首页 > 最新文献

2012 Ninth International Conference on Information Technology - New Generations最新文献

英文 中文
Using Reverse-Engineered Test-Based Models to Generate More Tests: Where is the Sense in That? 使用基于逆向工程测试的模型生成更多测试:其中的意义在哪里?
T. Kanstrén, Éric Piel, H. Groß
Model-based testing is a process of generating tests for a test target based on a behavioral model. In many cases, suitable models do not exist and building these from scratch is a costly effort. A potential approach to bootstrap this process is to generate models with reverse-engineering methods. Potential sources of information for such models include user sessions, existing test cases, and field data. All of these can be seen as different forms of test data. However, using existing test cases as a basis to create a model for test generation raises the question of what is the benefit over the previously existing tests. This paper aims to answer this question by evaluating the benefits in terms of a practical case study.
基于模型的测试是基于行为模型为测试目标生成测试的过程。在许多情况下,不存在合适的模型,并且从头构建这些模型是一项代价高昂的工作。引导此过程的一个潜在方法是使用逆向工程方法生成模型。此类模型的潜在信息源包括用户会话、现有测试用例和字段数据。所有这些都可以看作是不同形式的测试数据。然而,使用现有的测试用例作为创建测试生成模型的基础,提出了一个问题,即相对于先前存在的测试,它的好处是什么。本文旨在回答这个问题,通过评估效益方面的实际案例研究。
{"title":"Using Reverse-Engineered Test-Based Models to Generate More Tests: Where is the Sense in That?","authors":"T. Kanstrén, Éric Piel, H. Groß","doi":"10.1109/ITNG.2012.42","DOIUrl":"https://doi.org/10.1109/ITNG.2012.42","url":null,"abstract":"Model-based testing is a process of generating tests for a test target based on a behavioral model. In many cases, suitable models do not exist and building these from scratch is a costly effort. A potential approach to bootstrap this process is to generate models with reverse-engineering methods. Potential sources of information for such models include user sessions, existing test cases, and field data. All of these can be seen as different forms of test data. However, using existing test cases as a basis to create a model for test generation raises the question of what is the benefit over the previously existing tests. This paper aims to answer this question by evaluating the benefits in terms of a practical case study.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130826485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Constraint-Driven Business Object Model for Service-Based Business Processes 基于服务的业务流程的约束驱动业务对象模型
F. Zulkernine, P. Bertoli, M. Pistore, A. Friesen, J. Lemcke, Bernhard Thimmel, O. Geisau
Business today is increasingly becoming service-driven. A service represents either a part of or a complete business process, which in turn depicts the life cycle of a Business Object (BO). A number of actions constrained by a set of business policies cause the BO to transit from an initial state to a final state during its life cycle. The constraints would vary for different customized business processes. To engineer reliable service based systems it is crucial to verify the reachability of the desired final states of the BO model against a given set of constraints. We propose the formal specification of a constraint-driven BO model, and thereby, present a verification tool to validate the life cycle of the BO model given a set of constraints. The core object and its constraint-driven life cycle are modeled separately for flexibility and customizability. We also define a language specification to represent our BO model and the business goals. The specification is automatically interpreted by our verification tool, which outputs a graphical view of the life cycle and a textual report of the validation results.
