireless Markets and Needs 3 1.1.2 Living in the Wireless World 6 1.2 Understanding Wireless-Based Application Systems 8 1.2.1 Basic Definitions 8 1.2.2 Basic Components 8 1.2.3 Special Features and Properties 10 1.2.4 Essential Requirements and Expectations 11 1.2.5 Benefits, Issues, Challenges, and Limitations 12 1.2.6 Classification of Wireless-Based Application Systems 13 1.3 Engineering Wireless-Based Application Systems 14 1.3.1 Engineering Perspectives 16 1.3.2 Engineering Issues, Challenges, and Needs 17 1.4 Summary 20 References 21 PART II Mobile Technologies and Operation Environments 23 CHAPTER 2 Mobile Devices and Operating Systems 25 2.1 An Overview of Mobile Devices 26 2.1.1 Limitations 26 2.1.2 Evolution and Integration 30 2.2 Mobile Operating Systems 35 2.2.1 Symbian OS 39 2.2.2 Windows CE/Mobile 41 2.2.3 Embedded Linux (Mobile Linux) 44 2.3 Mobile Application Platforms 45 vii viii Contents 2.3.1 Java Platform 46 2.3.2 BREW 48 2.4 Summary 51 References 51 CHAPTER 3 Wireless Application Protocols and Technology 53 3.1 Introduction to WAP 53 3.1.1 Brief History 53 3.1.2 WAP Background 55 3.2 Overview of WAP Architecture and Protocols 56 3.2.1 WAP Programming Model 56 3.2.2 WAP Protocol Stack 57 3.2.3 WAP Service Architecture 59 3.2.4 From Web Proxy to WAP Proxy Gateway 62 3.2.5 WAP Push Mechanism 66 3.3 WAE 68 3.3.1 WML 68 3.3.2 WMLScript 70 3.3.3 UAProf 71 3.4 WAP and Messaging Services 72 3.4.1 SMS 72 3.4.2 MMS 74 3.4.3 MMS Works Together with WAP and SMS 74 3.5 Future of WAP—OMA 75 3.5.1 Converging to WAP 2 75 3.5.2 OMA 76 3.6 Summary 78 References 79 CHAPTER 4 Technologies for Mobile Client Software 81 4.1 XML-Based Technologies 81 4.1.1 XML Syntax 82 4.1.2 XML Validation: Document Type Definition/Schema 83 4.1.3 XML Styling: Cascading Style Sheets and Extensible Stylesheet 4.1.3 Language 86 4.1.4 XML-Based Markup Languages 89 4.2 Mobile Web Client 90 4.2.1 XHTML Basic 90 4.2.2 The XHTML Mobile Profile 92 4.3 Java Mobile Client 94 4.3.1 CLDC Connection Framework 94 4.3.2 MIDP Development 95 4.4 i-mode 98 4.4.1 i-mode Infrastructure 98 Contents ix 4.4.2 i-mode Client Technology 99 4.4.3 Server-Side Technologies 100 4.5 Summary 104 References 104 CHAPTER 5 Wireless Multimedia Technologies 107 5.1 Multimedia Streaming 108 5.1.1 Interactive Mobile Services 109 5.1.2 Extensible Markup Language 109 5.1.3 SMIL 110 5.1.4 Mobile Streaming Architecture 110 5.1.5 Backend Server 111 5.1.6 Streaming Client 116 5.1.7 Solution Providers 118 5.2 Wireless Network Technologies 119 5.2.1 Network Protocols 119 5.2.2 QoS and Scalability 121 5.2.3 Proxy Requirement 121 5.2.4 Unicast Versus Multicast 122 5.2.5 Wireless Multimedia Streaming Standards 122 5.3 Codec 123 5.3.1 MPEG 123 5.3.2 MPEG-4 Architecture 123 5.3.3 MPEG-4 Visual Profiles 124 5.3.4 MPEG-4 Encoding and Decoding 124 5.3.5 MPEG-4 File Format 124 5.3.6 Audio Compression Standard 124 5.4 Conclusion 125 References 125 Selected Bibliography 126 PART III Wireless Networks 129 CHAPTER 6 Wireless Local Area Networks 131 6.1 Wireless LAN Protocols 131 6.2 Wireless LAN Standards 132 6.2.1 The 802.11 Physical Layer 133 6.2.2 The 802.11 MAC Sublayer 137 6.3 Wireless LAN Infrastructures 142 6.3.1 Basic Service Areas 142 6.3.2 Extended Service Areas 143 6.3.3 Mobility 144 6.4 Future for