...hofstede@wur.nl Catholijn M. Jonker Delft University of Technology c.m.jonker@tudelft.nl Tim Verwaart LEI Wageningen UR tim.verwaart@wur.nl Keywords: trade, culture, agents, uncertainty avoidance, negotiation Abstract A model is presented of the way that our cultural attitude towards the unknown influences the decisions we make in trade. Uncertainty avoidance is one of Hofstede’s five cultural dimensions. The paper presents a model of how this dimension affects trade. This influence has been explicated for the decisions regarding trade: partner selection, negotiation behavior, trust, and the interpretation of the trade partner’s behavior. It has been verified in simulations showing that the generic tendencies as attributed to uncertainty avoidance are reflected in the simulation results. Our approach is an example of instantiating generic knowledge on the influences of culture on decision-making in general. INTRODUCTION The international food economy is rapidly changing. Important issues are concentration and globalization, growing information intensity, consumer demands, and social responsibility [Kinsey 2001]. An important issue in current food trade research is the emergence and performance of international supply chain networks [Lazzarini et al. 2001]. Agent-based modeling extends the understanding of processes in society and economy. It enables simulation of the emergence of macro-level phenomena from micro-level interactions between individual agents [Tesfatsion and Judd 2006]...
Words: 6864 - Pages: 28
...The same holds for collisions between agents: on each cell at most one agent is allowed and thus, both agents remain on their positions, if they would collide. This rule implies, that only one agent can pass the small opening at a time! An episode ends either if both agents are situated on their goals region or after imax iterations. Exercises 1. Discuss the following strategies for giving reward and choose one for your model / your implementation: a) Each agent gets an individual reward, i.e. agent Aj gets reward rj when it reaches goal Aj . b) Both agents get an identical reward r if both agents are on their correct goals. 1 Goal A2 Goal A1 1 2 Start A1 Start A2 Figure 1: Mulitagent scenario. What are pro and cons of these strategies? How can they influence the speed and the quality of learning? Justify your choice. Provide values for the reward function: What reward is given for reaching the goal(s), what value is given for other situations, are there intermediate rewards for partially reached goals? [4 p] 2. What is a useful model for this scenario / the...
Words: 810 - Pages: 4
...phases of emergency management: mitigation, preparedness, response and recovery. 3D modeling can provide realistic models of buildings, infrastructure and the surrounding topography. These models can provide emergency managers and first responders with valuable information about where to look for damage, people and sensitive materials, as well...
Words: 1500 - Pages: 6
...Volume 2, No. 4, April 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info A MULTI AGENT BASED E-SHOPPING SYSTEM Sougata Khatua*1, Zhang Yuheng 2, Arijit Das 3 and N.Ch.S.N. Iyengar 4 School of Computing Science and Engineering, VIT University, Vellore-632014, Tamil Nadu, INDIA sougatakhatua@yahoo.com*1, yuer.zhang1987@gmail.com2, arijitdasmid@yahoo.com3and nchsniyengar48@gmail.com4 ------------------------------------------------- Abstract: Current e-shopping systems use the Internet as its primary medium for transactions. e-shopping has grown in popularity over the years, mainly because people find it convenient and easy to buy various items comfortably from their office or home. This paper has proposed a personalized e-shopping system, which makes use of agent technology to enhance the automation and efficiency of shopping process in Internet commerce. The agent technology is used to enhance the customer‟s needs which include availability, speedy response time, and efficiency. Agent for e-Shopping creates connectivity on an anytime-anywhereany-device-basis to provide the specific goods required by the consumers based on transaction cost optimization and scalability. The client agent connects with the controller agent which controls all the agent information. The controller agent sends the item information to the client agent and the client chooses items and puts in to the shopping cart. Finally the conclusion shows...
Words: 4773 - Pages: 20
...Software Testing Techniques Manpreet Kaur1 and Rupinder Singh2 1 Department of CSE CGC, Gharuan Mohali, India 2 CSE CGC, Gharuan Mohali, India Abstract Software testing is important to reduce errors, maintenance and overall software costs. One of the major problems in software testing area is how to get a suitable set of test cases to test a software system. We identify a number of concepts that every software engineering student and faculty should have learned. There are now many testing techniques available for generating test cases. This set should ensure maximum effectiveness with the least possible number of test cases. The main goal of this paper is to analysed and compare the testing technique to find out the best one to find out the error from the software. Keywords: Software testing; process model; testing techniques; 1. Introduction Software testing is a process or a series of processes designed to verify computer code does what it was designed to do. According to ANSI/IEEE 1059 standard [1, 2], Testing can be defined as ―A process of analyzing a software item to detect the differences between existing and required conditions (that is defects/errors/bugs) and to evaluate the features of the software item. Another more appropriate definition is this: [3] Testing is the process of executing a program with the intent of finding errors. The concept of testing is as old as coding and is change along with time. Gelperin and Hetzel [4] proposed the concept of the testing process...
