Wyniki wyszukiwania dla: agile, security, software development methods - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: agile, security, software development methods

Wyniki wyszukiwania dla: agile, security, software development methods

  • Andrzej Chybicki dr inż.

    Z wykształcenia informatyk, absolwent Wydziału Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej, doktor nauk technicznych w dziedzinie informatyka specjalizujący się w przetwarzaniau danych przestrzennych w rozproszonych systemach informatycznych. Ukierunkowany na wykorzystywanie osiągnięć i wiedzy zakresu prowadzonych badań w przemyśle. Współpracował z szeregiem podmiotów przemysłu informatycznego, geodezyjnego...

  • Building Dedicated Project Management Process Basing on Historical Experience

    Publikacja

    - Rok 2017

    Project Management Process used to manage IT project could be a key aspect of project success. Existing knowledge does not provide a method, which enables IT Organizations to choose Project Management methodology and processes, which would be adjusted to their unique needs. As a result, IT Organization use processes which are not tailored to their specific and do not meet their basic needs. This paper is an attempt to fill this...

    Pełny tekst do pobrania w portalu

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publikacja

    - Rok 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Grzegorz Zieliński dr inż.

    Autor ponad 100 publikacji naukowych (zarówno w języku polskim, jak i angielskim) z zakresu zarządzania działalnością usługową, doskonalenia podmiotów, w tym podmiotów leczniczych. Zainteresowania naukowo-badawcze obejmują obszary związane z dojrzałością i doskonałością przedsiębiorstw w różnych aspektach ich działalności. Uczestniczył w projektach badawczych Narodowego Centrum Nauki oraz projektach realizowanych przez międzynarodowe...

  • Kamil Andrzej Rybacki mgr inż.

    Born on 23 October 1993 in Gdańsk. In 2017, I have received the M.Sc. Degree at the Faculty of Applied Physics and Mathematics, Gdańsk University of Technology, Poland. My main fields of interest include computer simulations of molecular systems, parallel computing in application to computational physics methods and development of various simulation software. Currently, my research is focused on the development of hybrid Molecular...

  • Game-based Sprint retrospectives: multiple action research

    In today’s fast-paced world of rapid technological change, software development teams need to constantly revise their work practices. Not surprisingly, regular reflection on how to become more effective is perceived as one of the most important principles of Agile Software Development. Nevertheless, running an effective and enjoyable retrospective meeting is still a challenge in real environments. As reported by several studies,...

    Pełny tekst do pobrania w portalu

  • Piotr Szczuko dr hab. inż.

    Dr hab. inż. Piotr Szczuko w 2002 roku ukończył studia na Wydziale Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej zdobywając tytuł magistra inżyniera. Tematem pracy dyplomowej było badanie zjawisk jednoczesnej percepcji obrazu cyfrowego i dźwięku dookólnego. W roku 2008 obronił rozprawę doktorską zatytułowaną "Zastosowanie reguł rozmytych w komputerowej animacji postaci", za którą otrzymał nagrodę Prezesa Rady...

  • Towards Cognitive and Perceptive Video Systems

    Publikacja
    • T. Akgun
    • C. Attwood
    • A. Cavallaro
    • C. Fabre
    • F. Poiesi
    • P. Szczuko

    - Rok 2014

    In this chapter we cover research and development issues related to smart cameras. We discuss challenges, new technologies and algorithms, applications and the evaluation of today’s technologies. We will cover problems related to software, hardware, communication, embedded and distributed systems, multi-modal sensors, privacy and security. We also discuss future trends and market expectations from the customer’s point of view.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Gabriela Rembarz dr inż. arch.

    Gabriela Rembarz inżynier-architekt, urbanista, naukowiec, dydaktyk i aktywna projektantka, jest doktorem nauk technicznych w dyscyplinie architektura i urbanistyka, Ukończyła studia magisterskie na Wydziale Architektury i Urbanistyki Politechniki Gdańskiej, uzupełniając je specjalizacją w Ochronie Środowiska w ramach międzyuczelnianego CENVIG Center of Environmental Studies (Politechnika Gdańska) akredytowanego przez Roskilde...

