An important mission of the World Congress in Computer Science, Computer Engineering, and Applied Computing (a federated congress to which this conference is affiliated with) includes "Providing a unique platform for a diverse community of constituents composed of scholars, researchers, developers, educators, and practitioners. The Congress makes concerted effort to reach out to participants affiliated with diverse entities (such as: universities, institutions, corporations, government agencies, and research centers/labs) from all over the world. The congress also attempts to connect participants from institutions that have teaching as their main mission with those who are affiliated with institutions that have research as their main mission. The congress uses a quota system to achieve its institution and geography diversity objectives." By any definition of diversity, this congress is among the most diverse scientific meeting in USA. We are proud to report that this federated congress has authors and participants from 82 different nations representing variety of personal and scientific experiences that arise from differences in culture and values. As can be seen (see below), the program committee of this conference as well as the program committee of all other tracks of the federated congress are as diverse as its authors and participants.
Additional Info
  • Publisher: Laxmi Publications
  • Language: English
  • ISBN : 978-93-84872-17-5
  • Chapter 1

    Principles for Profiling Healthcare Data Communication Standards Price 2.99  |  2.99 Rewards Points

    Healthcare organizations often have many proprietary heterogeneous information systems that must exchange data reliably. Seamlessly sharing information among systems is complex. The widely adopted HL7 version 2 messaging standard has helped the process of systems integration. However, using the HL7 standard alone does not ensure system interoperability. The HL7 standard offers a wide range of options. Trading partners, without prior agreement, are not likely to implement options that are compatible. As a result, interoperability is hindered and organizations are left to employ their own ad hoc solutions. Message profiles provide a solution to this problem. Message profiles define a standard template that provides a precise definition of the data exchanged between applications in a common format. Defining a set of message profiles for controlling message exchanges establishes a well defined communications interface among organizations and facilitates interoperability. However in order to be effective, message profiles must be designed and applied correctly. Additionally, with efficient design, a family of message profiles can be developed which leverage existing message profile components. Such a strategy is employed in the development the United States EHR certification family of standards for laboratory ordering and results reporting. This paper presents a methodology and best practices for designing a set of related message profiles. Although the methodology is applied to the healthcare messaging standards it has broad applicability for the class of communication standards.

  • Chapter 2

    A Model Driven Serious Games Development Approach for Game-based Learning Price 2.99  |  2.99 Rewards Points

    Computer games, predominantly a form of interactive entertainment, are having some success being repurposed for educational use. However, this approach is hindered by the lack of availability of experience in serious games tools. Much research is already underway to address this challenge, with some who choose to use readily available commercial-off-the-shelf games and others attempted to develop serious games in-house or collaboratively with industry expertise. These approaches present issues including educational appropriateness of the serious game content and its activities, reliability of serious games developed and the (often high) financial cost involved. Developments in software engineering that enable automatic generation of software artefacts through modelling or Model Driven Engineering (MDE) promises new hope for game-based learning adopters, especially those with little or no technical knowledge, to produce their own serious games for use in game-based learning. In this article, we present our model-driven approach to aid non-technical domain experts in serious games production for use in games-based learning.

  • Chapter 3

    Rocket Aiming Project: A Service Learning Study Price 2.99  |  2.99 Rewards Points

    The Rocket Aiming Project was introduced to the Computer Science program at Cameron University in the fall semester, 2011. The mission of this project was to develop an unclassified rocket aiming algorithm for the Guided Multiple Launch Rocket System (GMLRS) Program. This project provided the Computer Science students a unique opportunity to apply what they gained from classroom teaching in solving a real-world problem. There is discussion on how students were instructed to complete the project following government software development procedures. The authors concluded that a service learning approach not only enriched the learning environment and enhanced the students’ problem-solving abilities, but also established a healthy relationship between Cameron University and the Fires Center of Excellence at Fort Sill.

  • Chapter 4

    Concurrent Collaborative Captioning Price 2.99  |  2.99 Rewards Points

    Captioned text transcriptions of the spoken word can benefit hearing impaired people, non native speakers, anyone if no audio is available (e.g. watching TV at an airport) and also anyone who needs to review recordings of what has been said (e.g. at lectures, presentations, meetings etc.) In this paper, a tool is described that facilitates concurrent collaborative captioning by correction of speech recognition errors to provide a sustainable method of making videos accessible to people who find it difficult to understand speech through hearing alone. The tool stores all the edits of all the users and uses a matching algorithm to compare users’ edits to check if they are in agreement.

  • Chapter 5

    Dynamic Adaptation of Business Process Models Price 2.99  |  2.99 Rewards Points

    Healthcare organizations, which are facing the challenge of delivery personalized services to their patients, are obviously affected by the problems of flexibility and adaptability of their processes. This research is applied to healthcare processes in the context of AP-HM hospitals (Assistance Publique - Hôpitaux de Marseille). In this paper, we consider specifically the drug circulation process where the complexity and the high level of variability are critical issues and important in practice. The paper introduces the V-BPMI approach for process variability and it presents how dynamic adaptation can be carried out for delivering process models that satisfy actor’s business requirements. The paper focusses on both the steps of the adaptation cycle and the adaptation trees dynamically produced on business actors’ demand.

  • Chapter 6

    Research Trends and Open Issues in Mobile Application Software Engineering Price 2.99  |  2.99 Rewards Points

    Mobile development is becoimg an increasingly critical area of software engineering as more users are integrating mobile devices into the fabric of their daily lives

  • Chapter 7

    Strategies to Improve Development in Brazilian Financial Institution Integrating Distinct Environments Price 2.90  |  2.9 Rewards Points

    With every release of financial solution IT organizations invest heavily in new technologies with the goal of providing quality software products that meet customer requirements. By this solution often requires processing functionality in environments with totally different from one another. Without the integration of these processes in different environments can not meet the functional and nonfunctional requirements such as integrity, performance, reliability, transparency and inclusiveness. This article presents a solution developed in Brazilian financial institution that was only possible due to environmental Mainframe integration with distributed platforms, manipulated in Eclipse Platform products through Rational Developer for System z and Rational Team Concert. We proposed a collaborative setting that allowed it was tapped what each can provide a better environment without losing its fundamental characteristics. The direct beneficiaries are the end customers and the financial institution responsible for the project.

  • Chapter 8

    Advocation Over Investigation: Comments on Robert Glass' Fact #55 Price 2.99  |  2.99 Rewards Points

    Robert Glass, in “Facts and Fallacies of Software Engineering” [1], states clearly his view on research in software engineering (SE). SE research in the empirical sense does not adequately support current SE practice as it is generally believed. Glass supports his statement and provides a “fact” explaining that SE researchers advocate more than they investigate. It is agreed that the “fact” accurately describes the current state of the field. In this paper, support for Glass' statement and opinions on the two resulting components are given. Marketing resources are provided which detail the use of hype for targeted marketing strategies, possibly contributing to advocating new tools rather than investigating the viability of these tools in the SE research paradigm.