Wireless LAN Networks 144 6.4.1 Bluetooth 145 x Contents 6.4.2 Ultrawideband 145 6.4.3 IEEE 802.16 Broadband Wireless 146 6.4.4 3G Cellular Networks 147 6.4.5 Discussions 147 6.5 Summary 147 References 148 Selected Bibliography 148 CHAPTER 7 Wireless Wide Area Networks 149 7.1 Wireless WAN Overview 149 7.1.1 Common Wireless WAN Architecture 149 7.1.2 Mobility Management 151 7.1.3 Communication Background 153 7.2 Cellular Mobile Networks—Up to 2.5G 155 7.2.1 1G Networks: AMPS 156 7.2.2 2G Networks: D-AMPS, GSM, cdmaOne, and More 157 7.2.3 2.5G Networks: General Packet Radio System and Enhanced 4.1.3 Data Rates for Global/GSM Evolution 160 7.3 Cellular Mobile Networks—3G and Beyond 162 7.3.1 3G Networks: CDMA2000 and WCDMA 163 7.3.2 4G Networks and Beyond 165 7.3.3 Standardization Organizations 167 7.4 Summary 168 References 169 CHAPTER 8 Wireless Personal Area Networks 171 8.1 Wireless PAN Overview 171 8.1.1 IEEE 802.15 172 8.1.2 Near-Field Communication 174 8.2 Bluetooth 175 8.2.1 Introduction 175 8.2.2 Protocol Layers 177 8.2.3 States and Operations 181 8.2.4 Application Profiles 183 8.3 Device Coordination (Wireless Access Protocol) 188 8.3.1 Jini 188 8.3.2 Universal Plug-and-Play 191 8.3.3 Home Service Gateway 193 8.4 Summary 194 References 195 PART IV Engineering Wireless-Based Application Systems 197 Contents xi CHAPTER 9 System Requirements Engineering, Analysis, and Modeling 199 9.1 Understanding the Wireless Application Domain 199 9.2 Engineering System Requirements 200 9.2.1 Requirements Engineering Process 200 9.2.2 Requirements Elicitation for Wireless-Based Software Systems 202 9.3 System Analysis and Modeling 207 9.3.1 System Infrastructure and Connectivity Modeling 208 9.3.2 System User Analysis and Modeling 209 9.3.3 System Function Analysis and Modeling 211 9.3.4 System Data and Object Analysis and Modeling 212 9.3.5 System Dynamic Behavior Analysis and Modeling 220 9.4 Summary 225 References 226 CHAPTER 10 System Architectures for Wireless-Based Application Systems 227 10.1 Basic Concepts About System and Software Architectures 227 10.1.1 What Is System Architecture? 227 10.1.2 What Is Software Architecture? 230 10.1.3 Why Is Software Architecture Important? 230 10.1.4 Software Architecture Presentation and Specification 231 10.1.5 Architecture Design Process 231 10.1.6 Quality Factors in Architectural Design 233 10.2 The Network-Based System Infrastructure Classification 234 10.2.1 Application Systems Based on Wireless LAN Networks 234 10.2.2 Wireless Personal Network–Based Application Systems 234 10.2.3 Application Systems Based on Wide Area Networks 235 10.2.4 Wireless Application Systems Based on Heterogeneous 10.2.4 Networks 237 10.2.5 Mobile Commerce Application Systems Based on Sensor 10.2.4 Networks 238 10.3 Wireless Internet-Based Application System Architectures 239 10.3.1 The i-mode Application System Architecture 239 10.3.2 Mobile-Aware Application Architecture 242 10.3.3 Mobile-Transparent Application Architecture 244 10.3.4 Mobile-Interactive Application Architecture 245 10.3.5 Advantages and Limitations of Different Architectures 246 10.3.6 Comparison of Different Wireless Internet Application 10.2.4 Architectures 247 10.4 Smart Mobile Application Architectures 249 10.4.1 Advantages and Limitations of Smart