Leonardo Villalobos-Arias, Christian Quesada-López, Alexandra Martínez, Marcelo Jenkins
Context: Model-based testing is one of the most studied approaches by secondary studies in the area of software testing. Aggregating knowledge from secondary studies on model- based testing can be useful for both academia and industry. Objective: The goal of this study is to characterize secondary studies in model-based testing, in terms of the areas, tools and challenges they have investigated. Method: We conducted a tertiary study following the guidelines for systematic mapping studies. Our mapping included 22 secondary studies, of which 12 were literature surveys and 10 systematic reviews, over the period 1996–2016. Results: A hierarchy of model-based testing areas and subareas was built based on existing taxonomies as well as data that emerged from the secondary studies themselves. This hierarchy was then used to classify studies, tools, challenges and their tendencies in a unified classification scheme. We found that the two most studied areas are UML models and transition-based notations, both being modeling paradigms. Regarding tendencies of areas in time, we found two areas with constant activity through time, namely, test objectives and model specification. With respect to tools, we only found five studies that compared and classified model-based testing tools. These tools have been classified into common dimensions that mainly refer to the model type and phases of the model-based testing process they support. We reclassified all the tools into the hierarchy of model-based testing areas we proposed, and found that most tools were reported within the modeling paradigm area. With regard to tendencies of tools, we found that tools for testing the functional behavior of software have prevailed over time. Another finding was the shift from tools that support the generation of abstract tests to those that support the generation of executable tests. For analyzing challenges, we used six categories that emerged from the data (based on a grounded analysis): efficacy, availability, complexity, professional skills, investment, cost & effort, and evaluation & empirical evidence. We found that most challenges were related to availability. Besides, we too classified challenges according to our hierarchy of model-based testing areas, and found that most challenges fell in the model specification area. With respect to tendencies in challenges, we found they have moved from complexity of the approaches to the lack of approaches for specific software domains. Conclusions: Only a few systematic reviews on model-based testing could be found, therefore some areas still lack secondary studies, particularly, test execution aspects, language types, model dynamics, as well as some modeling paradigms and generation methods. We thus encourage the community to perform further systematic reviews and mapping studies, following known protocols and reporting procedures, in order to increase the quality and quantity of empirical studies in model-based testing.
{"title":"Model-based testing areas, tools and challenges: A tertiary study","authors":"Leonardo Villalobos-Arias, Christian Quesada-López, Alexandra Martínez, Marcelo Jenkins","doi":"10.19153/CLEIEJ.22.1.3","DOIUrl":"https://doi.org/10.19153/CLEIEJ.22.1.3","url":null,"abstract":"\u0000 \u0000 \u0000Context: Model-based testing is one of the most studied approaches by secondary studies in the area of software testing. Aggregating knowledge from secondary studies on model- based testing can be useful for both academia and industry. Objective: The goal of this study is to characterize secondary studies in model-based testing, in terms of the areas, tools and challenges they have investigated. Method: We conducted a tertiary study following the guidelines for systematic mapping studies. Our mapping included 22 secondary studies, of which 12 were literature surveys and 10 systematic reviews, over the period 1996–2016. Results: A hierarchy of model-based testing areas and subareas was built based on existing taxonomies as well as data that emerged from the secondary studies themselves. This hierarchy was then used to classify studies, tools, challenges and their tendencies in a unified classification scheme. We found that the two most studied areas are UML models and transition-based notations, both being modeling paradigms. Regarding tendencies of areas in time, we found two areas with constant activity through time, namely, test objectives and model specification. With respect to tools, we only found five studies that compared and classified model-based testing tools. These tools have been classified into common dimensions that mainly refer to the model type and phases of the model-based testing process they support. We reclassified all the tools into the hierarchy of model-based testing areas we proposed, and found that most tools were reported within the modeling paradigm area. With regard to tendencies of tools, we found that tools for testing the functional behavior of software have prevailed over time. Another finding was the shift from tools that support the generation of abstract tests to those that support the generation of executable tests. For analyzing challenges, we used six categories that emerged from the data (based on a grounded analysis): efficacy, availability, complexity, professional