Wyniki wyszukiwania dla: agile, security, software development methods - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: agile, security, software development methods

Wyniki wyszukiwania dla: agile, security, software development methods

  • Balancing agility and discipline in a research project

    Publikacja

    - Rok 2007

    Successful software development requires both agility and discipline. Optimal selection of methods, however, is not an easy task. The problem becomes even more difficult for long lasting projects. Appropriate selection of methods involving skillful introduction and abandonment of certain practices in time makes the whole process dynamic. The paper presents in this context a research project which was realized in a few iterations....

  • Weronika Hewelt-Belka dr hab. inż.

    I am specializing in analytical chemistry with a primary focus on lipidomics and metabolomics. My research centers on the development and application of cutting-edge analytical techniques, particularly high-performance liquid chromatography coupled with mass spectrometry (LC-MS), to explore complex biological matrices and deepen our understanding of human metabolism and health. A significant part of my work is dedicated to studying...

  • Jakub Miler dr inż.

    Kariera akademicka: 2000: mgr inż. Wydział ETI, Politechnika Gdańska, praca pt. "Computer system for supporting risk management in a software engineering project", promotor prof. Janusz Górski 2005: dr inż. Wydział ETI, Politechnika Gdańska, rozprawa pt. "A Method of Software Project Risk Identification and Analysis", obroniona z wyróżnieniem, dziedzina nauki techniczne, dyscyplina informatyka, promotor prof. Janusz Górski Zainteresowania...

  • Playing the Sprint Retrospective

    In agile software development, where great emphasis is put on effective informal communication, success depends heavily on human and social factors. However, Scrum does not specify any techniques that aid the human side of software development. In this paper we investigate the use of 6 collaborative games for the Sprint Retrospective. Each game was implemented twice in a Scrum team in Intel Technology Poland. The received feedback...

    Pełny tekst do pobrania w portalu

  • Piotr Rajchowski dr inż.

    Piotr Rajchowski (Member, IEEE) was born in Poland, in 1989. He received the E.Eng., M.Sc., and Ph.D. degrees in radio communication from the Gdańsk University of Technology (Gdańsk Tech), Poland, in 2012, 2013, and 2017, respectively. Since 2013, he has been working at the Department of Radiocommunication Systems and Networks, Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology, as a IT...

  • Interaction Design in Agile IT Projects

    Publikacja

    - Rok 2021

    In recent years, interactive systems, such as various types of software, online services or mobile applications, have become an integral part of everyday life. Interactive systems and digital services should be easy to use and provide a positive User Experience (UX). For this reason, interaction design has recently emerged as a distinct professional area of information technology (IT). Easy interaction and user experience (UX)...

    Pełny tekst do pobrania w portalu

  • Adopting Collaborative Games into Agile Requirements Engineering

    Publikacja

    In agile software development, where great emphasis is put on effective informal communication involving diverse stakeholders, success depends on human and social factors. Not surprisingly, the Agile Manifesto advocates principles and values such as “individuals and interactions over processes and tools”, “focus on the customer”, “collaborate regularly”, “communicate face-to-face within the team” and “have regular team introspection”....

    Pełny tekst do pobrania w portalu

  • Aspect-Oriented Software Development

    Konferencje

  • International Conference on Software Development

    Konferencje

  • Antecedents to Achieve Kanban Optimum Benefits in Software Companies

    Publikacja
    • M. Ahmad
    • A. Rohunen
    • P. Raulamo-jurvanen

    - Rok 2019

    In 2004, Kanban successfully entered into the Agile and Lean realm. Since then software companies have been increasingly using it in software development teams. The goal of this study is to perform an empirical investigation on antecedents considered as important for achieving optimum benefits of Kanban use and to discuss the practical implications of the findings. We conducted an online survey with software professionals from...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Andrzej Chybicki dr inż.

    Z wykształcenia informatyk, absolwent Wydziału Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej, doktor nauk technicznych w dziedzinie informatyka specjalizujący się w przetwarzaniau danych przestrzennych w rozproszonych systemach informatycznych. Ukierunkowany na wykorzystywanie osiągnięć i wiedzy zakresu prowadzonych badań w przemyśle. Współpracował z szeregiem podmiotów przemysłu informatycznego, geodezyjnego...

