Manuel J. Ibarra, Alvaro Monares, S. Ochoa, J. Pino
The need to use mobile technology in urban emergency response processes has recently been identified, given the importance of having relevant information to make decisions in these scenarios. The data visualization on small mobile devices, such as PDAs or smartphones, is a critical aspect to make appropriate and on-time decisions. This criticality particularly occurs due to the small size of their screens to show geographical data. This article presents a strategy to select and display the most relevant “Points of Interest” on a digital map, according to the emergency influence area. This strategy was implemented on the MobileMap tool, and then it was evaluated through simulated emergency situations. Commanders of various Chilean Fire Companies participated in this evaluation.
{"title":"A Strategy for Selecting Points of Interest on Mobile Devices for Emergency Situations","authors":"Manuel J. Ibarra, Alvaro Monares, S. Ochoa, J. Pino","doi":"10.19153/CLEIEJ.16.3.5","DOIUrl":"https://doi.org/10.19153/CLEIEJ.16.3.5","url":null,"abstract":"\u0000 \u0000 \u0000The need to use mobile technology in urban emergency response processes has recently been identified, given the importance of having relevant information to make decisions in these scenarios. The data visualization on small mobile devices, such as PDAs or smartphones, is a critical aspect to make appropriate and on-time decisions. This criticality particularly occurs due to the small size of their screens to show geographical data. This article presents a strategy to select and display the most relevant “Points of Interest” on a digital map, according to the emergency influence area. This strategy was implemented on the MobileMap tool, and then it was evaluated through simulated emergency situations. Commanders of various Chilean Fire Companies participated in this evaluation. \u0000 \u0000 \u0000","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46169864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Today, the great challenge in broad band networks, such as ATM, is to support applications that need guaranteed QoS. Efficient resource allocation for connections that need guaranteed QoS is only possible if the application can provide a precise and reliable traffic descriptor that the network can understand. This work presents a methodology to obtain the parameters of the traffic descriptor of an ATM application from an initial sample of the flow. Based on real-time measurements of the flow, we suggest periodic renegotiations of the parameters, every time they vary above or below their predefined limits. We apply this method to a VBR MPEG video flow and demonstrate its performance. Observed results are discussed and some future uses of the methodology are suggested.
{"title":"Adaptive Description of ATM Traffic Flows","authors":"Juergen Rochol, Mouriac Halen Diemer","doi":"10.19153/CLEIEJ.5.2.3","DOIUrl":"https://doi.org/10.19153/CLEIEJ.5.2.3","url":null,"abstract":"\u0000 \u0000 \u0000Today, the great challenge in broad band networks, such as ATM, is to support applications that need guaranteed QoS. Efficient resource allocation for connections that need guaranteed QoS is only possible if the application can provide a precise and reliable traffic descriptor that the network can understand. This work presents a methodology to obtain the parameters of the traffic descriptor of an ATM application from an initial sample of the flow. Based on real-time measurements of the flow, we suggest periodic renegotiations of the parameters, every time they vary above or below their predefined limits. We apply this method to a VBR MPEG video flow and demonstrate its performance. Observed results are discussed and some future uses of the methodology are suggested. \u0000 \u0000 \u0000","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43526577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Osias de Souza Lima Júnior, Pedro Porfírio Muniz Farias, Arnaldo Dias Belchior
Function Point Analysis (FPA) is among the most commonly used techniques to estimate the size of software system projects or software systems. During the point counting process that represents the dimension of a project or an application, each function is classified according to its relative functional complexity. Various studies already propose to extend FPA, mainly aimed at achieving greater precision in the point assessment of systems of greater algorithmic complexity. This work proposes the use of concepts and properties from fuzzy set theory to extend FPA to FFPA (Fuzzy Function Point Analysis). Fuzzy theory seeks to build a formal quantitative structure capable of emulating the imprecision of human knowledge. With the function points generated by FFPA, derived values such as costs and terms of development can be more precisely determined.