Mobile Application 10.2.4 Systems 250 10.5 Wireless Enterprise Application Architectures 251 10.5.1 Wireless Enterprise Application Architecture Based on 10.2.4 Microsoft Mobile Technology 252 10.5.2 Java-Based Wireless Enterprise Application Architectures 253 xii Contents 10.6 Summary 257 References 258 CHAPTER 11 Wireless Security: Introduction 259 11.1 Secret Key Cryptography 260 11.1.1 Basic Operations 260 11.1.2 Block Cipher Standards 263 11.1.3 Stream Cipher and RC4 267 11.1.4 Confidentiality 268 11.1.5 Authentication 268 11.1.6 Data Integrity 269 11.2 Public Key Cryptography 270 11.2.1 The RSA Algorithm 271 11.2.2 Confidentiality 273 11.2.3 Authentication 274 11.2.4 Data Integrity 275 11.3 Wireless Security Attacks 275 11.3.1 Attacks Against Confidentiality 276 11.3.2 Attacks Against Authentication 277 11.3.3 Attacks Against Data Integrity 279 11.3.4 Attacks Against Availability 280 11.4 Summary 281 References 282 CHAPTER 12 Wireless Security Solutions 285 12.1 Security Threats and Solutions for Wireless LANs 285 12.1.1 Overview of IEEE 802.11 WEP Standard 285 12.1.2 Security Threats for Wireless LANs 286 12.1.3 Security Countermeasures for Wireless LANs 288
Recommended publications
  • Wireless Local Area Networks: Threats and Their Discovery Using Wlans Scanning Tools Ms
    International Journal of Advanced Networking Applications (IJANA) ISSN No. : 0975-0290 137 Wireless Local Area Networks: Threats and Their Discovery Using WLANs Scanning Tools Ms. Rakhi Budhrani Bhavnagar, Gujarat, India. Dr. R. Sridaran, Dean, Faculty of Computer Applications, Marwadi Education Foundation’s Group of Institutions, Rajkot, Gujarat, India. ----------------------------------------------------------------------ABSTRACT-------------------------------------------------------- Wireless Local Area Networks frequently referred to as WLANs or Wi-Fi networks are all the passion in recent times. Wireless networks offer handiness, mobility, and can even be less expensive to put into practice than wired networks in many cases. But how far this technology is going provide a protected environment in terms of privacy is again an anonymous issue. Realizing the miscellaneous threats and vulnerabilities associated with 802.11-based wireless networks and ethically hacking them to make them more secure is what this paper is all about. On this segment, we'll seize a look at common threats, vulnerabilities related with wireless networks. This paper presents an overview some of the WLANs Scanning, Sniffing and Auditing tools available on the internet. This paper Reviews these tools along with their merits, demerits and how they can be used for hacking, exploiting security holes and their usage characterization in WLANs. Keywords - Current threats in WLANs, Exploiting Security, WLANs Scanning, WLANs Sniffing, Multifunctional, WLANs auditing tools penetrate any wired network via wireless network as Access Point (AP) is bridging between wireless and I. INTRODUCTION wired network. Wireless Networks present a host of issues for network managers. Unauthorized access he Institute of Electrical and Electronics points, broadcasted SSIDs, unknown stations, MITM Engineers (IEEE) provides 802.11 set of attacks such as session hijacking and spoofed MAC standards for WLANs.