今天的商业日益成为服务驱动的。服务代表业务流程的一部分或完整的业务流程,而业务流程又描述了业务对象(BO)的生命周期。受一组业务策略约束的许多操作导致BO在其生命周期中从初始状态过渡到最终状态。对于不同的定制业务流程,约束条件会有所不同。为了设计可靠的基于服务的系统,根据给定的一组约束来验证BO模型的期望最终状态的可达性是至关重要的。我们提出了约束驱动的BO模型的形式化规范,从而提供了一个验证工具来验证给定一组约束的BO模型的生命周期。为了灵活性和可定制性,对核心对象及其约束驱动的生命周期分别建模。我们还定义了一个语言规范来表示我们的BO模型和业务目标。规范由我们的验证工具自动解释,它输出生命周期的图形视图和验证结果的文本报告。
{"title":"A Constraint-Driven Business Object Model for Service-Based Business Processes","authors":"F. Zulkernine, P. Bertoli, M. Pistore, A. Friesen, J. Lemcke, Bernhard Thimmel, O. Geisau","doi":"10.1109/ITNG.2012.170","DOIUrl":"https://doi.org/10.1109/ITNG.2012.170","url":null,"abstract":"Business today is increasingly becoming service-driven. A service represents either a part of or a complete business process, which in turn depicts the life cycle of a Business Object (BO). A number of actions constrained by a set of business policies cause the BO to transit from an initial state to a final state during its life cycle. The constraints would vary for different customized business processes. To engineer reliable service based systems it is crucial to verify the reachability of the desired final states of the BO model against a given set of constraints. We propose the formal specification of a constraint-driven BO model, and thereby, present a verification tool to validate the life cycle of the BO model given a set of constraints. The core object and its constraint-driven life cycle are modeled separately for flexibility and customizability. We also define a language specification to represent our BO model and the business goals. The specification is automatically interpreted by our verification tool, which outputs a graphical view of the life cycle and a textual report of the validation results.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"55 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120920415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Region of Interest Localization of Cardiac Structure from Cine MRI Images 基于MRI影像的心脏结构感兴趣区域定位
Marwa M. A. Hadhoud, M. Eladawy, A. Seddik
In this paper, we present a new method for localizing the position of the heart from Cine MRI images. This method depends on calculating the summation of the difference between images of a specific slice that we work on it, then applying thresholding on the resulting image to get the region of interest. To validate our method, we compare between our results and results of another method used in localizing the position of the heart which depends on the standard deviation. We worked on images of 14 different patients, come from STACOM database. We achieved by this method good results in determining the position of the heart. This method has different advantages like: it works on different contrast images, fast, and fully automatic.
本文提出了一种利用MRI图像定位心脏位置的新方法。该方法依赖于计算我们处理的特定切片的图像之间的差的总和,然后对结果图像应用阈值以获得感兴趣的区域。为了验证我们的方法,我们将我们的结果与另一种用于定位心脏位置的方法的结果进行比较,这取决于标准偏差。我们研究了来自STACOM数据库的14位不同患者的图像。我们用这种方法在确定心脏位置方面取得了很好的效果。该方法具有以下优点:适用于不同对比度的图像,速度快,全自动。
{"title":"Region of Interest Localization of Cardiac Structure from Cine MRI Images","authors":"Marwa M. A. Hadhoud, M. Eladawy, A. Seddik","doi":"10.1109/ITNG.2012.10","DOIUrl":"https://doi.org/10.1109/ITNG.2012.10","url":null,"abstract":"In this paper, we present a new method for localizing the position of the heart from Cine MRI images. This method depends on calculating the summation of the difference between images of a specific slice that we work on it, then applying thresholding on the resulting image to get the region of interest. To validate our method, we compare between our results and results of another method used in localizing the position of the heart which depends on the standard deviation. We worked on images of 14 different patients, come from STACOM database. We achieved by this method good results in determining the position of the heart. This method has different advantages like: it works on different contrast images, fast, and fully automatic.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121367108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Annotating Resources in Sequence Diagrams for Testing Web Security 在序列图中标注资源用于测试Web安全性
Weifeng Xu, Lin Deng, Qing Zheng
Both legitimate users and attackers use web resources to realize their goals. These goals are either desired or malicious in terms of the role of the users. This paper presents a novel approach for testing web security by focusing on the web resources used/exploited by both legitimate users and attackers.