{"title":"A Fuzzy Model for Function Point Analysis to Development and Enhancement Project Assessments","authors":"Osias de Souza Lima Júnior, Pedro Porfírio Muniz Farias, Arnaldo Dias Belchior","doi":"10.19153/cleiej.5.2.4","DOIUrl":"https://doi.org/10.19153/cleiej.5.2.4","url":null,"abstract":"\u0000 \u0000 \u0000Function Point Analysis (FPA) is among the most commonly used techniques to estimate the size of software system projects or software systems. During the point counting process that represents the dimension of a project or an application, each function is classified according to its relative functional complexity. Various studies already propose to extend FPA, mainly aimed at achieving greater precision in the point assessment of systems of greater algorithmic complexity. This work proposes the use of concepts and properties from fuzzy set theory to extend FPA to FFPA (Fuzzy Function Point Analysis). Fuzzy theory seeks to build a formal quantitative structure capable of emulating the imprecision of human knowledge. With the function points generated by FFPA, derived values such as costs and terms of development can be more precisely determined. \u0000 \u0000 \u0000","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67759528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An important premise of most of the contemporary methods for developing Software and Information Systems is that a good understanding of the application domain is essential for a comprehensive definition of its requirements. However, when these methods are applied to the enterprise context, it is very unclear what an application domain means. To solve this problem, we elaborate the notion of business system and propose a method based on such notion for modeling application domains of Enterprise Information Systems (EIS). This method helps EIS development teams to get comprehensive knowledge about EIS application domains. This knowledge is expressed in terms of the fundamental concepts of a business system: goals, technologies, business rules, business processes, business objects, actors, job structure, and events. The method is described in terms of three methodological components: a product model, a process model, and a team model. This structure facilitates the explanation, understanding and application of the method.
{"title":"BMM: A Business Modeling Method For Information Systems Development","authors":"Jonás Montilva C, Judith Barrios A","doi":"10.19153/cleiej.7.2.3","DOIUrl":"https://doi.org/10.19153/cleiej.7.2.3","url":null,"abstract":"\u0000 \u0000 \u0000An important premise of most of the contemporary methods for developing Software and Information Systems is that a good understanding of the application domain is essential for a comprehensive definition of its requirements. However, when these methods are applied to the enterprise context, it is very unclear what an application domain means. To solve this problem, we elaborate the notion of business system and propose a method based on such notion for modeling application domains of Enterprise Information Systems (EIS). This method helps EIS development teams to get comprehensive knowledge about EIS application domains. This knowledge is expressed in terms of the fundamental concepts of a business system: goals, technologies, business rules, business processes, business objects, actors, job structure, and events. The method is described in terms of three methodological components: a product model, a process model, and a team model. This structure facilitates the explanation, understanding and application of the method. \u0000 \u0000 \u0000","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67759147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raimundo Sales Neto e Azevedo, Arnaldo Dias Belchior, Marum Simão Filho, Flávio Lenz César Lenz César
This work describes a model for certification ISO 9001:2000 process of a software company. The Quality Management System (QMS) implementation in the company guided the fundamental processes of the software development, the organizational processes and the support processes, structuring all the practices in the company and extending its vision in relation to their own products, processes, collaborators and clients. The certification process was conducted through a set of structured activities based upon ISO/IEC 12207, in contrast to the logical sequence of implementation items in ISO 9001. As a result, this work provided greater agility in the implementation process of the QMS in the software company.
{"title":"A ISO 9001:2000 Certification Model in SMEs","authors":"Raimundo Sales Neto e Azevedo, Arnaldo Dias Belchior, Marum Simão Filho, Flávio Lenz César Lenz César","doi":"10.19153/cleiej.8.1.7","DOIUrl":"https://doi.org/10.19153/cleiej.8.1.7","url":null,"abstract":"\u0000 \u0000 \u0000This work describes a model for certification ISO 9001:2000 process of a software company. The Quality Management System (QMS) implementation in the company guided the fundamental processes of the software development, the organizational processes and the support processes, structuring all the practices in the company and extending its vision in relation to their own products, processes, collaborators and clients. The certification process was conducted through a set of structured activities based upon ISO/IEC 12207, in contrast to the logical sequence of implementation items in ISO 9001. As a result, this work provided greater agility in the implementation process of the QMS in the software company. \u0000 \u0000 \u0000","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67759273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This issue of CLEIej combines regular papers and papers selected from events. The first four papers in this issue are extended and revised versions of a selected few papers presented at CIbSE 2013, the XVI Ibero-American Conference on Software Engineering, which took place at Montevideo, Uruguay, in April 2013. These papers were selected by invited editors Luca Cernuzzi Nelly Condori, Diego Vallespir and Martín Solari. The fith paper in this issue is a regular contribution. Finally, we find a selection of works presented at CIESC 2013, the XXI Iberoamerican Congress on Higher Education in Computing, which took place at Naiguatá, Venezuela, in October 2013. This set of six papers were selected by the Program Chairs of the congress, Silvana Roncagliolo and Jonás Montilva, who also provided a short introduction to their selection.
