首页 > 最新文献

2011 Malaysian Conference in Software Engineering最新文献

英文 中文
Usability in software development: Frameworks comparison between IKnowU and user behavior analysis framework (UBAF) 软件开发中的可用性:IKnowU和用户行为分析框架(UBAF)的框架比较
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140693
N. A. Razak, Masitah Ghazali
Software engineering (SE) and human-computer interaction (HCI) are often regarded as two separate entities while the fact is the two share many similarities and should affect each other to produce a better product or software. In this paper, we compare two component frameworks that integrate both HCI and SE together. Our aim is to understand how each framework considers usability in the software development, and, to identify the strengths and weaknesses of both frameworks. The two component frameworks are IKnowU and UBAF. Comparison of these two frameworks can be useful for researchers as we can the four important criteria — model, architecture, usability work and process, that make of a framework which has usability as its paramount objective.
软件工程(SE)和人机交互(HCI)通常被视为两个独立的实体,而事实是两者有许多相似之处,并且应该相互影响以产生更好的产品或软件。在本文中,我们比较了将HCI和SE集成在一起的两个组件框架。我们的目标是了解每个框架如何考虑软件开发中的可用性,并确定两个框架的优点和缺点。这两个组件框架是IKnowU和UBAF。这两种框架的比较对研究人员很有用,因为我们可以看到四个重要的标准——模型、架构、可用性工作和过程,它们构成了一个以可用性为最高目标的框架。
{"title":"Usability in software development: Frameworks comparison between IKnowU and user behavior analysis framework (UBAF)","authors":"N. A. Razak, Masitah Ghazali","doi":"10.1109/MYSEC.2011.6140693","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140693","url":null,"abstract":"Software engineering (SE) and human-computer interaction (HCI) are often regarded as two separate entities while the fact is the two share many similarities and should affect each other to produce a better product or software. In this paper, we compare two component frameworks that integrate both HCI and SE together. Our aim is to understand how each framework considers usability in the software development, and, to identify the strengths and weaknesses of both frameworks. The two component frameworks are IKnowU and UBAF. Comparison of these two frameworks can be useful for researchers as we can the four important criteria — model, architecture, usability work and process, that make of a framework which has usability as its paramount objective.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114886022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Negative selection algorithm in artificial immune system for spam detection 垃圾邮件检测人工免疫系统中的负选择算法
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140701
I. Idris, A. Selamat
Artificial immune system creates techniques that aim at developing immune based models. This was done by distinguishing self from non-self. Mathematical analysis exposed the computation and experimental description of the method and how it is applied to spam detection. This paper looked at evaluation and accuracy in spam detection within the negative selection algorithm. Preliminary result or classifier of self and non-self was carefully studied against mistake of assumption during email classification whereby an email was recognized as a spam and deleted or non-spam and accepted carelessly. This process is called false positive and false negative. Given a threshold, the accuracy increase with increased threshold to determine best performance of the spam detector. Also an improvement of the false positive rate was determined for better spam detector.
人工免疫系统创造了旨在开发基于免疫模型的技术。这是通过区分自我与非我来实现的。数学分析揭示了该方法的计算和实验描述,以及如何将其应用于垃圾邮件检测。本文研究了负面选择算法中垃圾邮件检测的评估和准确性。仔细研究了自我和非自我分类的初步结果,防止在电子邮件分类过程中出现假设错误,从而将电子邮件识别为垃圾邮件而删除或非垃圾邮件而不小心接受。这个过程被称为假阳性和假阴性。给定一个阈值,准确度随着阈值的增加而增加,以确定垃圾邮件检测器的最佳性能。此外,还确定了更好的垃圾邮件检测器的误报率的改进。
{"title":"Negative selection algorithm in artificial immune system for spam detection","authors":"I. Idris, A. Selamat","doi":"10.1109/MYSEC.2011.6140701","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140701","url":null,"abstract":"Artificial immune system creates techniques that aim at developing immune based models. This was done by distinguishing self from non-self. Mathematical analysis exposed the computation and experimental description of the method and how it is applied to spam detection. This paper looked at evaluation and accuracy in spam detection within the negative selection algorithm. Preliminary result or classifier of self and non-self was carefully studied against mistake of assumption during email classification whereby an email was recognized as a spam and deleted or non-spam and accepted carelessly. This process is called false positive and false negative. Given a threshold, the accuracy increase with increased threshold to determine best performance of the spam detector. Also an improvement of the false positive rate was determined for better spam detector.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128536434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Pair analysis of requirements in software engineering education 软件工程教育中的需求对分析
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140641
Kabas Albakry, M. Kamalrudin
Requirements Analysis and Design is found to be one of the crucial subjects in Software Engineering education. Students need to have deeper understanding before they could start to analyse and design the requirements, either using models or textual descriptions. However, the outcomes of their analysis are always vague and error-prone. We assume that this issue can be handled if “pair analysis” is conducted where all students are assigned with partners following the concept of pair-programming. To prove this, we have conducted a small preliminary evaluation to compare the outcomes of solo work and “pair analysis” work for three different groups of students. The performance, efficacy and students' satisfaction and confidence level are evaluated.
