Volume 6 Number 1 January 2014


Enabling Institutional Digital Repository for Scholarly Communication in Nigeria

Abubakar Mohammed, Aminu Garba

https://doi.org/

Abstract In the recent years due to the growth of information and communication technology (ICT) and electronic publishing the scholarly communication has gained momentum and reach the whole sections of the society either directly or indirectly. The trend indicates that it has positive implications for the majority of the society. The development of Internet technology has also provided academic and research institutions with... Read More


Exploiting DBMS Idleness Periods for Tuning its Performance

AbdulMateen, Basit Raza, Muhammad Sher, Mian Muhammad Awais

https://doi.org/

Abstract Rapid growth in data, maximum functionality and changing behavior tends the database workload to be more complex and tricky. Every organization has complex types of database workloads that are difficult to manage by the humans; human experts take much time to get sufficient experience to manage workload efficiently; even in some cases this task becomes impossible and leads towards malnourishment.... Read More


Mining Bug Database for Detecting Potential Areas of Bug Occurence

Md. Tajmilur Rahman, Al Abrar Hasan, Rashedur M Rahman, M A Matin

https://doi.org/

Abstract Vulnerability issues are really important for any system, therefore, many testing approaches have been proposed so far. Recently, it is becoming more and more difficult to ignore the analysis of data for web applications specially the social networking websites. In social networking communities, there are lot of public pages and public components where people might easily get access of the system... Read More


Web services

Syeda Mahwish Fatima Naqvi

https://doi.org/

Abstract In today’s Web, Web services are created and updated on the fly. It’s already beyond the human ability to analysis them and generates the composition plan manually. A number of approaches have been proposed to tackle that problem. Most of them are inspired by the researches in cross-enterprise workflow and AI planning. This paper gives an overview of recent research efforts... Read More


Exploiting DBMS Idleness Periods for Tuning its Performance

AbdulMateen, Basit Raza, Muhammad Sher, Mian Muhammad Awais

https://doi.org/

Abstract Rapid growth in data, maximum functionality and changing behavior tends the database workload to be more complex and tricky. Every organization has complex types of database workloads that are difficult to manage by the humans; human experts take much time to get sufficient experience to manage workload efficiently; even in some cases this task becomes impossible and leads towards malnourishment. The versatility in... Read More


Mining Bug Database for Detecting Potential Areas of Bug Occurence

Md. Tajmilur Rahman, Al Abrar Hasan, Rashedur M Rahman, M A Matin

https://doi.org/

Abstract Vulnerability issues are really important for any system, therefore, many testing approaches have been proposed so far. Recently, it is becoming more and more difficult to ignore the analysis of data for web applications specially the social networking websites. In social networking communities, there are lot of public pages and public components where people might easily get access of the system inside. This... Read More


Web services

Syeda Mahwish Fatima Naqvi

https://doi.org/

Abstract In today’s Web, Web services are created and updated on the fly. It’s already beyond the human ability to analysis them and generates the composition plan manually. A number of approaches have been proposed to tackle that problem. Most of them are inspired by the researches in cross-enterprise workflow and AI planning. This paper gives an overview of recent research efforts of automatic... Read More


Copyright© 2016 International Journal of Information Studies (ijis)