skills, investment, cost & effort, and evaluation & empirical evidence. We found that most challenges were related to availability. Besides, we too classified challenges according to our hierarchy of model-based testing areas, and found that most challenges fell in the model specification area. With respect to tendencies in challenges, we found they have moved from complexity of the approaches to the lack of approaches for specific software domains. Conclusions: Only a few systematic reviews on model-based testing could be found, therefore some areas still lack secondary studies, particularly, test execution aspects, language types, model dynamics, as well as some modeling paradigms and generation methods. We thus encourage the community to perform further systematic reviews and mapping studies, following known protocols and reporting procedures, in order to increase the quality and quantity of empirical studies in model-based testing. \u0000 \u0000 ","PeriodicalId":418941,"journal":{"name":"CLEI Electron. J.","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125245763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Miguel Morales Trujillo, Gabriel Alberto García-Mireles, Erick Orlando Matla-Cruz, M. Piattini
Protecting personal data in current software systems is a complex issue that requires legal regulations and constraints to manage personal data as well as a methodological support to develop software systems that would safeguard data privacy of their respective users. Privacy by Design (PbD) approach has been proposed to address this issue and has been applied to systems development in a variety of application domains. The aim of this work is to determine the presence of PbD and its extent in software development efforts. A systematic mapping study was conducted in order to identify relevant literature that collects PbD principles and goals in software development as well as methods and/or practices that support privacy aware software development. 53 selected papers address PbD mostly from a theoretical perspective with proposals validation based primarily on experiences or examples. The findings suggest that there is a need to develop privacy-aware methods to be integrated at all stages of software development life cycle and validate them in industrial settings.
{"title":"A Systematic Mapping Study on Privacy by Design in Software Engineering","authors":"Miguel Morales Trujillo, Gabriel Alberto García-Mireles, Erick Orlando Matla-Cruz, M. Piattini","doi":"10.19153/CLEIEJ.22.1.4","DOIUrl":"https://doi.org/10.19153/CLEIEJ.22.1.4","url":null,"abstract":"Protecting personal data in current software systems is a complex issue that requires legal regulations and constraints to manage personal data as well as a methodological support to develop software systems that would safeguard data privacy of their respective users. Privacy by Design (PbD) approach has been proposed to address this issue and has been applied to systems development in a variety of application domains. The aim of this work is to determine the presence of PbD and its extent in software development efforts. A systematic mapping study was conducted in order to identify relevant literature that collects PbD principles and goals in software development as well as methods and/or practices that support privacy aware software development. 53 selected papers address PbD mostly from a theoretical perspective with proposals validation based primarily on experiences or examples. The findings suggest that there is a need to develop privacy-aware methods to be integrated at all stages of software development life cycle and validate them in industrial settings.","PeriodicalId":418941,"journal":{"name":"CLEI Electron. J.","volume":"30 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130534143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Consumer product reviews are an invaluable source of data because they contain a wide range of information that could help requirement engineers to meet user needs. Recent studies have shown that tweets about software applications and reviews on App Stores contain useful information, which enable a more responsive software requirements elicitation. However, all of these studies' subjects are merely software applications. Information on system software, such as embedded software, operating systems, and firmware, are overlooked, unless reviews of a product using them are investigated. Challenges in investigating these reviews could come from the fact that there is a huge volume of data available, as well as the fact that reviews of such products are diverse in nature, meaning that they may contain information mostly on hardware components or broadly on the product as a whole. Motivated by these observations, we conduct an exploratory study using a dataset of 7198 review sentences from 6 Internet of Things (IoT) products. Our qualitative analysis demonstrates that a sufficient quantity of software related information exists in these reviews. In addition, we investigate the performance of two supervised machine learning techniques (Support Vector Machines and Convolutional Neural Networks) for classification of information contained in the reviews. Our results suggest that, with a certain setup, these two techniques can be used to classify the information automatically with high precision and recall.