  • Chapter 9

    Senior Citizens in Interaction with Mobile Phones: A Flexible Middleware Approach to Support the Diversity Price 2.99  |  2.99 Rewards Points

    The elderly population grows and it is necessary to develop appropriate technologies to them. Although many elderly afford a mobile phone, several of them only receive calls and do not benefit from other mobile phones’ functions due to interaction problems. The current design of mobile devices applications favor young audience, instead of also considering the elderly different interaction needs. The elderly population has different educational levels, experience with technology, cognitive skills and physical dexterity. This paper presents the designs of user interfaces that are flexible to meet the diverse requirements of elderly when interacting with smartphones. A framework for the design of flexible user interfaces was applied, and interaction requirements were formalized considering syntactic, semantic and pragmatic aspects. A set of rules defining the design of the system adaptable behavior was specified. A middleware was adopted and customized, and flexible user interfaces to a commercial Android smartphone were developed. The flexible solution was evaluated by elderly users. The results suggest a reduction in the interaction time with the use of flexible user interfaces and an increase in users’ satisfaction.

  • Chapter 10

    A Component-Based Architecture for Ginga Price 2.99  |  2.99 Rewards Points

    This paper discusses how component-driven development can be used in the design of the Ginga middleware architecture, including its Ginga-NCL presentation module. Presentation engines have an important facility, since they allow for previewing when each specific media player is needed. Therefore, to maintain temporal consistency during application presentations, instantiation time of media players can be computed. The paper describes how this approach has been considered in the design and implementation of Ginga, the middleware of ISDB-T terrestrial digital TV system and ITU-T Recommendation for IPTV services. The evaluations presented in the paper illustrate the benefits component-driven architecture can bring to digital TV middleware systems, such as decreasing the amount of needed resources and improving their dynamic evolution capability.

  • Chapter 11

    Managing User Accounts Across Heterogeneous Information Systems In The University Price 2.99  |  2.99 Rewards Points

    The present level of IT technologies provides the ability to automate much of the academic and administrative business processes of universities. With this said the park of information systems and services, often built using different technologies and architectures, in the universities is constantly expanding. In this regard, there are a number of issues related to the security of information, control of access to the information, as well as the optimization of the use of labor resources in the maintenance of information systems. To solve these issues qualitatively - the university must have an organized process for managing users of information systems and user privileges. This article shows an example of how to organize such a process with the use of modern IT means of automation.

  • Chapter 12

    Teams using Real World Projects in a Software Engineering Course Price 2.99  |  2.99 Rewards Points

    For a Computer Science undergraduate degree program the topics in software engineering are among the core topics recommended by the joint task force in computing curricula 2005. There is a large area of literature supporting the concept of project-based learning in a team setting to enhance teaching in a software engineering course. This paper discusses the curriculum issues within a software engineering course and explores and analyzes some advantages/disadvantages of using a team based approach with a real world project. Using data collected through a software engineering course at Southern Utah University, the author examines the overall experience in having a real software project from a local company using the PBL (Problem Base Learning) style in a team setting.

  • Chapter 13

    An Investigation into Mobile Based Approach for Healthcare Activites Occupational Therapy System Price 2.99  |  2.99 Rewards Points

    This research is to design and optimize the high quality of mobile apps, especially for iOS. The objective of this research is to develop a mobile system for Occupational therapy specialists to access and retrieval information. The investigation identifies the key points of using mobile-D agile methodology in mobile application development. It considers current applications within a different platform. It achieves new apps (OTS) for the health care activities.

  • Chapter 14

    Teaching Software Engineering Through a Real-World Project: A New Approach Price 2.99  |  2.99 Rewards Points

    Software Engineering is a commonly required course in the Computer Science degree curriculum. It can be a challenging task to teach the course in a way that is relevant to what students will experience in industry upon graduation. In this article, the authors discuss the use of a real-world project to teach Software Engineering. This new approach promotes a fresh and creative learning environment in which students apply their knowledge to engineer a real product for a real client. During the process, basic principles, methods, and CASE tool usage of Software Engineering are addressed. Student learning outcomes are enhanced as well.

  • Chapter 15

    Why To Research in Knowledge Management in Software Engineering Processes? Price 2.99  |  2.99 Rewards Points

    Knowledge Management is a young discipline that nowadays it is important for software development organizations (SDO). For this reason, this paper presents a review about the form knowledge management has been included in several Software Process Reference Models. For this study, five software process reference models, broadly used in Latin-American countries, were analyzed. The findings of this study show that in all models there are elements of knowledge management processes, and there are two models with a process area named Knowledge Management. Nevertheless, the knowledge management aspects included in these models is grounded in statements from Earl’s systems and engineering schools. Likewise, in terms of Gold’s knowledge management capabilities, the technology, knowledge acquisition and knowledge conversion capabilities are broadly covered but elements for others capabilities are not included in these reference models.

  • Chapter 16

    Systems on Abstract Network Price 2.99  |  2.99 Rewards Points

    The authors developed a new system abstraction method, “Abstract Network Framework”, implemented its prototype, ANetFW, and confirmed feasibility of the new method. In this paper, the method is proposed by explaining the implementation and behavior of ANetFW. This method does only abstraction of operations for inter-component connection and the components directly communicate each other at run-time without any intervention of the framework. Therefore the method is easier to introduce than the method of replacing the whole abstraction layers such as operating systems, while it does not cause any run-time overheads due to abstraction that overlay approaches such as middle-wares would cause.

  • Chapter 17

    XCD – A Design-by-Contract Architecture Description Language Price 2.99  |  2.99 Rewards Points

    Software architecture description languages (ADL) have been proposed as a way to properly specify the architectures of complex software systems, in a way that allows both communication among the different stakeholders and an early analysis of these systems for a number of properties. However, practitioners seem to have shunned the ADL developed in academia and mainly use other modeling languages, that were not originally created for describing architectures. In a recent survey, practitioners have expressed a wish for analyzing their architectures (esp. for non-functional properties) and at the same time expressed their dissatisfaction with existing ADL, finding that the formal notations they use have a learning curve that they perceive as being too steep.

  • Chapter 18

    A Quantitative Approach to the Evolution of Domain-Specific Modeling Languages Price 2.99  |  2.99 Rewards Points

    Domain-Specific Modeling Languages (DSMLs) are modeling languages that are effective only for particular domains, and DSMLs can make software development much simpler. It is often desirable for DSMLs to be usable repeatedly and for a long time since developing DSMLs is costly and time-consuming. However, this is not easy because it is difficult to evolve existing DSMLs. Conventional evolution of DSMLs is usually conducted based on the information obtained from domain experts (i.e., the interview results of domain experts). However, the DSML problems understood by domain experts can be incomplete, which makes it difficult for DSML developers to judge how to evolve DSMLs and whether an evolution is effective or not. In this paper, we propose an approach to the evolution of DSMLs using quantitative information such as the application data of DSMLs.

  • Chapter 19

    Using Productivity Measure and Function Points to Improve the Software Development Process Price 2.99  |  2.99 Rewards Points

    Usually, cost and time estimations are done at the beginning of a software project for budget planning purposes. Such estimations are used at the end of the project to verify if the initial planning was followed or if there were any deviations. In this sense, these estimations can only be used as an input to improve the process for other projects. This paper presents an iterative method, which uses productivity and function points metrics, to identify possible deviations in the amount of time and effort needed to carry out the process tasks, thus continuously updating the estimations in order to cope with the current project needs. It is presented a real case study of how this process can be applied.