需求分析与设计是软件工程教育的重要学科之一。学生需要有更深入的了解,然后才能开始分析和设计需求,无论是使用模型还是文本描述。然而,他们的分析结果总是模糊且容易出错。我们假设,如果按照“结对编程”的概念,将所有学生分配给伙伴进行“结对分析”,就可以解决这个问题。为了证明这一点,我们对三组不同的学生进行了一个小型的初步评估,以比较单独作业和“配对分析”作业的结果。评估教学效果、效果及学生满意度和信心水平。
{"title":"Pair analysis of requirements in software engineering education","authors":"Kabas Albakry, M. Kamalrudin","doi":"10.1109/MYSEC.2011.6140641","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140641","url":null,"abstract":"Requirements Analysis and Design is found to be one of the crucial subjects in Software Engineering education. Students need to have deeper understanding before they could start to analyse and design the requirements, either using models or textual descriptions. However, the outcomes of their analysis are always vague and error-prone. We assume that this issue can be handled if “pair analysis” is conducted where all students are assigned with partners following the concept of pair-programming. To prove this, we have conducted a small preliminary evaluation to compare the outcomes of solo work and “pair analysis” work for three different groups of students. The performance, efficacy and students' satisfaction and confidence level are evaluated.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130961386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Identifying refactoring through formal model based on data flow graph 通过基于数据流图的形式化模型识别重构
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140653
Panita Meananeatra, S. Rongviriyapanish, Taweesup Apiwattanapong
Identifying refactoring is an important step of bad smell removal process. Many developers have problem identifying refactoring, e.g., novice developers are not sure which refactorings should be applied. Even skilled developers may need to spend a lot of time doing this manually. Identifying refactoring techniques can alleviate these problems for developers. In our previous work, we proposed refactoring filtering conditions (RFC) that identify candidate refactorings for removing long method bad smell. These conditions analyze internal structure inside a method with data flow analysis. Our research improves these RFC based on more refined data flow analysis and presents its formal description. This research also demonstrates an approach of using the improved RFC of three refactorings. Moreover, we conducted an experiment to compare the efficiency of the results of our approach with that of our previous work and that of developer suggestion.