    [Show full text]
  • Final Proposal
    The Importance and Preservation of the Thoreau Society’s Audio and Video media An Interactive Project Submitted to the Faculty of WORCESTER POLYTECHNIC INSTITUTE in partial fulfillment of the requirements for the Degree of Bachelor of Science by _______________________ William H. House _______________________ Keith R. Murphy Date: Feburary 27th, 2008 Approved: ___________________________________ Professor Wesley Mott, Advisor ___________________________________ Rodney Obien, Co-Advisor Abstract: The Audio and Video collections at the Thoreau Institutes Library are in Jeopardy of being lost forever. The media is inaccessible due to obsolescence, and much of it is deteriorating to a point were it couldn’t be read, even with an appropriate player. Due to much research we have found that the majority of the collections can be easily, safely, and cost effectively converted to a digital format. A digital format will make all the different media formats in the collections accessible by a computer and easy to back up, duplicate, and preserve. Table of Contents: Acknowledgements………………………………………………………………01 Authorship………………………………………………………………………..02 Introduction…...………………………………………………………………….03 Background The Legacy of Henry David Thoreau (1817-1862)……………………...04 Thoreauvian Organizations………………………………………………08 Literature Review………………………………………………………………...09 Technology Media Deterioration……………………………………………………...11 Method of Conversion…………………………………………………...11 Desired Digital Format…………………………………………………..15 Equipment………………………………………………………………………..17 Software………………………………………………………………….17
    [Show full text]
  • Ebook - Informations About Operating Systems Version: August 15, 2006 | Download
    eBook - Informations about Operating Systems Version: August 15, 2006 | Download: www.operating-system.org AIX Internet: AIX AmigaOS Internet: AmigaOS AtheOS Internet: AtheOS BeIA Internet: BeIA BeOS Internet: BeOS BSDi Internet: BSDi CP/M Internet: CP/M Darwin Internet: Darwin EPOC Internet: EPOC FreeBSD Internet: FreeBSD HP-UX Internet: HP-UX Hurd Internet: Hurd Inferno Internet: Inferno IRIX Internet: IRIX JavaOS Internet: JavaOS LFS Internet: LFS Linspire Internet: Linspire Linux Internet: Linux MacOS Internet: MacOS Minix Internet: Minix MorphOS Internet: MorphOS MS-DOS Internet: MS-DOS MVS Internet: MVS NetBSD Internet: NetBSD NetWare Internet: NetWare Newdeal Internet: Newdeal NEXTSTEP Internet: NEXTSTEP OpenBSD Internet: OpenBSD OS/2 Internet: OS/2 Further operating systems Internet: Further operating systems PalmOS Internet: PalmOS Plan9 Internet: Plan9 QNX Internet: QNX RiscOS Internet: RiscOS Solaris Internet: Solaris SuSE Linux Internet: SuSE Linux Unicos Internet: Unicos Unix Internet: Unix Unixware Internet: Unixware Windows 2000 Internet: Windows 2000 Windows 3.11 Internet: Windows 3.11 Windows 95 Internet: Windows 95 Windows 98 Internet: Windows 98 Windows CE Internet: Windows CE Windows Family Internet: Windows Family Windows ME Internet: Windows ME Seite 1 von 138 eBook - Informations about Operating Systems Version: August 15, 2006 | Download: www.operating-system.org Windows NT 3.1 Internet: Windows NT 3.1 Windows NT 4.0 Internet: Windows NT 4.0 Windows Server 2003 Internet: Windows Server 2003 Windows Vista Internet: Windows Vista Windows XP Internet: Windows XP Apple - Company Internet: Apple - Company AT&T - Company Internet: AT&T - Company Be Inc. - Company Internet: Be Inc. - Company BSD Family Internet: BSD Family Cray Inc.
    [Show full text]
  • PDF with Notes
    Wireless Tools Training materials for wireless trainers This talk covers tools that will show you a great deal of information about wireless networks, including network discovery, data logging, security auditing, and spectrum analysis. Version 1.4 by Rob, @2009-11-23 Version 1.5 by Rob, @2010-02-28 Version 1.6 by Rob, @2010-03-12 Goals ‣ The goal of this talk is to provide an introduction to a few software tools that will help you to: ‣ monitor your WiFi network to identify problems ‣ perform security audits and prevent attacks ‣ observe the ongoing performance of your network and plan for future needs ‣ detect interference 2 Types of wireless tools ‣ Network ESSID scanners ‣ Wireless protocol analyzers ‣ Encryption cracking tools ‣ Wireless device auditing and management ‣ “War driving” tools: network mapping ‣ Spectrum analysis 3 Built-in wireless clients 4 If a computer has a wireless card, it has a basic network scanner. NetStumbler http://www.stumbler.net/ 5 NetStumbler was one of the first and most widely used WiFi detection tools. It runs only in Windows XP or Windows 2000, and works with many (but not all) wireless cards. NetStumbler can be used for mapping the coverage of your WiFi network, War Driving, rogue AP detection, aligning antennas on a long distance link, and more. NetStumbler is not open source, and was last updated in 2004. http://www.vistumbler.net/ 6 Vistumbler is an updated open source network detection tool for Windows Vista and Windows 7. It supports many of the same features as NetStumbler, including network detection and GPS integration. It also works with Google Earth to allow realtime WiFi mapping on a live map.
