首页 > 最新文献

2011 Malaysian Conference in Software Engineering最新文献

英文 中文
CRM software implementation factors in hospital: Software & patient perspectives 医院CRM软件实施因素:软件与患者视角
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140662
Hossein Monem, Ab Razak Che Hussin, R. Sharifian, Habib Shaterzadeh
Customer Relationship Management (CRM) related issues, during three consecutive years, were in the top nine lists of most concern for the hospitals' chief executive officers in the USA and furthermore, Information Technology (IT) projects' failure rate in the organizations were quite high. To deal with such problems Success Factors (CSF) from different perspectives such as management, staff, patient and software were reviewed in previous healthcare's literatures. In this paper, software and patient factors deeply were focused and added to the Egg model and a five perspective map was created. Implementation success factors map depicts inadequate study on patient's trust and perception and software's customization, complexity, usability, privacy and usefulness. Chief Information Officers (CIO) and Chief Executive Officers (CEO) of hospitals and hospital's CRM system vendors can use proposed factors' map for more successful implementations. It should be noted that this result is part of a PhD research and further investigation is required to test these factors in term of practical usage in heath care environment.
与客户关系管理(CRM)相关的问题,连续三年在美国医院首席执行官最关心的前九大问题中名列前茅,此外,信息技术(IT)项目在组织中的失败率相当高。为了解决这些问题,我们从管理、员工、患者和软件等不同角度对以往的医疗保健文献进行了综述。本文深入关注软件和患者因素,并将其加入Egg模型中,创建了一个五视角图。实施成功因素图描述了对患者信任和感知以及软件定制,复杂性,可用性,隐私和有用性的研究不足。医院的首席信息官(CIO)和首席执行官(CEO)以及医院的CRM系统供应商可以使用建议的因素图来实现更成功的实施。值得注意的是,该结果是博士研究的一部分,需要进一步调查以测试这些因素在医疗保健环境中的实际使用情况。
{"title":"CRM software implementation factors in hospital: Software & patient perspectives","authors":"Hossein Monem, Ab Razak Che Hussin, R. Sharifian, Habib Shaterzadeh","doi":"10.1109/MYSEC.2011.6140662","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140662","url":null,"abstract":"Customer Relationship Management (CRM) related issues, during three consecutive years, were in the top nine lists of most concern for the hospitals' chief executive officers in the USA and furthermore, Information Technology (IT) projects' failure rate in the organizations were quite high. To deal with such problems Success Factors (CSF) from different perspectives such as management, staff, patient and software were reviewed in previous healthcare's literatures. In this paper, software and patient factors deeply were focused and added to the Egg model and a five perspective map was created. Implementation success factors map depicts inadequate study on patient's trust and perception and software's customization, complexity, usability, privacy and usefulness. Chief Information Officers (CIO) and Chief Executive Officers (CEO) of hospitals and hospital's CRM system vendors can use proposed factors' map for more successful implementations. It should be noted that this result is part of a PhD research and further investigation is required to test these factors in term of practical usage in heath care environment.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115186224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An enhanced generic pipeline model for code clone detection 用于代码克隆检测的增强通用管道模型
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140712
Al-Fahim Mubarak Ali, S. Sulaiman, Sharifah Mashita Syed-Mohamad
Maintainability is an important attribute when developing software. One of the factors that negatively affect maintainability of software is cloning. Cloning is identical copies of the same instances or fragments. Code cloning happens due to rapid changes when programmers perform clone instances and copy-paste technique. Although copy and paste is widely used in code reusability approach, it significantly increases maintenance cost. Current code clone research focuses in detection and analysis of code clones in order to help software developers to identify code clones in a source code and reuse the source code in order to decrease the maintenance cost. Necessary measures needed in order to reduce issues caused by cloning during implementation. Therefore, there is a need in exploring problems and possibilities associated in code cloning. This paper proposes an enhancement of a generic pipeline model for code clone detection. With the support of a tool, we implement and apply the proposed approach.