  • Chapter 20

    Scaffolding the Software Design Process: Fine-Grained Specifications from Design Tactics Price 2.99  |  2.99 Rewards Points

    Software projects define requirements to describe what the system does. In some cases, these requirements are not available. Instead, customers demand that the system meet specific quality goals. Experience shows that domain experts use design tactics to meet quality goals for several application domains. Because most engineers are not domain experts, they may experience difficulties in understanding and implementing these tactics as effective solutions to design problems related to quality attributes. In these situations, a significant amount of trial-and-error work takes place during design to ensure a particular goal is met. In some cases, this valuable knowledge can be lost throughout the life cycle or hard to reuse in future projects. This paper proposes a twostep approach in which fine-grained specifications can be extracted from design tactics. To address this problem, design tactics are modeled as activity diagrams. The Unified Modeling Language provides these diagrams as effective representations for conveying system behavior in terms of what actions the system performs. Action and control nodes of these diagrams are examined in order to generate specifications expressed in natural language based on subjectverb- object templates.

  • Chapter 21

    Building Information Technology Based on a Human Behavior- Oriented Approach to Enterprise Architecture Price 2.99  |  2.99 Rewards Points

    Enterprise Architecture (EA) frameworks (EAF) define a comprehensive step-by-step process with an expected outcome an EA plan that details the guidelines for governing and aligning an enterprise’s strategic business plan with it’s information technology (IT) capabilities. The process attempts to simplify the capture and validation of the design artifacts used to implement new information systems. Yet, many EA projects fail. In analyzing failure, EA changes the culture, character, and structure of an enterprise that often manifests itself in new stakeholder behavioral patterns (i.e., organizational transformation). Existing EAFs, though technically comprehensive, fail to acknowledge non-technical factors such as stakeholder behavior which may have more influence on EA than technology. This paper progresses earlier work assessing the affect of stakeholder behavior and organizational transformation on EA. Our approach to EA encourages a more holistic, humanistic, and behavior-driven process using Giddens’ Theory of Structuration as a lens guiding EA design.

  • Chapter 22

    Applying Design Patterns in Game Programming Price 2.99  |  2.99 Rewards Points

    This paper discussed an object-oriented design for general game using C# and XNA using design pattern. We presented application of structural patterns, creational pattern and behavioral pattern to create game sprite, manage game state and game sprites, different collision and rewards among sprites or between sprites and map; we also discussed how to apply design patterns to handle communications between sprites and NPC by using observer pattern and mediator patterns. Although lots of design patterns are discussed, other design patterns might suitable as well because game programming are so complicated to separate each pattern independently.

  • Chapter 23

    New Paradigms for Software Application Development: Software architectures and component-based development Price 2.99  |  2.99 Rewards Points

    In recent years several technologies and programming languages have appeared for developing software systems. Each one provides advantages and specific implementations to business applications. However, traditional approaches are still in use in many software projects, and therefore the software code was not initially developed with reuse in mind. This situation leads to delays in delivery times, production costs above budget, and possible generation of incomplete/defective software products. The architectures and the component-based development emerge as alternatives for traditional software development. The challenge is software with and for reuse, and interoperability between different technologies, platforms and applications. This paper provides a description of the component-based development and the uses of software architectures. Also, examples of program technologies that implement these concepts are given such as .NET, Web Services, OSGi, ICE, and SCA.

  • Chapter 24

    A QoS Driven Web Service Selection Methodology Using UML and UML Profiles Price 2.99  |  2.99 Rewards Points

    Business process modeling and execution in SOA requires a set of methodologies and tools which support transition from analysis to execution level. Web services play a significant role in application development in SOA environment and publishing its functionality on registries to link their data and operations for different applications. Web service selection must satisfy not only the functional requirements but also the Non Functional Requirements (NFR) of the user. Based on our literature survey, we observe the need for improvement in current approaches so as to consider NFR during web service selection. Further, as number of users and their specific requirements increase, NFR conflicts are bound to rise and need to be understood. Detecting them and finding their impact on the system is the next rational step. Our work proposes to detect these conflicts using Ontology, Unified Modeling Language (UML) and UML Profile. The focus is on selecting an appropriate web service so that the Quality of Service (QoS) values are maintained. Our contribution is to develop a model driven approach so as to allow the designer to choose an appropriate web service. This is expected to greatly reduce the development and operational time besides providing transparency.

  • Chapter 25

    Generation of Efficient Embedded C Code from UML/MARTE Models Price 2.99  |  2.99 Rewards Points

    Nowadays, the increasing complexity of the embedded software development process, demands design techniques capable of addressing such complexity efficiently. In this article, a methodology that follows MDA guidelines for the design of real-time embedded software is presented. This methodology comprises two fundamental activities: application modeling and code generation. Our modeling strategy uses UML and MARTE extensions to elaborate models where the specification of the application functionality is decoupled from the platform execution support. This modeling approach is complemented by a code generation strategy that transforms the application model into efficient C code for execution on embedded systems. A senderreceiver application is used as a case study to illustrate the complete methodology workflow.

  • Chapter 26

    An Object-Oriented Framework for Digital Voting Price 2.99  |  2.99 Rewards Points

    Voting is a mechanism widely used in decision making and are commonly employed by governments and businesses.

  • Chapter 27

    Towards Improving Object-Oriented Software Maintenance during Change Impact Analysis Price 2.99  |  2.99 Rewards Points

    Today, resources are geared towards modifying rather than developing new software systems. Changes are necessary during the system’s lifetime to keep it useful but the major challenge is how these changes are controlled and managed. Software systems are complex with large dependency webs and components that are fault-prone. Modifying components without regard to its dependencies or its fault-proneness may have some unpredicted and potential effects on the quality or increase their risk to fail. Objectoriented software (OOS) systems are not exception. Identifying these components early may reduce system failure risks when implementing changes. Traditional researches on change impact analysis (CIA) of software code change and failure prediction are disjointed. Therefore, the main goal is to propose a change impact analysis framework that incorporates change and failure prediction while enhancing software quality and reducing maintenance time, cost and effort. By way of contribution and extension of existing knowledge, this research will explore and analyze OOS component’s relationship for effective change impact analysis and predicting early, the failure associated with fault-prone components by utilizing OO metrics.

  • Chapter 28

    Evaluating the Effectiveness of a Collaborative Requirements Engineering Modeling Notation for Planning Globally Distributed Projects Price 2.99  |  2.99 Rewards Points

    In many software projects, stakeholders are distributed across different time zones, organizations, and geographical locations. This creates challenges for conducting people-intensive activities such as requirements elicitation, analysis, and prioritization. To address these problems we previously introduced a visual modeling notation to help project managers plan the collaboration infrastructures needed to support requirements-related activities in globally distributed projects. In this paper we present a refined version of the notation and report on an observational study we conducted in which project managers used our notation to plan globally distributed projects. Results show that the modeling activity and the resulting diagrams helped the project managers to better understand the communication needs for the project, to identify potential communication and collaboration problems, and to proactively address the infrastructure and communication needs for the project.

