Comparing software artifacts to identify their similarities and differences is a task ubiquitous in softwareengineering. Logical-design comparison is particularly interesting, since it can serve multiple purposes. Wh...
详细信息
In this study, we have successfully developed a prototype which is a mobile friendly user interface for relevant laboratories that will improve students' understanding and learning of the transform techniques in e...
详细信息
ISBN:
(纸本)9781479903733
In this study, we have successfully developed a prototype which is a mobile friendly user interface for relevant laboratories that will improve students' understanding and learning of the transform techniques in engineering fields using smartphones.
In this paper, we investigate the personal epistemology of computing students, that is, their conceptions of knowledge and learning. We review some models of personal epistemological development and describe one of th...
详细信息
ISBN:
(纸本)9781450320788
In this paper, we investigate the personal epistemology of computing students, that is, their conceptions of knowledge and learning. We review some models of personal epistemological development and describe one of the questionnaire tools that have been used to assess the epistemological beliefs of students studying in other disciplines. We describe an experiment that uses one of these tools, together with exploratory factor analysis, to determine the dimensions of epistemological beliefs of a cohort of computing students and compare the results with that reported in other contexts. The results, while not reproducing the details of previous work, do seem to suggest that there are indeed multiple dimensions to personal epistemology, and that these can be identified, to a large extent, with those recognised by other researchers. Finally, we make some observations about the importance of personal epistemology for learning in Computer Science and outline further work in this area. Copyright 2013 ACM.
The negative database (NDB) is the negative representation of original data. Existing work has demonstrated that NDB can be used to preserve privacy and hide information. However, most work about NDB is based on binar...
详细信息
The rapid growth of embedded systems especially mobile embedded devices results in a shortage of professionals for embedded hardware and software developments. In order to broader embedded system education in small co...
详细信息
ISBN:
(纸本)9781450320788
The rapid growth of embedded systems especially mobile embedded devices results in a shortage of professionals for embedded hardware and software developments. In order to broader embedded system education in small college and university, we must overcome the difficulties such significant financial investment for embedded system labs and the high expertise requirement for instructors. This paper presents an ongoing work on developing a novel Android-based Mobile Sensory System Labware that is open source Android device based with short learning curve, portable, affordable, and easily adoptable. The proposed labware can greatly facilitate authentic and creative learning of embedded systems and provide extensive real world relevant hands-on experiences using smartphone devices with MCU controlled sensory. Preliminary feedback from the participating students is positive and encouraging.
We propose the use of forensic requirements to drive the automation of a digital forensics process. We augment traditional reactive digital forensics processes with proactive evidence collection and analysis activitie...
详细信息
We propose the use of forensic requirements to drive the automation of a digital forensics process. We augment traditional reactive digital forensics processes with proactive evidence collection and analysis activities, and provide immediate investigative suggestions before an investigation starts. These activities adapt depending on suspicious events, which in turn might require the collection and analysis of additional evidence. The reactive activities of a traditional digital forensics process are also adapted depending on the investigation findings.
作者:
Marko JänttiSchool of Computing
Software Engineering IT Service Management Research Group University of Eastern Finland Kuopio Finland
IT service providers are placing more and more resources for implementing self-service channels. Although there are several best practice frameworks available for managing IT service desk, such as IT Infrastructure Li...
详细信息
IT service providers are placing more and more resources for implementing self-service channels. Although there are several best practice frameworks available for managing IT service desk, such as IT Infrastructure Library (ITIL), the frameworks do not address well enough how self-service models for IT service management purposes should be designed, implemented or maintained. The research problem of this study is: How do IT service provider organizations use self service methods? A qualitative interview method was used as a main data collection method. The main contribution of the paper is to present results from an interview study focusing on exploring self-service methods in IT service provider organizations and provide lessons learnt based on the interview results.
Model transformations are an important part of Model Driven engineering (MDE). To generate a transformation with current MDE approaches, users are required to specify (or provide) complex meta-models and then engage i...
详细信息
ISBN:
(纸本)9781479903702
Model transformations are an important part of Model Driven engineering (MDE). To generate a transformation with current MDE approaches, users are required to specify (or provide) complex meta-models and then engage in quite low-level coding in textual transformation scripting languages. This paper introduces a new approach to visualising source and target models that allows specifiers of complex data transformations to use the resultant visual notations for specifying transformations by example using drag and drop. We demonstrate the applicability of our new approach by an example case study.
Face recognition in uncontrolled environments, such as large pose variations, and extreme ambient illumination and expressions is a challenging task for traditional face recognition methods. Some recent works show tha...
详细信息
Web services have become more and more important in these years. It is of key importance for enterprise web applications to combine different services available to accomplish complex business processes. BPEL4WS (BPEL)...
详细信息
Web services have become more and more important in these years. It is of key importance for enterprise web applications to combine different services available to accomplish complex business processes. BPEL4WS (BPEL) is the OASIS standard for web services composition and orchestration. It contains several distinct features, including scope-based compensation and fault handling mechanism. We have already studied the semantics for BPEL, including the operational semantics, algebraic semantics and their linking theory. This paper considers the mechanical approach to linking the algebraic semantics and operational semantics for BPEL. Our approach is to generate operational semantics from algebraic semantics, and to use equational and rewriting logic system Maude to mechanize the linking between the two semantics. Firstly, we investigate the algebraic laws in the Maude approach. Based on the algebraic semantics, the generation of head normal form is explored. Secondly, we consider the Maude approach to deriving the operational semantics from algebraic semantics, where the derivation strategy is based on the concept of head normal form. Our mechanical approach using Maude can visually show the head normal form of each program, as well as the execution steps of a program based on the derivation strategy.
暂无评论