{"title":"Do consumers talk about the software in my product? An Exploratory Study of IoT Products on Amazon","authors":"Kamonphop Srisopha, B. Boehm, Pooyan Behnamghader","doi":"10.19153/CLEIEJ.22.1.1","DOIUrl":"https://doi.org/10.19153/CLEIEJ.22.1.1","url":null,"abstract":"Consumer product reviews are an invaluable source of data because they contain a wide range of information that could help requirement engineers to meet user needs. Recent studies have shown that tweets about software applications and reviews on App Stores contain useful information, which enable a more responsive software requirements elicitation. However, all of these studies' subjects are merely software applications. Information on system software, such as embedded software, operating systems, and firmware, are overlooked, unless reviews of a product using them are investigated. Challenges in investigating these reviews could come from the fact that there is a huge volume of data available, as well as the fact that reviews of such products are diverse in nature, meaning that they may contain information mostly on hardware components or broadly on the product as a whole. Motivated by these observations, we conduct an exploratory study using a dataset of 7198 review sentences from 6 Internet of Things (IoT) products. Our qualitative analysis demonstrates that a sufficient quantity of software related information exists in these reviews. In addition, we investigate the performance of two supervised machine learning techniques (Support Vector Machines and Convolutional Neural Networks) for classification of information contained in the reviews. Our results suggest that, with a certain setup, these two techniques can be used to classify the information automatically with high precision and recall.","PeriodicalId":418941,"journal":{"name":"CLEI Electron. J.","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133465630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Critical thinking and problem solving are fundamental skills to function successfully in today’s world. When programming, these skills are promoted, developed and deployed. In this context, Universidad ORT Uruguay and The University of Edinburgh co-created in 2015 a MOOC (Massive Open Online Course) that teaches young teenagers how to program. The course was offered simultaneously in two versions: in Spanish, called "¡A Programar!" and in English, called "Code Yourself!", which are available on the Coursera platform. Since its launch in March 2015, more than 161,000 people from 197 countries have registered. Initially it was offered in a "fixed session"; while currently it is offered in an "auto-cohort" mode. In both cases, student surveys indicate that the course has met or exceeded expectations (values above 93%). In this paper, we detail the characteristics of the MOOC, and we analyze and compare the results for the two delivery modes.
{"title":"The \"Code Yourself!\" and \"¡A Programar!\" programming MOOC for teenagers: Reflecting on one and a half years of experience","authors":"Inés Friss de Kereki, J. Paulos, A. Manataki","doi":"10.19153/cleiej.21.2.9","DOIUrl":"https://doi.org/10.19153/cleiej.21.2.9","url":null,"abstract":"Critical thinking and problem solving are fundamental skills to function successfully in today’s world. When programming, these skills are promoted, developed and deployed. In this context, Universidad ORT Uruguay and The University of Edinburgh co-created in 2015 a MOOC (Massive Open Online Course) that teaches young teenagers how to program. The course was offered simultaneously in two versions: in Spanish, called \"¡A Programar!\" and in English, called \"Code Yourself!\", which are available on the Coursera platform. Since its launch in March 2015, more than 161,000 people from 197 countries have registered. Initially it was offered in a \"fixed session\"; while currently it is offered in an \"auto-cohort\" mode. In both cases, student surveys indicate that the course has met or exceeded expectations (values above 93%). In this paper, we detail the characteristics of the MOOC, and we analyze and compare the results for the two delivery modes.","PeriodicalId":418941,"journal":{"name":"CLEI Electron. J.","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132672518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this special issue a selection of the best papers presented during the 42thLatin American Conference in Informatics (CLEI 2017) is presented in extendedversions. After a very tough selection process for the Conference, a set of 10paper obtained the best review marks. The authors were invited to submitextended versions that were again blind-reviewed, and finally eight wereaccepted for publication. A ninth regular paper completes the issue.
{"title":"Preface to the August 2018 Issue including selected works from CLEI 2017 plus one regular paper","authors":"Rodrigo Santos","doi":"10.19153/CLEIEJ.21.2.0","DOIUrl":"https://doi.org/10.19153/CLEIEJ.21.2.0","url":null,"abstract":"In this special issue a selection of the best papers presented during the 42thLatin American Conference in Informatics (CLEI 2017) is presented in extendedversions. After a very tough selection process for the Conference, a set of 10paper obtained the best review marks. The authors were invited to submitextended versions that were again blind-reviewed, and finally eight wereaccepted for publication. A ninth regular paper completes the issue.","PeriodicalId":418941,"journal":{"name":"CLEI Electron. J.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126120144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We propose an indexing technique for approximate text searching, which is practical and powerful, and especially optimized for natural language text. Unlike other indices of this kind, it is able to retrieve any string that approximately matches the search pattern, not only words. Every text substring of a fixed length q is stored in the index, together with pointers to all the text positions where it appears. The search pattern is partitioned into pieces which are searched in the index, and all their occurrences in the text are verified for a complete match. To reduce space requirements, pointers to blocks instead of exact positions can be used, which increases querying costs. We design an algorithm to optimize the pattern partition into pieces so that the total number of verifications is minimized. This is especially well suited for natural language texts, and allows to know in advance the expected cost of the search and the expected relevance of the query to the user. We show experimentally the building time, space requirements and querying time of our index, finding that it is a practical alternative for text retrieval. The retrieval times are reduced from 10% to 60% of the best on-line algorithm.