  • Chapter 29

    Analysis and Application of Earned Value Managment in Software Development Price 2.99  |  2.99 Rewards Points

    Earned Value Management (EVM) is a well-known cost and schedule management technique in government and defense industry projects. Its usage, however, is not as wide spread in the general software industry. In this paper we explore some of the shortcomings in EVM and suggest several improvements in the application of EVM in software development projects. In particular, we analyze the nature of software projects and offer improved ways to approximate Estimate of Completion for cost of software projects. Another area of special attention in this paper is demonstrating that EVM’s metric such as Schedule Performance Index alone does not alert the project managers early enough on late task starting date and that the actual start date itself must be taken into account.

  • Chapter 30

    On Acceptance Testing Price 2.99  |  2.99 Rewards Points

    Regardless of which (model-centric or code-centric) development process is adopted, industrial software production ultimately and necessarily requires the delivery of an executable implementation. It is generally accepted that the quality of such an implementation is of utmost importance. Yet current verification techniques, including software testing, remain problematic. In this paper, we focus on acceptance testing, that is, on the validation of the actual behavior of the implementation under test against the requirements of stakeholder(s). This task must be as objective and automated as possible. Our goal here is to review existing code-based and model-based tools for testing in light of what such an objective and automated approach to acceptance testing entails. Our contention is that the difficulties we identify originate mainly in a lack of traceability between a testable model of the requirements of the stakeholder(s) and the test cases used to validate these requirements.

  • Chapter 31

    A Framework for Maturity Assessment in Software Testing for Small and Medium-Sized Enterprises Price 2.99  |  2.99 Rewards Points

    This paper proposes a framework for a software maturity assessment model for small and medium-sized enterprises (SMEs) based on the TMMi model. Our framework includes an evaluation questionnaire based on TMMi subpractices, support tools with examples of artefacts required to ensure the questionnaire is thoroughly completed, as well as an automated tool support for its application, enabling SMEs to carry out self-assessment. The model was applied to four SMEs.

  • Chapter 32

    Constructing Verifiable Correct Java Programs Using OCL and Clean Java Price 2.99  |  2.99 Rewards Points

    A recent trend in software development is building a precise model that can be used as a basis for the software development. Such a model may enable an automatic generation of working code, and more importantly it provides a foundation for correctness reasoning of code. In this paper we propose a practical approach for constructing a verifiably correct program from such a model. The key idea of our approach is (a) to systematically translate formally-specified design constraints such as class invariants and operation pre and post conditions to code-level annotations and (b) to use the annotations for the correctness proof of code. For this we use the Object Constraint Language (OCL) and CleanJava. CleanJava is a formal annotation language for Java and supports Clean room style functional program verification. The combination of OCL and CleanJava makes our approach not only practical but also suitable for its incorporation into existing object-oriented software development methods. We expect our approach to provide a practical alternative or complementary technique to program testing to assure the correctness of software.

  • Chapter 33

    An Open Source Platform for Collaborative Remote Usability Studies Price 2.99  |  2.99 Rewards Points

    In the field of usability testing, remote evaluation methods have been suggested as a way to combat the high costs incurred by traditional laboratory testing. The Distributed Usability Evaluation (DUE) framework is an asynchronous remote testing suite which has yielded good results in an industrial case study of production software. The framework allows users to send video/audio reports to a centralized server on which evaluators and developers can collaborate to find their optimal solutions. In this paper we present the latest development iteration of the framework, which brings about significant improvements to allow for studies with an extensive amount (>50) of participants. The updated framework is submitted to an expert evaluation by acknowledged usability experts and scientists which concludes that the framework holds a potential for doing extensive usability studies with minimal effort. Based on the promising results, the framework is now released as an open source project in an effort to assist others in conducting long-term studies involving many users.

  • Chapter 34

    Study of Data Imputation on the Predictive Value of Software Attributes in the ISBSG-10 Data Set Price 2.99  |  2.99 Rewards Points

    With increased attention on reducing software cost, research has recently focused on developing new methods to measure software complexity that can be successfully applied for resource allocation, project complexity, and defect estimation. To help practitioners, a variety of public data sets were created and maintained to provide historical data for organizations that do not possess historical project data. However, due to their cross-company nature, such data sets contain missing values, and raise several practical estimation problems. This article explores the relevance of imputation on the predictive value of software attributes. We evaluated this on the International Software Benchmarking Standards Group release 10 (ISBSG- 10) data set which is commonly used for software estimation. We build linear models for prediction, cluster results by the quality of prediction, and identify relevant predictors using association rule mining techniques.

  • Chapter 35

    Finding The Relationship Between Software Testing Effort And Software Quality Metrics Price 2.99  |  2.99 Rewards Points

    Software testing has very important role in Software Development Life Cycle for providing software quality and its role comes into prominence day by day. One of the jobs, which software test engineers perform, is executing the tests according to the test cases. But before the execution of tests starts, test manager has to schedule and plan and for this purpose he or she has to estimate the test effort accurate as possible. The accuracy of the estimation is very important for project success, because source and time planning is going to be actualizing according to this estimation. But so far the methods which have been used to estimate the test effort are too subjective or required too many efforts. In this article, we propose a new method for test effort estimation. Proposed method is about finding the relationship between software quality metrics and test effort execution then making the estimation according to this relationship.

  • Chapter 36

    Examining the Performance of Java Static Analyzers Price 2.99  |  2.99 Rewards Points

    Static Analysis refers to the analysis of computer programs prior to executing them to reveal potential problems that need to be fixed before executing the programs. In this paper, five static analyzers for Java programs will be examined and compared using three Java programs, which are randomly selected from a collection available on the Internet.

  • Chapter 37

    Verification and Validation Experience of Safety-grade Optical Modem for Core Protection Calculator (CPC) Price 2.99  |  2.99 Rewards Points

    In general, an optical modem used in industry is composed of an integral system for the Transmitter/Receiver. However, a safety-grade optical communication modem in a nuclear safety system is composed of send-only service or receive-only service. A send-only optical modem of the control rod signal transmission is in charge of the transmitting function in the form of frequency-converted optical signals to the receive-only optical modem as frequency-converted optical signals in the range of an input voltage of 0V to 10V. The receive-only optical modem of the control rod signal receiving is in charge of the receiving function toward the Analog Input (AI) Gate through the Core Element Assembly Computer (CEAC) Analog Input (AI) Surge card in the form of frequency-converted optical signals to the sending-only optical modem as frequency-converted optical signals in the range of an input voltage of 0V to 10V. This paper describes the results of a software verification and validation for a send-only optical modem and receive-only optical modem, respectively. All tests were performed according to the test plan and test procedures. Functional testing, performance testing, event testing, and scenario-based testing for a safety-grade optical modem of a Core Protection Calculator in a Korea Standard Nuclear Power Plant as a thirty-party verifier was performed successfully.

