Top Favorites
Videos 41-60 of 286
 
18:35
 
18:35
 
18:35

Value-Based Software Engineering V2

S. Biffl, A.Aurum, B. Boehm, H. Erdogmus and P. Gr√ľnbacher (Eds.) Value-Based Software Engineering, Springer, Berlin-Heidelberg, 2006, pp.3-14, http://dx.doi.org/10.1007/3-540-29263-2_1

Added by: christianpi

Views: 682 | Comments: 0

 
19:27
 
19:27
 
19:27

Model-Driven Reverse Engineering (MDRE)

Spencer Rugaber, Kurt Stirewalt,

Added by: kevinhaghighat

Views: 12690 | Comments: 0

 
18:44
 
18:44
 
18:44

Model-Based Performance Risk Analysis

Cortellessa, V.; Goseva-Popstojanova, K.; Kalaivani Appukkutty; Guedem, A.R.; Hassan, A.; Elnaggar, R.; Abdelmoez, W.; Ammar, H.H. (January 2005), "Model-based performance risk analysis" Software Engineering, IEEE Transactions on Volume 31, Issue 1, Jan. 2005 Page(s): 3 - 20 DOI 10.1109/TSE.2005.12

Added by: a_steele

Views: 376 | Comments: 0

 
12:04
 
12:04
 
12:04

TMA 4 Presentation: Social Computing Privacy and Security

Computer and human interaction has evolved and reached new levels with the advent of social networks and social computing. This paper investigates challenges with social computing, particularly technical challenges around the collection and management of data, security and privacy and mobile social computing. The number of users of social computing systems has grown exponentially and managing all the data produced by all the users presents a monumental infrastructure challenge. Social computing organizations have deployed hundreds of thousands of servers to safely store and quickly retrieve data. Privacy and security manifest themselves in many different ways, a level of confidence in the organizations handling of private data is necessary to attract users. Organizations user privacy policy set the legal limits to what and organization intends and is allowed to do with a userís private info. Additionally an organization needs to protect the dataís confidentiality, availability and integrity from malicious hackers. Finally and organization needs to protect users from other users, mainly minor or vulnerable users from predators and bullies. Finally there is the challenge of mobile computing which introduces an extra dimension of physical space in addition to the time and content of all users data. With mobile computing users content is superimposed with time and space factors that draws a complete picture of a userís activities and the organization now needs to handle that extra dimension in all its system design, data management, and privacy challenges.

Added by: wchannaa

Views: 38407 | Comments: 0

 
19:07
 
19:07
 
19:07

The Golden Age of Software Architecture

Mary Shaw, Paul Clements,

Added by: esananthmu

Views: 1227 | Comments: 1

 
18:20
 
18:20
 
18:20

Asking & Answering Question during a Programming Task Change

Jonathan Sillito, Gail C. Murphy, Kris De Volder, "Asking and Answering Questions during a Programming Change Task," IEEE Transactions on Software Engineering, Vol. 34, No. 4, 2008, pp. 434-451, http://dx.doi.org/10.1109/TSE.2008.26

Added by: dipanda

Views: 462 | Comments: 0

 
18:02
 
18:02
 
18:02

Domain Specific Architecture

A. Suganthy and T. Chithralekha: ‚ÄúDomain-Specific Architecture for Software Agents‚ÄĚ, in Journal of Object Technology, vol. 7, no. 6, July-August 2008, pp. 77-100 http://www.jot.fm/issues/issue_2008_07/article2/

Added by: farzana

Views: 427 | Comments: 0

 
02:09
 
02:09
 
02:09

NPC in 3D Virtual Learning Environment - QuizMASter

Incorporating intelligence and social behaviours into virtual worlds for learning is becoming more desirable in making them smart, adaptive, personalized, and therefore, more effective and engaging. Realistic non-player controlled characters (NPCs) are essential of a game world and are making the virtual world more real for players. This is true in video games where more interactive NPCs support the story narrative of a game, making the game more immersive, more convincing, but it is also true in other areas where virtual worlds are used such as business and education, increasing the effectiveness of those environments. Research that has been done with virtual agents and multi-agent systems can be leveraged to create more realistic NPCs through purposeful communication channels, inter-agent interactions and environment-agent interactions for game-based learning applications. This research proposes an approach to controlling avatars with intelligent agents through the creation of an interface between a multi-agent system to a virtual world engine. Basic NPC behaviours controlled by agents using Jason AgentSpeak are used to test the feasibility of the approach. A QuizMASter scenario is described as a proof of concept of the use of such agent controlled avatars in educational context.