{"title":"A Practical q -Gram Index for Text Retrieval Allowing Errors","authors":"G. Navarro, Ricardo Baeza-Yates","doi":"10.19153/cleiej.1.2.3","DOIUrl":"https://doi.org/10.19153/cleiej.1.2.3","url":null,"abstract":"We propose an indexing technique for approximate text searching, which is practical and powerful, and especially optimized for natural language text. Unlike other indices of this kind, it is able to retrieve any string that approximately matches the search pattern, not only words. Every text substring of a fixed length q is stored in the index, together with pointers to all the text positions where it appears. The search pattern is partitioned into pieces which are searched in the index, and all their occurrences in the text are verified for a complete match. To reduce space requirements, pointers to blocks instead of exact positions can be used, which increases querying costs. We design an algorithm to optimize the pattern partition into pieces so that the total number of verifications is minimized. This is especially well suited for natural language texts, and allows to know in advance the expected cost of the search and the expected relevance of the query to the user. We show experimentally the building time, space requirements and querying time of our index, finding that it is a practical alternative for text retrieval. The retrieval times are reduced from 10% to 60% of the best on-line algorithm.","PeriodicalId":418941,"journal":{"name":"CLEI Electron. J.","volume":"99 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130996723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. V. Deriggi, M. Kubo, A. Sementille, Simone Santos Casolli, C. Kirner
This paper discusses the implementation of three types of network support based on distributed virtual environment communication models using World2World toolkit, CORBA platform, and its CORBA Event Service as well. These supports encompass an integrated communication environment on a network that is suitable for distributed virtual reality applications. Finally, performance analyses from such supports are presented.
{"title":"Distributed Interoperable Virtual Environments","authors":"F. V. Deriggi, M. Kubo, A. Sementille, Simone Santos Casolli, C. Kirner","doi":"10.19153/cleiej.2.2.3","DOIUrl":"https://doi.org/10.19153/cleiej.2.2.3","url":null,"abstract":"This paper discusses the implementation of three types of network support based on distributed virtual environment communication models using World2World toolkit, CORBA platform, and its CORBA Event Service as well. These supports encompass an integrated communication environment on a network that is suitable for distributed virtual reality applications. Finally, performance analyses from such supports are presented. ","PeriodicalId":418941,"journal":{"name":"CLEI Electron. J.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130890503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Advances in parallel computation are of central importance to Artificial Intelligence due to the significant amount of time and space their pro- grams require. Functional languages have been identified as providing a clear and concise way of programming parallel machines for artificial intelligence tasks. The problems of exporting, creating, and manipulating processes have been thoroughly studied in relation to the paralleliza- tion of functional languages, but none of the necessary support structures needed for the ab- straction, like a distributed memory, have been properly designed. In order to design and im- plement parallel functional languages efficiently, we propose the development of an all-software based distributed virtual memory system de- signed specifically for the memory demands of a functional language. In this paper, we review the MT architecture and briefly survey the related literature that lead to its development. We then present empirical results obtained from observ- ing the paging behavior of the MT stack. Our empirical results suggest that LRU is superior to FIFO as a page replacement policy for MT stack pages. We present a proof that LRU is an opti- ?Partially supported by the Seton Hall University Re- search Council. †Partially supported by NSF grant CDA-9114481. ‡Partially supported by NSF grant HRD-9703600. mal page replacement policy. Based on this proof the MT stack page replacement policy was de- veloped and implemented. We outline the paging algorithm and present an argument of partial cor- rectness. The MT stack page replacement policy is superior to LRU, because it does not incur the expensive time penalties associated with imple- menting LRU in software.