可维护性是开发软件时的一个重要属性。影响软件可维护性的负面因素之一是克隆。克隆是相同实例或片段的相同副本。当程序员执行克隆实例和复制粘贴技术时,由于快速变化而发生代码克隆。虽然复制粘贴在代码可重用性方法中被广泛使用,但它显著增加了维护成本。当前对代码克隆的研究主要集中在对代码克隆的检测和分析,以帮助软件开发人员识别源代码中的代码克隆,并重用源代码以降低维护成本。必要的措施,以减少克隆在实施过程中造成的问题。因此,有必要探索与代码克隆相关的问题和可能性。本文提出了一种用于代码克隆检测的通用管道模型的改进。在工具的支持下,我们实现并应用了所提出的方法。
{"title":"An enhanced generic pipeline model for code clone detection","authors":"Al-Fahim Mubarak Ali, S. Sulaiman, Sharifah Mashita Syed-Mohamad","doi":"10.1109/MYSEC.2011.6140712","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140712","url":null,"abstract":"Maintainability is an important attribute when developing software. One of the factors that negatively affect maintainability of software is cloning. Cloning is identical copies of the same instances or fragments. Code cloning happens due to rapid changes when programmers perform clone instances and copy-paste technique. Although copy and paste is widely used in code reusability approach, it significantly increases maintenance cost. Current code clone research focuses in detection and analysis of code clones in order to help software developers to identify code clones in a source code and reuse the source code in order to decrease the maintenance cost. Necessary measures needed in order to reduce issues caused by cloning during implementation. Therefore, there is a need in exploring problems and possibilities associated in code cloning. This paper proposes an enhancement of a generic pipeline model for code clone detection. With the support of a tool, we implement and apply the proposed approach.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121933378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Controlled vocabulary based software requirements classification 基于受控词汇表的软件需求分类
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140639
N. Minhas, Shahla Majeed, Ziaul Qayyum, Muhammad Aasem
The nature of software requirements is very much subjective and multi-faceted. The level of complexity increases along-with the volume, especially when the requirements are in natural language. In the primary phase of requirements engineering, it is mostly desirable to transform these user written requirements into more understandable form. Organizing the requirements in different groups may support further activities much easier than direct working. In this paper, we present a classifier that sufficiently transforms natural language written requirements into corresponding groups. The organization of these groups depends upon the inter-keywords association i.e., hierarchy of keywords. The classifier works best when requirements have been written using relative vocabulary i.e., controlled vocabulary. The overall structure of this technique is composed on three main components: 1) Repository: of keywords and their relationships as source data, 2) Mapping: Finding words in the requirements document with keywords of repository, and 3) Presentation: presenting classified (grouped) requirements in more meaningful ways.
软件需求的本质是非常主观和多方面的。复杂程度随着容量的增加而增加,特别是当需求是自然语言时。在需求工程的初级阶段,将这些用户编写的需求转换成更容易理解的形式是最可取的。在不同的组中组织需求可能比直接工作更容易支持进一步的活动。在本文中,我们提出了一个分类器,它充分地将自然语言编写的需求转换为相应的组。这些组的组织取决于关键字之间的关联,即关键字的层次结构。当使用相对词汇表(即受控词汇表)编写需求时,分类器工作得最好。该技术的总体结构由三个主要组件组成:1)存储库:关键字及其作为源数据的关系;2)映射:在使用存储库关键字的需求文档中查找单词;3)表示:以更有意义的方式表示分类(分组)需求。
{"title":"Controlled vocabulary based software requirements classification","authors":"N. Minhas, Shahla Majeed, Ziaul Qayyum, Muhammad Aasem","doi":"10.1109/MYSEC.2011.6140639","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140639","url":null,"abstract":"The nature of software requirements is very much subjective and multi-faceted. The level of complexity increases along-with the volume, especially when the requirements are in natural language. In the primary phase of requirements engineering, it is mostly desirable to transform these user written requirements into more understandable form. Organizing the requirements in different groups may support further activities much easier than direct working. In this paper, we present a classifier that sufficiently transforms natural language written requirements into corresponding groups. The organization of these groups depends upon the inter-keywords association i.e., hierarchy of keywords. The classifier works best when requirements have been written using relative vocabulary i.e., controlled vocabulary. The overall structure of this technique is composed on three main components: 1) Repository: of keywords and their relationships as source data, 2) Mapping: Finding words in the requirements document with keywords of repository, and 3) Presentation: presenting classified (grouped) requirements in more meaningful ways.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126340124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Software engineering approach to enterprise-strength ontology engineering 面向企业级本体工程的软件工程方法