Words: 4928 - Pages: 20
...Traditionally, efforts to improve the quality have centered on the end the product development cycle by emphasizing the detection and correction of defects. There are two types of software testing that people usually refer to. The first one is through Waterfall Model and the second one is Agile Testing. Both of these models have their own advantages and disadvantages. By weighting the advantages and disadvantages between these two concepts, we will then be able to decide on which one that we can use as a referral to do software testing. Before we begin to decide on which concepts that we can refer to, let’s take a look at each of the concepts. Waterfall Model Waterfall model is known as a sequential model. Once the stage has completed then developers can move on to the next step. This model requires an extensive plan so that we can minimize the error of going back to the previous stage. To be able to complete the project using the Waterfall method, both sides should be able the requirements and able to present what is should look like after completing the project in the beginning. Waterfall model consist of eight stages. They are: System requirement, Software requirement, Analysis, Design, Coding, Test and Use. Figure 1.0 – Waterfall Model The real purpose of software testing is to verify whether the completed software package functions according to the expectations defined by the requirements/specifications. The objective is not to find every software bug...
Words: 3602 - Pages: 15
...NHPP Based Software Reliability Growth Models Stochastic processes are used for the description of a system’s operation over time. There are two main types of stochastic processes: continuous and discrete. Among discrete processes, counting processes in reliability engineering are widely used to describe the appearance of events in time (e.g., failures, number of perfect repairs, etc). The simplest counting process is a Poisson process. The Poisson process plays a special role to many applications in reliability engineering. As a general class of well-developed stochastic process model in reliability engineering, NHPP models have been successfully used in studying hardware reliability problems. They are especially useful to describe failure processes which possess certain trends such as reliability growth and deterioration. Therefore, an application of NHPP models to software reliability analysis is then easily implemented. The model provides the expected number of faults/failures at a given time. Schneidewind [1975] proposed an error detection model. Goel & Okumoto [1979] proposed the time dependent failure rate model. Ohba [1984] proposed the inflection S-shaped model. Musa [1975] and Musa & Okumoto [1984] proposed the basic execution time model and Log Poisson model respectively. Yamada, Ohba & Osaki [1983] proposed a model based on the concept of failure observation and the corresponding fault removal phenomenon. Goel [1985] modified his original model by introducing...
Words: 2507 - Pages: 11
...ISTQB Advanced CTAL Exam – S tudy Guide (Part 1) Q. 1: What is Configuration management? Software configuration management encompasses the disciplines and techniques of initiating, evaluating, and controlling change to software products during and after the development process. It emphasizes the importance of configuration control in managing software production. Configuration management is an integral part of the software development process across all phases of the life cycle. It functions as a controlling discipline, enabling changes to be made to existing documentation and products in such a way as not to destroy the integrity of the software. Since configuration management extends over the life of the product, and since tools, techniques, and standards exist solely aimed at its proper execution, configuration management can stand alone as a module within a graduate curriculum. > Q. 2: What are the Requirements for the Success of Configuration Management? The key requirement for success of configuration management is the commitment of all levels of management to enforcing its use throughout the project lifetime. Configuration management, like other parts of software engineering perceived as being tedious, may require some coercion for success. A further requirement is the availability of a clearly stated configuration management plan. > Q. 3: How can we say that Configuration Management is a Cost Saving Tool? By helping to maintain product integrity, configuration...
