We characterize different implementations of interactive queues in the setting of history functions. the component's internal state is systematically introduced as an abstraction of the input history. We explore d...
详细信息
We characterize different implementations of interactive queues in the setting of history functions. the component's internal state is systematically introduced as an abstraction of the input history. We explore different history abstractions and describe the corresponding history-sensitive models by state transition machines with input and output. For each implementation, we discuss the possibilities of inverting the interaction history with undo commands
When assessing the potential security risks that exist in the features of different operating systems, there is not a common set of metrics. As a result, it is very difficult to objectively assess the risks associated...
详细信息
When assessing the potential security risks that exist in the features of different operating systems, there is not a common set of metrics. As a result, it is very difficult to objectively assess the risks associated with a specific feature in the operating system. In this paper, we propose a simple set of metrics to quantify and measure the security risks associated with a specific feature or configuration of any operating systems. We present how the risks in a specific feature in Windows can be quantified and measured withthe formula and metrics we have developed in this study. Further more, it is also applicable to other operating systems such as Linux
there is a perception that the quality of eLearning environments is variable;however there is little empirical evidence. there is reluctance by users to complete evaluation forms and so alternative ways of collecting ...
详细信息
ISBN:
(纸本)9781905305308
there is a perception that the quality of eLearning environments is variable;however there is little empirical evidence. there is reluctance by users to complete evaluation forms and so alternative ways of collecting user feedback need to be considered. computer users are used to "chatting" using Instant Messaging (such as provided by MSN Messenger and Jabber). So an evaluation tool based on chatting has been developed. the approach is based on a chatbot (a chatting software agent or robot). the chatbot is based on the AIML chatbot language, supplemented by a domain specific knowledge base. this instantiation of the chatbot asks the user questions related to the quality of a particular module that is offered via the Blackboard Managed Learning Environment. For example the chatbot may ask one of the users: "Would you agree that the discussion board in programming is easy to navigate?" By using natural language the user is engaged in conversation and depending on the response the chatbot will ask a follow up question. the chatbot has been trialled with a first year class and the results of the chat are compared to the results of the form-based evaluation of the module. Initial results indicate that a more detailed level of response about the quality of the environment is elicited using the chatbot;however the response rate appears to be lower.
this paper presents the Pattern Modeling Framework (PMF), a new metamodeling approach to pattern specification for MOF-compliant modeling frameworks and languages. Patterns need to be precisely specified before a tool...
详细信息
ISBN:
(纸本)3540457720
this paper presents the Pattern Modeling Framework (PMF), a new metamodeling approach to pattern specification for MOF-compliant modeling frameworks and languages. Patterns need to be precisely specified before a tool can manipulate them, and though several approaches to pattern specification have been proposed, they do not provide the scalability and flexibility required in practice. PMF provides a pattern specification language called Epattern, which is capable of precisely specifying patterns in MOF-compliant metamodels. the language is defined as an extension to MOF by adding semantics inspired from the UML composite structure diagram. the language also comes with a graphical notation and a recommended iterative specification process. It also contains features to manage the complexity of specifying patterns and simplify their application and detection in user models. Most importantly, the language is implemented using state-of-the-art technologies that are heavily used by major modeling tool vendors, thus facilitating its adoption.
In this article we contribute to the issue of documenting architectural description with UML. Describing the architecture of a software system using UML notations is a tricky task due to the lack of explicit support f...
详细信息
In this article we contribute to the issue of documenting architectural description with UML. Describing the architecture of a software system using UML notations is a tricky task due to the lack of explicit support for architectural description concepts. thus, we try to define a strategy to map any ADL into UML, particularly UML 2.0. Our strategy is based on constructing a meta ADL that next can be mapped into MOF. We show how this strategy can be used by mapping COSA architectural description concepts into UML 2.0
Pervasive human-centric computing, the emerging next-generation computing, focuses on humans rather than machines. Pervasive computing's goal of "all the time, everywhere" access replaces today's mob...
详细信息
Pervasive human-centric computing, the emerging next-generation computing, focuses on humans rather than machines. Pervasive computing's goal of "all the time, everywhere" access replaces today's mobile and distributed computing's goal of "anytime, anywhere" access. Pervasive computing requires cross-disciplinary collaborations among experts in fields such as intelligent systems, agent technologies, autonomic computing, security and privacy, human factors engineering and ergonomics, human factors psychology, augmented reality computing, wearable computing, wireless and mobile computing, location-and context-aware computing, sensor computing, device technology, and social sciences. thus, it is crucial to reform softwareengineering education in order to well prepare software engineers for the new challenges and opportunities presented by pervasive human-centric computing. this paper presents and discusses our project results and the lessons learned about the softwareengineering education reform
the development of Behavioral Dependency Analysis (BDA) techniques and the visualization of such dependencies have been identified as a high priority in industrial Distributed Real-Time systems (DRTS). BDA determines ...