  • Chapter 38

    Findings of Expert Validation and Review of the Technology Enhanced Interaction Framework Price 2.99  |  2.99 Rewards Points

    A Technology Enhanced Interaction Framework has been developed to support designers and developers designing and developing technology enhanced interactions for complex scenarios involving disabled people. Issues of motivation, time, and understanding when validating and evaluating the Technology Enhanced Interaction Framework were identified through a literature review and questionnaires and interviews with experts. Changes to content, system, and approach were made in order to address issues identified. A detailed analysis of the expert review and validation findings supported the view that the TEIF could help designers/developers design technology solutions in complex situations when disabled people are involved. The next step will be to run a motivating experiment to evaluate how and in what ways the framework helps designers/developers.

  • Chapter 39

    An Approach to Configuration-based Generation of Validation Rules for Shipdex Price 2.99  |  2.99 Rewards Points

    Shipdex protocol defines all technical documents including the ship equipment manuals in XML according to Shipdex document format. Data module, the smallest information unit of the Shipdex protocol shall be prepared based on S1000D XML schema and shall satisfy the fundamental S1000D XML schema rules and Shipdex standard as well. There are commercial tools that support validating whether these rules are met. However, when S1000D standard or Shipdex standard is modified, update by the validation tool developer and continuous maintenance as well are required as the tool has Shipdex rules inherent in it. In order to minimize such inconvenience, a scheme is proposed with which the Shipdex tool user can modify and add Shipdex rules easily.

  • Chapter 40

    Experimental Evaluation of Static Source Code Analysis tools Price 2.99  |  2.99 Rewards Points

    Code analysis is a substantial process to understand the source code. This needs effective, reliable, and accurate code analysis tools, but these tools may mislead the software developers because they might provide inaccurate measures. Therefore, there is a need to investigate empirically the features of these tools. This paper highlights the serious need to improve understanding of source code to support the development of reliable software in addition to achieve better understanding of how code analysis tools work. For this purpose, this paper presents an experiment, which is comparing between two static code metrics analysis tools. This paper provides significant evidence about the inconsistent values of metrics that are calculated by two code analysis tools for a given program. In addition, our paper shows how the tools are significantly different in terms of speed. Then, this paper discusses numerous of issues and causes of this difference such as unclear definition of code metrics.

  • Chapter 41

    An Efficient Regression Testing Technique For Test Case Prioritization Price 2.99  |  2.99 Rewards Points

    Regression testing which is an expensive activity. Regression testing is used to verify the program correctness once it is modified. To ensure that the changes made to that program are correct and due to that change that has been made it should not affect the remaining portions in the program. If we execute all regression tests it will take more time to execute the excessive regression tests. Retest-all reruns all the test, consumes excess time. In regression testing selection technique selects the subset of test case from the test suite which reduces the time taken to retest the modified program .Since to make the regression testing to a cost effective manner the test cases are prioritized. We define an algorithm which provides maximum code coverage for a regression test suite.

  • Chapter 42

    Security Requirements Engineering: Analysis and Prioritization Price 2.99  |  2.99 Rewards Points

    with the increase in the use of software system, security requirement engineering becomes an emergent area of study. Security requirements are constraints to a system which must be satisfied for consistent system. Most of the software engineering processes deals with security constraints during the design or implementation phases which may result into unnecessary constrained system. So the need for a new process arises which deals with security issues in requirement engineering phase and then take appropriate design decisions so that security mechanism used are optimal to some extent resulting in efficient secure system. Therefore the requirement engineers must discover security requirement along with functional and non functional requirement, so that security requirement can be dealt effectively. In this paper, we present a method for security requirement analysis and prioritization along with the other activities of security requirement engineering. Analysis is based on the technique of ontology that will automate the process and prioritization is based on risk analysis. The resultant system will be a cost effective in nature as well as it lay a foundation for further activities so that designer will adopt the most efficient technique for the implementation of security requirements.

  • Chapter 43

    Empirical Evaluation of Software Development Methodology Selection Consistency: A Case Study Using Analytical Hierarchy Process Price 2.99  |  2.99 Rewards Points

    When developing software, the selection of an appropriate software development methodology is an essential decision. The experience, knowledge, expertise, of the software developer and organizational development context are assumed to have a great influence in selecting a methodology. In this research, we examine factors affecting the selection of software development methodologies and the consistency in which the methodology selection process is carried out. Based on Analytical Hierarchy Process (AHP), we evaluate the consistency in software development methodology selection in a particular software development company. We investigate the importance of a number of factors by first soliciting the criteria from practitioners before methodology selection and then later observing the actual implementation of a software development methodology. The paper identifies the predictor variables for development methodology selection and the dynamics triggered by situational variables. The results of our findings as well as recommendations for further work are presented in this paper.

  • Chapter 44

    The Impact of Non-Functional Attributes on the Analysis Operations of Feature Models Price 2.99  |  2.99 Rewards Points

    The functional aspect of a system is very important. In fact, it defines different features of the system, but it does not negate the reality of the non-functional aspects of it and that has an impact on this functional aspect. This aspect has been largely treated with classical systems but not enough with the product lines.

    So we had the idea to study the impact of non-functional attributes on the analysis operations of feature models. In this work, we have resumed analysis operations of feature models listed in the literature. Moreover, we studied the effect of adding the non-functional attributes on these operations by giving examples. So this has enabled us to emphasize the presence of three types of constraints namely constraint value, constraint attribute-attribute and constraint feature attribute.

    Finally, we have deduced that some operations are not affected, others are affected and there is also the emergence of new one(s).

  • Chapter 45

    Determining Software System Type from Software Requirement Specification Price 2.99  |  2.99 Rewards Points

    Deciding type of software system appropriately helps in proactive software performance engineering with graph transformation approach. Further this task can be useful in performance analysis of software systems. Analysis carried out in requirement and design phases add value to implementation. In this paper idea of determining software system type based on software requirement specification is proposed.

  • Chapter 46

    On-Demand Source Code Generation & Scheduling Optimised Parallel Applications on Heterogeneous Platforms Price 2.99  |  2.99 Rewards Points

    Scheduling applications tasks across heterogeneous clusters is a growing problem, particularly when new upgraded components are added to a parallel computing system that may have originally been homogeneous. We describe how automatic and just-in-time source code generation techniques can be used to make the best parallel decomposition for whatever resource is available in a heterogeneous system consisting of graphical processing unit accelerators and multi-cored conventional CPUs. We show how a high level domain specific language approach to our set of target simulation applications can be used to cater for a variety of different GPU and CPU models and scheduling circumstances. We present some performance and resource utilisation data illustrating the scheduling issue for heterogeneous systems in computational science. We discuss the future outlook for this code generation approach in software engineering.

  • Chapter 47

    Lights on the Impact of Requirements Interdependencies on Priorities during Release Planning Decisions Price 2.99  |  2.99 Rewards Points

    In market-driven software development, software release planning is both crucial and complex activity with a significant impact on the success or failure of software product development. However, the task of scheduling an optimal set of requirements for a particular release is not as easy as expected. This is because requirements prioritization is crippled by interdependencies. Consequently, release planning decisions are thwarted, prioritization is difficult, and interdependencies are complex and fuzzy. Furthermore, not much has been known about the nature of requirements interdependencies in release planning perspective in literature. Therefore, our objective in this paper is to bring into light the impact of interdependencies on priority of requirement and their complexity nature. In addition, an approach for intermediate representation of interdependencies is proposed.