{"title":"Preface to the December 2014 issue","authors":"H. Cancela","doi":"10.19153/cleiej.17.3.0","DOIUrl":"https://doi.org/10.19153/cleiej.17.3.0","url":null,"abstract":"This issue of CLEIej combines regular papers and papers selected from events. The first four papers in this issue are extended and revised versions of a selected few papers presented at CIbSE 2013, the XVI Ibero-American Conference on Software Engineering, which took place at Montevideo, Uruguay, in April 2013. These papers were selected by invited editors Luca Cernuzzi Nelly Condori, Diego Vallespir and Martín Solari. The fith paper in this issue is a regular contribution. Finally, we find a selection of works presented at CIESC 2013, the XXI Iberoamerican Congress on Higher Education in Computing, which took place at Naiguatá, Venezuela, in October 2013. This set of six papers were selected by the Program Chairs of the congress, Silvana Roncagliolo and Jonás Montilva, who also provided a short introduction to their selection.","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":"9 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67758817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Universidad Nacional in Costa Rica is making significant efforts to improve the professional performance of graduates in order to respond to society and industry needs. In particular, the School of Informatics has been exploring the opportunities to implement, through the use of a pedagogy oriented to problems and projects, a curricular integration between diverse areas of knowledge in the curriculum. From this perspective and with the aim of integrating the areas of programming, databases and systems engineering, an initial exploratory study was carried out with faculty members and a group of students from the fourth level of the curriculum. The findings show several limitations, such as mismatches between the course contents, lack of faculty commitment to collaborative work and student resistance. They also show the need of establishing strategies to create, from the early years of the curriculum, the necessary conditions to promote a positive attitude towards curricular integration processes and therefore overcome, at least partially, the identified limitations.
{"title":"Curriculum Integration by Projects: Opportunities and Constraints A Case Study in Systems Engineering","authors":"S. Mora, M. Coto","doi":"10.19153/CLEIEJ.17.3.10","DOIUrl":"https://doi.org/10.19153/CLEIEJ.17.3.10","url":null,"abstract":"The Universidad Nacional in Costa Rica is making significant efforts to improve the professional performance of graduates in order to respond to society and industry needs. In particular, the School of Informatics has been exploring the opportunities to implement, through the use of a pedagogy oriented to problems and projects, a curricular integration between diverse areas of knowledge in the curriculum. From this perspective and with the aim of integrating the areas of programming, databases and systems engineering, an initial exploratory study was carried out with faculty members and a group of students from the fourth level of the curriculum. The findings show several limitations, such as mismatches between the course contents, lack of faculty commitment to collaborative work and student resistance. They also show the need of establishing strategies to create, from the early years of the curriculum, the necessary conditions to promote a positive attitude towards curricular integration processes and therefore overcome, at least partially, the identified limitations.","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":"17 1","pages":"11-11"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67758981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The most important result to standardize the notation for graphical representation of Business Processes (BPs) is the Business Process Model and Notation (BPMN). Despite the BPs modeled with BPMN being able to support business designers, BPMN models are not appropriate to support the analysis phase. BPMN models have no formal semantics to conduct qualitative analysis (validation and verification). In this work is presented how Model Checking (MC) verification technique for software and Timed Automata (TA) formal language are integrated within a formal verification approach to check BPs modeled with BPMN. Also, are introduced a set of guideline to transform BPMN models into TA. The use of our approach allow to business analysts and designers to perform evaluation (i.e., qualitative analysis) of BPs, based on the formal specification of BP–task model with TA. The application of the approach is aimed to evaluate the behavior of the BP–task model with respect to business performance indicators (for instance, service time, waiting time or queue size) derived from business needs, as is shown in an instance of an enterprise–project related to Customer Relationship Management.
