{"title":"Learning Outcomes for an Introductory Database Project","authors":"Jeff Pittges, R. Phillips, P. Uppuluri","doi":"10.1109/ITNG.2009.308","DOIUrl":"https://doi.org/10.1109/ITNG.2009.308","url":null,"abstract":"As rapid advances in database technology compel the database community to expand the breadth of introductory topics, a new generation of database education may emerge. However, the introductory database project must continue to reinforce the fundamental concepts and principles of database systems. This paper defines a set of learning outcomes for an introductory database project, identifies five key project elements, describes a set of assignments that illustrate how the key elements achieve the learning outcomes, and presents results from a project used extensively at Radford University.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125197690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Scaffolding to Improve Written Communication of Software Engineering Students","authors":"G. Hislop, H. Ellis","doi":"10.1109/ITNG.2009.31","DOIUrl":"https://doi.org/10.1109/ITNG.2009.31","url":null,"abstract":"The complexity and scale of modern software systems require that such software be developed by teams. Good communication skills are critical to the success of software development efforts. However, software engineering students typically have little experience in conveying information in a clear, complete, and unambiguous manner. In this paper we describe the use of document templates as a way to provide infrastructure to students to help them understand and better communicate software engineering information. We begin by discussing scaffolding for learning and then describe the template approach. We outline the use of templates at two different academic institutions and then discuss the benefits and drawbacks of using templates to scaffold student software engineering learning.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122848709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting Video Multicast in Wireless Ad Hoc Networks Using Multiple Paths and Multiple Description Coding","authors":"Osamah. S. Badarneh, M. Kadoch, A. Elhakeem","doi":"10.1109/ITNG.2009.132","DOIUrl":"https://doi.org/10.1109/ITNG.2009.132","url":null,"abstract":"Multiple Description Coding (MDC) generates multiple independent bit-streams, where the multiple bitstreams are referred to as MD (multiple descriptions). Moreover, MDC enables a useful reproduction of the signal when any description is received correctly. In this paper, a heuristic multicast algorithm that exploits this salient property of MDC along with multiple disjoint paths for improving the user’s satisfaction for a group of heterogeneous destinations in wireless ad hoc networks is proposed. Simulation results demonstrated the effectiveness of the proposed algorithm in improving the user’s satisfaction irrespective of the number of destinations in the multicast group.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"307 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121743643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Agent-Oriented Source-Level Debugger on Top of a Monitoring Framework","authors":"Ziad Al-Sharif, C. Jeffery","doi":"10.1109/ITNG.2009.305","DOIUrl":"https://doi.org/10.1109/ITNG.2009.305","url":null,"abstract":"Standard debuggers are usually limited in the amount of analysis that they perform in order to assist with debugging. This paper presents UDB, an agent-oriented source-level debugger for the Unicon programming language with a novel architecture and capabilities. UDB combines classical debugging techniques such as those found in GDB with a growing set of extension agents. The paper tests three hypotheses: 1) a source-level debugger built on top of a monitoring framework can surpass ordinary debuggers with more debugging capabilities, 2) a debugger based on a high-level monitoring framework allows easier and more efficient agent-based extension, and 3) an agent-oriented debugger is easier to extend on the fly with new agents that utilize automatic debugging and dynamic analysis techniques","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128103558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Google Scholar's Ranking Algorithm: The Impact of Articles' Age (An Empirical Study)","authors":"J. Beel, Bela Gipp","doi":"10.1109/ITNG.2009.317","DOIUrl":"https://doi.org/10.1109/ITNG.2009.317","url":null,"abstract":"Google Scholar is one of the major academic search engines but its ranking algorithm for academic articles is unknown. In recent studies we partly reverse-engineered the algorithm. This paper presents the results of our third study. While the first study provided a broad overview and the second study focused on researching the impact of citation counts, the current study focused on analyzing the correlation of an article’s age and its ranking in Google Scholar. In other words, it was analyzed if older/recent published articles are more/less likely to appear in a top position in Google Scholar’s result lists. For our study, age and rankings of 1,099,749 articles retrieved via 2,100 search queries were analyzed. The analysis revealed that an article’s age seems to play no significant role in Google Scholar’s ranking algorithm. It is also discussed why this might lead to a suboptimal ranking.