Daniel Fredes, Pablo Cruz, F. Medina, R. Villarroel
MDA is a concept promoted by the OMG that proposes software development based on models specified using UML, to make from these models a transformation to other models and also source code that can be executed as an application implemented by a programmer. In software engineering the models are very important in development, due to the fact that they enhance the reuse of the different parts or components and with them a better production and maintenance is generated. This paper presents automatic transformations of a software process, for which the tools: MediniQVT and Eclipse Process Framework, and the QVT and ATL languages were used. A configuration metamodel along with the automatic transformation from source code to java were also successfully created.
MDA是OMG提出的一个概念,它提出基于使用UML指定的模型进行软件开发,从这些模型转换到其他模型,以及可以作为程序员实现的应用程序执行的源代码。在软件工程中,模型在开发中非常重要,因为它们增强了不同部件或组件的重用,从而产生了更好的生产和维护。本文介绍了一个软件过程的自动转换,使用了mediiniqvt和Eclipse process Framework工具,以及QVT和ATL语言。配置元模型以及从源代码到java的自动转换也成功创建了。
{"title":"Automatic transformation applied to a software process using MDA","authors":"Daniel Fredes, Pablo Cruz, F. Medina, R. Villarroel","doi":"10.1145/2590651.2590679","DOIUrl":"https://doi.org/10.1145/2590651.2590679","url":null,"abstract":"MDA is a concept promoted by the OMG that proposes software development based on models specified using UML, to make from these models a transformation to other models and also source code that can be executed as an application implemented by a programmer. In software engineering the models are very important in development, due to the fact that they enhance the reuse of the different parts or components and with them a better production and maintenance is generated. This paper presents automatic transformations of a software process, for which the tools: MediniQVT and Eclipse Process Framework, and the QVT and ATL languages were used. A configuration metamodel along with the automatic transformation from source code to java were also successfully created.","PeriodicalId":165011,"journal":{"name":"Euro American Conference on Telematics and Information Systems","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129503962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Software Engineering has as objective the development of software products that meet customer needs. For this, there are new approaches to development and testing of software, such as Model-Driven Development (MDD) and the Model Driven Testing (MDT), which aim to shift the focus of development and software testing for models and their transformations, and no longer in programming languages. This paper aims to propose a process model driven software development model by allowing tests accompany every stage of this, adding quality to the developed software.
{"title":"Qualitas: A proposal of process model development software driven models","authors":"Carla C. de Jesus Almeida, A. A. D. Oliveira","doi":"10.1145/2590651.2590678","DOIUrl":"https://doi.org/10.1145/2590651.2590678","url":null,"abstract":"Software Engineering has as objective the development of software products that meet customer needs. For this, there are new approaches to development and testing of software, such as Model-Driven Development (MDD) and the Model Driven Testing (MDT), which aim to shift the focus of development and software testing for models and their transformations, and no longer in programming languages. This paper aims to propose a process model driven software development model by allowing tests accompany every stage of this, adding quality to the developed software.","PeriodicalId":165011,"journal":{"name":"Euro American Conference on Telematics and Information Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130736785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer Supported Collaborative Learning (CSCL) systems enable not only group learning with independence of the time and space where group members are located, but also they are favorable environments for leadership skills development. However, as interactions that are ideal for learning do not occur spontaneously, participation of e-tutors (teachers) is essential in order to generate interactions that contribute to collaborative building of knowledge. Considering e-tutors of CSCL usually do not know the most effective way to assist students, this article proposes a multi agent model (combining techniques from natural language processing, text mining, and machine learning) that can be used for personalized training of e-tutors. In the proposed model an intelligent agent analyzes group interactions to identify conflicts which resolution needs e-tutors' intervention. In these cases, a training agent suggests to e-tutors necessary actions so as they solve conflicts and simultaneously they develop skills they do not manifest properly. The multi agent model will be implemented in a CSCL environment and its operation will be evaluated through experiments with university students and teachers.