  • Chapter 48

    Towards a Software Domain Metric based on Semantic Web Techniques Price 2.99  |  2.99 Rewards Points

    The reuse of software remains a major objective in the software industry. An important task in order to accomplish this goal is to classify the software based on the application domain for which it was done. This action facilitates their possible assembly with other programs based on the same vocabulary and domain. In this paper we describe a software domain metric which is measured based on semantic web techniques. This metric is independent of lines of code, binary and executable code of the software, and the programming language. Our approach is based on a lightweight ontology of CORBAL-IDL language and SPARQL queries. The ontology captures the vocabulary and its relation. This is encoded using OWL DL, supported by the Pellet reasoner to check the ontology component consistency. The populated ontology is queried using SPARQL. These queries look for matching words based on a vocabulary which describes a domain. We use an example and a prototype (a semantic framework called Chichen-Itza) to show the feasibility of our approach.

  • Chapter 49

    A Template-Based Approach to Modeling Variability Price 2.99  |  2.99 Rewards Points

    Arnold and Corriveau have recently described ACL/VF, a nonstate- based quality-driven approach to software specification that enables the requirements of stakeholders to be validated against the actual behavior of an implementation under test. Simultaneously, in recent years, the software product line (SPL) approach, initiated by Parnas back in the 1970s, has emerged as a promising way to improve software productivity and quality. The problem we address here can be summarized in one question: how can ACL/VF support product lines? The solution we propose adopts Cleaveland's template-based general approach to variability. We first explain how to go from the traditional feature diagram and feature grammar used in SPL to a) ACL domain contracts capturing commonalities between the requirements contracts of a domain and b) variability contracts capturing how features and their relationships (captured in a feature grammar) can affect these domain contracts. Domain and variability contracts are then captured in XML files and we rely on XSLT to specify how variability is to be resolved in order to generate a specific member contract.

  • Chapter 50

    Software Maintenance Risk Management Process - A Case Study Price 2.99  |  2.99 Rewards Points

    Software Maintenance risk management differs in many aspects from software development risk management. Although it is the longest and the riskier phase on the software life cycle, differently from software development where many processes and models were established, very few processes have been developed to deal with software maintenance. Because it deals with systems that are already in production, software maintenance presents much more sources of risks. In this paper, we go through the software maintenance process identifying the main sources of risks and defining a process that can help mitigate those risks. Finally, we present a case study where this process was applied and some of the results are shown.

  • Chapter 51

    Test Case Prioritization Related to Code Quality Price 2.99  |  2.99 Rewards Points

    Regression testing which is a type of tessting that determines whether a change in one part of the software affects other parts of that software, can effectively based on pre-defined priorities.

  • Chapter 52

    An Eclipse Plug-In for Generating Database Access Documentation in Java Code Price 2.99  |  2.99 Rewards Points

    Enterprise applications typically consist of a web layer, the business logic layer, and a relational database. However, the interaction between these various layers is not sufficiently captured by the current generation of IDE (Integrated Development Environment). For example, current Java IDE's do not evaluate the relationship of classes with the database, or how a particular java method interacts with database tables and columns. We report here our progress in developing an Eclipse plug-in that helps the programmer document the interactions between Java code and relational databases. A primary motivation is to facilitate code maintenance in the face of database modifications.

  • Chapter 53

    A Decision Model for Monitoring Project Status with Earned Value Management Indicators. Price 2.99  |  2.99 Rewards Points

    Project management is the discipline of planning, organizing, motivating, and controlling resources in order to fulfill specific goals. Project managers are required to monitor and control project execution, i.e. verify actual progress and performance of the project with respect to the project plan and timely identify areas in which changes may be required. Earned Value Management (EVM) is a valuable technique for determining and monitoring project status. It indicates performance variances based on measures related to work progress, schedule and cost information. The technique involves systematically collecting a set of indicators during project execution. As so, a manger may strive to systematically use all the indicators during a project, and, without an appropriate guideline, correctly interpret the values collected. In this paper we propose a classification of the EVM indicators in five conceptual classes and present an interpretation model that managers can adopt as checklist for monitoring EVM values and predict project status. The model has been applied in an industrial case study to monitor project status and guide project manager decisions.

  • Chapter 54

    Software Engineering Practices for Minimizing Technical Debt Price 2.99  |  2.99 Rewards Points

    Often we find it difficult to incorporate any changes in a software project during later phases of its development, or during post-delivery maintenance. Primary reason for this is inflexibility in design and code which makes it difficult for changes to be incorporated. This inflexibility substantially increases the cost of making changes and this metaphor has been termed as Technical Debt [1]. While Technical Debt cannot be eliminated completely, its burden needs to be reduced. Many practitioners, especially from agile community, have suggested some practices to avoid or eliminate Technical Debt. This paper discusses methods for relief from Technical Debt and proposes seven software engineering practices that a developer can follow to minimize Technical Debt. These practices have been used and found to be effective when implemented in projects as discussed here.

  • Chapter 55

    Agile Project-Based Teaching and Learning Price 2.99  |  2.99 Rewards Points

    Agile courses in university settings aim to prepare students to face the ever increasing demands from the software industry, where Agile has become mainstream. This proves the teaching and understanding of Agile in such settings is of the utmost importance. This is why Agile is no longer just a part of the software engineering curriculum in Computer Science but a standalone course in most cases, though with increasing challenges for both faculty and students. This article presents yet another example case of the design, planning, development and evaluation of an agile project-based course. The reason for addressing the Agile teaching is twofold: not only are the Agile theory and practice taught and experienced in class, but also the teaching itself, and consequently the learning, has been adapted to changing requirements and priorities in each edition of the course. Making it project-based allows students to work with realistic projects through which they learn Agile more effectively, in collaborative and self-organizing teams. These insights, as well as settings and experiences over a total of 4 years, are addressed in this article.

  • Chapter 56

    Study of Agility in Mobile Application Development Price 2.99  |  2.99 Rewards Points

    Not only has Agility infiltrated enterprise and consumer mobile application development, but it has also become an integral part of most IT departments and the standard for younger generation developers. Despite the numerous benefits of Agile development, software developers often find out that there are also several pitfalls to avoid during mobile application development. In this study, we explore the potential pitfalls of incorporating agility into the development of mobile applications. The motivation behind this work stems from professional and personal experience of the primary author. As a junior software developer in the mobile application age, the primary author has experienced first-hand the demands of a “we want it now” market.

  • Chapter 57

    A Model-Based Agile Process for DO-178C Certification Price 2.99  |  2.99 Rewards Points

    Increasing complexity has driven aerospace companies to consider the use of Agile processes for development of safety-critical systems. For other domains, Agile processes have been shown to improve cost, schedule, and quality metrics. Airworthiness certification under the Federal Aviation Administration (FAA) guidelines imposes unique challenges that require adaptation of Agile processes. The FAA’s mission is maintaining safety within the National Air Space, and the certification process that the FAA has adopted is a process-oriented standard RTCA DO-178C. Here we present a Model-Based Agile Process (MBA process) that will allow companies to benefit from some of the efficiencies inherent in Agile methods while maintaining compliance with airworthiness certification requirements. Model-based requirements capture using the Unified Modeling Language (UML) facilitates iterative and incremental capture, refinement, and verification of requirements using executable requirements models, maintaining the Agility of the requirements elicitation process.