合法用户和攻击者都使用web资源来实现他们的目的。就用户的角色而言,这些目标要么是期望的,要么是恶意的。本文提出了一种新的方法,通过关注合法用户和攻击者使用/利用的web资源来测试web安全性。
{"title":"Annotating Resources in Sequence Diagrams for Testing Web Security","authors":"Weifeng Xu, Lin Deng, Qing Zheng","doi":"10.1109/ITNG.2012.78","DOIUrl":"https://doi.org/10.1109/ITNG.2012.78","url":null,"abstract":"Both legitimate users and attackers use web resources to realize their goals. These goals are either desired or malicious in terms of the role of the users. This paper presents a novel approach for testing web security by focusing on the web resources used/exploited by both legitimate users and attackers.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"606 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116387449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of a FPGA-based Timing Sharing Architecture for Sound Rendering Applications 基于fpga的声音渲染时序共享架构设计
Tan Yiyu, Y. Inoguchi, Yukinori Sato, Y. Iwaya, Hiroshi Matsuoka, M. Otani, T. Tsuchiya
Sound rendering applications are data-intensive and memory-intensive as a sound space increases. To speed up computation and extend the simulated area, a sound rendering system based on the two-dimensional Digital Huygens Model (DHM) with timing sharing architecture is designed and implemented by a Field Programmable Gate Array (FPGA) chip XC5VLX330T. Compared with the DHM system with the traditional parallel architecture, the proposed system implemented by a FPGA chip extends about 20 times in simulated area, and speeds up 1.47 times against the software simulation carried out in a computer with an AMD Phenom 9500 Quad-core processor (2.2 GHz) and 4GB RAM. The system is relatively easy to cascade many FPGA chips to work in parallel in real applications.
随着声音空间的增加,声音渲染应用程序是数据密集型和内存密集型的。为了提高计算速度和扩展模拟区域,设计并实现了一种基于二维数字惠更斯模型(DHM)的声音绘制系统,该系统采用现场可编程门阵列(FPGA)芯片XC5VLX330T实现。与传统并行架构的DHM系统相比,采用FPGA芯片实现的系统在仿真面积上扩展了约20倍,在采用AMD Phenom 9500四核处理器(2.2 GHz)和4GB RAM的计算机上进行的软件仿真中,速度提高了1.47倍。在实际应用中,该系统相对容易实现多个FPGA芯片的级联并行工作。
{"title":"Design of a FPGA-based Timing Sharing Architecture for Sound Rendering Applications","authors":"Tan Yiyu, Y. Inoguchi, Yukinori Sato, Y. Iwaya, Hiroshi Matsuoka, M. Otani, T. Tsuchiya","doi":"10.1109/ITNG.2012.110","DOIUrl":"https://doi.org/10.1109/ITNG.2012.110","url":null,"abstract":"Sound rendering applications are data-intensive and memory-intensive as a sound space increases. To speed up computation and extend the simulated area, a sound rendering system based on the two-dimensional Digital Huygens Model (DHM) with timing sharing architecture is designed and implemented by a Field Programmable Gate Array (FPGA) chip XC5VLX330T. Compared with the DHM system with the traditional parallel architecture, the proposed system implemented by a FPGA chip extends about 20 times in simulated area, and speeds up 1.47 times against the software simulation carried out in a computer with an AMD Phenom 9500 Quad-core processor (2.2 GHz) and 4GB RAM. The system is relatively easy to cascade many FPGA chips to work in parallel in real applications.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121128858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Planarization of Geographic Cluster-based Overlay Graphs in Realistic Wireless Networks 现实无线网络中基于地理聚类的覆盖图平面化
Emi Mathews
Geographic routing based on greedy forwarding at node level and planar graph routing at overlay level is more efficient than both being performed at node level, especially when topology changes frequently. Overlay graphs based on geographic clusters constructed for wireless networks, modeled as 2D graphs, are generally nonplanar and planar graph routing applied on such overlay graphs may fail. Existing planarization algorithms create planar overlay graphs, when the network graphs obey assumptions like Unit Disk Graph (UDG) property. However, in real wireless networks due to radio range irregularities they fail to create connected planar graphs for connected network graphs. We propose a new planarization algorithm for overlay graphs based on the localized link removal and addition based planarization algorithm. Theoretical analysis shows that planarized graphs created by our algorithm are always planar and connected for connected UDG modeled networks. Evaluation of our algorithm on Log Normal Shadowing model, a realistic wireless model, shows that our algorithm creates connected networks in almost all simulations. Moreover, the probability of getting planar graphs is really high compared to the existing planarization algorithms.