{"title":"Multi agent model for skills training of CSCL e-tutors: modelo multi agente para el entrenamiento de habilidades de e-tutores de ACSC","authors":"P. Mansilla, R. Costaguta, S. Schiaffino","doi":"10.1145/2590651.2590680","DOIUrl":"https://doi.org/10.1145/2590651.2590680","url":null,"abstract":"Computer Supported Collaborative Learning (CSCL) systems enable not only group learning with independence of the time and space where group members are located, but also they are favorable environments for leadership skills development. However, as interactions that are ideal for learning do not occur spontaneously, participation of e-tutors (teachers) is essential in order to generate interactions that contribute to collaborative building of knowledge. Considering e-tutors of CSCL usually do not know the most effective way to assist students, this article proposes a multi agent model (combining techniques from natural language processing, text mining, and machine learning) that can be used for personalized training of e-tutors. In the proposed model an intelligent agent analyzes group interactions to identify conflicts which resolution needs e-tutors' intervention. In these cases, a training agent suggests to e-tutors necessary actions so as they solve conflicts and simultaneously they develop skills they do not manifest properly. The multi agent model will be implemented in a CSCL environment and its operation will be evaluated through experiments with university students and teachers.","PeriodicalId":165011,"journal":{"name":"Euro American Conference on Telematics and Information Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134013005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In Computer Supported Collaborative Learning (CSCL) systems, students work in groups interacting by using computers. Each member of the team behaves in a particular way to collaborate with others, manifesting a particular learning style. In this paper we propose a new approach for automatically creating student groups in CSCL systems by considering their individual learning styles. Data mining techniques are applied to discover which existent combinations of learning styles lead to a better performance. The discovered knowledge will be used by a software agent to propose the creation of the most promising new groups. The approach also considers the creation and maintenance of a user model for each student and a group model for each team. The assistant agent will be implemented in an existing CSCL tool, and its performance will be validated with real students.
{"title":"An assistant agent for group formation in CSCL based on student learning styles","authors":"R. Costaguta, María de los Ángeles Menini","doi":"10.1145/2590651.2590674","DOIUrl":"https://doi.org/10.1145/2590651.2590674","url":null,"abstract":"In Computer Supported Collaborative Learning (CSCL) systems, students work in groups interacting by using computers. Each member of the team behaves in a particular way to collaborate with others, manifesting a particular learning style. In this paper we propose a new approach for automatically creating student groups in CSCL systems by considering their individual learning styles. Data mining techniques are applied to discover which existent combinations of learning styles lead to a better performance. The discovered knowledge will be used by a software agent to propose the creation of the most promising new groups. The approach also considers the creation and maintenance of a user model for each student and a group model for each team. The assistant agent will be implemented in an existing CSCL tool, and its performance will be validated with real students.","PeriodicalId":165011,"journal":{"name":"Euro American Conference on Telematics and Information Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116449185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. M. M. Neto, Alisson A. L. Costa, Enio L. Sombra, Jonathan D. C. Moreira, J. Samper, Ricardo A. M. Valentim, R. Nascimento, C. Flores
This paper proposes a content recommendation mechanism as part of a model for implementing ubiquitous learning for supporting people with chronic diseases who are treated at home, so that they can learn more about treatments for their disease. In the proposed approach, the learning takes place based on day-to-day activities and real situations. In this case, the model supports the development of tools that can learn about the user's context, based on data obtained via sensors installed on users or in their home, as well as data supplied directly by the user interface of their mobile devices, and data provided by the healthcare team, and, after that, recommend contents about their diseases.