  • Chapter 58

    IEEE std 829-2008 and Agile Process Can They Work Together? Price 2.99  |  2.99 Rewards Points

    IEEE Standard for software and system test documentation (i.e., IEEE std 829-2008) is a comprehensive guide that specifies a common framework for planning the testing activities. The agile process is known for its promotion of frequent delivery of working software over comprehensive documentation and responding to change over following a plan. Although the IEEE std 829-2008 has strong association with the traditional waterfall development process, it does offer flexibility that allows user to combine or eliminate some of the test documentation content topics. Furthermore, it does not prohibit short-term and incremental planning. The underlining philosophies of the test standard and agile process are not at odd. This paper attempts to investigate whether they can be married and work together to great effect. Keywords: IEEE std 829-2008, Agile

  • Chapter 59

    Managing a Global Software Project under an Agile and Cloud Perspective Price 2.99  |  2.99 Rewards Points

    Nowadays Lean-Kanban approach is perhaps the fastest growing Agile Methodology in software engineering. At the same time Cloud Computing (CC) is a technological phenomenon that is becoming more and more important in these last years. In our opinion Small and Medium Enterprises (SMEs) can increase their competitiveness by taking advantage of CC, and we think that it is very important to study and assess its impact on SMEs’ management processes. In this paper we proposed an effective tool to support strategic initiatives to the software development for the companies that develop software using agile methodologies and distributed resources. We used System Dynamics to model and simulate the software development: it allowed us to highlight in a very efficient way the interaction among several factors present in the software project.

  • Chapter 60

    Video Processing for Motion Tracking of Safety Critical Systems Price 2.99  |  2.99 Rewards Points

    The authors have been developing a laboratory for teaching safety critical software development. The laboratory currently utilizes an HO model train system, which provides for easy understanding of the operational and safety requirements. In earlier years, mechanical, magnetic and optical sensors have been used to provide location data to the scheduling and safety software. However, this approach has grown to the level that over 1000 wire segments need to be maintained for correct operation. This paper discusses the use of video tracking software to significantly reduce the number of electrical contacts subject to failure, and to provide more flexibility to the system as the track layout changes.

  • Chapter 61

    Strengthening Interrupt Controls in Embedded Systems by Cooperation between Windows CE and REMON Price 2.99  |  2.99 Rewards Points

    Many recent embedded system products have sophisticated display functions. Microsoft Windows Embedded CE (hereafter referred to as ‘Windows CE’) is a widely used embedded OS with a simple GUI design. However, Windows CE has threaded interrupt processes, and therefore it has problems in handling processes for which a strict interrupt response time is requested. We have developed Real-Time Embedded Monitor (REMON) for controlling Interrupt Service Routine (ISR) processes. When using REMON, it is possible to improve the real-time characteristics of the interrupt processes. This paper proposes a system that combines Windows CE and REMON and utilizes the advantages of both to create an embedded system having both sophisticated display functionality and excellent responsiveness to interrupts.

  • Chapter 62

    Independent Verification and Validation of Software for Weapon Management System of a High Performance Aircraft Price 2.99  |  2.99 Rewards Points

    The failure of safety critical embedded software is unacceptable be it for safety, security or economic reasons. The risk of software failure in complex embedded systems is overcome by using the Independent Verification and Validation (IV&V) technique. The process of IV&V and its planning needs to be initiated early in the development life cycle of the weapon management system for a high performance aircraft. In the present context, the aircraft has so far achieved successful integration and release of Air-to- Ground weapons and Air-to-Air close combat missiles. The above functionalities are achieved by complex embedded software systems which constitute the weapon management system for which advanced IV&V techniques have been used to remove errors during development phase. The methodology used for performing IV&V of software for weapon management system has been discussed in this paper.

  • Chapter 63

    An Effective Method to Test Sensor Applications Price 2.99  |  2.99 Rewards Points

    The common way of testing sensor application is to build a test board, connect sensors to the board, and test sensor applications on the board. This paper introduced the problem of existing approach to test sensor applications, and proposed our approach to solve it. In the existing approach, it’s impossible to apply the techniques of automatic test data generation. In other words, users cannot manage test data of sensor applications. This paper proposed sensor reading generator through which users can manage test data.

  • Chapter 64

    Towards Cycle-Accurate Performance Predictions for Real-Time Embedded Systems Price 2.99  |  2.99 Rewards Points

    In this paper we present a model-based performance analysis method for component-based real-time systems, featuring cycle-accurate predictions of latencies and enhanced system robustness. The method incorporates the following phases: (a) instruction-level profiling of SW components, (b) modeling the obtained performance metrics in MARTEcompatible models, (c) generation, schedulability analysis and simulation of a system model, (d) architecture improvement based on the analysis results. Our proposed method incorporates both the schedulability analysis and the simulation technique, complementing the advantages and eliminating the limitations of the individual steps. Moreover, the cycle-accurate performance metrics initiated by our method lead to accurate performance predictions for an autonomous navigation robot system, with only 6% deviation (or less) from the actual performance metrics.

  • Chapter 65

    A Study on Traceabilty for Model-based Testing of Automotive Embedded System Price 2.99  |  2.99 Rewards Points

    Traceability is a potential ability for traces to be established and used. Traceability is thereby an attribute of a source, a traget and trace links. 

  • Chapter 66

    Emerging and Innovative Techniques and Methodology in Software Engineering for Systems Maintenance and Development Price 2.99  |  2.99 Rewards Points

    When undertaking a substantial upgrade to a heavily used, widely distributed network, it is important to have a realistic status of the system at all times to ensure all resources required are available and in place. Our previous research examined the utility of atomic and information theory metrics to identify potential risks and predict project progress to completion. These metrics were derived from an information system inventory database.

  • Chapter 67

    Novel Visual and Analytical Methods in Repurposing Legacy Scientific Code A Case Study Price 2.99  |  2.99 Rewards Points

    Scientific computing is dominated by team authored legacy code that has evolved over decades with the purpose of capturing the evolving understanding of a scientific discipline. Accumulated deprecated code, various optimization techniques, and evolving algorithms lead to convoluted source code that is impractical to reverse engineer using mainstream methods.

  • Chapter 68

    Use of Closures to Engineer Software for a Family of Numerical Simulation Models Price 2.99  |  2.99 Rewards Points

    Closures offer powerful capabilities for encapsulating adaptive parts of a simulation program into dynamical data structures. We investigate the use of closure mechanisms for managing different simulation models in a lattice simulation framework implemented in both the Java and Groovy programming languages. We present results based on compiled Java with fixed model definitions as well as with user input of models at runtime expressed in dynamical Groovy. We discuss performance and other tradeoff issues as well as the potential for highly compact and reusable software components in what would otherwise be quite a complex software system.