识别重构是臭味去除过程中的一个重要步骤。许多开发人员在识别重构方面存在问题,例如,新手开发人员不确定应该应用哪些重构。即使是熟练的开发人员也可能需要花费大量时间手动完成此操作。确定重构技术可以减轻开发人员的这些问题。在我们之前的工作中,我们提出了重构过滤条件(RFC)来识别用于去除长方法臭味的候选重构。这些条件通过数据流分析来分析方法内部的结构。我们的研究基于更精细的数据流分析改进了这些RFC,并给出了其形式化描述。本研究还演示了一种使用三种重构的改进RFC的方法。此外,我们还进行了一个实验,将我们的方法的结果效率与我们以前的工作和开发者建议的结果效率进行比较。
{"title":"Identifying refactoring through formal model based on data flow graph","authors":"Panita Meananeatra, S. Rongviriyapanish, Taweesup Apiwattanapong","doi":"10.1109/MYSEC.2011.6140653","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140653","url":null,"abstract":"Identifying refactoring is an important step of bad smell removal process. Many developers have problem identifying refactoring, e.g., novice developers are not sure which refactorings should be applied. Even skilled developers may need to spend a lot of time doing this manually. Identifying refactoring techniques can alleviate these problems for developers. In our previous work, we proposed refactoring filtering conditions (RFC) that identify candidate refactorings for removing long method bad smell. These conditions analyze internal structure inside a method with data flow analysis. Our research improves these RFC based on more refined data flow analysis and presents its formal description. This research also demonstrates an approach of using the improved RFC of three refactorings. Moreover, we conducted an experiment to compare the efficiency of the results of our approach with that of our previous work and that of developer suggestion.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129630813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Service differentiation for collaborative caching query process in mobile database 移动数据库协同缓存查询过程的服务差异化
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140711
M. Elfaki, H. Ibrahim, A. Mamat, M. Othman
With the dramatic explosion of the real time mobile application, mobile computing is undergoing a transition from a data communication infrastructure to a global information utility. Wireless phones, PDAs, laptop, and high-end workstation can be viewed as appliances that need to be plug-in to this utility for accessing the information. However, due to mobile limited resources, such as insufficient wireless bandwidth, disconnection and client's mobility, collaborative cache management faces vast challenges. One of these challenges is that all requests are processed in the same manner, as well as these requests are forwarded from hop to hop along the way towards the main database server while the requested data items are missed locally. However, these forward data requests might cause delay and increase the number of hops to serve the requests. This paper aims to study the resource management problem to support differentiated collaborative caching and content distribution services. We focus on the preferential of data exchange among neighbor's nodes to support priority-based caching services. Thus, the collaborative neighbors caching increased, and the cache hit within the system is increased indirectly while most of the requests are answered from the neighbor nodes collaboration instead of relying much on the main database server. The proposed model demonstrates its ability to provide quantifiable service differentiation in terms of increasing the percentage of answering the data item requests locally, with minimal efficiency penalties compared to existence collaborative caching models.
随着实时移动应用的迅猛发展,移动计算正经历着从数据通信基础设施向全球信息实用工具的转变。可以将无线电话、pda、笔记本电脑和高端工作站视为需要插件到此实用程序以访问信息的设备。然而,由于移动资源有限,如无线带宽不足、断连和客户端移动性等,协同缓存管理面临巨大挑战。其中一个挑战是,所有请求都以相同的方式处理,并且这些请求在发送到主数据库服务器的途中一跳一跳地转发,而所请求的数据项在本地丢失。但是,这些转发数据请求可能会导致延迟,并增加为请求提供服务的跳数。本文旨在研究支持差异化协同缓存和内容分发服务的资源管理问题。为了支持基于优先级的缓存服务,我们重点研究了相邻节点间数据交换的优先性。这样,协作的邻居缓存增加了,系统内的缓存命中率间接增加,而大多数请求都是由协作的邻居节点来应答,而不是依赖于主数据库服务器。与现有的协作缓存模型相比,所提出的模型证明了它能够提供可量化的服务差异,从而提高本地响应数据项请求的百分比,并且效率损失最小。
{"title":"Service differentiation for collaborative caching query process in mobile database","authors":"M. Elfaki, H. Ibrahim, A. Mamat, M. Othman","doi":"10.1109/MYSEC.2011.6140711","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140711","url":null,"abstract":"With the dramatic explosion of the real time mobile application, mobile computing is undergoing a transition from a data communication infrastructure to a global information utility. Wireless phones, PDAs, laptop, and high-end workstation can be viewed as appliances that need to be plug-in to this utility for accessing the information. However, due to mobile limited resources, such as insufficient wireless bandwidth, disconnection and client's mobility, collaborative cache management faces vast challenges. One of these challenges is that all requests are processed in the same manner, as well as these requests are forwarded from hop to hop along the way towards the main database server while the requested data items are missed locally. However, these forward data requests might cause delay and increase the number of hops to serve the requests. This paper aims to study the resource management problem to support differentiated collaborative caching and content distribution services. We focus on the preferential of data exchange among neighbor's nodes to support priority-based caching services. Thus, the collaborative neighbors caching increased, and the cache hit within the system is increased indirectly while most of the requests are answered from the neighbor nodes collaboration instead of relying much on the main database server. The proposed model demonstrates its ability to provide quantifiable service differentiation in terms of increasing the percentage of answering the data item requests locally, with minimal efficiency penalties compared to existence collaborative caching models.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124278180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Incorporating scholar's background knowledge into recommender system for digital libraries 将学者背景知识融入数字图书馆推荐系统
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140721
Bahram Amini, R. Ibrahim, M. Othman, Hamid Rastegari
In recent years, recommender systems have received increasing attention in digital libraries since they assist scholars to find the most appropriate articles. However, a major problem of such systems is that they don't subsume user background knowledge into the recommendation process and scholars have to manually sift irrelevant articles obtained in response of queries. Therefore, a great challenging task is how to include scholar's knowledge into personalization process and filter out articles accordingly. To address this problem, a novel cascade recommender framework which incorporates scholar's background knowledge using ontological concepts into the user profiles is proposed. The framework exploits standard ODP structure as ontology modeling as well as lexicographic database (WordNet) for concept disambiguation. The primary experiment over CiteSeerX digital library indicates an increase in user satisfaction.
