Filters
total: 1225
displaying 1000 best results Help
Search results for: agile, security, software development methods
-
Weronika Hewelt-Belka dr hab. inż.
PeopleI am specializing in analytical chemistry with a primary focus on lipidomics and metabolomics. My research centers on the development and application of cutting-edge analytical techniques, particularly high-performance liquid chromatography coupled with mass spectrometry (LC-MS), to explore complex biological matrices and deepen our understanding of human metabolism and health. A significant part of my work is dedicated to studying...
-
Playing the Sprint Retrospective
PublicationIn agile software development, where great emphasis is put on effective informal communication, success depends heavily on human and social factors. However, Scrum does not specify any techniques that aid the human side of software development. In this paper we investigate the use of 6 collaborative games for the Sprint Retrospective. Each game was implemented twice in a Scrum team in Intel Technology Poland. The received feedback...
-
Jakub Miler dr inż.
PeopleAcademic career: 2000: Master of Science - Gdansk University of Technology, Faculty of Electronics, Telecommunications and Informatics, thesis "Computer system for supporting risk management in a software engineering project", supervisor prof. Janusz Górski 2005: PhD - Gdansk University of Technology, Faculty of Electronics, Telecommunications and Informatics, thesis "A Method of Software Project Risk Identification and Analysis",...
-
Piotr Rajchowski dr inż.
PeoplePiotr Rajchowski (Member, IEEE) was born in Poland, in 1989. He received the E.Eng., M.Sc., and Ph.D. degrees in radio communication from the Gdańsk University of Technology (Gdańsk Tech), Poland, in 2012, 2013, and 2017, respectively. Since 2013, he has been working at the Department of Radiocommunication Systems and Networks, Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology, as a IT...
-
Interaction Design in Agile IT Projects
PublicationIn recent years, interactive systems, such as various types of software, online services or mobile applications, have become an integral part of everyday life. Interactive systems and digital services should be easy to use and provide a positive User Experience (UX). For this reason, interaction design has recently emerged as a distinct professional area of information technology (IT). Easy interaction and user experience (UX)...
-
Adopting Collaborative Games into Agile Requirements Engineering
PublicationIn agile software development, where great emphasis is put on effective informal communication involving diverse stakeholders, success depends on human and social factors. Not surprisingly, the Agile Manifesto advocates principles and values such as “individuals and interactions over processes and tools”, “focus on the customer”, “collaborate regularly”, “communicate face-to-face within the team” and “have regular team introspection”....
-
Aspect-Oriented Software Development
Conferences -
International Conference on Software Development
Conferences -
Antecedents to Achieve Kanban Optimum Benefits in Software Companies
PublicationIn 2004, Kanban successfully entered into the Agile and Lean realm. Since then software companies have been increasingly using it in software development teams. The goal of this study is to perform an empirical investigation on antecedents considered as important for achieving optimum benefits of Kanban use and to discuss the practical implications of the findings. We conducted an online survey with software professionals from...
-
Andrzej Chybicki dr inż.
PeopleA graduate of the Faculty of Electronics, Telecommunications and Informatics at the Gdańsk University of Technology, PhD in technical sciences in the field of IT specializing in distributed data processing in IT . Aimed at exploiting the achievements and knowledge in the field of industrial research. He cooperated with a number of companies including OpeGieka Elbląg, Reson Inc., Powel Sp. z o. o., Wasat, Better Solutions, the European...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublicationIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Building Dedicated Project Management Process Basing on Historical Experience
PublicationProject Management Process used to manage IT project could be a key aspect of project success. Existing knowledge does not provide a method, which enables IT Organizations to choose Project Management methodology and processes, which would be adjusted to their unique needs. As a result, IT Organization use processes which are not tailored to their specific and do not meet their basic needs. This paper is an attempt to fill this...
-
Kamil Andrzej Rybacki mgr inż.
PeopleBorn on 23 October 1993 in Gdańsk. In 2017, I have received the M.Sc. Degree at the Faculty of Applied Physics and Mathematics, Gdańsk University of Technology, Poland. My main fields of interest include computer simulations of molecular systems, parallel computing in application to computational physics methods and development of various simulation software. Currently, my research is focused on the development of hybrid Molecular...
-
Grzegorz Zieliński dr inż.
PeopleAuthor of over 100 scientific publications (both in Polish and English) in the field of service management, entity improvement, including medical entities. Scientific and research interests include areas related to the maturity and excellence of enterprises in various aspects of their activities. He participated in research projects of the National Science Center and projects implemented by international consortia under the European...