{"title":"The MT Stack: Paging Algorithm and Performance in a Distributed Virtual Memory System","authors":"M. Morazán, Douglas R. Troeger, Myles Nash","doi":"10.19153/cleiej.5.1.2","DOIUrl":"https://doi.org/10.19153/cleiej.5.1.2","url":null,"abstract":"\u0000 \u0000 \u0000Advances in parallel computation are of central importance to Artificial Intelligence due to the significant amount of time and space their pro- grams require. Functional languages have been identified as providing a clear and concise way of programming parallel machines for artificial intelligence tasks. The problems of exporting, creating, and manipulating processes have been thoroughly studied in relation to the paralleliza- tion of functional languages, but none of the necessary support structures needed for the ab- straction, like a distributed memory, have been properly designed. In order to design and im- plement parallel functional languages efficiently, we propose the development of an all-software based distributed virtual memory system de- signed specifically for the memory demands of a functional language. In this paper, we review the MT architecture and briefly survey the related literature that lead to its development. We then present empirical results obtained from observ- ing the paging behavior of the MT stack. Our empirical results suggest that LRU is superior to FIFO as a page replacement policy for MT stack pages. We present a proof that LRU is an opti- ?Partially supported by the Seton Hall University Re- search Council. †Partially supported by NSF grant CDA-9114481. ‡Partially supported by NSF grant HRD-9703600. mal page replacement policy. Based on this proof the MT stack page replacement policy was de- veloped and implemented. We outline the paging algorithm and present an argument of partial cor- rectness. The MT stack page replacement policy is superior to LRU, because it does not incur the expensive time penalties associated with imple- menting LRU in software. \u0000 \u0000 \u0000","PeriodicalId":418941,"journal":{"name":"CLEI Electron. J.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127811509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article describes the construction of a Knowledge Management System (KMS) by applying fundamental concepts and principles of Software Engineering, such as process, models, methodology, technology and architectures, among others. They are applied to the field of Knowledge Management as a means of improving the process of developing applications in this domain, in an endeavor to increase its effectiveness. This paper’s main contribution is a methodological approach progressing from knowledge processes to a set of appropriate systems. The use of modeling techniques and technologies that may prove helpful to the Software Engineer are suggested as part of this approach, while the technological, social and organizational aspects to be considered are highlighted. This proposal was evaluated through the development of a Knowledge Management System for a Venezuelan organization – a research center. The evaluation proved the effectiveness of the methodological aspects proposed. These may be of use as inputs for some Learning Software Organizations dedicated to the development of this type of system.
{"title":"Methodological Approach for Developing a KMS: A Case Study","authors":"Anna Grimán, T. Rojas, M. Pérez","doi":"10.19153/cleiej.5.1.1","DOIUrl":"https://doi.org/10.19153/cleiej.5.1.1","url":null,"abstract":"\u0000 \u0000 \u0000This article describes the construction of a Knowledge Management System (KMS) by applying fundamental concepts and principles of Software Engineering, such as process, models, methodology, technology and architectures, among others. They are applied to the field of Knowledge Management as a means of improving the process of developing applications in this domain, in an endeavor to increase its effectiveness. \u0000This paper’s main contribution is a methodological approach progressing from knowledge processes to a set of appropriate systems. The use of modeling techniques and technologies that may prove helpful to the Software Engineer are suggested as part of this approach, while the technological, social and organizational aspects to be considered are highlighted. This proposal was evaluated through the development of a Knowledge Management System for a Venezuelan organization – a research center. \u0000The evaluation proved the effectiveness of the methodological aspects proposed. These may be of use as inputs for some Learning Software Organizations dedicated to the development of this type of system. \u0000 \u0000 \u0000","PeriodicalId":418941,"journal":{"name":"CLEI Electron. J.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130018399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An analysis pattern is any part of a requirement analysis specification that can be reused in the design of other information systems as well. Urban management systems (e.g.: Tax Control Systems, Urban Transportation System) are implemented in a similar way for many counties. This paper proposes three analysis patterns that make possible the reuse of geographic database design for urban area planning and management applications, developed in Geographic Information System (GIS).
{"title":"Analysis Patterns for GIS Data Schema Reuse on Urban Management Applications","authors":"J. L. Filho, C. Iochpe, Karla A. V. Borges","doi":"10.19153/cleiej.5.2.2","DOIUrl":"https://doi.org/10.19153/cleiej.5.2.2","url":null,"abstract":"\u0000 \u0000 \u0000An analysis pattern is any part of a requirement analysis specification that can be reused in the design of other information systems as well. Urban management systems (e.g.: Tax Control Systems, Urban Transportation System) are implemented in a similar way for many counties. This paper proposes three analysis patterns that make possible the reuse of geographic database design for urban area planning and management applications, developed in Geographic Information System (GIS). \u0000 \u0000 \u0000","PeriodicalId":418941,"journal":{"name":"CLEI Electron. J.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122673172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}