    [Show full text]
  • Palm Security WP.Qxd
    Palm® Mobility Series: Security Smartphone and handheld security for mobile business. Mobile computing: Opportunities and risk By providing professionals with convenient mobile access to email, business applications, customer information and critical corporate data, businesses can become more productive, streamline business processes and enable better decision making. With the new ease of access to information comes a responsibility to protect the organization's data as well as the investment in mobile devices. In many ways, security risks for mobile computing are similar to those for other computing platforms. There are the usual concerns of protecting data, authenticating users, and shielding against viruses and other malicious Contents code. But because of their mobility and compact size, smartphones and handhelds present some additional challenges: Mobile computing: Opportunities and risk...................................................... 1 Know thy enemy: Security risks...................................................................... 2 • Smartphones and handhelds are more easily lost or stolen than Theft and loss ............................................................................................ 2 laptop or desktop computers. Password cracking .................................................................................... 2 Data interception ...................................................................................... 2 • Users often treat smartphones and handhelds as personal devices Malicious code
    [Show full text]
  • A Security Framework for Mobile Health Applications on Android Platform
    A SECURITY FRAMEWORK FOR MOBILE HEALTH APPLICATIONS ON ANDROID PLATFORM MUZAMMIL HUSSAIN FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY UNIVERSITY OF MALAYA UniversityKUALA LUMPUR of Malaya 2017 A SECURITY FRAMEWORK FOR MOBILE HEALTH APPLICATIONS ON ANDROID PLATFORM MUZAMMIL HUSSAIN THESIS SUBMITTED IN FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY UNIVERSITY OF MALAYA UniversityKUALA LUMPUR of Malaya 2017 UNIVERSITY OF MALAYA ORIGINAL LITERARY WORK DECLARATION Name of Candidate: Muzammil Hussain Matric No: WHA130038 Name of Degree: Doctor of Philosophy Title of Project Paper/Research Report/Dissertation/Thesis (“this Work”): A SECURITY FRAMEWORK FOR MOBILE HEALTH APPLICATIONS ON ANDROID PLATFORM Field of Study: Network Security (Computer Science) I do solemnly and sincerely declare that: (1) I am the sole author/writer of this Work; (2) This Work is original; (3) Any use of any work in which copyright exists was done by way of fair dealing and for permitted purposes and any excerpt or extract from, or reference to or reproduction of any copyright work has been disclosed expressly and sufficiently and the title of the Work and its authorship have been acknowledged in this Work; (4) I do not have any actual knowledge nor do I ought reasonably to know that the making of this work constitutes an infringement of any copyright work; (5) I hereby assign all and every rights in the copyright to this Work to the University of Malaya (“UM”), who henceforth shall be owner of the copyright in this Work and that any reproduction or use in any form or by any means whatsoever is prohibited without the written consent of UM having been first had and obtained; (6) I am fully aware that if in the course of making this Work I have infringed any copyright whether intentionally or otherwise, I may be subject to legal action or any other action as may be determined by UM.
    [Show full text]
  • Innovations in Natural Language Document Processing for Requirements Engineering
    Calhoun: The NPS Institutional Archive Faculty and Researcher Publications Faculty and Researcher Publications 2008 Innovations in Natural Language Document Processing for Requirements Engineering Berzins, Valdis þÿB. Paech and C. Martell (Eds.): Monterey Workshop 2007, LNCS 5320, pp. 125 146, 2008. http://hdl.handle.net/10945/46073 Innovations in Natural Language Document Processing for Requirements Engineering Valdis Berzins, Craig Martell, Luqi, and Paige Adams Naval Postgraduate School, 1411 Cunningham Road, Monterey, California 93943 {berzins,cmartell,luqi,phadams}@nps.edu Abstract. This paper evaluates the potential contributions of natural language processing to requirements engineering. We present a selective history of the relationship between requirements engineering (RE) and natural-language processing (NLP), and briefly summarize relevant re- cent trends in NLP. The paper outlines basic issues in RE and how they relate to interactions between a NLP front end and system-development processes. We suggest some improvements to NLP that may be possible in the context of RE and conclude with an assessment of what should be done to improve likelihood of practical impact in this direction. Keywords: Requirements, Natural Language, Ambiguity, Gaps, Domain- Specific Methods. 1 Introduction A major challenge in requirements engineering is dealing with changes, especially in the context of systems of systems with correspondingly complex stakeholder communities and critical systems with stringent dependability requirements. Documentation driven development (DDD) is a recently developed approach for addressing these issues that seeks to simultaneously improve agility and de- pendability via computer assistance centered on a variety of documents [1,2]. The approach is based on a new view of documents as computationally active knowledge bases that support computer aid for many software engineering tasks from requirements engineering to system evolution, which is quite different from the traditional view of documents as passive pieces of paper.