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140656
Muthukkaruppan Annamalai, M. M. Rosli
Semantic network is a promising technological platform that uses the internet and intranet, and related software technologies to explicitly integrate disparate applications in linked organisations such as enterprises. A primary element of the semantic network is ontology. The adoption of semantic network in enterprises is impeded by the lack of enduring methodologies for engineering reliable ontologies to support the evolving enterprise applications on the envisaged meaning-laden network. Consequently, the paper recognises the systematic and disciplined approach of Software Engineering (SE) as relevant course for Enterprise-strength Ontology Engineering (EsOE), and sets out to reflect EsOE in the light of SE. It identifies the common ground among the contemporary SE models, and suggests exploiting these commonalities to serve as a basis for EsOE. Following the idea of maturity models, the proposed high-level methodology is structured into three levels of realisation, each described by a process, namely, Engineering, Project-focus and Organisation-focus processes.
语义网络是一个很有前途的技术平台,它使用互联网和内部网以及相关的软件技术来明确地集成企业等相关组织中的不同应用程序。语义网络的一个主要元素是本体。由于缺乏持久的方法来设计可靠的本体,以支持在设想的充满意义的网络上不断发展的企业应用程序,因此阻碍了语义网络在企业中的采用。因此,本文认识到软件工程(SE)的系统和有纪律的方法是企业实力本体工程(EsOE)的相关课程,并着手在SE的基础上反映EsOE。它确定了当代SE模型之间的共同点,并建议利用这些共同点作为EsOE的基础。遵循成熟度模型的思想,建议的高级方法被构建为三个实现级别,每个级别由一个过程描述,即工程、项目重点和组织重点过程。
{"title":"Software engineering approach to enterprise-strength ontology engineering","authors":"Muthukkaruppan Annamalai, M. M. Rosli","doi":"10.1109/MYSEC.2011.6140656","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140656","url":null,"abstract":"Semantic network is a promising technological platform that uses the internet and intranet, and related software technologies to explicitly integrate disparate applications in linked organisations such as enterprises. A primary element of the semantic network is ontology. The adoption of semantic network in enterprises is impeded by the lack of enduring methodologies for engineering reliable ontologies to support the evolving enterprise applications on the envisaged meaning-laden network. Consequently, the paper recognises the systematic and disciplined approach of Software Engineering (SE) as relevant course for Enterprise-strength Ontology Engineering (EsOE), and sets out to reflect EsOE in the light of SE. It identifies the common ground among the contemporary SE models, and suggests exploiting these commonalities to serve as a basis for EsOE. Following the idea of maturity models, the proposed high-level methodology is structured into three levels of realisation, each described by a process, namely, Engineering, Project-focus and Organisation-focus processes.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114338924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intercultural challenges in offshore software development outsourcing relationships: A systematic literature review protocol 离岸软件开发外包关系中的跨文化挑战:系统的文献回顾协议
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140719
M. Azeem, S. Khan
Offshore software development outsourcing (OSDO) is an emerging business approach adopted by many software development organizations in developed countries. Developing software at offshore locations has many benefits including access to large labor pool, low development cost and round-the-clock development. However, inspite of these benefits OSDO presents a variety of challenges to the software development organizations including temporal, geographical and intercultural differences. Intercultural differences cause many problems to vendors in OSDO relationships. This research seeks to identify the potential intercultural challenges faced by vendors in OSDO relationships by reviewing the literature in a systematic way. We have developed a systematic literature review (SLR) protocol, and are in the process of implementing the protocol. SLR is based on a structured protocol, and is therefore, different from ordinary literature review. SLR provides in-depth and more thorough results than ordinary literature review. The expected outcomes of this review will be the identification of intercultural challenges or barriers faced by vendor organisations in the establishment and maintenance of OSDO relationships.