特别是在拓扑结构频繁变化的情况下,节点级贪婪转发的地理路由和覆盖级平面图路由的效率都高于节点级。基于地理聚类为无线网络构建的覆盖图,建模为二维图,通常是非平面的,在这种覆盖图上应用平面图路由可能会失败。现有的平面化算法在网络图服从单位磁盘图(Unit Disk Graph, UDG)等属性的前提下,生成平面叠加图。然而,在实际的无线网络中,由于无线电范围的不规则性,它们不能为连通的网络图创建连通的平面图。提出了一种基于局部链路去除和加法的叠加图平面化算法。理论分析表明,对于连通的UDG模型网络,我们的算法生成的平面化图始终是平面且连通的。我们的算法在对数正态阴影模型(一个真实的无线模型)上的评估表明,我们的算法在几乎所有的模拟中都能创建连接网络。而且,与现有的平面化算法相比,得到平面图的概率非常高。
{"title":"Planarization of Geographic Cluster-based Overlay Graphs in Realistic Wireless Networks","authors":"Emi Mathews","doi":"10.1109/ITNG.2012.22","DOIUrl":"https://doi.org/10.1109/ITNG.2012.22","url":null,"abstract":"Geographic routing based on greedy forwarding at node level and planar graph routing at overlay level is more efficient than both being performed at node level, especially when topology changes frequently. Overlay graphs based on geographic clusters constructed for wireless networks, modeled as 2D graphs, are generally nonplanar and planar graph routing applied on such overlay graphs may fail. Existing planarization algorithms create planar overlay graphs, when the network graphs obey assumptions like Unit Disk Graph (UDG) property. However, in real wireless networks due to radio range irregularities they fail to create connected planar graphs for connected network graphs. We propose a new planarization algorithm for overlay graphs based on the localized link removal and addition based planarization algorithm. Theoretical analysis shows that planarized graphs created by our algorithm are always planar and connected for connected UDG modeled networks. Evaluation of our algorithm on Log Normal Shadowing model, a realistic wireless model, shows that our algorithm creates connected networks in almost all simulations. Moreover, the probability of getting planar graphs is really high compared to the existing planarization algorithms.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121416062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Excessive Use of the Internet and Gender: The Case for University Students in Jordan 网络过度使用与性别:约旦大学生案例
Y. Eyadat
The primary purpose of this study was to determine the level of internet use as it varies by gender among university students in Jordan. A random sample of 278 students from one university located in the Northern part of Jordan responded to a valid and reliable instrument developed by the researcher. Results of the study indicated that university students under study experienced excessive use of the internet as indicated by the overall mean value and the results indicated that the university students under excessive use of the internet neglect household responsibilities and neglect exams and courses to spend more time online. Results also indicated that there were no significant differences in the excessive use of the internet based on differences in gender. The study ended by offering a number of recommendations for the field of study.
