{"title":"Usability in software development: Frameworks comparison between IKnowU and user behavior analysis framework (UBAF)","authors":"N. A. Razak, Masitah Ghazali","doi":"10.1109/MYSEC.2011.6140693","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140693","url":null,"abstract":"Software engineering (SE) and human-computer interaction (HCI) are often regarded as two separate entities while the fact is the two share many similarities and should affect each other to produce a better product or software. In this paper, we compare two component frameworks that integrate both HCI and SE together. Our aim is to understand how each framework considers usability in the software development, and, to identify the strengths and weaknesses of both frameworks. The two component frameworks are IKnowU and UBAF. Comparison of these two frameworks can be useful for researchers as we can the four important criteria — model, architecture, usability work and process, that make of a framework which has usability as its paramount objective.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114886022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Negative selection algorithm in artificial immune system for spam detection","authors":"I. Idris, A. Selamat","doi":"10.1109/MYSEC.2011.6140701","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140701","url":null,"abstract":"Artificial immune system creates techniques that aim at developing immune based models. This was done by distinguishing self from non-self. Mathematical analysis exposed the computation and experimental description of the method and how it is applied to spam detection. This paper looked at evaluation and accuracy in spam detection within the negative selection algorithm. Preliminary result or classifier of self and non-self was carefully studied against mistake of assumption during email classification whereby an email was recognized as a spam and deleted or non-spam and accepted carelessly. This process is called false positive and false negative. Given a threshold, the accuracy increase with increased threshold to determine best performance of the spam detector. Also an improvement of the false positive rate was determined for better spam detector.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128536434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pair analysis of requirements in software engineering education","authors":"Kabas Albakry, M. Kamalrudin","doi":"10.1109/MYSEC.2011.6140641","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140641","url":null,"abstract":"Requirements Analysis and Design is found to be one of the crucial subjects in Software Engineering education. Students need to have deeper understanding before they could start to analyse and design the requirements, either using models or textual descriptions. However, the outcomes of their analysis are always vague and error-prone. We assume that this issue can be handled if “pair analysis” is conducted where all students are assigned with partners following the concept of pair-programming. To prove this, we have conducted a small preliminary evaluation to compare the outcomes of solo work and “pair analysis” work for three different groups of students. The performance, efficacy and students' satisfaction and confidence level are evaluated.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130961386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Panita Meananeatra, S. Rongviriyapanish, Taweesup Apiwattanapong
{"title":"Identifying refactoring through formal model based on data flow graph","authors":"Panita Meananeatra, S. Rongviriyapanish, Taweesup Apiwattanapong","doi":"10.1109/MYSEC.2011.6140653","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140653","url":null,"abstract":"Identifying refactoring is an important step of bad smell removal process. Many developers have problem identifying refactoring, e.g., novice developers are not sure which refactorings should be applied. Even skilled developers may need to spend a lot of time doing this manually. Identifying refactoring techniques can alleviate these problems for developers. In our previous work, we proposed refactoring filtering conditions (RFC) that identify candidate refactorings for removing long method bad smell. These conditions analyze internal structure inside a method with data flow analysis. Our research improves these RFC based on more refined data flow analysis and presents its formal description. This research also demonstrates an approach of using the improved RFC of three refactorings. Moreover, we conducted an experiment to compare the efficiency of the results of our approach with that of our previous work and that of developer suggestion.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129630813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service differentiation for collaborative caching query process in mobile database","authors":"M. Elfaki, H. Ibrahim, A. Mamat, M. Othman","doi":"10.1109/MYSEC.2011.6140711","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140711","url":null,"abstract":"With the dramatic explosion of the real time mobile application, mobile computing is undergoing a transition from a data communication infrastructure to a global information utility. Wireless phones, PDAs, laptop, and high-end workstation can be viewed as appliances that need to be plug-in to this utility for accessing the information. However, due to mobile limited resources, such as insufficient wireless bandwidth, disconnection and client's mobility, collaborative cache management faces vast challenges. One of these challenges is that all requests are processed in the same manner, as well as these requests are forwarded from hop to hop along the way towards the main database server while the requested data items are missed locally. However, these forward data requests might cause delay and increase the number of hops to serve the requests. This paper aims to study the resource management problem to support differentiated collaborative caching and content distribution services. We focus on the preferential of data exchange among neighbor's nodes to support priority-based caching services. Thus, the collaborative neighbors caching increased, and the cache hit within the system is increased indirectly while most of the requests are answered from the neighbor nodes collaboration instead of relying much on the main database server. The proposed model demonstrates its ability to provide quantifiable service differentiation in terms of increasing the percentage of answering the data item requests locally, with minimal efficiency penalties compared to existence collaborative caching models.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124278180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bahram Amini, R. Ibrahim, M. Othman, Hamid Rastegari
