• Title, Summary, Keyword: Software

Search Result 24,054, Processing Time 0.071 seconds

A Study on software patent claim of computer related invention (컴퓨터 관련 발명의 소프트웨어의 특허 클레임에 관한 연구)

  • Nam Tea-Soo
    • Management & Information Systems Review
    • /
    • v.7
    • /
    • pp.211-226
    • /
    • 2001
  • This paper relates to a software patent of a computer related invention, explains a describing method of software patent claim which can be registered software patent of computer related invention instead of computer program copyright which is the Intellectual Property about software since 1998 in the Korea Intellectual Patent Office(KIPO) by developing an information communication infrastructure technology and WWW technology. Also, it introduces an international and domestic trends of the software patent for computer related invention and related database for the software patent of the world and mentions advantage and disadvantage of software patent regime of each nation and the facing software patent problems as the Intellectual Property.

  • PDF

An analysis of the switching Software Matrics : Case study (통신 소프트웨어의 복잡도 분석 사례 연구)

  • 이재기;신상권;남상식;김창봉
    • Proceedings of the IEEK Conference
    • /
    • /
    • pp.409-412
    • /
    • 2002
  • The software complexity model makes an estimated of the product software. For a practice of software managed, need to guideline of the static analysis. Especially, Software complexity model introduced for the estimation of software quantity. In case of measurement the software matrices, its need for us to analysis of software qualify and products. In this paper, we represent that the analysis of function point, control structure and interface, volume matrices in various aspect of switching software. Others, their results utilized similar of project and system development.

  • PDF

Analyses of Security for Software Attack (소프트웨어 공격에 대한 보안성 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • /
    • pp.725-728
    • /
    • 2007
  • Software security is about making software behave correctly in the presence of a malicious attack, even though software failures usually happen spontaneously in the real world. Standard software testing literature is concerned only with what happens when software fails, regardless of intent. The difference between software safety and software security is therefor the presence of an intelligent adversary bent on breaking the system. Software security for attacking the system is presented in this paper

  • PDF

A Development and Application of the Checklist for Evaluating Software Usability (소프트웨어 사용성 평가를 위한 체크리스트의 개발과 적용)

  • 진영택;하수정
    • The Journal of Society for e-Business Studies
    • /
    • v.6 no.2
    • /
    • pp.73-85
    • /
    • 2001
  • Usability is defined by the effectiveness, efficiency and satisfaction with which specified users can achieve specified goal in particular environment. Today, many factors such as software acquisition, business re-engineering and the trend of software market have software industry considers usability as an important quality of software products. Therefore, the specification and measurement method for establishing the acceptable usability level of software is required during software development acquisition and evaluation. To evaluate whether software products is usable or not, we need evaluation method for software usability. This paper is not only to provide a framework for specifying the usability attributes of a product and establishing a comprehensive set of usability criteria, but also assessing usability metrics of the software. The usability metrics and checklist is developed based on the properties of the user interface using ISO standard and general usability principles with product-oriented view which means the Product has attributes contributing to determine the usability. This paper also suggested the way to weight the relative importance of the individual usability item depending on the software categories.

  • PDF

Basic Elements and Implication of Software Metadata in the Intelligent Geospatial Web

  • Lee, Ki-Won
    • Korean Journal of Remote Sensing
    • /
    • v.25 no.6
    • /
    • pp.559-569
    • /
    • 2009
  • During over decades, metadata on spatial data have been developed, and they have been widely applied at the national and international metadata standards such as file structure, format, and data model. However, in the web 2.0 paradigm toward user participation and openness, sources and contents of geospatial products are also diversified, not being limited to well-organized and structured data sets or databases. Especially, software products in both open source software and commercially packaged software are considered into important resources in the geospatial domain. But there are no reports or studies regarding software metadata from the side of software engineering or information technology, till now. The motivation of this study is based on practical needs to build search engine in the intelligent geospatial web. Brief review on current metadata standards is presented, and necessity for software metadata is discussed as well as related works. Basic elements, initially considered, of software metadata are presented. This work is the first attempt for software metadata, although it just covers geospatial software products. Further practical works to meet industrial demands need to actual applications of software metadata.