-
Game-based Sprint retrospectives: multiple action research
PublicationIn today’s fast-paced world of rapid technological change, software development teams need to constantly revise their work practices. Not surprisingly, regular reflection on how to become more effective is perceived as one of the most important principles of Agile Software Development. Nevertheless, running an effective and enjoyable retrospective meeting is still a challenge in real environments. As reported by several studies,...
-
Towards Cognitive and Perceptive Video Systems
PublicationIn this chapter we cover research and development issues related to smart cameras. We discuss challenges, new technologies and algorithms, applications and the evaluation of today’s technologies. We will cover problems related to software, hardware, communication, embedded and distributed systems, multi-modal sensors, privacy and security. We also discuss future trends and market expectations from the customer’s point of view.
-
Gabriela Rembarz dr inż. arch.
PeopleGabriela Rembarz inżynier-architekt, urbanista, naukowiec, dydaktyk i aktywna projektantka, jest doktorem nauk technicznych w dyscyplinie architektura i urbanistyka, Ukończyła studia magisterskie na Wydziale Architektury i Urbanistyki Politechniki Gdańskiej, uzupełniając je specjalizacją w Ochronie Środowiska w ramach międzyuczelnianego CENVIG Center of Environmental Studies (Politechnika Gdańska) akredytowanego przez Roskilde...
-
Ontology Engineering Aspects in the Intelligent Systems Development
PublicationThe ontology engineering encompasses both, artificial intelligence methods and software engineering discipline. The paper tries to address a selection of aspects pertaining to development activities such as choice of the environmental framework, functionality description, specification methods and roles definition. Authors refer to the ontology development projects they were involved in.
-
Hybrid Approach in Project Management - Mixing Capability Maturity Model Integration with Agile Practices
PublicationThis paper introduces an idea of hybrid approach in managing software development projects. The main goal of this research is to prove that it is possible to design consistent method for managing software development projects which is based on different corporate standards and methods. Authors also want to show that this new hybrid approach is beneficial for IT organization, triggers synergy effects and brings software development...
-
Jakość oprogramowania w zwinnym podejściu do zarządzania projektami informatycznymi
PublicationCel: Celem artykułu jest ocena, czy wykorzystanie podejścia zwinnego Scrum w organizacji podnosi jakość wytwarzanego oprogramowania oraz próba uzyskania odpowiedzi na pytanie, jak nowelizacja Przewodnika po Scrumie (Scrum Guide) z listopada 2020 roku wpłynęła na proces wytwarzania oprogramowania. Projekt badania/metodyka badawcza/koncepcja: Przyjętą metodyką badawczą jest przegląd literatury przedmiotu oraz badania własne autora....
-
Agnieszka Landowska dr hab. inż.
PeopleAgnieszka Landowska works for Gdansk University of Technology, FETI, Department of Software Engineering. Her research concentrates on usability, accessibility and technology adoption, as well as affective computing methods. She initiated Emotions in HCI Research Group and conducts resarch on User eXperiene evaluation of applications and other technologies.
-
Tomasz Janowski dr
PeopleTomasz Janowski is the Head of the Department of Informatics in Management, Gdańsk University of Technology, Poland; Invited Professor at the Department for E-Governance and Administration, University for Continuing Education Krems, Austria; and Co-Editor-in-Chief of Government Information Quarterly, Elsevier. Previously, he was the founder and head of the United Nations University Operating Unit on Policy-Driven Electronic Governance...
-
Evaluation of Readiness of IT Organizations to Agile Transformation Based on Case-Based Reasoning
PublicationNowadays many of IT organization decides to change the way of delivering from classic, waterfall approach to agile. This transition is called “agile transformation” (AT). The problem of this process is that part of companies started AT without any analysis. This causes that many of transitions fails and organizations must return to old methods of delivering. Cost of return is significant and number of projects with violated project...
-
SDN testbed for validation of cross-layer data-centric security policies
PublicationSoftware-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...
-
Completeness and Consistency of the System Requirement Specification
PublicationAlthough the System Requirement Specification, as a first formal and detailed document, is the base for the software project in classic software methodologies, there is a noticeable problem of assuring the completeness of this document. The lack of its completeness causes uncertainty of the project foundations. This was one of motivations for agile methodologies – if the SRS cannot be easily validated, if it can change in late project...
-
Adopting collaborative games into Open Kanban
PublicationThe crucial element of any agile project is people. Not surprisingly, principles and values such as "Respect for people", "Communication and Collaboration", "Lead using a team approach", and "Learn and improve continuously" are an integral part of Open Kanban. However, Open Kanban has not provided any tools or techniques to aid the human side of software development. Moreover, as a Lean initiative, it is not as comprehensively...
-
Anti-theft lab security system based on RFID
PublicationThe aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...