  • Chapter 69

    A Case Study in the Model-Driven Development of CorkBoard a WebApp for Collaborative Work Price 2.99  |  2.99 Rewards Points

    We report on the model-driven development of CorkBoard - a project designed to provide a mechanism for small groups of persons to work collaboratively. We narrowed the most important software functions that a group would need for project success to: notification, communication, organization, accountability, and management. By focusing on these five topics, we believed we could create a WebApp that would serve as a positive environment for a group and facilitate the process of achieving success. Ultimately, we gained invaluable knowledge and experience in planning, estimation, scheduling, settings goals, meeting deadlines, and working in teams through the progression of the CorkBoard project. We present our results and lessons learned in the process

  • Chapter 70

    An Object Oriented Runtime Complexity Metric based on Iterative Decision Points Price 2.99  |  2.99 Rewards Points

    Software metrics are used to measure the quality of a software system. Such metrics indicate the level of desired quality present in a system. However software metrics have traditionally been captured at compile time, rendering useful results, but often times inexact, as the complete source code differs from the executing subset. For this reason, static metrics can fall short of measuring the true operational behavior of object oriented programs.

  • Chapter 71

    The Influence of Human Aspects in Software Process Improvement: a Brazilian Public Company Study Price 2.99  |  2.99 Rewards Points

    This study discusses issues related to factors that can influence the success of Software Process Improvement (SPI) initiatives and seeks to contribute to the understanding of these factors, focusing especially on human aspects in the adoption of these initiatives. The study is quantitative, based on a survey approach, and was conducted at a public information technology (IT) company that aims at reaching Maturity Level G of the MRMPS- SW Model (Reference Model for Brazilian Software Process Improvement). The results are analyzed taking into account four basic hypotheses, organized based on four human factor categories: inertia and resistance to negative experiences; lack of evidence of benefits; imposition; and, restricted resources

  • Chapter 72

    Methodology for Ontology Development in Support to the MPS Model for Software Price 2.99  |  2.99 Rewards Points

    This paper proposes the use of enterprise ontology’s as a complementary tool to support the adoption of software process quality models. The model selected for this work was the Reference Model MPS for software development (RM-MPSSW), which is part of the Brazilian Software Process Improvement Program (MPS.BR). The RM-MPS-SW was developed focusing micro, small and medium-sized enterprises (MSMEs), although it is completely suited to large organizations. In this context, this work presents a methodology for the ontology development on the levels G and F of the RMMPS- SW. Concepts of the PMBOK (Project Management Body of Knowledge) are included to support adherence to its principle by software companies. The inclusion of BSC (Balanced Scorecard) indicators approximates the model with the strategic planning of the company. The intention is that this methodology can be used as a basis for the representation of the other MPSSW levels and other software process models.

  • Chapter 73

    A Method and a Tool for Evaluating the Quality of an SOA Price 2.99  |  2.99 Rewards Points

    During these last years, Service Oriented Architecture (SOA) has known a meteoric rise and more and more companies are lured by this technology and its strengths (reusability, costs benefits and productivity increase) because of an improved control of the business expectations. This technology could bring a lot of benefits but there may also appear some major complications while disrupting the company organization to adopt it.

  • Chapter 74

    Training Users of Accounting Information Systems for their Satisfaction, Decision-making, and Competitiveness Price 2.99  |  2.99 Rewards Points

    Information technologies are rapidly changing the world. Therefore, more scientific research that can contribute to the development of our understanding regarding information technology is needed. In particular, research that addresses the role of accounting information systems is urgently needed as financial problems in all types of organizations are common worldwide. For this reason, this research is aimed at determining the impact that training in the operation of Accounting Information Systems has on their users regarding Satisfaction, Decision-making, and Competitiveness. A questionnaire was administered to 92 users. The positive impact that training has on competitiveness (financial performance, market share and customer satisfaction) is highlighted.

  • Chapter 75

    Dynamic Registration Forms Price 2.99  |  2.99 Rewards Points

    User registration for events has been made easier via the use of web applications. Similarly, administrative systems often accompany them providing event coordinators with the ability to manage the registration data of users who register via web form. Many web applications that exist make the management of registered users' data easier to manage. However, the creation of unique registration forms for each new event is often lacking in most systems; this often places undue stress on companies and organizations providing the online registrations, requiring significant development time to create unique registration forms.

  • Chapter 76

    Software Reuse: The State of Art Price 2.99  |  2.99 Rewards Points

    This paper surveys the different approaches to software reuse found in the research literature. It describes and compares the different approaches and makes generalizations about the field of software reuse.

  • Chapter 77

    Empirical Validate C&K Suite for Predict Fault-Proneness of Object-Oriented Classes Developed Using Fuzzy Logic Price 2.99  |  2.99 Rewards Points

    Empirical validation of software metrics suites to predict fault proneness in object-oriented (OO) components is essential to ensure their accuracy in practical industrial. In this paper, we empirically validate the Chidamber and Kemerer (CK) metrics suite metrics for their ability to predict software quality in terms of fault-proneness: we explore the ability of these metrics suites to predict fault-prone classes using defect data for six versions of Rhino, an open-source implementation of JavaScript written in Java.

  • Chapter 78

    Template Generation in a Tiered Architecture - Practical C# class templates from DDL statements Price 2.99  |  2.99 Rewards Points

    Business applications are often written as tiered applications with tiers dedicated to presentation, business logic, and data access. Much research has been done to show the benefits of structuring applications with tiered abstractions, but this process often means developers spend considerable time creating similar abstractions for different business and data objects. In this paper, we present an application that performs automated code generation by parsing T-SQL DDL statements to create stored procedures and C# .NET data access classes, and classes to mimic business logic templates. Our research showed that by using this application some of the mundane tasks programmers who write multi-tiered applications face could be automated.

  • Chapter 79

    The Proposal of Smart Phone Camera Application Which Realize a Person's Super Deformation Price 2.99  |  2.99 Rewards Points

    Today, Japanese animation is a digital contents which represents Japan, and it become worldwide that me really proud of. Also, Print Club (Purikura), the picture taking machine which you could add some hand drawing or grafttii, and “unique effect camera app” become really popular in Japan. So we know there are some market of add effect picture. In this paper, we propose the camera app which makes two heads high picture of person as a effect. By this system, you could take two heads high picture pretty easy without using any special systems.

  • Chapter 80

    An Interface Generator For Customizable Fuzzy Expert System Price 2.99  |  2.99 Rewards Points

    The Interface Generator is a tool which allows user to define an interface by input some information and generates the data input interface for defined fuzzy expert system. Testing shows that it can successfully accept and store interface definitions from users and dynamically generate the data input interface for defined fuzzy expert system.

  • Chapter 81

    Lessons Learned: Porting Java Applications to Android Price 2.99  |  2.99 Rewards Points

    Android has become the world’s most popular mobile platform. It provides a very powerful Android runtime and application framework that enable application developers to efficiently create innovative and feature-rich apps in Java. This attribute is very attractive to application developers who are familiar with Java and who may wish to port some existing Java applications to Android. However, there are significant differences between Android’s Java and the Java SE environments

About the Author

[email protected] Phone: 617-989-4142 Campus Address: 145 Dobbs Hall view complete profile

Professor of Computer Science view complete profile

The University of Georgia (Tbilisi) · Physics Department. Spacial Department view complete profile

Tags

Other Books by Author