离岸软件开发外包(OSDO)是一种新兴的商业方法,被许多发达国家的软件开发组织采用。在离岸地点开发软件有很多好处,包括获得大量的劳动力、低开发成本和全天候开发。然而,尽管有这些好处,OSDO给软件开发组织带来了各种各样的挑战,包括时间、地理和文化差异。跨文化差异给OSDO关系中的供应商带来了许多问题。本研究旨在通过系统地回顾文献,确定供应商在OSDO关系中面临的潜在跨文化挑战。我们已经制定了系统的文献回顾(SLR)协议,并正在实施该协议。单反是基于一个结构化的协议,因此,不同于普通的文献综述。单反提供了比普通文献综述更深入、更全面的结果。本次审查的预期结果将是确定供应商组织在建立和维护OSDO关系时面临的跨文化挑战或障碍。
{"title":"Intercultural challenges in offshore software development outsourcing relationships: A systematic literature review protocol","authors":"M. Azeem, S. Khan","doi":"10.1109/MYSEC.2011.6140719","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140719","url":null,"abstract":"Offshore software development outsourcing (OSDO) is an emerging business approach adopted by many software development organizations in developed countries. Developing software at offshore locations has many benefits including access to large labor pool, low development cost and round-the-clock development. However, inspite of these benefits OSDO presents a variety of challenges to the software development organizations including temporal, geographical and intercultural differences. Intercultural differences cause many problems to vendors in OSDO relationships. This research seeks to identify the potential intercultural challenges faced by vendors in OSDO relationships by reviewing the literature in a systematic way. We have developed a systematic literature review (SLR) protocol, and are in the process of implementing the protocol. SLR is based on a structured protocol, and is therefore, different from ordinary literature review. SLR provides in-depth and more thorough results than ordinary literature review. The expected outcomes of this review will be the identification of intercultural challenges or barriers faced by vendor organisations in the establishment and maintenance of OSDO relationships.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125370612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
User-centered technique for managing and tracking modification requests in prototype-based web applications 以用户为中心的技术,用于管理和跟踪基于原型的web应用程序中的修改请求
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140663
Siti Nor Asikin Kamalzaman, S. Sulaiman, Sharifah Mashita Syed-Mohamad
Nowadays, a lot of development of Web applications use prototyping approach such as throw-away prototyping and evolutionary prototyping. In order to fulfill the users' requirements, developers need to communicate with the users, therefore prototyping is widely used in software development to assist these developers. As we develop Web application and release them as a number of versions or releases of prototype, it constantly requires changes to evolve and meet users' specific requirements. Thus, prototyping approach may cause more maintenance cost to be incurred due to scope creep during software development. In addition, it provides the challenges to a maintenance team who is mostly not the actual development team, to manage and track maintenance process of such Web applications. This paper proposes a user-centered technique for managing and tracking modification requests in a Web application. We anticipate that the proposed technique can assist maintainers to manage and track modification of a Web application in more effective and efficient manner by capturing, classifying and validating the enhancement requests, problem report and modification requests directly from the users during the prototyping process itself. This in turn will avoid unexpected modification requests once we release the Web application and to allow the tracing of both enhancement and problem report during prototyping and modification requests and problem report during maintenance.