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132781436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Outlier Detection in Spatial Databases Using Clustering Data Mining","authors":"Amitava Karmaker, Syed M. Rahman","doi":"10.1109/ITNG.2009.198","DOIUrl":"https://doi.org/10.1109/ITNG.2009.198","url":null,"abstract":"Data mining refers to extracting or “mining” knowledge from large amounts of data. Thus, it plays an important role in extracting spatial patterns and features. It is an essential process where intelligent methods are applied in order to extract data patterns. In this paper, we have proposed a technique with which it is possible to detect whether a given data set is erroneous. Furthermore, our technique locates the possible errors and comprehends the pattern of errors to minimize outliers. Finally, it ensures the integrity and correctness of large databases. We have made use of some of the existing clustering algorithms (like PAM, CLARA, CLARANS) to formulate our proposed technique. The proposed outlier detection and minimization method is simpler to implement, efficient comparing with respect to both time and memory complexity than other existing methods.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133445235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Teaching Software Design Using a Case Study on Model Transformation","authors":"Yanxia Jia, Yonglei Tao","doi":"10.1109/ITNG.2009.114","DOIUrl":"https://doi.org/10.1109/ITNG.2009.114","url":null,"abstract":"Modeling is a fundamental concept in software engineering. While model evolution is an essential topic due to the popularity of object-oriented design and iterative development, model transformation has not received adequate attention in the software engineering education community. Model transformation involves a change of the viewpoint from which a design problem is viewed and a change of the structure of the design model. As such, it makes possible for instructors to underscore important design concepts. We in this paper present a case study on model transformation. Initial classroom use of the case study demonstrated that model transformation is a worthy topic and can offer students a unique learning experience which might not be easily achievable otherwise.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133986210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual Globe on the Android - Remote vs. Local Rendering","authors":"M. Sterk, Mariano Agustin Cecowski Palacio","doi":"10.1109/ITNG.2009.258","DOIUrl":"https://doi.org/10.1109/ITNG.2009.258","url":null,"abstract":"Two approaches are presented and compared for developing a lightweight three-dimensional terrain visualization, i.e. virtual globe application, for mobile devices. Android was chosen as the target platform. The first approach relies completely on remote rendering by a rendering server running NASA WorldWind Java SDK, and streaming the resulting frames to the mobile client. The second approach uses a scaled-down version of the geographical data to locally render a small area, and displays the rest of the visible landscape with an impostor box. Visual quality and network requirements of both versions are studied and compared to the full version of the WorldWind Java SDK.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134519392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manabu Hirano, Tomohiro Umeda, T. Okuda, Eiji Kawai, S. Yamaguchi
{"title":"T-PIM: Trusted Password Input Method against Data Stealing Malware","authors":"Manabu Hirano, Tomohiro Umeda, T. Okuda, Eiji Kawai, S. Yamaguchi","doi":"10.1109/ITNG.2009.35","DOIUrl":"https://doi.org/10.1109/ITNG.2009.35","url":null,"abstract":"Internet-based financial services like online shopping and online banking have become popular in the past several years. However, most end-user's environments constructed on existing operating systems always face a threat of malware like keylogger and screenlogger. Especially, conventional anti-virus technology cannot prevent a new type of hypervisor-based stealth viruses yet. This paper proposes a novel password protection mechanism called T-PIM (Trusted Password Input Method). Proposed T-PIM mechanism provides a secure password input method to users. Our proposal employs a hypervisor to isolate a trusted domain. This paper shows a design, a prototype implementation, and results of a performance measurement. We discuss security and usability of proposed T-PIM mechanism, preventable and unpreventable attacks, and comparison with conventional measures against data stealing malware.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"316 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133800056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DASIMA: A Flexible Management Middleware in Multi-Scale Contexts","authors":"M. Kessis, C. Roncancio, A. Lefebvre","doi":"10.1109/ITNG.2009.338","DOIUrl":"https://doi.org/10.1109/ITNG.2009.338","url":null,"abstract":"Tiny devices, smart objects, home gateways, sensor networks, have become an integral part of our everyday life and of our socio-economic ecosystem. However their large number, their distribution and their volatility andheterogeneity make their management fiendishly complex. Traditional management systems, that are mainly ad-hoc or centralized, reach their limits in such complex management contexts. This paper introduces our responseto overcome these difficulties by proposing a flexible management middleware for multi-scale contexts. This middleware named DASIMA, implements a new approach combining domain-based and architecture-based management. DASIMA is a fully component-based management middleware intended to scale-up and down according to the number and the distribution of managedresources. This proposal breaks with current management paradigms mainly related to quite rigid and monolithic systems. DASIMA has been experimented in a real industrial application in the Machine to Machine (M2M) context. These experiments confirm the interest of developing adaptable middleware to manage networked systems in multi-scale contexts.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115052524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}