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publikacja

    - Rok 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Building Dedicated Project Management Process Basing on Historical Experience

    Publikacja

    - Rok 2017

    Project Management Process used to manage IT project could be a key aspect of project success. Existing knowledge does not provide a method, which enables IT Organizations to choose Project Management methodology and processes, which would be adjusted to their unique needs. As a result, IT Organization use processes which are not tailored to their specific and do not meet their basic needs. This paper is an attempt to fill this...

    Pełny tekst do pobrania w portalu

  • Kamil Andrzej Rybacki mgr inż.

    Osoby

    Born on 23 October 1993 in Gdańsk. In 2017, I have received the M.Sc. Degree at the Faculty of Applied Physics and Mathematics, Gdańsk University of Technology, Poland. My main fields of interest include computer simulations of molecular systems, parallel computing in application to computational physics methods and development of various simulation software. Currently, my research is focused on the development of hybrid Molecular...

  • Grzegorz Zieliński dr inż.

    Autor ponad 100 publikacji naukowych (zarówno w języku polskim, jak i angielskim) z zakresu zarządzania działalnością usługową, doskonalenia podmiotów, w tym podmiotów leczniczych. Zainteresowania naukowo-badawcze obejmują obszary związane z dojrzałością i doskonałością przedsiębiorstw w różnych aspektach ich działalności. Uczestniczył w projektach badawczych Narodowego Centrum Nauki oraz projektach realizowanych przez międzynarodowe...

  • Game-based Sprint retrospectives: multiple action research

    In today’s fast-paced world of rapid technological change, software development teams need to constantly revise their work practices. Not surprisingly, regular reflection on how to become more effective is perceived as one of the most important principles of Agile Software Development. Nevertheless, running an effective and enjoyable retrospective meeting is still a challenge in real environments. As reported by several studies,...

    Pełny tekst do pobrania w portalu

  • Towards Cognitive and Perceptive Video Systems

    Publikacja
    • T. Akgun
    • C. Attwood
    • A. Cavallaro
    • C. Fabre
    • F. Poiesi
    • P. Szczuko

    - Rok 2014

    In this chapter we cover research and development issues related to smart cameras. We discuss challenges, new technologies and algorithms, applications and the evaluation of today’s technologies. We will cover problems related to software, hardware, communication, embedded and distributed systems, multi-modal sensors, privacy and security. We also discuss future trends and market expectations from the customer’s point of view.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Gabriela Rembarz dr inż. arch.

    Gabriela Rembarz inżynier-architekt, urbanista, naukowiec, dydaktyk i aktywna projektantka, jest doktorem nauk technicznych w dyscyplinie architektura i urbanistyka, Ukończyła studia magisterskie na Wydziale Architektury i Urbanistyki Politechniki Gdańskiej, uzupełniając je specjalizacją w Ochronie Środowiska w ramach międzyuczelnianego CENVIG Center of Environmental Studies (Politechnika Gdańska) akredytowanego przez Roskilde...

  • Ontology Engineering Aspects in the Intelligent Systems Development

    The ontology engineering encompasses both, artificial intelligence methods and software engineering discipline. The paper tries to address a selection of aspects pertaining to development activities such as choice of the environmental framework, functionality description, specification methods and roles definition. Authors refer to the ontology development projects they were involved in.

  • Hybrid Approach in Project Management - Mixing Capability Maturity Model Integration with Agile Practices

    Publikacja

    This paper introduces an idea of hybrid approach in managing software development projects. The main goal of this research is to prove that it is possible to design consistent method for managing software development projects which is based on different corporate standards and methods. Authors also want to show that this new hybrid approach is beneficial for IT organization, triggers synergy effects and brings software development...

  • Jakość oprogramowania w zwinnym podejściu do zarządzania projektami informatycznymi

    Publikacja

    Cel: Celem artykułu jest ocena, czy wykorzystanie podejścia zwinnego Scrum w organizacji podnosi jakość wytwarzanego oprogramowania oraz próba uzyskania odpowiedzi na pytanie, jak nowelizacja Przewodnika po Scrumie (Scrum Guide) z listopada 2020 roku wpłynęła na proces wytwarzania oprogramowania. Projekt badania/metodyka badawcza/koncepcja: Przyjętą metodyką badawczą jest przegląd literatury przedmiotu oraz badania własne autora....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Agnieszka Landowska dr hab. inż.