Words: 10058 - Pages: 41
...themes The academic research Is goodwill impairment testing relevant? Is goodwill impairment testing effective? What are the difficulties? Do we need all of these disclosures? What are some of the alternatives? We have three unanswered questions A call to action Appendix 1: The interviewees Appendix 2: References and notes Acknowledgements © 2014 KPMG IFRG Limited, a UK company, limited by guarantee. All rights reserved. Who cares about goodwill impairment? | 1 TIME TO ENGAGE On 30 January 2014, the IASB launched the public phase of its post-implementation review of business combinations accounting when it released a Request for Information.1 We believe that a key aspect of the review is the impairment-only accounting model for goodwill, which was introduced in 2004. Comments are due to the IASB by 30 May 2014, so now is the time for all stakeholders to provide their feedback on this emotive topic. The Request for Information essentially asks three questions in relation to goodwill impairment testing. • How useful have you found the information obtained from annually assessing goodwill for impairment? • Do you think that improvements are needed regarding the information provided by the impairment test? • What are the main implementation, auditing or enforcement challenges in testing goodwill for impairment? With this in mind, we interviewed a sample of stakeholders to find out what they think about goodwill impairment testing – its relevance, its effectiveness, the difficulties...
Words: 7709 - Pages: 31
...discrete probability distributions and their characteristics To develop the concept of mathematical expectation for a discrete random variable To introduce the covariance and illustrate its application in finance To present applications of the binomial distribution in business To present applications of the Poisson distribution in business 02 Counting Techniques 03 Continued 04 Conditional Probability 05 Discrete probability distribution. 06 Mathematical Expectation of Discrete Random Variable 07 Properties of mean and variance of a discrete random Variable. 08 Binomial Distribution. 09 Poisson Distribution. 10. The Normal Distribution and Sampling Distribution Introduction Mathematical Models of Continuous Random Variables To...
Words: 1396 - Pages: 6
...presented topic. Please let me know in case of errors or missing information: contact.benjaminsommer.com [SOFTWARE ENGINEERING LECTURE NOTES] October 21, 2011 OVERVIEW SOFTWARE PROCESSES SOFTWARE PROCESS MODELS PROCESS ACTIVITIES COPING WITH CHANGE THE RATIONAL UNIFIED PROCESS AGILE SOFTWARE DEVELOPMENT AGILE METHODS PLAN-DRIVEN AND AGILE DEVELOPMENT EXTREME PROGRAMMING AGILE PROJECT MANAGEMENT SCALING AGILE METHODS REQUIREMENTS ENGINEERING FUNCTIONAL AND NON-FUNCTIONAL REQUIREMENTS THE SOFTWARE REQUIREMENTS DOCUMENT REQUIREMENTS SPECIFICATION REQUIREMENTS ENGINEERING PROCESSES REQUIREMENTS ELICITATION AND ANALYSIS REQUIREMENTS VALIDATION REQUIREMENTS MANAGEMENT SYSTEM MODELING CONTEXT MODELS INTERACTION MODELS STRUCTURAL MODELS BEHAVIORAL MODELS MODEL-DRIVEN ENGINEERING ARCHITECTURAL DESIGN ARCHITECTURAL DESIGN DECISIONS ARCHITECTURAL VIEWS ARCHITECTURAL PATTERNS APPLICATION ARCHITECTURES DESIGN AND IMPLEMENTATION OBJECT-ORIENTED DESIGN USING THE UML DESIGN PATTERNS IMPLEMENTATION ISSUES OPEN SOURCE DEVELOPMENT SOFTWARE TESTING DEVELOPMENT TESTING TEST-DRIVEN DEVELOPMENT RELEASE TESTING download.benjaminsommer.com | 1 3 5 5 7 10 13 16 16 17 17 19 20 21 21 23 24 25 26 29 30 31 32 32 33 34 35 37 38 39 39 42 44 45 47 48 50 51 52 56 57 October 21, 2011 USER TESTING SOFTWARE EVOLUTION EVOLUTION PROCESSES PROGRAM EVOLUTION DYNAMICS SOFTWARE MAINTENANCE LEGACY SYSTEM MANAGEMENT DEPENDABILITY AND SECURITY [SOFTWARE ENGINEERING LECTURE NOTES] 58 59 60 61 62 65 67 67 68 70...
Words: 24348 - Pages: 98
...Cloud Databases Abstract: The cloud database as a service is a novel paradigm that can support several Internet-based applications, but its adoption requires the solution of information confidentiality problems. We propose a novel architecture for adaptive encryption of public cloud databases that offers an interesting alternative to the tradeoff between the required data confidentiality level and the flexibility of the cloud database structures at design time. We demonstrate the feasibility and performance of the proposed solution through a software prototype. Moreover, we propose an original cost model that is oriented to the evaluation of cloud database services in plain and encrypted instances and that takes into account the variability of cloud prices and tenant workloads during a medium-term period. KEYWORDS: Cloud database, confidentiality, encryption, adaptivity, cost model. LIST OF CONTENTS Page No List of Figures viii List of Tables ix 1. Introduction 1.1 Purpose 1.2 Scope 1.3 Motivation 1.3.1 Definitions 1.3.2 Abbreviations 1.3.3 Model Diagrams 1.4 Overview 2. Literature Survey 2.1 Introduction 2.2 History 2.3 Purpose 2.4 Requirements 2.5 Technology Used ...