{"title":"An approach for recommending personalized contents for homecare users in the context of health 2.0","authors":"F. M. M. Neto, Alisson A. L. Costa, Enio L. Sombra, Jonathan D. C. Moreira, J. Samper, Ricardo A. M. Valentim, R. Nascimento, C. Flores","doi":"10.1145/2590651.2590684","DOIUrl":"https://doi.org/10.1145/2590651.2590684","url":null,"abstract":"This paper proposes a content recommendation mechanism as part of a model for implementing ubiquitous learning for supporting people with chronic diseases who are treated at home, so that they can learn more about treatments for their disease. In the proposed approach, the learning takes place based on day-to-day activities and real situations. In this case, the model supports the development of tools that can learn about the user's context, based on data obtained via sensors installed on users or in their home, as well as data supplied directly by the user interface of their mobile devices, and data provided by the healthcare team, and, after that, recommend contents about their diseases.","PeriodicalId":165011,"journal":{"name":"Euro American Conference on Telematics and Information Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121958458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Social Network Sites have grown considerably in recent years. Studies have revealed that users write in Social Systems about services, opinions or facts concerning personal life. However, no studies have been found regarding the following question: Do users write about the system in use? How? Is it valid to evaluate the users experience in Social Network Sites through their written texts? A methodology to search for postings of users on Twitter was used, composed of filters which combine patterns which may be related to the use of the system. The results have shown evidence that some messages posted in these types of systems are about the system in use. As a contribution, we presented some characteristics of the messages of the users of social networking sites in order to facilitate the understanding of its usage experience.
{"title":"Do users write about the system in use?: an investigation from messages in natural language on Twitter","authors":"M. Mendes, E. Furtado, M. D. Castro","doi":"10.1145/2590651.2590654","DOIUrl":"https://doi.org/10.1145/2590651.2590654","url":null,"abstract":"Social Network Sites have grown considerably in recent years. Studies have revealed that users write in Social Systems about services, opinions or facts concerning personal life. However, no studies have been found regarding the following question: Do users write about the system in use? How? Is it valid to evaluate the users experience in Social Network Sites through their written texts? A methodology to search for postings of users on Twitter was used, composed of filters which combine patterns which may be related to the use of the system. The results have shown evidence that some messages posted in these types of systems are about the system in use. As a contribution, we presented some characteristics of the messages of the users of social networking sites in order to facilitate the understanding of its usage experience.","PeriodicalId":165011,"journal":{"name":"Euro American Conference on Telematics and Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131203710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
António Ribeiro, L. Silva, Glêdson Elias da Silveira
Component sotware reuse contributes to reduce software development time. These components are stored in repositories and search systems are needed to peform the selection of components. This paper proposes a method to reduce space storage in indexes of software assets repositories, based on applying Hill Climbing to identify similar components. The aproach is validated by using a synthetic repository of a thousand of assets and the results seems promising
{"title":"Usando hill climbing para identificação de componentes de software similares","authors":"António Ribeiro, L. Silva, Glêdson Elias da Silveira","doi":"10.1145/2590651.2590665","DOIUrl":"https://doi.org/10.1145/2590651.2590665","url":null,"abstract":"Component sotware reuse contributes to reduce software development time. These components are stored in repositories and search systems are needed to peform the selection of components. This paper proposes a method to reduce space storage in indexes of software assets repositories, based on applying Hill Climbing to identify similar components. The aproach is validated by using a synthetic repository of a thousand of assets and the results seems promising","PeriodicalId":165011,"journal":{"name":"Euro American Conference on Telematics and Information Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123407783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Intelligent Transport Systems solutions typically require selectable level of telecommunications services quality with usually widely spread area coverage. ITS Telecommunications service parameters were re-defined as performance indicators which are tightly linked with the ITS service performance quantification. Wireless data services with reasonable coverage are offered by public wireless mobile services providers, however, mostly no relevant service performance indicators are guaranteed. ITS requirements can be, however, cost-effectively resolved in case the different public and private services are effectively combined. Such solution requires implementation of the flexible system architecture supported by the efficient decision processes. Additionally "Car to Infrastructure" and "Car to Car" communication interconnected with the vehicle on board data network based on the CAN (Controlled Area Network) bus significantly increase potential of the intruders attacks so that the integration of the relevant telecommunications security treatment has been understood as one of critical topics of the ITS telecommunications solution, as well.
