Ambiguity is a major problem of software errors because much of the requirements specification is written in a natural language format. Therefore, it is hard to identify consistencies because this format is too ambigu...
详细信息
ISBN:
(纸本)9781424439027
Ambiguity is a major problem of software errors because much of the requirements specification is written in a natural language format. Therefore, it is hard to identify consistencies because this format is too ambiguous for specification purposes. This paper aims to propose a method for handling requirement specification documents which have a similar content to each other through a hierarchical text classification. The method consists of two main processes of classification: heavy classification and light classification. The heavy classification is to classify the requirement specification documents having similar content together. Meanwhile, light classification is to elaborate specification requirement documents by using the Euclidean distance. Finally, slimming down the number of requirements specification through hierarchical text classification classifying may yield a specification which is easier to understand. That means the proposed method is more effective for reducing and handling in the requirements specification.
Robustness and reliability with respect to the successful completion of a schedule are crucial requirements for scheduling in multi-agent systems because agent autonomy makes execution environments dynamic and nondete...
详细信息
Robustness and reliability with respect to the successful completion of a schedule are crucial requirements for scheduling in multi-agent systems because agent autonomy makes execution environments dynamic and nondeterministic. We introduce a model to incorporate trust which indicates the probability that an agent will comply with its commitments into scheduling, thus improving the predictability and stability of the schedule. To deal with exceptions during execution, we adapt and evolve the schedule at runtime by interleaving the processes of evaluation, scheduling, execution and monitoring in the life cycle of a plan. Experiments show that schedules maximizing participantspsila trust are more likely to survive and succeed in open and dynamic environments. The results also prove that the proposed plan evaluation approach conforms with the simulation result, thus being helpful for plan selection.
Adopting new tools and technologies on a development process can be a risky endeavor. Will the project accept the new technology? What will be the impact? Far too often the project is forced to adopt the new technolog...
详细信息
As digital ink technology continues to make an impact on the technical classroom, faculty members are exploring the different strategies for using this technology to improve student learning. The purpose of this panel...
详细信息
As digital ink technology continues to make an impact on the technical classroom, faculty members are exploring the different strategies for using this technology to improve student learning. The purpose of this panel is to demonstrate how faculty members are implementing this technology in engineering and science classrooms at three different institutions: Rose-Hulman Institute of Technology, University of Texas at Austin, and University of Vermont. The panel is designed to show both experienced pen computing users and those who are new to the field the different ways this versatile technology may be employed. In addition to the demonstrations, the presenters will discuss the pedagogical implications that result from the implementations. faculty who are interested in both the pedagogy and assessment of pen-based computing in the classroom should find the session informative and useful.
The QAOOSE 2007 workshop brought together, for half day, researchers working on several aspects related to quantitative evaluation of software artifacts developed with the object-oriented paradigm and related technolo...
详细信息
In this paper, we propose an efficient algorithm, NCLOSED, for mining the N k-closed itemsets with the highest supports for 1 up to a certain k max value. The algorithm adopts best-first search strategy to generate c...
详细信息
In this paper, we propose an efficient algorithm, NCLOSED, for mining the N k-closed itemsets with the highest supports for 1 up to a certain k max value. The algorithm adopts best-first search strategy to generate closed itemsets with highest remaining supports. It does not keep closed itemsets mined in main memory to ensure that they are really closed. This is because this algorithm can directly generate closed itemsets. Moreover, duplicated closed itemsets are detected and discarded from this algorithm.
This chapter overviews the scope, goals and timeline of the modeling contest CoCoME. It also describes the input the competing teams received and, furthermore, explains how the peer reviewing process went ahead, and h...
详细信息
One way to see the semantic Web is to think of it as a set of all-knowing technologies that respond to whatever the user asks. The other view is that it is a set of standards and tools that help build better Web appli...
详细信息
One way to see the semantic Web is to think of it as a set of all-knowing technologies that respond to whatever the user asks. The other view is that it is a set of standards and tools that help build better Web applications. Since the latter is probably more realistic at the moment, it means that a lot of software has to be developed before we start actually seeing the semantic Web in widespread *** developers would be needed for the task and unless we "win their hearts and minds", they are likely to obstruct rather than support the semantic Web idea. And from the average developer's point of view, there is not much to like on today's RDF query languages, especially when compared with relational algebra and SQL. Besides the fact that they are built on different principles, none of the languages we are aware of has a property that has served SQL so well - they are not closed.
Access to computer networks and systems is most often based on the use of conventional passwords nowadays. However, users have difficulty remembering a password that is long and random-appearing. So, they create short...
详细信息
Access to computer networks and systems is most often based on the use of conventional passwords nowadays. However, users have difficulty remembering a password that is long and random-appearing. So, they create short, simple, and insecure passwords. Graphical passwords have been designed to try to make passwords more memorable and easier for people to use, to create and, therefore, more usable and secure. Using a graphical password, users click on images rather than type conventional passwords. We have designed a usable graphical password system focusing in the usability features to the users, called Jetafida. In this paper we describe the Jetafida usability features, and the system usability features had been tested by questionnaire survey. This done by thirty computer students participates and uses the system for three times in different times to see the usability features achieved in the system. Where these features are ease of use, ease to create, ease to memorize, ease to learn and the overall system design and layout. The results show that the participants found that the proposed usable graphical password system has been achieving the usability features built in.
We propose a new similarity measure forcomparing maximal frequent itemset(MFI),whichtakes into account not only non-numeric attributes butalso numeric attributes of each item while computingsimilarity between *** prov...
详细信息
We propose a new similarity measure forcomparing maximal frequent itemset(MFI),whichtakes into account not only non-numeric attributes butalso numeric attributes of each item while computingsimilarity between *** provides more reliablesoundness for clustering results *** approaches consider just one side and areapt to lead to unintelligible clustering results *** on properties of maximalfrequent itemset(MFI),we construct a multi-levelhierarchical model(MHM)for our ***,to evaluate our approach andcompare with other similarity strategies,we constructan original evaluating strategy NF_Measure whichintegrates both quantity similarity and qualifysimilarity between *** experimentallyevaluate the proposed approach and demonstrate thatour algorithm is promising and effective.
暂无评论