-
Critical systems software testing and QA - Spring'24
e-Learning CoursesCourse objectives: Present software development standards in the European space industry and techniques of their implementation. Learn how to assess and manage critical system software quality in an IT project. Gain basic hands-on experience in bug tracking and reporting in a software project.
-
International Conference on Model-Driven Engineering and Software Development
Conferences -
Overview of new product development strategies and models
PublicationMotivation: The motivation for the overview presented in this article is to provide a starting point for considering whether existing new product development methodology and its level of detail allows product teams to develop high-quality and business-effective product concepts. Aim: The aim of this article is recognise the current state of research into new product development methodology and to present the strategies and models...
-
Model oceny dojrzałości przedsiębiorstw do zastosowania zwinnych metodyk zarządzania projektami IT
PublicationDysertacja koncentruje się na budowie modelu, który ocenia gotowość przedsiębiorstw do wdrożenia zwinnych metodyk zarządzania projektami IT. Analizuje istniejące metody oceny dojrzałości projektowej i wprowadza własny model, biorąc pod uwagę krytyczne czynniki sukcesu i skuteczność zwinnych metod. Rozprawa zawiera badania literaturowe, empiryczne studium przypadku oraz weryfikację i rekomendacje modelu, dostarczając wglądu w praktyczne...
-
Agile Commerce in the light of Text Mining
PublicationThe survey conducted for this study reveals that more than 84% of respondents have never encountered the term “agile commerce” and do not understand its meaning. At the same time, they are active participants of this strategy. Using digital channels as customers more often than ever before, they have already been included in the agile philosophy. Based on the above, the purpose of the study is to analyse major text sets containing...
-
Mobile Security: Threats and Best Practices
PublicationCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
Computer -Aided Local Energy Planning Using ALEP-PL Software
PublicationThe issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...
-
Zarządzanie bezpieczeństwem informacji - specjalność ISI -2022
e-Learning CoursesThe aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.
-
Zarządzanie bezpieczeństwem informacji - specjalność ISI -2023
e-Learning CoursesThe aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.
-
Zarządzanie bezpieczeństwem informacji - specjalność ISI -2024
e-Learning CoursesThe aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.
-
Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
PublicationCritical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...
-
International Conference on Software Engineering and Formal Methods
Conferences -
Barbara Kusznierewicz dr hab. inż.
People -
Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublicationSustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...
-
What Is Troubling IT Analysts? A Survey Report from Poland on Requirements-Related Problems
PublicationRequirements engineering and business analysis are activities considered to be important to software project success but also difficult and challenging. This paper reports on a survey conducted in Polish IT industry, aimed at identifying most widespread problems/challenges related to requirements. The survey was targeted at people performing role of analyst in commercial IT projects. The questionnaire included 64 pre-defined problems...
-
Ontology-Aided Software Engineering
PublicationThis thesis is located between the fields of research on Artificial Intelligence (AI), Knowledge Representation and Reasoning (KRR), Computer-Aided Software Engineering (CASE) and Model Driven Engineering (MDE). The modern offspring of KRR - Description Logic (DL) [Baad03] is considered here as a formalization of the software engineering Methods & Tools. The bridge between the world of formal specification (governed by the mathematics)...
-
SkinDepth - synthetic 3D skin lesion database
Open Research DataSkinDepth is the first synthetic 3D skin lesion database. The release of SkinDepth dataset intends to contribute to the development of algorithms for:
-
VISUALIZATION OF SCANTER AND ARPA RADAR DATA IN THE DISTRIBUTED TELEINFORMATION SYSTEM FOR THE BORDER GUARD
PublicationMonitoring of country maritime border is an important task of the Border Guard. This activity can be enhanced with the use of the technology enabling gathering information from distributed sources, processing of that information and its visualization. The paper presents the next stage of development of the STRADAR project (Streaming of real-time data transmission in distributed dispatching and teleinformation systems of the Border...
-
Analysis of human behavioral patterns
PublicationWidespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...
-
Spatial Modelling in Environmental Analysis and Civil Engineering
PublicationAs can be seen, Spatial Modelling in Environmental Analysis and Civil Engineering applies to a multitude of applications. In an attempt to bring the topic closer to potential readers, the special issue referred to security methods, optimization of calculations, conducting measurements and empirical tests. Each article has made an original contribution to the development of practical science that can be replicated by researchers...
-
Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments
PublicationThe goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...
-
Approaching Secure Industrial Control Systems
PublicationThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
Developing competences of IT project managers using simulation games
PublicationProject Management is a domain in which methodological approach is developing very rapidly. Project managers are required to present knowledge of the various methods of project management and apply them to the management of specific projects. It means that project managers must constantly develop their competence, mainly based on good practices from different formal methods of project management. The purpose of this article is...