Automatic Creation of Countermeasure Plans against Process Delay: Creation of Countermeasures based on Holiday Work

نویسندگان

  • Kazuki MORI
  • Daisuke KINOSHITA
  • Seiichi KOMIYA
چکیده

The authors have been developing the automatic scheduling systems for software development project, which deliver scheduling and worker assignment. Their earlier works were designed to draw on crashing and fast tracking to produce countermeasure plans against process delay. However, process delay can be recovered not only by crashing or fast tracking but also by using holiday works. Their earlier works did not take holidays into the considerations as a constraint, and supposed that the holiday works were unassignable because the holidays were considered to be an unchangeable object (from application perspective) and were treated implicitly. In this paper, the authors consider the holidays as a constraint against worker assignable days, and treat explicitly handle them. Therefore this paper proposes a mechanism for producing countermeasure plans by using holiday works, and proves that the proposed mechanism is effective in producing countermeasure plans stated above. Key-Words: Schedule Planning for Software Development, Countermeasure Plans against Process Delay, GA,

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automatic Creation of Countermeasure Plan against Process Delay: Creation of Countermeasures based on Crashing and Fast-tracking

Success or failure of a software project mainly depends on the management capability of the project manager. Therefore, EVA (Earned Value Analysis) is gaining much attention recently as a method of managing a project in an integrated fashion by introducing a unified metric called EV (Earned Value) and quantitatively measuring and analyzing the cost and schedule of a project. Project managers ca...

متن کامل

Threshold Implementation as a Countermeasure against Power Analysis Attacks

One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...

متن کامل

The Study of Relationship Between Work Teams and Favoring Knowledge Management(Case: Bank Keshavarzi)

Knowledge management is a process that has been recently generated as an activity which is very important in the dynamic environment, and in the competitive scene. We believe that KM is a process which its organizational knowledge is created from the individual knowledge of the members of the organization. The relevant studies have indicated that organizing based on work teams could be consider...

متن کامل

Low Cost Countermeasure at Authentication Protocol Level against Electromagnetic Side Channel Attacks on RFID Tags

Radio Frequency Identification (RFID) technology is widely spread in many security applications. Producing secured low-cost and low-power RFID tags is a challenge. The used of lightweight encryption algorithms can be an economic solution for these RFID security applications. This article proposes low cost countermeasure to secure RFID tags against Electromagnetic Side Channel Attacks (EMA). Fir...

متن کامل

Spoofing countermeasures for the protection of automatic speaker recognition systems against attacks with artificial signals

The vulnerability of automatic speaker verification systems to imposture or spoofing is widely acknowledged. This paper shows that extremely high false alarm rates can be provoked by simple spoofing attacks with artificial, non-speech-like signals and highlights the need for spoofing countermeasures. We show that two new, but trivial countermeasures based on higher-level, dynamic features and v...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011