近年来,推荐系统在数字图书馆中越来越受到关注,因为它可以帮助学者找到最合适的文章。然而,这类系统的一个主要问题是它们没有将用户背景知识纳入推荐过程,学者们必须手动筛选响应查询获得的不相关文章。因此,如何将学者的知识融入到个性化过程中,并对文章进行相应的筛选,是一项极具挑战性的任务。为了解决这一问题,提出了一种新的级联推荐框架,该框架将学者的背景知识与本体概念结合到用户配置文件中。该框架利用标准的ODP结构作为本体建模,并利用词典数据库(WordNet)进行概念消歧。对CiteSeerX数字图书馆的初步实验表明,用户满意度有所提高。
{"title":"Incorporating scholar's background knowledge into recommender system for digital libraries","authors":"Bahram Amini, R. Ibrahim, M. Othman, Hamid Rastegari","doi":"10.1109/MYSEC.2011.6140721","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140721","url":null,"abstract":"In recent years, recommender systems have received increasing attention in digital libraries since they assist scholars to find the most appropriate articles. However, a major problem of such systems is that they don't subsume user background knowledge into the recommendation process and scholars have to manually sift irrelevant articles obtained in response of queries. Therefore, a great challenging task is how to include scholar's knowledge into personalization process and filter out articles accordingly. To address this problem, a novel cascade recommender framework which incorporates scholar's background knowledge using ontological concepts into the user profiles is proposed. The framework exploits standard ODP structure as ontology modeling as well as lexicographic database (WordNet) for concept disambiguation. The primary experiment over CiteSeerX digital library indicates an increase in user satisfaction.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121640160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Software Engineering Curriculum: A systematic mapping study 软件工程课程:系统的绘图研究
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140682
Muhammad Manan Qadir, M. Usman
Software Engineering (SE) discipline has come a long way since the 1968 NATO conference when the term SE was first used. Lot of work has been done for developing and revising SE curriculum and body of knowledge (e.g. SE 2004, GSwE2009, SWEBOK efforts). Different universities are developing and revising SE program and curricula at graduate and undergraduate levels all over the world. Large number of SE curriculum related efforts are being published in conferences such as CSEET, FIE and REET etc. There is a need to see the state of the art of this abundant literature. In this paper, we report a systematic mapping study conducted to synthesize and aggregate the SE curriculum related reported efforts and to provide a broad overview of the area. Systematic mapping studies are performed to evaluate quantity and types of primary studies in an area of interest in an unbiased and systematic manner.