Quantitative Reliability Assessment for Safety Critical System Software

  • Chung, Dae-Won
    • Journal of Electrical Engineering and Technology
    • /
    • v.2 no.3
    • /
    • pp.386-390
    • /
    • 2007
  • At recent times, an essential issue in the replacement of the old analogue I&C to computer-based digital systems in nuclear power plants becomes the quantitative software reliability assessment. Software reliability models have been successfully applied to many industrial applications, but have the unfortunate drawback of requiring data from which one can formulate a model. Software that is developed for safety critical applications is frequently unable to produce such data for at least two reasons. First, the software is frequently one-of-a-kind, and second, it rarely fails. Safety critical software is normally expected to pass every unit test producing precious little failure data. The basic premise of the rare events approach is that well-tested software does not fail under normal routine and input signals, which means that failures must be triggered by unusual input data and computer states. The failure data found under the reasonable testing cases and testing time for these conditions should be considered for the quantitative reliability assessment. We presented the quantitative reliability assessment methodology of safety critical software for rare failure cases in this paper.

Improved Exponential Software Reliability Model Based on NHPP with the Uncertainty of Operating Environments

  • Song, Kwang Yoon;Chang, In Hong
    • Journal of the Chosun Natural Science
    • /
    • v.10 no.4
    • /
    • pp.249-257
    • /
    • 2017
  • The main focus when developing software is to improve the reliability and stability of a software system. We are enjoying a very comfortable life thanks to modern civilization, however, comfort is not guaranteed to us. Once software systems are introduced, the software systems used in the field environments are the same as or close to those used in the development-testing environment; however, the systems may be used in many different locations. Development of software system is a difficult and complex process. Generally, existing software reliability models are applied to software testing data and then used to make predictions on the software failures and reliability in the field. In this paper, we present an improved exponential NHPP software reliability model in different development environments, and examine the goodness-of-fit of improved exponential model and other model based on two datasets. The results show that the proposed model fits significantly better than other NHPP software reliability model.

Reliability Models for Application Software in Maintenance Phase

  • Chen, Yung-Chung;Tsai, Shih-Ying;Chen, Peter
    • Industrial Engineering and Management Systems
    • /
    • v.7 no.1
    • /
    • pp.51-56
    • /
    • 2008
  • With growing demand for zero defects, predicting reliability of software systems is gaining importance. Software reliability models are used to estimate the reliability or the number of latent defects in a software product. Most reliability models to estimate the reliability of software in the literature are based on the development lifecycle stages. However, in the maintenance phase, the software needs to be corrected for errors and to be enhanced for the requests from users. These decrease the reliability of software. Software Reliability Growth Models (SRGMs) have been applied successfully to model software reliability in development phase. The software reliability in maintenance phase exhibits many types of systematic or irregular behaviors. These may include cyclic behavior as well as long-term evolutionary trends. The cyclic behavior may involve multiple periodicities and may be asymmetric in nature. In this paper, SGRM has been adapted to develop a reliability prediction model for the software in maintenance phase. The model is established using maintenance data from a commercial shop floor control system. The model is accepted to be used for resource planning and assuring the quality of the maintenance work to the user.

Fundamental Principles for Software Architecture Design (소프트웨어 아키텍처 설계의 근본 원리들)

  • Kang, Sungwon
    • Journal of Software Engineering Society
    • /
    • v.23 no.4
    • /
    • pp.125-139
    • /
    • 2010
  • This paper first examines the notion of software and the importance of software development and then presents twelve fundamental principles for software architecture design as the key enabling technology for effective software development. This paper divides design steps into four groups, i.e. analyzing the problem, deciding architecture modeling methods, architecture design process and architecture evaluation. Then it identifies the principles within and across the various steps of software architecture design and explains their roles.

  • PDF

Design and Implementation of Software Vulnerability Analysis Algorithm through Static Data Access Analysis

  • Lim, Hyun-il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.69-75
    • /
    • 2015
  • Nowadays, software plays various roles in applications in wide areas. However, the security problems caused by software vulnerabilities increase. So, it is necessary to improve software security and safety in software execution. In this paper, we propose an approach to improve the safety of software execution by managing information used in software through static data access analysis. The approach can detect the exposures of secure data in software execution by analyzing information property and flows through static data access analysis. In this paper, we implemented and experimented the proposed approach with a base language, and verify that the proposed approach can effectively detect the exposures of secure information. The proposed approach can be applied in several areas for improving software safety by analysing vulnerabilities from information flows in software execution.