详细信息
ISBN:
(纸本)3540457720
the development of Behavioral Dependency Analysis (BDA) techniques and the visualization of such dependencies have been identified as a high priority in industrial Distributed Real-Time systems (DRTS). BDA determines the extent to which the functionality of one system entity (e.g., an object, a node) is dependent on other entities. Among many uses, a BDA is traditionally used to perform risk analysis and assessment, fault tolerance and redundancy provisions (e.g. multiple instances of a system entity) in DRTS. Traditionally, most BDA techniques are based on source code or execution traces of a system. However, as model driven development is gaining more popularity, there is a need for model-based BDA techniques. To address this need, we propose a set of procedures and measures for the BDA of distributed objects based on behavioral models (UML sequence diagrams). In contrast to the conventional code-based and execution-trace-based BDA techniques, this measure can be used earlier in the software development life cycle, when the UML design model of a system becomes available, to provide engineers with early insights into dependencies among entities in a DRTS (e.g., early risk identification). We also present a dependency visualization model to visualize measured dependencies. Our approach is applied to a case study to show its applicability and potential usefulness in predicting behavioral dependencies based on UML models.
To continuously meet the changing needs of the customers, organisations follow their own enhancive maintenance process models. Unfortunately, these models are not easily available to the academic world. In this paper,...
详细信息
To continuously meet the changing needs of the customers, organisations follow their own enhancive maintenance process models. Unfortunately, these models are not easily available to the academic world. In this paper, we study enhancive maintenance in three organisations in Ghana. Our goal is to explore information about the initial phases of the enhancive maintenance process and put them into a process model. Our model makes provision for process phases, their activities, roles, and data needed for managing enhancements. Although the primary goal of this paper is to elicit an enhancive maintenance model, we do not deny that it also provides the information on the state of enhancive maintenance practice in one developing country - Ghana
As information security is increasingly becoming critical for today's computer based systems, there is increasing need for integrating security concerns into the early phases system development processes. As a res...
详细信息
As information security is increasingly becoming critical for today's computer based systems, there is increasing need for integrating security concerns into the early phases system development processes. As a result, more attention is being drawn to modeling of security goals and their refinements into implementable security policies. Withthe growing adoption of the UML for object oriented analysis and design, there is need to incorporate security concepts into UML models to offer an attractive approach to engineering security into the system being developed. In this paper, we present a visual approach to unifying goal oriented analysis of security objectives and their associated security policies, with UML functional models. We also show how this representation leads to the early discovery of conflicts and inconsistencies in security policies during analysis. A simplified college department information system is used to illustrate the major concepts of this approach
One of the stated beliefs common to practitioners of all the agile methodologies is that "the most efficient and effective method of conveying information to and within a development team is face-to-face conversa...
详细信息
ISBN:
(纸本)3540350942
One of the stated beliefs common to practitioners of all the agile methodologies is that "the most efficient and effective method of conveying information to and within a development team is face-to-face conversation." this view is pervasive throughout Agile systems techniques and approaches. there is starting to be some interest and in-depth investigation into the nature of programmer interaction and dialogue within the case of pair-programming [2] as well as larger scale ethnographic studies of XP practice [10]. Although interesting metaphoric features have already been found in the language of expert software developers [12] [8] [7], more detailed qualitative analysis can also be made into the nature of such communication. Narrative analysis [9] is an in-depth qualitative analysis methodology, and focuses on the ways in which people make and use stories to interpret the world. Storytelling and its role for communicating social tacit knowledge and historical and organisational identity is well recognised [4]. So far there are fairly few cases where narrative analysis has been applied to Information systems (an analysis of these are given in Wagner [11]), but it is beginning to find popularity within the information systems community as it has proved particularly useful when considering tacit knowledge transfer and related communication issues, especially during periods of organisational change [1] [5]. Narratives are considered to be social products within specific contexts, and an interpretive device through which people communicate knowledge and define their own identity. It is arguable that the most basic and prevalent form of narrative arises as the product of ordinary conversation [6]. As Gregori-Signes [3] points out "We tell stories to each other as a means of packaging experience in cognitively and effectively coherent ways, or [...] as a way to test the borderlines between the exceptional and the ordinary." Conversational stories are "negotiable and colla
暂无评论