目前,许多Web应用程序的开发都使用原型方法,如一次性原型和进化原型。为了满足用户的需求,开发人员需要与用户进行沟通,因此原型设计在软件开发中被广泛使用,以帮助这些开发人员。当我们开发Web应用程序并将其作为原型的多个版本或发行版发布时,它不断需要更改以发展并满足用户的特定需求。因此,由于软件开发过程中的范围蔓延,原型方法可能会导致更多的维护成本。此外,它还为维护团队(通常不是实际的开发团队)管理和跟踪此类Web应用程序的维护过程提供了挑战。本文提出了一种以用户为中心的技术,用于管理和跟踪Web应用程序中的修改请求。我们期望所提出的技术能够通过捕获、分类和验证在原型过程中直接来自用户的增强请求、问题报告和修改请求,以更有效和高效的方式帮助维护者管理和跟踪Web应用程序的修改。这样一来,一旦我们发布了Web应用程序,就可以避免意外的修改请求,并允许在原型设计期间跟踪增强和问题报告,在维护期间跟踪修改请求和问题报告。
{"title":"User-centered technique for managing and tracking modification requests in prototype-based web applications","authors":"Siti Nor Asikin Kamalzaman, S. Sulaiman, Sharifah Mashita Syed-Mohamad","doi":"10.1109/MYSEC.2011.6140663","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140663","url":null,"abstract":"Nowadays, a lot of development of Web applications use prototyping approach such as throw-away prototyping and evolutionary prototyping. In order to fulfill the users' requirements, developers need to communicate with the users, therefore prototyping is widely used in software development to assist these developers. As we develop Web application and release them as a number of versions or releases of prototype, it constantly requires changes to evolve and meet users' specific requirements. Thus, prototyping approach may cause more maintenance cost to be incurred due to scope creep during software development. In addition, it provides the challenges to a maintenance team who is mostly not the actual development team, to manage and track maintenance process of such Web applications. This paper proposes a user-centered technique for managing and tracking modification requests in a Web application. We anticipate that the proposed technique can assist maintainers to manage and track modification of a Web application in more effective and efficient manner by capturing, classifying and validating the enhancement requests, problem report and modification requests directly from the users during the prototyping process itself. This in turn will avoid unexpected modification requests once we release the Web application and to allow the tracing of both enhancement and problem report during prototyping and modification requests and problem report during maintenance.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131286244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data format notations for technical communication among hardware and software engineers 用于硬件和软件工程师之间技术交流的数据格式符号
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140699
Ali MohammadAliZadeh Ghazijahani, R. Atan
Communication among software and hardware engineers plays an important and significant role in successful completion of projects in the environments that hardware and software engineers cooperate to develop common products. In these environments communication is inevitable because both hardware and software engineers need to be aware of each other's main challenges and concerns with respect to the common project. The need for this communication is perceived to be even more in developing hardware-software interfaces and also in clarification of types and formats of the data that will be transferred between hardware and software components. In this paper, three different notations are proposed to help software and hardware engineers communicate each other in written and document-based way. By using these notations which are understandable by hardware and software engineers, the requirements relating to the data types and data formats will be depicted in uniform, detailed and accurate forms of documents. These notations that will be drawn by either hardware or software engineers in requirements phase, will describe the type and format of any interaction data at any size.
在硬件和软件工程师合作开发共同产品的环境中,软件和硬件工程师之间的沟通对于项目的成功完成起着重要的作用。在这些环境中,沟通是不可避免的,因为硬件和软件工程师都需要了解彼此在共同项目中的主要挑战和关注点。人们认为,这种交流的需要更多地体现在开发硬件-软件接口以及澄清将在硬件和软件组件之间传输的数据的类型和格式方面。本文提出了三种不同的符号,以帮助软件和硬件工程师以书面和基于文档的方式进行交流。通过使用这些硬件和软件工程师可以理解的符号,与数据类型和数据格式有关的需求将以统一、详细和准确的文件形式描述出来。这些符号将由硬件或软件工程师在需求阶段绘制,将描述任何大小的任何交互数据的类型和格式。
{"title":"Data format notations for technical communication among hardware and software engineers","authors":"Ali MohammadAliZadeh Ghazijahani, R. Atan","doi":"10.1109/MYSEC.2011.6140699","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140699","url":null,"abstract":"Communication among software and hardware engineers plays an important and significant role in successful completion of projects in the environments that hardware and software engineers cooperate to develop common products. In these environments communication is inevitable because both hardware and software engineers need to be aware of each other's main challenges and concerns with respect to the common project. The need for this communication is perceived to be even more in developing hardware-software interfaces and also in clarification of types and formats of the data that will be transferred between hardware and software components. In this paper, three different notations are proposed to help software and hardware engineers communicate each other in written and document-based way. By using these notations which are understandable by hardware and software engineers, the requirements relating to the data types and data formats will be depicted in uniform, detailed and accurate forms of documents. These notations that will be drawn by either hardware or software engineers in requirements phase, will describe the type and format of any interaction data at any size.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128201843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach to estimate the savings from negotiation based on cost-benefit analysis model 一种基于成本效益分析模型的谈判节约估算方法
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140687
Sabrina Ahmad, A. Muda, N. A. Muda, Zahriah Othman
This paper presents an approach to estimate the savings from implementing negotiation in requirements elicitation process. The aim of implementing negotiation is to minimize the possibility of introducing defects during the creation of requirements and to decrease later effort required to fix requirements defects. An empirical evaluation study is adopted through a role play experiment to evaluate the benefit of exercising negotiation. The net-gain and the return-on-investment show positive value which suggest that negotiation activities worth an investment. Based on the return-on-investment of 197 percent in average, this paper suggests that negotiation is a useful prevention activity to inhibit defects from occurring during the creation of requirements.