{"title":"Specific role of telecommunications in intelligent transport systems","authors":"T. Zelinka","doi":"10.1145/2261605.2261680","DOIUrl":"https://doi.org/10.1145/2261605.2261680","url":null,"abstract":"Intelligent Transport Systems solutions typically require selectable level of telecommunications services quality with usually widely spread area coverage. ITS Telecommunications service parameters were re-defined as performance indicators which are tightly linked with the ITS service performance quantification. Wireless data services with reasonable coverage are offered by public wireless mobile services providers, however, mostly no relevant service performance indicators are guaranteed. ITS requirements can be, however, cost-effectively resolved in case the different public and private services are effectively combined. Such solution requires implementation of the flexible system architecture supported by the efficient decision processes. Additionally \"Car to Infrastructure\" and \"Car to Car\" communication interconnected with the vehicle on board data network based on the CAN (Controlled Area Network) bus significantly increase potential of the intruders attacks so that the integration of the relevant telecommunications security treatment has been understood as one of critical topics of the ITS telecommunications solution, as well.","PeriodicalId":165011,"journal":{"name":"Euro American Conference on Telematics and Information Systems","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124556847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The purpose of this paper is to present the results of a research, which consist in to analyze the proposals for evaluation to e-inclusion published until 2000. To obtain the results, a methodology composed by four stages was defined. The main results were: identify 58 research papers, including paper in journals and conferences, oriented to evaluate the e-inclusion; the classification of these considering the following object of evaluation: technologies, programs/projects, policies, inclusion and digital literacy. Likewise, the analysis of inclusion category allows identifying the target population, the subjects evaluated, their relationship to e-inclusion aspects, countries that developed proposals of evaluation, and models for evaluating the e-inclusion.
{"title":"Analysis of proposals for evaluation of e-inclusion","authors":"M. González-Zabala, J. M. Sánchez-Torres","doi":"10.1145/2261605.2261667","DOIUrl":"https://doi.org/10.1145/2261605.2261667","url":null,"abstract":"The purpose of this paper is to present the results of a research, which consist in to analyze the proposals for evaluation to e-inclusion published until 2000. To obtain the results, a methodology composed by four stages was defined. The main results were: identify 58 research papers, including paper in journals and conferences, oriented to evaluate the e-inclusion; the classification of these considering the following object of evaluation: technologies, programs/projects, policies, inclusion and digital literacy. Likewise, the analysis of inclusion category allows identifying the target population, the subjects evaluated, their relationship to e-inclusion aspects, countries that developed proposals of evaluation, and models for evaluating the e-inclusion.","PeriodicalId":165011,"journal":{"name":"Euro American Conference on Telematics and Information Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124575520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yong-kyu Lee, Hyewon K. Lee, G. Lee, Hwa-Jong Kim, C. Jeong
Mobile multi-hop relay (MMR) network is known to have the strength of easy installation and convenient management because of its self-organizing and self-healing characteristics. However, MMR is also known to be vulnerable to security problems for the very same reason. In this paper, we propose a new hybrid authentication algorithm for IEEE 802.16j MMR network service. The proposed scheme uses centralized authentication when a mobile station (MS) or a relay station (RS) initially joins the MMR network, and uses distributed authentication for hop-by-hop authentication between the mobile nodes. We analyze the procedure of the proposed scheme in detail, and examine its usefulness when applied to the MMR network. The proposed scheme can be used in any mobile multi-hop network as well as IEEE 802.16j MMR network.
{"title":"Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j","authors":"Yong-kyu Lee, Hyewon K. Lee, G. Lee, Hwa-Jong Kim, C. Jeong","doi":"10.1145/1551722.1551734","DOIUrl":"https://doi.org/10.1145/1551722.1551734","url":null,"abstract":"Mobile multi-hop relay (MMR) network is known to have the strength of easy installation and convenient management because of its self-organizing and self-healing characteristics. However, MMR is also known to be vulnerable to security problems for the very same reason. In this paper, we propose a new hybrid authentication algorithm for IEEE 802.16j MMR network service. The proposed scheme uses centralized authentication when a mobile station (MS) or a relay station (RS) initially joins the MMR network, and uses distributed authentication for hop-by-hop authentication between the mobile nodes. We analyze the procedure of the proposed scheme in detail, and examine its usefulness when applied to the MMR network. The proposed scheme can be used in any mobile multi-hop network as well as IEEE 802.16j MMR network.","PeriodicalId":165011,"journal":{"name":"Euro American Conference on Telematics and Information Systems","volume":"837 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116148732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}