{"title":"Incorporating scholar's background knowledge into recommender system for digital libraries","authors":"Bahram Amini, R. Ibrahim, M. Othman, Hamid Rastegari","doi":"10.1109/MYSEC.2011.6140721","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140721","url":null,"abstract":"In recent years, recommender systems have received increasing attention in digital libraries since they assist scholars to find the most appropriate articles. However, a major problem of such systems is that they don't subsume user background knowledge into the recommendation process and scholars have to manually sift irrelevant articles obtained in response of queries. Therefore, a great challenging task is how to include scholar's knowledge into personalization process and filter out articles accordingly. To address this problem, a novel cascade recommender framework which incorporates scholar's background knowledge using ontological concepts into the user profiles is proposed. The framework exploits standard ODP structure as ontology modeling as well as lexicographic database (WordNet) for concept disambiguation. The primary experiment over CiteSeerX digital library indicates an increase in user satisfaction.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121640160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Engineering Curriculum: A systematic mapping study","authors":"Muhammad Manan Qadir, M. Usman","doi":"10.1109/MYSEC.2011.6140682","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140682","url":null,"abstract":"Software Engineering (SE) discipline has come a long way since the 1968 NATO conference when the term SE was first used. Lot of work has been done for developing and revising SE curriculum and body of knowledge (e.g. SE 2004, GSwE2009, SWEBOK efforts). Different universities are developing and revising SE program and curricula at graduate and undergraduate levels all over the world. Large number of SE curriculum related efforts are being published in conferences such as CSEET, FIE and REET etc. There is a need to see the state of the art of this abundant literature. In this paper, we report a systematic mapping study conducted to synthesize and aggregate the SE curriculum related reported efforts and to provide a broad overview of the area. Systematic mapping studies are performed to evaluate quantity and types of primary studies in an area of interest in an unbiased and systematic manner.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"291 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114383423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tanthawat Khemavast, Dirk Muthorst, Andreas Kinderreich, T. Anwar
{"title":"Architecting a plug-in based TSM client application","authors":"Tanthawat Khemavast, Dirk Muthorst, Andreas Kinderreich, T. Anwar","doi":"10.1109/MYSEC.2011.6140651","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140651","url":null,"abstract":"There were several existing KISTERS TSM Client Applications (TCA) which used the Time Series Management (TSM) system. Each application was developed using different technologies; these applications contained significant features and were important to the success of the operation. However, they posed a set of problems to the operation, including difficulty in adding a new feature and lack of integration. This paper describes how we have designed and implemented the new TCA including the problems we face. The new TCA is developed based on the Eclipse platform, which enables us to integrate every existing client application into a single and extendable application that can be run as a standalone application as well as a web application using the same source.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134046396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security backlog in Scrum security practices","authors":"Zulkarnain Azham, I. Ghani, Norafida Ithnin","doi":"10.1109/MYSEC.2011.6140708","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140708","url":null,"abstract":"The rapid development of software nowadays requires the high speed software product delivery by development teams. In order to deliver the product faster, the development teams make a transformation to their conventional software development lifecycle to agile development method which can enable them towards speedy delivery of software coping with the requirements-change phenomenon. In this scenario, one of the most popular techniques in Agile development is the Scrum methodology which has been criticised in term of its security aspect cycle that ignores the security risk management activity. However, the current practices suggest that security should be considered during all stages of the software development life cycle. In order to address the aforementioned issue, this paper proposes the integration of security principles in development phases using scrum and suggests the element of security backlog that can be used as security features analysis and implementation in scrum phases.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131139040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aimi Elliyana Rais, S. Sulaiman, Sharifah Mashita Syed-Mohamad
{"title":"Game-based approach and its feasibility to support the learning of object-oriented concepts and programming","authors":"Aimi Elliyana Rais, S. Sulaiman, Sharifah Mashita Syed-Mohamad","doi":"10.1109/MYSEC.2011.6140689","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140689","url":null,"abstract":"Object-oriented has been widely used in software development. Hence, learning object-oriented concepts is crucial in undergraduate Computer Science or Information Technology programs. Learning object-oriented programming requires high concentration to understand the whole concepts before embarking on the practical aspect. It could be difficult for some students especially novices. In addition, lecturers might not be able to explain the subject effectively due to many factors. This research aims to justify and investigate more aspects to support the understanding of object-oriented concepts through games. Game is one of the approaches that could attract students' attention and increases their focus in learning object-oriented theory and practice. This paper reports a feasibility study using a controlled experiment that investigated the effect of using games in learning object-oriented programming among Computer Science students. The findings show that learners prefer using game as compared to traditional approach of teaching. Based on the study, we propose a more effective game-based approach to support the students in learning object-oriented concepts and programming.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123602647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}