The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A proposed approach supports the continual construction and evolution of model-based Internetware artifacts by a collective of Internet-connected stakeholders. The key mechanism is incremental graph superimposition (IGS), a refinement of stigmergy, the process that produces collective intelligence in social insects. Employing IGS, a collective of individuals collaboratively and continually construct...
User feedback is crucial to improve software quality. For example, it can be used to identify missing features and clarify user trends and preferences for future improvement. However, obtaining user feedback is not a 'one-off' process which requires that developers need to gather user feedback in an on-going approach. The problem lies here: the majority of users are generally lack motivation and interest...
In the context of product line engineering (PLE), providing immediate feedback on the correctness of a manual configuration step to users has a practical impact on whether a configuration process with tool support can be successfully adopted in practice. Model-based PLE has brought opportunities to enable automated product configuration and derivation for large-scale systems/software, in which models...
Through the study of the Bejaia's University students' marks in Computer Science, we want to show the interest of the Statistical Implicative Analysis (SIA). This method, developed by Régis Gras and his collaborators, is used to discover and analyze the most relevant implications between different studied modules. CHIC (Cohesive Hierarchical Implicative Classification) is a software implementing most...
Education invariably aims at developing competencies, technical as well as non-technical ones. As a consequence, there is also a need for methods that can be used to assess the quality of education faithfully. One possible approach is an assessment of whether intended learning outcomes are achieved, i.e. an investigation if the target audience possesses the desired competencies. Assessment of competencies,...
In all the projects centered on the promotion of self-regulation, self-regulation strategies and learning strategies are taught, to enable the students to use them in order to improve their learning and self-regulatory skills. When the students use these strategies, they choose the tools that they want to use to implement the strategies, pen and paper in many cases, and generic software tools in other...
This paper presents two primary results: (1) an adaptation of a Scrum-based, software-tools enabled process used in international service-learning project courses in the Computer and Information Sciences and other disciplines and (2) the software applications resulting from this process. The paper begins with an overview of Scrum and the challenges of applying it in the classroom. We survey the literature...
In the Computer Science Department at the University of Michigan (UM), we have spent the past five years building social context into several courses in the traditional computer science (CS) curriculum. Specifically, freshman- and senior-level, project-based classes have been designed to both teach significant and appropriate academic content, while also building software games and apps for children...
Analyzing the role of target-related information in a security attack is an understudied topic in the behavioral information security research field. This paper presents an empirical investigation of the effect of adding information about the target in phishing attacks. Data was collected by conducting two phishing experiments using a sample of 158 employees at five Swedish organizations. The first...
Assuring quality in software development processes is often a complex task. In many cases there are numerous needs which cannot be fulfilled with the limited resources given. Consequently it is crucial to identify the set of necessary requirements for a software project which needs to be complete and conflict-free. Additionally, the evolution of single requirements (artifacts) plays an important role...
Many technological solutions, especially in the fields of computer science and software engineering, are poorly supported by empirical evidences of their effectiveness and by the experience of acquiring the application in different industrial contexts. The lack of empirical evidences makes managers less confident in applying technological solutions proposed by the research community. Moreover, the...
It is still an open question how to achieve a proper balance between the cost and value of requirements elicitation. When deciding to assign time and other resources to elicitation, one needs to know what its effectives would be. In the paper we investigate the Structured Elicitation of Non-functional Require-ments(SENoR) method. The method is composed of a sequence of short brainstorming sessions...
Patterns and pattern languages are widely used nowadays. The need to apply patterns in the right sequence is very important, but how to apply them using many pattern languages or pattern catalogue is sometimes very difficult. After examining the current literature on the use of patterns from the software development perspective, this paper proposes a framework for determining the pattern applicability...
The success of an e-learning project depends largely on the quality of applications and tools used to support the learning process. Meanwhile, the quality of software depends largely on proper identification of stakeholders in the requirements stage in the development process. While there are studies that have identified key stakeholders in e-learning contexts, most of them do not perform a deep analysis...
In this paper, we propose an explicit signaling of RDPCM scheme for a lossy intra-coded block, and achieve a significant coding gain over the HEVC Range Extension reference software in the screen contents coding. We define three RDPCM modes, and transmit the side information so that the best RDPCM mode can be applied to residual signals after all available angular directional predictions. Contexts...
Software development projects in the context of the pharmaceutical industry are highly restricted. Innovation in terms of process changes within the practice of software development has to manoeuvre though the regulatory wilderness of legislation and industry standards. 49 articles have been selected using the Systematic Literature Review method to evaluate the maturity of this field of research....
One of the key issues in the current information society is the easy and open availability of required resources. The concept of “openness” covers several resource categories, such as data, software sources, services, innovation and education. Open Data is seen as a promising source of new business. The concept of open innovation is based on the idea of distributing “useless” innovations for beneficial...
The Software Engineering Education has to intrinsically enable students to master today's technology and immediately practical skills required by the industry, and on the other hand, to meet the challenges of the future and acquire long-term knowledge. In this paper, we report our approach to implement this duality in the context of “Object Oriented Software Engineering” course in King Saud University.
There are multiple commercial and non-commercial products available to integrate gamification aspects to existing services. Some of these are platform dependent whilst others are more general purpose. Commercial systems come with some problems - for example, lack of control and privacy issues. To avoid these problems, we created two iterations of badge systems and tested both of them on large courses...
Cloud computing is becoming increasingly prevalent, more and more software providers are offering their applications as Software-as-a-Service solutions rather than traditional on-premises installations. In order to ensure the efficacy of the testing phase, it is critical to create a test environment that sufficiently emulates the production environment. Thus, Cloud applications should be tested in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.