自1968年北约会议首次使用术语SE以来,软件工程(SE)学科已经走过了漫长的道路。在开发和修订SE课程和知识体系方面已经做了大量的工作(例如SE 2004、GSwE2009、SWEBOK的努力)。世界各地不同的大学都在开发和修改研究生和本科生的SE项目和课程。在CSEET, FIE和REET等会议上发表了大量与SE课程相关的成果。有必要看看这些丰富的文学作品的艺术水平。在本文中,我们报告了一项系统的测绘研究,以综合和汇总与SE课程相关的报告工作,并提供该领域的广泛概述。系统测绘研究是为了以公正和系统的方式评估感兴趣领域的主要研究的数量和类型。
{"title":"Software Engineering Curriculum: A systematic mapping study","authors":"Muhammad Manan Qadir, M. Usman","doi":"10.1109/MYSEC.2011.6140682","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140682","url":null,"abstract":"Software Engineering (SE) discipline has come a long way since the 1968 NATO conference when the term SE was first used. Lot of work has been done for developing and revising SE curriculum and body of knowledge (e.g. SE 2004, GSwE2009, SWEBOK efforts). Different universities are developing and revising SE program and curricula at graduate and undergraduate levels all over the world. Large number of SE curriculum related efforts are being published in conferences such as CSEET, FIE and REET etc. There is a need to see the state of the art of this abundant literature. In this paper, we report a systematic mapping study conducted to synthesize and aggregate the SE curriculum related reported efforts and to provide a broad overview of the area. Systematic mapping studies are performed to evaluate quantity and types of primary studies in an area of interest in an unbiased and systematic manner.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"291 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114383423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Architecting a plug-in based TSM client application 构建基于插件的TSM客户机应用程序
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140651
Tanthawat Khemavast, Dirk Muthorst, Andreas Kinderreich, T. Anwar
There were several existing KISTERS TSM Client Applications (TCA) which used the Time Series Management (TSM) system. Each application was developed using different technologies; these applications contained significant features and were important to the success of the operation. However, they posed a set of problems to the operation, including difficulty in adding a new feature and lack of integration. This paper describes how we have designed and implemented the new TCA including the problems we face. The new TCA is developed based on the Eclipse platform, which enables us to integrate every existing client application into a single and extendable application that can be run as a standalone application as well as a web application using the same source.
已有几个使用时间序列管理(TSM)系统的KISTERS TSM客户机应用程序(TCA)。每个应用程序都使用不同的技术开发;这些应用程序包含重要的功能,对操作的成功至关重要。然而,它们给操作带来了一系列问题,包括难以添加新功能和缺乏集成。本文介绍了我们如何设计和实现新的TCA,包括我们面临的问题。新的TCA是基于Eclipse平台开发的,它使我们能够将每个现有的客户端应用程序集成到一个单一的、可扩展的应用程序中,这个应用程序可以作为一个独立的应用程序运行,也可以作为使用相同源的web应用程序运行。
{"title":"Architecting a plug-in based TSM client application","authors":"Tanthawat Khemavast, Dirk Muthorst, Andreas Kinderreich, T. Anwar","doi":"10.1109/MYSEC.2011.6140651","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140651","url":null,"abstract":"There were several existing KISTERS TSM Client Applications (TCA) which used the Time Series Management (TSM) system. Each application was developed using different technologies; these applications contained significant features and were important to the success of the operation. However, they posed a set of problems to the operation, including difficulty in adding a new feature and lack of integration. This paper describes how we have designed and implemented the new TCA including the problems we face. The new TCA is developed based on the Eclipse platform, which enables us to integrate every existing client application into a single and extendable application that can be run as a standalone application as well as a web application using the same source.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134046396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security backlog in Scrum security practices Scrum安全实践中的安全待办事项
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140708
Zulkarnain Azham, I. Ghani, Norafida Ithnin
The rapid development of software nowadays requires the high speed software product delivery by development teams. In order to deliver the product faster, the development teams make a transformation to their conventional software development lifecycle to agile development method which can enable them towards speedy delivery of software coping with the requirements-change phenomenon. In this scenario, one of the most popular techniques in Agile development is the Scrum methodology which has been criticised in term of its security aspect cycle that ignores the security risk management activity. However, the current practices suggest that security should be considered during all stages of the software development life cycle. In order to address the aforementioned issue, this paper proposes the integration of security principles in development phases using scrum and suggests the element of security backlog that can be used as security features analysis and implementation in scrum phases.