  • Ontology Engineering Aspects in the Intelligent Systems Development

    The ontology engineering encompasses both, artificial intelligence methods and software engineering discipline. The paper tries to address a selection of aspects pertaining to development activities such as choice of the environmental framework, functionality description, specification methods and roles definition. Authors refer to the ontology development projects they were involved in.

  • Jakość oprogramowania w zwinnym podejściu do zarządzania projektami informatycznymi

    Publikacja

    Cel: Celem artykułu jest ocena, czy wykorzystanie podejścia zwinnego Scrum w organizacji podnosi jakość wytwarzanego oprogramowania oraz próba uzyskania odpowiedzi na pytanie, jak nowelizacja Przewodnika po Scrumie (Scrum Guide) z listopada 2020 roku wpłynęła na proces wytwarzania oprogramowania. Projekt badania/metodyka badawcza/koncepcja: Przyjętą metodyką badawczą jest przegląd literatury przedmiotu oraz badania własne autora....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Hybrid Approach in Project Management - Mixing Capability Maturity Model Integration with Agile Practices

    Publikacja

    This paper introduces an idea of hybrid approach in managing software development projects. The main goal of this research is to prove that it is possible to design consistent method for managing software development projects which is based on different corporate standards and methods. Authors also want to show that this new hybrid approach is beneficial for IT organization, triggers synergy effects and brings software development...

  • Tomasz Janowski dr

    Tomasz Janowski jest kierownikiem Katedry Informatyki w Zarządzaniu, Politechnika Gdańska; profesorem wizytującym w Department for E-Governance and Administration, University for Continuing Education Krems, Austria; oraz współredaktorem naczelnym czasopisma Government Information Quarterly, Elsevier.  Wcześniej był założycielem i kierownikiem United Nations University Operating Unit on Policy-Driven Electronic Governance (UNU-EGOV),...

  • Agnieszka Landowska dr hab. inż.

    Ukończyła studia na dwóch kierunkach: Finanse i bankowość na Uniwersytecie Gdańskim oraz Informatyka na WETI Politechniki Gdańskiej. Od 2000 roku jest związana z Politechniką Gdańską. W 2006 roku uzyskała stopień doktora w dziedzinie nauk technicznych, a w roku 2019 stopień doktora habilitowanego. Aktualnie jej praca naukowa dotyczy zagadnień interakcji człowiek-komputer oraz informatyki afektywnej (ang. affective computing), która...

  • Evaluation of Readiness of IT Organizations to Agile Transformation Based on Case-Based Reasoning

    Publikacja

    - Rok 2017

    Nowadays many of IT organization decides to change the way of delivering from classic, waterfall approach to agile. This transition is called “agile transformation” (AT). The problem of this process is that part of companies started AT without any analysis. This causes that many of transitions fails and organizations must return to old methods of delivering. Cost of return is significant and number of projects with violated project...

    Pełny tekst do pobrania w portalu

  • Completeness and Consistency of the System Requirement Specification

    Although the System Requirement Specification, as a first formal and detailed document, is the base for the software project in classic software methodologies, there is a noticeable problem of assuring the completeness of this document. The lack of its completeness causes uncertainty of the project foundations. This was one of motivations for agile methodologies – if the SRS cannot be easily validated, if it can change in late project...

    Pełny tekst do pobrania w portalu

  • Adopting collaborative games into Open Kanban

    Publikacja

    - Rok 2016

    The crucial element of any agile project is people. Not surprisingly, principles and values such as "Respect for people", "Communication and Collaboration", "Lead using a team approach", and "Learn and improve continuously" are an integral part of Open Kanban. However, Open Kanban has not provided any tools or techniques to aid the human side of software development. Moreover, as a Lean initiative, it is not as comprehensively...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • SDN testbed for validation of cross-layer data-centric security policies

    Publikacja

    - Rok 2017

    Software-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Anti-theft lab security system based on RFID

    The aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...