{"title":"Business Process Verification: The Application of Model Checking and Timed Automata","authors":"M. Morales, E. Luis","doi":"10.19153/CLEIEJ.17.2.2","DOIUrl":"https://doi.org/10.19153/CLEIEJ.17.2.2","url":null,"abstract":"The most important result to standardize the notation for graphical representation of Business Processes (BPs) is the Business Process Model and Notation (BPMN). Despite the BPs modeled with BPMN being able to support business designers, BPMN models are not appropriate to support the analysis phase. BPMN models have no formal semantics to conduct qualitative analysis (validation and verification). In this work is presented how Model Checking (MC) verification technique for software and Timed Automata (TA) formal language are integrated within a formal verification approach to check BPs modeled with BPMN. Also, are introduced a set of guideline to transform BPMN models into TA. The use of our approach allow to business analysts and designers to perform evaluation (i.e., qualitative analysis) of BPs, based on the formal specification of BP–task model with TA. The application of the approach is aimed to evaluate the behavior of the BP–task model with respect to business performance indicators (for instance, service time, waiting time or queue size) derived from business needs, as is shown in an instance of an enterprise–project related to Customer Relationship Management.","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":"17 1","pages":"3-3"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67758759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Felix Brezo, José Gaviria de la Puerta, Xabier Ugarte-Pedrero, I. Santos, P. G. Bringas
The possibilities that the management of a vast amount of computers and/or networks oer is attracting an increasing number of malware writers. In this document, the authors propose a methodology thought to detect malicious botnet trac, based on the analysis of the packets that ow within the network. This objective is achieved by means of the extraction of the static characteristics of packets, which are lately analysed using supervised machine learning techniques focused on trac labelling so as to proactively face the huge volume of information nowadays lters work with.
{"title":"A Supervised Classification Approach for Detecting Packets Originated in a HTTP-based Botnet","authors":"Felix Brezo, José Gaviria de la Puerta, Xabier Ugarte-Pedrero, I. Santos, P. G. Bringas","doi":"10.19153/CLEIEJ.16.3.2","DOIUrl":"https://doi.org/10.19153/CLEIEJ.16.3.2","url":null,"abstract":"The possibilities that the management of a vast amount of computers and/or networks oer is attracting an increasing number of malware writers. In this document, the authors propose a methodology thought to detect malicious botnet trac, based on the analysis of the packets that ow within the network. This objective is achieved by means of the extraction of the static characteristics of packets, which are lately analysed using supervised machine learning techniques focused on trac labelling so as to proactively face the huge volume of information nowadays lters work with.","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":"16 1","pages":"2-2"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67758458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Katia Cristina A. Damaceno Borges, I. F. B. Tronto, Renato de Aquino Lopes, J. D. S. D. Silva
Software effort estimates is an important part of s oftware development work and provides essential input to project feasibility analyses, bi dding, budgeting and planning. Analogy-based estimates models emerge as a promising approach, with comparable accuracy to arithmetic methods, and it is potentially easier to understand and apply. Studies show all the models are sensitive to the quality and availability data, thu s requiring a systematic data treatment. In this paper, it is proposed a data pre-processing method for use in software effort estimate. The results of it on applying on applying Case Based Reasoning - CBR that enables us to enhance the precision of the estimates.
软件工作量评估是软件开发工作的重要组成部分,并为项目可行性分析、预算编制和计划提供必要的输入。基于类比的估计模型是一种很有前途的方法,具有与算术方法相当的精度,并且可能更容易理解和应用。研究表明,所有模型都对质量和可用性数据敏感,因此需要系统的数据处理。本文提出了一种用于软件工作量估算的数据预处理方法。基于案例推理(Case Based Reasoning, CBR)的应用结果使我们能够提高估计的精度。
{"title":"A Data Pre-Processing Method for Software Effort Estimation Using Case-Based Reasoning","authors":"Katia Cristina A. Damaceno Borges, I. F. B. Tronto, Renato de Aquino Lopes, J. D. S. D. Silva","doi":"10.19153/CLEIEJ.16.3.7","DOIUrl":"https://doi.org/10.19153/CLEIEJ.16.3.7","url":null,"abstract":"Software effort estimates is an important part of s oftware development work and provides essential input to project feasibility analyses, bi dding, budgeting and planning. Analogy-based estimates models emerge as a promising approach, with comparable accuracy to arithmetic methods, and it is potentially easier to understand and apply. Studies show all the models are sensitive to the quality and availability data, thu s requiring a systematic data treatment. In this paper, it is proposed a data pre-processing method for use in software effort estimate. The results of it on applying on applying Case Based Reasoning - CBR that enables us to enhance the precision of the estimates.","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":"16 1","pages":"7-7"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67759031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}