本文提出了一种估算在需求获取过程中实施协商所节省的成本的方法。实现协商的目的是最小化在需求创建过程中引入缺陷的可能性,并减少修复需求缺陷所需的后期工作。通过角色扮演实验,采用实证评价研究的方法来评估实施谈判的效益。净收益和投资回报率均为正值,表明谈判活动值得投资。基于平均1977%的投资回报率,本文建议协商是一种有用的预防活动,可以在需求创建期间抑制缺陷的发生。
{"title":"An approach to estimate the savings from negotiation based on cost-benefit analysis model","authors":"Sabrina Ahmad, A. Muda, N. A. Muda, Zahriah Othman","doi":"10.1109/MYSEC.2011.6140687","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140687","url":null,"abstract":"This paper presents an approach to estimate the savings from implementing negotiation in requirements elicitation process. The aim of implementing negotiation is to minimize the possibility of introducing defects during the creation of requirements and to decrease later effort required to fix requirements defects. An empirical evaluation study is adopted through a role play experiment to evaluate the benefit of exercising negotiation. The net-gain and the return-on-investment show positive value which suggest that negotiation activities worth an investment. Based on the return-on-investment of 197 percent in average, this paper suggests that negotiation is a useful prevention activity to inhibit defects from occurring during the creation of requirements.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128952653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Negative selection algorithm in artificial immune system for spam detection 垃圾邮件检测人工免疫系统中的负选择算法
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140701
I. Idris, A. Selamat
Artificial immune system creates techniques that aim at developing immune based models. This was done by distinguishing self from non-self. Mathematical analysis exposed the computation and experimental description of the method and how it is applied to spam detection. This paper looked at evaluation and accuracy in spam detection within the negative selection algorithm. Preliminary result or classifier of self and non-self was carefully studied against mistake of assumption during email classification whereby an email was recognized as a spam and deleted or non-spam and accepted carelessly. This process is called false positive and false negative. Given a threshold, the accuracy increase with increased threshold to determine best performance of the spam detector. Also an improvement of the false positive rate was determined for better spam detector.
