this paper leverages the outcomes of the first workshop on HCI engineering Education [4] to create an online repository where the community can share content relevant to HCI. the repository takes advantage of the func...
详细信息
ISBN:
(纸本)9783031616877;9783031616884
this paper leverages the outcomes of the first workshop on HCI engineering Education [4] to create an online repository where the community can share content relevant to HCI. the repository takes advantage of the functionalities of the Git file versioning system to support presenting and adding content. the paper describes the structure of the repository and the process for adding new content. In addition, we propose an adaptation of the framework for presenting teaching samples, supporting more flexibility in the application of educational material for different teaching objectives. the new presentation format starts with describing a design problem and emphasises the students' applied understanding of conceptual and theoretical knowledge. the presentation format is demonstrated and discussed by the example of an end-user design tool for mobile data collection.
In the continuously evolving and growing landscape of Big Data, a key challenge lies in the transformation of a Data Lake into a Data Mesh structure. Unveiling a transformative approach through semantic data blueprint...
详细信息
Rich web-based applications are complex systems with multiple application elements running on diverse platforms distributed over different tiers. there are no UML-based modelling languages or tools catering for the sp...
详细信息
software defect prediction (SDP) is an important task within software development. It is a challenging activity, as the detection of software modules that are prone to malfunction in new versions of software contribut...
详细信息
this study investigated the characteristics of data clumps in UML class diagrams. Data clumps are group of variables which appear together in multiple locations. In this study we compared the data clumps characteristi...
详细信息
Business traditional software development methods rely on a work plan to extract complete sets of documentation, architectural, and high-level project development and control requirements. Agile has gained immense pop...
详细信息
ISBN:
(纸本)9789897585876
Business traditional software development methods rely on a work plan to extract complete sets of documentation, architectural, and high-level project development and control requirements. Agile has gained immense popularity in the field of computer science in recent years, although it combines acceptable softwareengineering practices withthe controversial ones. the software industry has finally come to the conclusion that specific project characteristics such as purpose, scope, requirements, resources, architecture and size determine the methodology that best fits the project realities. the paper presents hybrid approaches, combining the PRINCE2 methodology and the Scrum method, in order to take maximum advantage of the methodologies and minimize their disadvantages by using the strengths of one methodology on the weaknesses of the other.
In recent years, the advancement of AI has been primarily driven by neural networks, which, despite their success, pose challenges in terms of explainability and high-power consumption. Genetic Programming (GP) offers...
详细信息
Identifying confidentiality violations is challenging as modern software-intensive systems exchange and store large amounts of data, and system deployment and context vary. Although model-based analyses can identify s...
详细信息
ISBN:
(纸本)9798400706226
Identifying confidentiality violations is challenging as modern software-intensive systems exchange and store large amounts of data, and system deployment and context vary. Although model-based analyses can identify such violations already at design time, uncertainty within a software system or its environment can void analysis results. Existing approaches to raising awareness of uncertainty sources are limited in usability and extendability and require expert knowledge for interpretation and analysis. this paper presents our collaborative tooling ARC(3)N for collecting, modeling, and analyzing uncertainty sources regarding confidentiality. Using an open web-based platform, we simplify both identifying and assessing uncertainty without requiring expert knowledge. We evaluate our approach with a user study with students, researchers, and practitioners (n = 17) and demonstrate its feasibility.
this paper explores hackathons as an evaluative tool and their contribution to students' learning. Mixed-data collection methods/qualitative and quantitative data collection were used by conducting a survey among ...
详细信息
ISBN:
(纸本)9783031533815;9783031533822
this paper explores hackathons as an evaluative tool and their contribution to students' learning. Mixed-data collection methods/qualitative and quantitative data collection were used by conducting a survey among students and semi-structured interviews among hackathon juries and organizers. Results have demonstrated that hackathons can be used as evaluative tools alongside exams. From a student's perspective, hackathons supply positive motivation and are less stressful while enabling students to demonstrate their knowledge in a work-like environment. From the organizer's perspective, hackathons require more effort in terms of organization whereas less effort is needed in handling of evaluation and grading. this work provides guidelines to address potential challenges and organize a hackathon as an exam replacement or part of the exam. this study advocates that the evaluation steps described in this paper could constitute a solid basis to develop a formal evaluation strategy to be applied to similar future events. the paper provides preliminary results that were collected in a rigorous manner. Future work should target a larger sample size to draw more firm conclusions and generalize to wide academic settings of softwareengineering programmes.
Privacy issues in mobile apps have become a key concern of researchers, practitioners and users. We carried out a large-scale analysis of eHealth app user reviews to identify their key privacy concerns. We then analys...
详细信息
暂无评论