Words: 17343 - Pages: 70
...Waterfall vs. Agile Methodology Contents Waterfall vs. Agile Model Comparison .........................................................................................3 Conceptual Difference.................................................................................................................3 Efficiency ....................................................................................................................................4 Suitability ....................................................................................................................................4 Waterfall Model Diagram .............................................................................................................5 Explanation of the Waterfall Model ..............................................................................................5 Phase I: Requirements................................................................................................................6 Phase II: Analysis .......................................................................................................................6 Phase III: Design.........................................................................................................................6 Phase IV: Coding ........................................................................................................................6 Phase V: Testing...............................................................
Words: 3023 - Pages: 13
...EMEA Global Testing Practice Statement of Work Statement of Confidentiality EDS Internal - EDS Internal information comprises most EDS business information. This information could be of a sensitivity and/or value to EDS that disclosure externally could be inappropriate or problematic. 1. INTRODUCTION 7 2. PROJECT/PROGRAMME SPONSORSHIP/MANAGEMENT 7 3. MANAGED SERVICE OVERVIEW AND SCOPE 7 3.1. EMEA GLOBAL TESTING PRACTICE MANAGED SERVICE SCOPE STATEMENT 7 3.1.1 Testing Management 7 3.1.2 TESTING TECHNIQUES 8 3.1.3 TEST LEVELS 8 3.1.4 PRODUCTION ENVIRONMENT 9 3.1.5 TESTING ENVIRONMENT 9 3.1.6 OUT OF SCOPE 9 3.2. Detailed Requirements and List of Deliverables 9 3.3. Acceptance Criteria 10 3.4. Additional Services 11 4. CHANGES TO SERVICE 11 5. EMEA GLOBAL TESTING PRACTICE TESTING MANAGED SERVICE RESPONSIBILITIES 11 6. CHANGE CONTROL 12 7. ASSUMPTIONS 12 7.1. GENERAL ASSUMPTIONS 12 7.2. PROJECT SPECIFIC ASSUMPTIONS 13 7.3. PERFORMANCE TESTING SPECIFIC ASSUMPTIONS 13 7.4. AET SPECIFIC ASSUMPTIONS 14 8. COMMUNICATION 15 9. RESOURCE PLANS 15 10. RISK ASSESSMENT 15 11. FINANCIAL INFORMATION 16 11.1. PRODUCTIVITY SAVINGS 16 11.2. TRAINING COSTS 16 11.3. SOFTWARE/HARDWARE/SERVICE/OTHER COSTS 16 12. BASELINE TESTING MANAGED SERVICE SCHEDULE 17 13. QUALITY PLAN 17 14. PROJECT HANDOVER 17 14.1. Replication, Delivery and Installation 17 15. PROBLEMS AFTER...
Words: 6145 - Pages: 25
...Abhishek Mr. Amandeep sir Section: E - 3004 Roll_No: RE3004B58 Group : 2 Part – A Q1: Take a suitable example to develop a software and implement the waterfall Model technique in it to develop the software ? Ans: The waterfall model shows a process, where developers are to follow these phases in order: 1. Requirements specification (Requirements analysis) 2. Software Design 3. Integration 4. Testing (or Validation) 5. Deployment (or Installation) 6. Maintenance In a strict Waterfall model, after each phase is finished, it proceeds to the next one. Reviews may occur before moving to the next phase which allows for the possibility of changes (which may involve a formal change control process). Reviews may also be employed to ensure that the phase is indeed complete; the phase completion criteria are often referred to as a "gate" that the project must pass through to move to the next phase. Waterfall discourages revisiting and revising any prior phase once it's complete. This "inflexibility" in a pure Waterfall model has been a source of criticism by supporters of other more "flexible" models. The waterfall model proceeds from one phase to the next in a sequential manner. For example, one first completes requirements specification, which after sign-off are considered "set in stone." When requirements are completed, one proceeds to design. The software in question...
Words: 1387 - Pages: 6