    Ukończyła studia na dwóch kierunkach: Finanse i bankowość na Uniwersytecie Gdańskim oraz Informatyka na WETI Politechniki Gdańskiej. Od 2000 roku jest związana z Politechniką Gdańską. W 2006 roku uzyskała stopień doktora w dziedzinie nauk technicznych, a w roku 2019 stopień doktora habilitowanego. Aktualnie jej praca naukowa dotyczy zagadnień interakcji człowiek-komputer oraz informatyki afektywnej (ang. affective computing), która...

  • Tomasz Janowski dr

    Tomasz Janowski jest kierownikiem Katedry Informatyki w Zarządzaniu, Politechnika Gdańska; profesorem wizytującym w Department for E-Governance and Administration, University for Continuing Education Krems, Austria; oraz współredaktorem naczelnym czasopisma Government Information Quarterly, Elsevier. Wcześniej był założycielem i kierownikiem United Nations University Operating Unit on Policy-Driven Electronic Governance (UNU-EGOV),...

  • Evaluation of Readiness of IT Organizations to Agile Transformation Based on Case-Based Reasoning

    Publikacja

    - Rok 2017

    Nowadays many of IT organization decides to change the way of delivering from classic, waterfall approach to agile. This transition is called “agile transformation” (AT). The problem of this process is that part of companies started AT without any analysis. This causes that many of transitions fails and organizations must return to old methods of delivering. Cost of return is significant and number of projects with violated project...

    Pełny tekst do pobrania w portalu

  • SDN testbed for validation of cross-layer data-centric security policies

    Publikacja

    - Rok 2017

    Software-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Completeness and Consistency of the System Requirement Specification

    Although the System Requirement Specification, as a first formal and detailed document, is the base for the software project in classic software methodologies, there is a noticeable problem of assuring the completeness of this document. The lack of its completeness causes uncertainty of the project foundations. This was one of motivations for agile methodologies – if the SRS cannot be easily validated, if it can change in late project...

    Pełny tekst do pobrania w portalu

  • Adopting collaborative games into Open Kanban

    Publikacja

    - Rok 2016

    The crucial element of any agile project is people. Not surprisingly, principles and values such as "Respect for people", "Communication and Collaboration", "Lead using a team approach", and "Learn and improve continuously" are an integral part of Open Kanban. However, Open Kanban has not provided any tools or techniques to aid the human side of software development. Moreover, as a Lean initiative, it is not as comprehensively...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Anti-theft lab security system based on RFID

    The aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...

    Pełny tekst do pobrania w portalu

  • Critical systems software testing and QA - Spring'24

    Kursy Online
    • A. Kaczmarek
    • B. Wiszniewski

    Course objectives: Present software development standards in the European space industry and techniques of their implementation. Learn how to assess and manage critical system software quality in an IT project. Gain basic hands-on experience in bug tracking and reporting in a software project.

  • International Conference on Model-Driven Engineering and Software Development

    Konferencje

  • Overview of new product development strategies and models

    Publikacja

    - Catallaxy - Rok 2023

    Motivation: The motivation for the overview presented in this article is to provide a starting point for considering whether existing new product development methodology and its level of detail allows product teams to develop high-quality and business-effective product concepts. Aim: The aim of this article is recognise the current state of research into new product development methodology and to present the strategies and models...

    Pełny tekst do pobrania w portalu

  • Model oceny dojrzałości przedsiębiorstw do zastosowania zwinnych metodyk zarządzania projektami IT

    Publikacja

    - Rok 2024

    Dysertacja koncentruje się na budowie modelu, który ocenia gotowość przedsiębiorstw do wdrożenia zwinnych metodyk zarządzania projektami IT. Analizuje istniejące metody oceny dojrzałości projektowej i wprowadza własny model, biorąc pod uwagę krytyczne czynniki sukcesu i skuteczność zwinnych metod. Rozprawa zawiera badania literaturowe, empiryczne studium przypadku oraz weryfikację i rekomendacje modelu, dostarczając wglądu w praktyczne...

