In this talk, intended to provoke discussion, I will suggest ten important open challenges at boundaries where softwareengineering & Information systems meet. I will focus on challenges are both intellectually de...
详细信息
Despite reputation deeply influences system providers and users interactions (e.g. in e-commerce), today implementations of reputation systems are far from being satisfactory. Reputation systems implemented so far for...
详细信息
ISBN:
(纸本)9781479965632
Despite reputation deeply influences system providers and users interactions (e.g. in e-commerce), today implementations of reputation systems are far from being satisfactory. Reputation systems implemented so far for e-commerce are very simple and lack in showing relevant features of the service: on the one hand the representation of reputation does not distinguish different attributes concerning the entity holding the reputation;on the other hand the information used to built reputation is completely subjective, that is entirely rely on users' feedbacks, even concerning attributes that could be objectively measured. The principal cause of the problems above is that softwareengineering methodologies captures high level functional requirements and detail them down to system implementation but not on the reputation system side. In the present paper we start to tackle the highlighted problems by proposing an extension of Value Delivery Modeling Language and Service Modeling Language toward the representation of reputation systems concepts. The aim is to provide a model to represent reputation requirements of the system-to-be from the very beginning in the software development.
Program comprehension is a prerequisite in most software maintenance and evolution tasks. Given an unfamiliar system, it is difficult for practitioners to determine which software artifacts are relevant to the current...
详细信息
ISBN:
(纸本)9781479948604
Program comprehension is a prerequisite in most software maintenance and evolution tasks. Given an unfamiliar system, it is difficult for practitioners to determine which software artifacts are relevant to the current task. Generally, there are a variety of packages in a Java software system. These packages often have different intents and different relationships between each other Different information of packages and the relationships between different stereotypes packages form a signature of the system. This paper proposes a novel approach to automatically generate the description of the packages and its diagram to show relationships between the packages. The generated description and diagram can allow developers to more easily understand the main intent and structure of the system.
Described is a laboratory which is being equipped and developed to provide softwareengineering/computer science majors with important hardware, instrumentation, and interfacing knowledge that many such majors do not ...
详细信息
Described is a laboratory which is being equipped and developed to provide softwareengineering/computer science majors with important hardware, instrumentation, and interfacing knowledge that many such majors do not gain during their undergraduate education. It is hoped that the experience that students will It is hoped that the experience that students will gain from this laboratory will prepare them for becoming members of computersystems development teams consisting of both hardware and software engineers. Each softwareengineering team member will be familiar with the hardware engineer's craft, thus allowing for effective, efficient working teams.
RNAMute is an interactive web tool written in Java that calculates the secondary structure of all single point mutations, given an RNA sequence, and organizes them into categories according to their distances from the...
详细信息
An Integrated Medical Information System (IMIS) requires continuous customization to cope with periodic government notifications, changes in customer needs, and changing customer preferences. These systems are also mo...
详细信息
ISBN:
(纸本)9783642352669
An Integrated Medical Information System (IMIS) requires continuous customization to cope with periodic government notifications, changes in customer needs, and changing customer preferences. These systems are also modified as part of internationalization efforts. An IMIS should adhere to these situations while retaining its ability to charge medical expenses to patients and to the National Health Insurance Corporation. It should also deal with medical information such as prescriptions, medical images or videos in a manner that avoids minor defects which can lead to legal battles. Thorough testing is therefore very important. However, it is not easy to standardize medical processes, and much tailoring of IMISs has been done as a result. Moreover, new notifications should be reflected in customized IMISs operating in the hospitals within one week. It is known that sufficient testing of these systems has not been carried out. Therefore, this paper describes observations and an examination of the improvements of the test capability of such a system at a SME-level company. The assessments use a lightweight test process based on the test capability level of the company.
software security has an enormous impact on almost all areas ranging from general softwaresystems to security critical systems. The traditional measures such as firewalls cannot fundamentally solve the problem of sof...
详细信息
This paper defines a new protocol KeEs for the key establishment that meets the security requirements of the threat model proposed. The KeEs protocol assures forward and backward secrecy of the session key, so that if...
详细信息
Much of the knowledge about softwaresystems is implicit and therefore difficult to recover by purely automated techniques. Architectural layers and die externally visible features of software, systems are two example...
详细信息
ISBN:
(纸本)9783540878742
Much of the knowledge about softwaresystems is implicit and therefore difficult to recover by purely automated techniques. Architectural layers and die externally visible features of software, systems are two examples of information that can he difficult to detect Awn swine code alone, and that would benefit from addition human knowledge. Typical approaches to reasoning about data involve encoding an explicit meta-model and expressing analyses at that level. Due to its informal nature, however, human knowledge can be difficult to characterize up-front and integrate into such a meta-model. We propose a generic, annotation-based approach to captive such knowledge during the reverse engineering process. Annotation types can be iteratively defined, refined and transformation, without requiring a fixed meta-model to he defined in advance. We show how our approach supports reverse, engineering by implementing it in a tool called Metanool and by applying it to (i) analyzing architectural layering, (ii) tracking reengineering tasks, (iii) detecting design flaws, and (iv) analyzing features.
暂无评论