    [Show full text]
  • Managing Requirements Engineering Risks: an Analysis and Synthesis of the Literature
    Lars Mathiassen – Timo Saarinen – Tuure Tuunanen – Matti Rossi MANAGING REQUIREMENTS ENGINEERING RISKS: AN ANALYSIS AND SYNTHESIS OF THE LITERATURE W-379 HELSINKI SCHOOL OF ECONOMICS ISSN 1795-1828 WORKING PAPERS ISBN 951-791-895-X (Electronic working paper) W-379 2004 Lars Mathiassen* – Timo Saarinen** – Tuure Tuunanen** – Matti Rossi** MANAGING REQUIREMENTS ENGINEERING RISKS: AN ANALYSIS AND SYNTHESIS OF THE LITERATURE *Center for Process Innovation, Georgia State University **Helsinki School Economics, Department of Management, Information Systems Science November 2004 HELSINGIN KAUPPAKORKEAKOULU HELSINKI SCHOOL OF ECONOMICS WORKING PAPERS W-379 HELSINGIN KAUPPAKORKEAKOULU HELSINKI SCHOOL OF ECONOMICS PL 1210 FIN-00101 HELSINKI FINLAND © Lars Mathiassen, Timo Saarinen, Tuure Tuunanen, Matti Rossi and Helsinki School of Economics ISSN 1795-1828 ISBN 951-791-895-X (Electronic working paper) Helsinki School of Economics - HeSE print 2004 Managing Requirements Engineering Risks: An Analysis and Synthesis of the Literature Lars Mathiassen ([email protected]) Center for Process Innovation, Georgia State University P. O. Box 4015, Atlanta, GA 30303-4015, USA Phone: +1-404-651-0933, Fax: +1-404-463-9292 Timo Saarinen ([email protected]) Helsinki School Economics, Department of Management, Information Systems Science P. O. Box 1210, FIN-00101 Helsinki, Finland Phone: +358-9-431-38272, Fax: Fax: +358-9-431-38700 Tuure Tuunanen ([email protected]) Helsinki School Economics, Department of Management, Information Systems Science P. O. Box 1210, FIN-00101 Helsinki, Finland Phone: +358-40-544-5591, Fax: +358-9-431-38700 http://www.tuunanen.fi Matti Rossi ([email protected]) Helsinki School Economics, Department of Management, Information Systems Science P.
    [Show full text]
  • Frequently Asked Questions
    Frequently Asked Questions www.wireless-village.org The Wireless Village initiative: FAQs 26 April 2001 1. Instant Messaging and Presence Services (IMPS) 1.1 What is IMPS? It stands for “instant messaging and presence service”, and includes four primary features: · Presence · Instant Messaging · Groups · Shared Content In the mobile Internet society, people have a greater need to communicate than ever before. In wire-line networks, people can use online chat software to communicate across the Internet using short text, or even multimedia, messages. This type of service is called an “instant messaging service”. In mobile networks, similar short message services have existed since the introduction of digital mobile phone service. The utility of instant messaging is greatly enhanced by the addition of a service that will keep track of the online status and availability of your chat partners or “friends”; as well as notify you of changes to their status or availability. This type of service is called a “presence service”. The combination of instant messaging, presence, groups, and shared content is called an IMPS. 1.2 Is the concept of IMPS new? No. Ever since the introduction of early time-sharing computer systems, there has been the availability of services desired to allow users of these systems to communicate or “chat” between terminals using short text messages. Some have even provided session based services that provide a “chat room” feature. Digital mobile phone users are also familiar with mobile-terminated and mobile- originated short messaging services. These services allow text-based messaging between mobile phone users. Internet “web portal” and online services users are also familiar with chat, chat room capabilities and “friends lists” for maintaining chat addresses of friends; along with their online status and availability.