Added by: maiga

Views: 826 | Comments: 0

 
19:32
 
19:32
 
19:32

Measuring the Usability of Software Components

Citation: Bertoa, M. F., Troya, J. M., and Vallecillo, A., "Measuring the usability of software components," Journal of Systems and Software, vol. 79, no. 3, 2006, pp. 427-439. DOI= http://dx.doi.org/10.1016/j.jss.2005.06.026

Added by: wszeto

Views: 462 | Comments: 0

 
20:10
 
20:10
 
20:10

Toward A Taxonomy of Software Change

A presentation that reviews a software change classification and categorization method.

Added by: under_score

Views: 770 | Comments: 0

 
11:36
 
11:36
 
11:36

Context Aware Application Development Using the Android Development Kit for Inexperienced Programmers

In this paper we discuss the experience of developing a context aware application for an Android device using the Android development kit. Using the technologies available in mobile devices like smart phones, we can leverage GPS, Bluetooth, Wi-Fi, and other methods to provide ubiquitous computing/learning so a user can obtain content anywhere and anytime they want while the content being delivered to them is context aware of the learnerís location. This opens up possibilities for ubiquitous computing and also learning opportunities. In this paper, we will look at whether an inexperienced programmer is able to develop a basic context aware application with the short time period of three to four weeks.

Added by: airken888

Views: 3109 | Comments: 0

 
20:01
 
20:01
 
20:01

New Frontiers of Reverse Engineering

Gerardo Canfora, Massimiliano Di Penta, New Frontiers of Reverse Engineering, 2007 Future of Software Engineering, p.326-341, May 23-25, 2007 [doi>10.1109/FOSE.2007.15] DOI Bookmark: http://dx.doi.org/10.1109/FOSE.2007.15

Added by: grantm

Views: 427 | Comments: 0

 
19:23
 
19:23
 
19:23

Assigning tasks in a 24-h software development model.

Link to the original paper: http://dx.doi.org/10.1016/j.jss.2005.06.040 Reference: Pankaj Jalote, Gourav Jain,

Added by: sinthu2005

Views: 356 | Comments: 0

 
00:15.94
 
00:15.94
 
00:15.94

Enabling Collaboration in Distributed Requirements Managemen

Sinha, V., B. Sengupta and S. Chandra (2006),

Added by: dbkattel

Views: 794 | Comments: 0

 
20:44
 
20:44
 
20:44

Enabling Collaboration in Distributed Requirements Managemen

Sinha, V., B. Sengupta and S. Chandra (2006),

Added by: dbkattel

Views: 463 | Comments: 0

 
17:29
 
17:29
 
17:29

A Case Study: Introducing eXtreme Programming

Ann Fruhling, Patrick McDonald and Christopher Dunbar,

Added by: jblair99

Views: 404 | Comments: 0

 
18:56
 
18:56
 
18:56

A Research Agenda for Distributed Software Development

Sengupta, B., Chandra, S., and Sinha, V.,

Added by: twang

Views: 360 | Comments: 0

 
03:58
 
03:58
 
03:58

Intelligent Agent Controlled NPCs in 3D Virtual Learning Environment

Incorporating intelligence and social behaviours into virtual worlds for learning is becoming more desirable in making them smart, adaptive, personalized, and therefore, more effective and engaging. Realistic non-player controlled characters (NPCs) are essential of a game world and are making the virtual world more real for players. This is true in video games where more interactive NPCs support the story narrative of a game, making the game more immersive, more convincing, but it is also true in other areas where virtual worlds are used such as business and education, increasing the effectiveness of those environments. Research that has been done with virtual agents and multi-agent systems can be leveraged to create more realistic NPCs through purposeful communication channels, inter-agent interactions and environment-agent interactions for game-based learning applications. This research proposes an approach to controlling avatars with intelligent agents through the creation of an interface between a multi-agent system to a virtual world engine. Basic NPC behaviours controlled by agents using Jason AgentSpeak are used to test the feasibility of the approach. A QuizMASter scenario is described as a proof of concept of the use of such agent controlled avatars in educational context.

Added by: maiga

Views: 1102 | Comments: 0

 
19:57
 
19:57
 
19:57

A Soft-Structured Agile Framework for Larger Scale Systems D

Soundararajan, Shvetha; Arthur, James D.,

Added by: Steven

Views: 708 | Comments: 0

 
21:15
 
21:15
 
21:15

Linking Model-Driven Development and Software Architecture:

Mattsson , A.; Lundell , B.; Lings, B.; Fitzgerald, B.; (2009, January) ‚ÄúLinking Model-Driven Development and Software Architecture: A Case Study‚ÄĚ, IEEE Transactions on Software Engineering, Volume 35,Issue 1,Jan.-Feb. 2009 Page(s):83 ‚Äď 93, http://dx.doi.org/10.1109/TSE.2008.87

Added by: Tonysoftca

Views: 4077 | Comments: 0