    Pełny tekst do pobrania w portalu

  • Critical systems software testing and QA - Spring'24

    Kursy Online
    • A. Kaczmarek
    • B. Wiszniewski

    Course objectives: Present software development standards in the European space industry and techniques of their implementation. Learn how to assess and manage critical system software quality in an IT project. Gain basic hands-on experience in bug tracking and reporting in a software project.

  • Overview of new product development strategies and models

    Publikacja

    - Catallaxy - Rok 2023

    Motivation: The motivation for the overview presented in this article is to provide a starting point for considering whether existing new product development methodology and its level of detail allows product teams to develop high-quality and business-effective product concepts. Aim: The aim of this article is recognise the current state of research into new product development methodology and to present the strategies and models...

    Pełny tekst do pobrania w portalu

  • International Conference on Model-Driven Engineering and Software Development

    Konferencje

  • Agile Commerce in the light of Text Mining

    The survey conducted for this study reveals that more than 84% of respondents have never encountered the term “agile commerce” and do not understand its meaning. At the same time, they are active participants of this strategy. Using digital channels as customers more often than ever before, they have already been included in the agile philosophy. Based on the above, the purpose of the study is to analyse major text sets containing...

    Pełny tekst do pobrania w portalu

  • Computer -Aided Local Energy Planning Using ALEP-PL Software

    The issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...

  • Mobile Security: Threats and Best Practices

    Publikacja

    - Mobile Information Systems - Rok 2020

    Communicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...

    Pełny tekst do pobrania w portalu

  • Zarządzanie bezpieczeństwem informacji - specjalność ISI -2022

    Kursy Online
    • A. Wardziński
    • R. Leszczyna

    The aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.

  • Zarządzanie bezpieczeństwem informacji - specjalność ISI -2023

    Kursy Online
    • A. Wardziński
    • R. Leszczyna

    The aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.

  • Zarządzanie bezpieczeństwem informacji - specjalność ISI -2024

    Kursy Online
    • A. Wardziński
    • R. Leszczyna

    The aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.

  • Overview of new product development strategies and models

    Publikacja

    - Catallaxy - Rok 2023

    Motivation: The motivation for the overview presented in this article is to provide a starting point for considering whether existing new product development methodology and its level of detail allows product teams to develop high-quality and business-effective product concepts. Aim: The aim of this article is recognise the current state of research into new product development methodology and to present the strategies...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Barbara Kusznierewicz dr hab. inż.

  • Security Evaluation of IT Systems Underlying Critical Networked Infrastructures

    Publikacja

    - Rok 2008

    Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • International Conference on Software Engineering and Formal Methods

    Konferencje

  • What Is Troubling IT Analysts? A Survey Report from Poland on Requirements-Related Problems

    Requirements engineering and business analysis are activities considered to be important to software project success but also difficult and challenging. This paper reports on a survey conducted in Polish IT industry, aimed at identifying most widespread problems/challenges related to requirements. The survey was targeted at people performing role of analyst in commercial IT projects. The questionnaire included 64 pre-defined problems...

    Pełny tekst do pobrania w portalu

  • Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems

    Publikacja

    Sustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Ontology-Aided Software Engineering

    Publikacja

    - Rok 2012

    This thesis is located between the fields of research on Artificial Intelligence (AI), Knowledge Representation and Reasoning (KRR), Computer-Aided Software Engineering (CASE) and Model Driven Engineering (MDE). The modern offspring of KRR - Description Logic (DL) [Baad03] is considered here as a formalization of the software engineering Methods & Tools. The bridge between the world of formal specification (governed by the mathematics)...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • SkinDepth - synthetic 3D skin lesion database

    Dane Badawcze
    wersja 1.0 embargo

    SkinDepth is the first synthetic 3D skin lesion database. The release of SkinDepth dataset intends to contribute to the development of algorithms for:

  • VISUALIZATION OF SCANTER AND ARPA RADAR DATA IN THE DISTRIBUTED TELEINFORMATION SYSTEM FOR THE BORDER GUARD

    Monitoring of country maritime border is an important task of the Border Guard. This activity can be enhanced with the use of the technology enabling gathering information from distributed sources, processing of that information and its visualization. The paper presents the next stage of development of the STRADAR project (Streaming of real-time data transmission in distributed dispatching and teleinformation systems of the Border...