人工免疫系统创造了旨在开发基于免疫模型的技术。这是通过区分自我与非我来实现的。数学分析揭示了该方法的计算和实验描述,以及如何将其应用于垃圾邮件检测。本文研究了负面选择算法中垃圾邮件检测的评估和准确性。仔细研究了自我和非自我分类的初步结果,防止在电子邮件分类过程中出现假设错误,从而将电子邮件识别为垃圾邮件而删除或非垃圾邮件而不小心接受。这个过程被称为假阳性和假阴性。给定一个阈值,准确度随着阈值的增加而增加,以确定垃圾邮件检测器的最佳性能。此外,还确定了更好的垃圾邮件检测器的误报率的改进。
{"title":"Negative selection algorithm in artificial immune system for spam detection","authors":"I. Idris, A. Selamat","doi":"10.1109/MYSEC.2011.6140701","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140701","url":null,"abstract":"Artificial immune system creates techniques that aim at developing immune based models. This was done by distinguishing self from non-self. Mathematical analysis exposed the computation and experimental description of the method and how it is applied to spam detection. This paper looked at evaluation and accuracy in spam detection within the negative selection algorithm. Preliminary result or classifier of self and non-self was carefully studied against mistake of assumption during email classification whereby an email was recognized as a spam and deleted or non-spam and accepted carelessly. This process is called false positive and false negative. Given a threshold, the accuracy increase with increased threshold to determine best performance of the spam detector. Also an improvement of the false positive rate was determined for better spam detector.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128536434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Service differentiation for collaborative caching query process in mobile database 移动数据库协同缓存查询过程的服务差异化
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140711
M. Elfaki, H. Ibrahim, A. Mamat, M. Othman
With the dramatic explosion of the real time mobile application, mobile computing is undergoing a transition from a data communication infrastructure to a global information utility. Wireless phones, PDAs, laptop, and high-end workstation can be viewed as appliances that need to be plug-in to this utility for accessing the information. However, due to mobile limited resources, such as insufficient wireless bandwidth, disconnection and client's mobility, collaborative cache management faces vast challenges. One of these challenges is that all requests are processed in the same manner, as well as these requests are forwarded from hop to hop along the way towards the main database server while the requested data items are missed locally. However, these forward data requests might cause delay and increase the number of hops to serve the requests. This paper aims to study the resource management problem to support differentiated collaborative caching and content distribution services. We focus on the preferential of data exchange among neighbor's nodes to support priority-based caching services. Thus, the collaborative neighbors caching increased, and the cache hit within the system is increased indirectly while most of the requests are answered from the neighbor nodes collaboration instead of relying much on the main database server. The proposed model demonstrates its ability to provide quantifiable service differentiation in terms of increasing the percentage of answering the data item requests locally, with minimal efficiency penalties compared to existence collaborative caching models.
随着实时移动应用的迅猛发展,移动计算正经历着从数据通信基础设施向全球信息实用工具的转变。可以将无线电话、pda、笔记本电脑和高端工作站视为需要插件到此实用程序以访问信息的设备。然而,由于移动资源有限,如无线带宽不足、断连和客户端移动性等,协同缓存管理面临巨大挑战。其中一个挑战是,所有请求都以相同的方式处理,并且这些请求在发送到主数据库服务器的途中一跳一跳地转发,而所请求的数据项在本地丢失。但是,这些转发数据请求可能会导致延迟,并增加为请求提供服务的跳数。本文旨在研究支持差异化协同缓存和内容分发服务的资源管理问题。为了支持基于优先级的缓存服务,我们重点研究了相邻节点间数据交换的优先性。这样,协作的邻居缓存增加了,系统内的缓存命中率间接增加,而大多数请求都是由协作的邻居节点来应答,而不是依赖于主数据库服务器。与现有的协作缓存模型相比,所提出的模型证明了它能够提供可量化的服务差异,从而提高本地响应数据项请求的百分比,并且效率损失最小。
{"title":"Service differentiation for collaborative caching query process in mobile database","authors":"M. Elfaki, H. Ibrahim, A. Mamat, M. Othman","doi":"10.1109/MYSEC.2011.6140711","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140711","url":null,"abstract":"With the dramatic explosion of the real time mobile application, mobile computing is undergoing a transition from a data communication infrastructure to a global information utility. Wireless phones, PDAs, laptop, and high-end workstation can be viewed as appliances that need to be plug-in to this utility for accessing the information. However, due to mobile limited resources, such as insufficient wireless bandwidth, disconnection and client's mobility, collaborative cache management faces vast challenges. One of these challenges is that all requests are processed in the same manner, as well as these requests are forwarded from hop to hop along the way towards the main database server while the requested data items are missed locally. However, these forward data requests might cause delay and increase the number of hops to serve the requests. This paper aims to study the resource management problem to support differentiated collaborative caching and content distribution services. We focus on the preferential of data exchange among neighbor's nodes to support priority-based caching services. Thus, the collaborative neighbors caching increased, and the cache hit within the system is increased indirectly while most of the requests are answered from the neighbor nodes collaboration instead of relying much on the main database server. The proposed model demonstrates its ability to provide quantifiable service differentiation in terms of increasing the percentage of answering the data item requests locally, with minimal efficiency penalties compared to existence collaborative caching models.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124278180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2011 Malaysian Conference in Software Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1