本研究的主要目的是确定约旦大学生的互联网使用水平,因为它因性别而异。来自约旦北部一所大学的278名学生随机抽样,对研究人员开发的有效和可靠的工具作出了反应。研究结果表明,被研究大学生的总体平均值表明,被研究大学生过度使用互联网,结果表明,过度使用互联网的大学生忽视家庭责任,忽视考试和课程,花费更多的时间在网上。结果还表明,性别差异在过度使用互联网方面没有显著差异。该研究最后为研究领域提出了一些建议。
{"title":"Excessive Use of the Internet and Gender: The Case for University Students in Jordan","authors":"Y. Eyadat","doi":"10.1109/ITNG.2012.83","DOIUrl":"https://doi.org/10.1109/ITNG.2012.83","url":null,"abstract":"The primary purpose of this study was to determine the level of internet use as it varies by gender among university students in Jordan. A random sample of 278 students from one university located in the Northern part of Jordan responded to a valid and reliable instrument developed by the researcher. Results of the study indicated that university students under study experienced excessive use of the internet as indicated by the overall mean value and the results indicated that the university students under excessive use of the internet neglect household responsibilities and neglect exams and courses to spend more time online. Results also indicated that there were no significant differences in the excessive use of the internet based on differences in gender. The study ended by offering a number of recommendations for the field of study.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127383499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of a Countering Method to Social Bookmarking Pollution Based on Degree of Bookmark Similarity 基于书签相似度的社会书签污染防治方法性能评价
H. Hisamatsu, T. Hatanaka
Social Book marking (SBM) is one of the most widely used Web services. An SBM website displays and shares each user's bookmarks. The SBM service aggregates the number of users who bookmark a given Web page and provides useful information as a result of these aggregations. However, an increase in the popularity of the SBM service and in the number of the users of the SBM service results in an increase in the amount of SBM SPAM. In addition, the SBM service generates irrelevant information to many users because of the aggregation of a large number of bookmarks, we call this problem "SBM pollution." In this paper, we propose a method for countering the problem of SBM pollution based on the degree of bookmark similarity. The proposed method creates blacklists that contain lists of users having a high degree of bookmark similarity. Based on the created blacklists, the number of bookmarks of the Web pages influenced by SBM pollution is reduced. From the results of the performance evaluation, we show that our method reduces the number of bookmarks of most Web pages influenced by the SBM pollution to a great extent.
社会图书标记(SBM)是使用最广泛的Web服务之一。SBM网站显示并共享每个用户的书签。SBM服务聚合为给定Web页面添加书签的用户数量,并根据这些聚合提供有用的信息。然而,随着SBM服务的普及和SBM服务用户数量的增加,导致SBM垃圾邮件的数量增加。此外,由于大量书签的聚集,SBM服务对很多用户产生了不相关的信息,我们称这种问题为“SBM污染”。本文提出了一种基于书签相似度的SBM污染处理方法。提出的方法创建黑名单,其中包含书签高度相似的用户列表。根据创建的黑名单,减少受SBM污染影响的网页的书签数量。从性能评估结果来看,我们的方法在很大程度上减少了受SBM污染影响的大多数网页的书签数量。
{"title":"Performance Evaluation of a Countering Method to Social Bookmarking Pollution Based on Degree of Bookmark Similarity","authors":"H. Hisamatsu, T. Hatanaka","doi":"10.1109/ITNG.2012.144","DOIUrl":"https://doi.org/10.1109/ITNG.2012.144","url":null,"abstract":"Social Book marking (SBM) is one of the most widely used Web services. An SBM website displays and shares each user's bookmarks. The SBM service aggregates the number of users who bookmark a given Web page and provides useful information as a result of these aggregations. However, an increase in the popularity of the SBM service and in the number of the users of the SBM service results in an increase in the amount of SBM SPAM. In addition, the SBM service generates irrelevant information to many users because of the aggregation of a large number of bookmarks, we call this problem \"SBM pollution.\" In this paper, we propose a method for countering the problem of SBM pollution based on the degree of bookmark similarity. The proposed method creates blacklists that contain lists of users having a high degree of bookmark similarity. Based on the created blacklists, the number of bookmarks of the Web pages influenced by SBM pollution is reduced. From the results of the performance evaluation, we show that our method reduces the number of bookmarks of most Web pages influenced by the SBM pollution to a great extent.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121611737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Computational Teaching Approach through the Use of a Narrative Technique and a Comic Strip 运用叙事技巧和连环画的计算教学方法
Mario Masayuki Takeda, F. S. Marcondes, Í. S. Vega, Elizabete Briani Macedo Gara, Luciano Gaspar
This article presents a computational teaching approach through the use of OCC-RDD narrative technique for the elaboration of a comic strip. Our aim is to achieve level 1 (Knowledge) of the cognitive dimension of Bloom's Taxonomy. An illustration of the use of such technique is presented along this article. Starting from a sequence of scenes, a comic strip was elaborated in order to teach concepts of software modeling.