    Pełny tekst do pobrania w portalu

  • Analysis of human behavioral patterns

    Publikacja

    - Rok 2022

    Widespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Spatial Modelling in Environmental Analysis and Civil Engineering

    As can be seen, Spatial Modelling in Environmental Analysis and Civil Engineering applies to a multitude of applications. In an attempt to bring the topic closer to potential readers, the special issue referred to security methods, optimization of calculations, conducting measurements and empirical tests. Each article has made an original contribution to the development of practical science that can be replicated by researchers...

    Pełny tekst do pobrania w portalu

  • Approaching Secure Industrial Control Systems

    Publikacja

    This study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...

    Pełny tekst do pobrania w portalu

  • Developing competences of IT project managers using simulation games

    Publikacja

    Project Management is a domain in which methodological approach is developing very rapidly. Project managers are required to present knowledge of the various methods of project management and apply them to the management of specific projects. It means that project managers must constantly develop their competence, mainly based on good practices from different formal methods of project management. The purpose of this article is...

  • Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments

    Publikacja

    - Rok 2010

    The goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...

  • Approach to security assessment of critical infrastructures' information systems

    Publikacja

    - IET Information Security - Rok 2011

    This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Heuristic Minimization of Symmetric Index Generation Functions utilizing their Properties

    Publikacja

    - Journal of Software and Systems Development - Rok 2021

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Overcoming Challenges of Virtual Scrum Teams: Lessons Learned Through an Action Research Study

    Publikacja

    - Rok 2023

    After the COVID-19 breakout, agile teams found themselves in situations that “pure agilists” and textbooks on agile methods had preferred to ignore. Whereas agile mindsets helped them to quickly shift to remote work, mere virtualization of agile practices often proved insufficient, and several challenges emerged. This paper reports on an Action Research project carried out in Lufthansa Systems Poland with the aim of (1) revisiting...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Formal Methods in Software Engineering and Defence Systems Workshop

    Konferencje

  • An integrated framework for security protocol analysis

    Publikacja

    - Rok 2008

    Assurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...

  • Acceptance Testing of Software Products for Cloud-Based On-Line Delivery

    Publikacja

    Software products intended for on-line delivery by distributors serving an open community of subscribers are developed in a specific life-cycle model, in which roles of the major stakeholders are strongly separated, unlike in any other software development model known in software engineering. Its specificity underlines the fact that a distributor of the final product, responsible for its acceptance for publication and delivery...

    Pełny tekst do pobrania w portalu

  • Understanding Sustainable Knowledge-Sharing in Agile Projects: Utilizing Follow-the-Sun Technique (FTS) in Virtual Teams

    Publikacja

    - Rok 2023

    In Agile IT projects, promoting effective knowledge sharing is essential not only for achieving success but also for supporting Sustainable Development Goals (SDGs). However, Companies using virtual teams may face challenges in coordinating work, particularly when teams are distributed across different time zones, ultimately hindering their ability to consistently share knowledge. This can lead to delays and inefficiencies, ultimately...

    Pełny tekst do pobrania w portalu

  • The level of Knowledge and use of tax exemptions for R&D activities

    Dane Badawcze
    open access

    The following research data contains the answers of 259 entrepreneurs to questions regarding tax reliefs and exemptions for research and development activities. As part of the study answers to the following questions were obtained:Have you ever used the tax relief for new technologies / R&D?Has your company acquired a license / software (intangible...