    Pełny tekst do pobrania w portalu

  • Agile Commerce in the light of Text Mining

    The survey conducted for this study reveals that more than 84% of respondents have never encountered the term “agile commerce” and do not understand its meaning. At the same time, they are active participants of this strategy. Using digital channels as customers more often than ever before, they have already been included in the agile philosophy. Based on the above, the purpose of the study is to analyse major text sets containing...

    Pełny tekst do pobrania w portalu

  • Mobile Security: Threats and Best Practices

    Publikacja

    - Mobile Information Systems - Rok 2020

    Communicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...

    Pełny tekst do pobrania w portalu

  • Computer -Aided Local Energy Planning Using ALEP-PL Software

    The issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...

  • Zarządzanie bezpieczeństwem informacji - specjalność ISI -2022

    Kursy Online
    • A. Wardziński
    • R. Leszczyna

    The aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.

  • Zarządzanie bezpieczeństwem informacji - specjalność ISI -2023

    Kursy Online
    • A. Wardziński
    • R. Leszczyna

    The aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.

  • Zarządzanie bezpieczeństwem informacji - specjalność ISI -2024

    Kursy Online
    • A. Wardziński
    • R. Leszczyna

    The aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.

  • Barbara Kusznierewicz dr hab. inż.

  • Security Evaluation of IT Systems Underlying Critical Networked Infrastructures

    Publikacja

    - Rok 2008

    Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • International Conference on Software Engineering and Formal Methods

    Konferencje

  • Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems

    Publikacja

    Sustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • What Is Troubling IT Analysts? A Survey Report from Poland on Requirements-Related Problems

    Requirements engineering and business analysis are activities considered to be important to software project success but also difficult and challenging. This paper reports on a survey conducted in Polish IT industry, aimed at identifying most widespread problems/challenges related to requirements. The survey was targeted at people performing role of analyst in commercial IT projects. The questionnaire included 64 pre-defined problems...

    Pełny tekst do pobrania w portalu

  • Ontology-Aided Software Engineering

    Publikacja

    - Rok 2012

    This thesis is located between the fields of research on Artificial Intelligence (AI), Knowledge Representation and Reasoning (KRR), Computer-Aided Software Engineering (CASE) and Model Driven Engineering (MDE). The modern offspring of KRR - Description Logic (DL) [Baad03] is considered here as a formalization of the software engineering Methods & Tools. The bridge between the world of formal specification (governed by the mathematics)...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • SkinDepth - synthetic 3D skin lesion database

    Dane Badawcze
    wersja 1.0 open access

    SkinDepth is the first synthetic 3D skin lesion database. The release of SkinDepth dataset intends to contribute to the development of algorithms for:

  • VISUALIZATION OF SCANTER AND ARPA RADAR DATA IN THE DISTRIBUTED TELEINFORMATION SYSTEM FOR THE BORDER GUARD

    Monitoring of country maritime border is an important task of the Border Guard. This activity can be enhanced with the use of the technology enabling gathering information from distributed sources, processing of that information and its visualization. The paper presents the next stage of development of the STRADAR project (Streaming of real-time data transmission in distributed dispatching and teleinformation systems of the Border...

    Pełny tekst do pobrania w portalu

  • Analysis of human behavioral patterns

    Publikacja

    - Rok 2022

    Widespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Spatial Modelling in Environmental Analysis and Civil Engineering

    As can be seen, Spatial Modelling in Environmental Analysis and Civil Engineering applies to a multitude of applications. In an attempt to bring the topic closer to potential readers, the special issue referred to security methods, optimization of calculations, conducting measurements and empirical tests. Each article has made an original contribution to the development of practical science that can be replicated by researchers...

    Pełny tekst do pobrania w portalu

  • Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments

    Publikacja

    - Rok 2010

    The goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...

  • Approaching Secure Industrial Control Systems

    Publikacja

    This study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...

    Pełny tekst do pobrania w portalu