本文介绍了一种利用OCC-RDD叙事技术进行连环画精细化的计算教学方法。我们的目标是达到布鲁姆分类法认知维度的第一级(知识)。本文提供了使用这种技术的示例。为了教授软件建模的概念,从一系列场景开始,详细阐述了漫画。
{"title":"A Computational Teaching Approach through the Use of a Narrative Technique and a Comic Strip","authors":"Mario Masayuki Takeda, F. S. Marcondes, Í. S. Vega, Elizabete Briani Macedo Gara, Luciano Gaspar","doi":"10.1109/ITNG.2012.104","DOIUrl":"https://doi.org/10.1109/ITNG.2012.104","url":null,"abstract":"This article presents a computational teaching approach through the use of OCC-RDD narrative technique for the elaboration of a comic strip. Our aim is to achieve level 1 (Knowledge) of the cognitive dimension of Bloom's Taxonomy. An illustration of the use of such technique is presented along this article. Starting from a sequence of scenes, a comic strip was elaborated in order to teach concepts of software modeling.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130692063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Software Security: The Dangerous Afterthought 软件安全:危险的事后考虑
C. Steward, Luay A. Wahsheh, Aftab Ahmad, J. Graham, Cheryl V. Hinds, Aurelia T. Williams, S. J. DeLoatch
As users of many different types of software, one of the last things we think about when deciding which is best for the task at hand is the security of the software. This of course depends on the type of software as well. If it is banking or tax software then, security is of concern. However, in most cases the thought rarely crosses the average users mind. That is until something happens to the system or information the system may hold. This way of thinking is very similar to the way some software is created. The software's features, usability, and interface are normally at the forefront. On the other hand the software's security is just an afterthought for many developers. While software is developed in a very intricate process, it does not currently stress security. In this paper, we will describe different approaches that have been recently researched to help create more secure software. Although these approaches will be introduced separately, using a combination of two or all three together would be the most secure combination.
作为许多不同类型软件的用户,在决定哪种软件最适合手头的任务时,我们考虑的最后一件事是软件的安全性。当然,这也取决于软件的类型。如果是银行或税务软件,那么安全性是值得关注的。然而,在大多数情况下,普通用户很少想到这一点。直到系统或系统可能保存的信息发生变化。这种思维方式与某些软件的创建方式非常相似。软件的特性、可用性和界面通常是最重要的。另一方面,对于许多开发人员来说,软件的安全性只是事后的考虑。虽然软件开发是一个非常复杂的过程,但它目前并不强调安全性。在本文中,我们将描述最近研究的不同方法,以帮助创建更安全的软件。虽然这些方法将分别介绍,但将两种或所有三种方法结合使用将是最安全的组合。
{"title":"Software Security: The Dangerous Afterthought","authors":"C. Steward, Luay A. Wahsheh, Aftab Ahmad, J. Graham, Cheryl V. Hinds, Aurelia T. Williams, S. J. DeLoatch","doi":"10.1109/ITNG.2012.60","DOIUrl":"https://doi.org/10.1109/ITNG.2012.60","url":null,"abstract":"As users of many different types of software, one of the last things we think about when deciding which is best for the task at hand is the security of the software. This of course depends on the type of software as well. If it is banking or tax software then, security is of concern. However, in most cases the thought rarely crosses the average users mind. That is until something happens to the system or information the system may hold. This way of thinking is very similar to the way some software is created. The software's features, usability, and interface are normally at the forefront. On the other hand the software's security is just an afterthought for many developers. While software is developed in a very intricate process, it does not currently stress security. In this paper, we will describe different approaches that have been recently researched to help create more secure software. Although these approaches will be introduced separately, using a combination of two or all three together would be the most secure combination.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"137 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130876317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2012 Ninth International Conference on Information Technology - New Generations
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1