    [Show full text]
  • Compression for Great Video and Audio Master Tips and Common Sense
    Compression for Great Video and Audio Master Tips and Common Sense 01_K81213_PRELIMS.indd i 10/24/2009 1:26:18 PM 01_K81213_PRELIMS.indd ii 10/24/2009 1:26:19 PM Compression for Great Video and Audio Master Tips and Common Sense Ben Waggoner AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Focal Press is an imprint of Elsevier 01_K81213_PRELIMS.indd iii 10/24/2009 1:26:19 PM Focal Press is an imprint of Elsevier 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA Linacre House, Jordan Hill, Oxford OX2 8DP, UK © 2010 Elsevier Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions . This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this fi eld are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein.
    [Show full text]
  • Research Purpose Operating Systems – a Wide Survey
    GESJ: Computer Science and Telecommunications 2010|No.3(26) ISSN 1512-1232 RESEARCH PURPOSE OPERATING SYSTEMS – A WIDE SURVEY Pinaki Chakraborty School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi – 110067, India. E-mail: [email protected] Abstract Operating systems constitute a class of vital software. A plethora of operating systems, of different types and developed by different manufacturers over the years, are available now. This paper concentrates on research purpose operating systems because many of them have high technological significance and they have been vividly documented in the research literature. Thirty-four academic and research purpose operating systems have been briefly reviewed in this paper. It was observed that the microkernel based architecture is being used widely to design research purpose operating systems. It was also noticed that object oriented operating systems are emerging as a promising option. Hence, the paper concludes by suggesting a study of the scope of microkernel based object oriented operating systems. Keywords: Operating system, research purpose operating system, object oriented operating system, microkernel 1. Introduction An operating system is a software that manages all the resources of a computer, both hardware and software, and provides an environment in which a user can execute programs in a convenient and efficient manner [1]. However, the principles and concepts used in the operating systems were not standardized in a day. In fact, operating systems have been evolving through the years [2]. There were no operating systems in the early computers. In those systems, every program required full hardware specification to execute correctly and perform each trivial task, and its own drivers for peripheral devices like card readers and line printers.
    [Show full text]
  • A Complete Bibliography of Publications in Software—Practice and Experience
    A Complete Bibliography of Publications in Software|Practice and Experience Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 23 July 2021 Version 3.26 Title word cross-reference [Bar82a, Bar82c, Bar84b]. < [SMGMOFM07a, SMGMOFM07b]. > [SMGMOFM07a, SMGMOFM07b]. 2 [MST13, MDB19]. 3 [DS09]. 4 [MSR+07]. \ 0 [GW96]. 1 [GW96]. $1.50 [Bar78d]. $11 [PK04]. TM [MZB00, Win02]. 8 [DB21b]. k [Bar84a]. $12.00 [Rob72]. $13 [Bar84a]. [AW93, Mer93]. κ [MG94]. µ $13.00 [Rob72]. $18.50 [Jon74]. $185 [BS90c, BDS+92, SMNB21]. N [Bar79b]. $19.30 [Lan74a]. $19.50 [Dav78]. [MS98, Coh98, KST94, YAVHC21]. P 3 $25.00 [Pet77, And78]. 3 [BE02, FMA02]. [DC03]. PM [CLD+17]. q [GSR17]. τ $31-25 [Pet77]. $31.35 [Bri82]. 32 [VED06]. 2:5 [TSZ14, UDS+07]. $35.00 [Inc86]. $39.50 [Sim83]. 5 [CPMAH+20]. $58.50 [Wal81a]. $6.95 -ary [MS98]. -bit [AM10, SF85, VED06]. [Tho74]. 64 [AM10, VED06]. 68 -gram [Coh98, KST94, YAVHC21]. -grams [Ear76, Hol77]. $68.25 [Pit82]. $7.00 [GSR17]. -level [FM77]. -queens [Plu74]. [Bar72a]. $7.50 [Bar78d]. $7.95 -R [Ear76, Hol77]. -shortest-paths [MG94]. [Bar76a, Lav77]. $78.50 [Sim83]. 8 -System [BS90c]. [Plu74, SF85]. $8.95 [Bar82a, Bar82c, Bar84b]. $9.75 . [Bis81b]. .NET [Coo04, Han04]. [Bar77e, Mul76]. $9.80 [Atk79a]. $9.95 1 2 0 [Bar81, Edw98a, Edw98b, Gru83, Llo82, 2 [Bar74a, Bar74b, Bar80b, Bud85, Cor88b, Val77a, Val78, Wal83b].
    [Show full text]