当今软件的快速发展要求开发团队快速交付软件产品。为了更快地交付产品,开发团队将其传统的软件开发生命周期转换为敏捷开发方法,这可以使他们能够快速交付应对需求变化现象的软件。在这种情况下,敏捷开发中最流行的技术之一是Scrum方法,该方法因其忽略安全风险管理活动的安全方面周期而受到批评。然而,当前的实践建议在软件开发生命周期的所有阶段都应该考虑安全性。为了解决上述问题,本文建议使用scrum将安全原则集成到开发阶段,并建议使用安全待办事项列表元素作为scrum阶段的安全特性分析和实现。
{"title":"Security backlog in Scrum security practices","authors":"Zulkarnain Azham, I. Ghani, Norafida Ithnin","doi":"10.1109/MYSEC.2011.6140708","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140708","url":null,"abstract":"The rapid development of software nowadays requires the high speed software product delivery by development teams. In order to deliver the product faster, the development teams make a transformation to their conventional software development lifecycle to agile development method which can enable them towards speedy delivery of software coping with the requirements-change phenomenon. In this scenario, one of the most popular techniques in Agile development is the Scrum methodology which has been criticised in term of its security aspect cycle that ignores the security risk management activity. However, the current practices suggest that security should be considered during all stages of the software development life cycle. In order to address the aforementioned issue, this paper proposes the integration of security principles in development phases using scrum and suggests the element of security backlog that can be used as security features analysis and implementation in scrum phases.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131139040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Game-based approach and its feasibility to support the learning of object-oriented concepts and programming 基于游戏的方法及其可行性,支持学习面向对象的概念和编程
Pub Date : 2011-12-01 DOI: 10.1109/MYSEC.2011.6140689
Aimi Elliyana Rais, S. Sulaiman, Sharifah Mashita Syed-Mohamad
Object-oriented has been widely used in software development. Hence, learning object-oriented concepts is crucial in undergraduate Computer Science or Information Technology programs. Learning object-oriented programming requires high concentration to understand the whole concepts before embarking on the practical aspect. It could be difficult for some students especially novices. In addition, lecturers might not be able to explain the subject effectively due to many factors. This research aims to justify and investigate more aspects to support the understanding of object-oriented concepts through games. Game is one of the approaches that could attract students' attention and increases their focus in learning object-oriented theory and practice. This paper reports a feasibility study using a controlled experiment that investigated the effect of using games in learning object-oriented programming among Computer Science students. The findings show that learners prefer using game as compared to traditional approach of teaching. Based on the study, we propose a more effective game-based approach to support the students in learning object-oriented concepts and programming.
面向对象技术在软件开发中得到了广泛的应用。因此,学习面向对象的概念在本科计算机科学或信息技术课程中是至关重要的。学习面向对象编程需要在开始实践之前高度集中精力理解整个概念。这对一些学生来说可能很难,尤其是新手。此外,由于许多因素,讲师可能无法有效地解释主题。这项研究旨在证明和调查更多的方面,以支持通过游戏理解面向对象的概念。在面向对象理论和实践的学习中,游戏是最能吸引学生注意力和提高学生注意力的方法之一。本文报告了一项可行性研究,使用对照实验来调查使用游戏在计算机科学专业学生学习面向对象程序设计中的效果。研究结果表明,与传统的教学方法相比,学习者更喜欢使用游戏。在此基础上,我们提出了一种更有效的基于游戏的方法来支持学生学习面向对象的概念和编程。
{"title":"Game-based approach and its feasibility to support the learning of object-oriented concepts and programming","authors":"Aimi Elliyana Rais, S. Sulaiman, Sharifah Mashita Syed-Mohamad","doi":"10.1109/MYSEC.2011.6140689","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140689","url":null,"abstract":"Object-oriented has been widely used in software development. Hence, learning object-oriented concepts is crucial in undergraduate Computer Science or Information Technology programs. Learning object-oriented programming requires high concentration to understand the whole concepts before embarking on the practical aspect. It could be difficult for some students especially novices. In addition, lecturers might not be able to explain the subject effectively due to many factors. This research aims to justify and investigate more aspects to support the understanding of object-oriented concepts through games. Game is one of the approaches that could attract students' attention and increases their focus in learning object-oriented theory and practice. This paper reports a feasibility study using a controlled experiment that investigated the effect of using games in learning object-oriented programming among Computer Science students. The findings show that learners prefer using game as compared to traditional approach of teaching. Based on the study, we propose a more effective game-based approach to support the students in learning object-oriented concepts and programming.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123602647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
2011 Malaysian Conference in Software Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1