2009 Sixth International Conference on Information Technology: New Generations最新文献

筛选
英文 中文
Learning Outcomes for an Introductory Database Project 入门数据库项目的学习成果
Jeff Pittges, R. Phillips, P. Uppuluri
{"title":"Learning Outcomes for an Introductory Database Project","authors":"Jeff Pittges, R. Phillips, P. Uppuluri","doi":"10.1109/ITNG.2009.308","DOIUrl":"https://doi.org/10.1109/ITNG.2009.308","url":null,"abstract":"As rapid advances in database technology compel the database community to expand the breadth of introductory topics, a new generation of database education may emerge. However, the introductory database project must continue to reinforce the fundamental concepts and principles of database systems. This paper defines a set of learning outcomes for an introductory database project, identifies five key project elements, describes a set of assignments that illustrate how the key elements achieve the learning outcomes, and presents results from a project used extensively at Radford University.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125197690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using Scaffolding to Improve Written Communication of Software Engineering Students 利用脚手架提高软件工程专业学生的书面交流能力
G. Hislop, H. Ellis
{"title":"Using Scaffolding to Improve Written Communication of Software Engineering Students","authors":"G. Hislop, H. Ellis","doi":"10.1109/ITNG.2009.31","DOIUrl":"https://doi.org/10.1109/ITNG.2009.31","url":null,"abstract":"The complexity and scale of modern software systems require that such software be developed by teams. Good communication skills are critical to the success of software development efforts. However, software engineering students typically have little experience in conveying information in a clear, complete, and unambiguous manner. In this paper we describe the use of document templates as a way to provide infrastructure to students to help them understand and better communicate software engineering information. We begin by discussing scaffolding for learning and then describe the template approach. We outline the use of templates at two different academic institutions and then discuss the benefits and drawbacks of using templates to scaffold student software engineering learning.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122848709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Supporting Video Multicast in Wireless Ad Hoc Networks Using Multiple Paths and Multiple Description Coding 利用多路径和多描述编码支持无线自组织网络中的视频组播
Osamah. S. Badarneh, M. Kadoch, A. Elhakeem
{"title":"Supporting Video Multicast in Wireless Ad Hoc Networks Using Multiple Paths and Multiple Description Coding","authors":"Osamah. S. Badarneh, M. Kadoch, A. Elhakeem","doi":"10.1109/ITNG.2009.132","DOIUrl":"https://doi.org/10.1109/ITNG.2009.132","url":null,"abstract":"Multiple Description Coding (MDC) generates multiple independent bit-streams, where the multiple bitstreams are referred to as MD (multiple descriptions). Moreover, MDC enables a useful reproduction of the signal when any description is received correctly. In this paper, a heuristic multicast algorithm that exploits this salient property of MDC along with multiple disjoint paths for improving the user’s satisfaction for a group of heterogeneous destinations in wireless ad hoc networks is proposed. Simulation results demonstrated the effectiveness of the proposed algorithm in improving the user’s satisfaction irrespective of the number of destinations in the multicast group.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"307 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121743643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Agent-Oriented Source-Level Debugger on Top of a Monitoring Framework 监视框架之上的面向代理的源代码级调试器
Ziad Al-Sharif, C. Jeffery
{"title":"An Agent-Oriented Source-Level Debugger on Top of a Monitoring Framework","authors":"Ziad Al-Sharif, C. Jeffery","doi":"10.1109/ITNG.2009.305","DOIUrl":"https://doi.org/10.1109/ITNG.2009.305","url":null,"abstract":"Standard debuggers are usually limited in the amount of analysis that they perform in order to assist with debugging. This paper presents UDB, an agent-oriented source-level debugger for the Unicon programming language with a novel architecture and capabilities. UDB combines classical debugging techniques such as those found in GDB with a growing set of extension agents. The paper tests three hypotheses: 1) a source-level debugger built on top of a monitoring framework can surpass ordinary debuggers with more debugging capabilities, 2) a debugger based on a high-level monitoring framework allows easier and more efficient agent-based extension, and 3) an agent-oriented debugger is easier to extend on the fly with new agents that utilize automatic debugging and dynamic analysis techniques","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128103558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Google Scholar's Ranking Algorithm: The Impact of Articles' Age (An Empirical Study) Google Scholar排名算法:文章年龄的影响(一项实证研究)
J. Beel, Bela Gipp
{"title":"Google Scholar's Ranking Algorithm: The Impact of Articles' Age (An Empirical Study)","authors":"J. Beel, Bela Gipp","doi":"10.1109/ITNG.2009.317","DOIUrl":"https://doi.org/10.1109/ITNG.2009.317","url":null,"abstract":"Google Scholar is one of the major academic search engines but its ranking algorithm for academic articles is unknown. In recent studies we partly reverse-engineered the algorithm. This paper presents the results of our third study. While the first study provided a broad overview and the second study focused on researching the impact of citation counts, the current study focused on analyzing the correlation of an article’s age and its ranking in Google Scholar. In other words, it was analyzed if older/recent published articles are more/less likely to appear in a top position in Google Scholar’s result lists. For our study, age and rankings of 1,099,749 articles retrieved via 2,100 search queries were analyzed. The analysis revealed that an article’s age seems to play no significant role in Google Scholar’s ranking algorithm. It is also discussed why this might lead to a suboptimal ranking.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132781436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Outlier Detection in Spatial Databases Using Clustering Data Mining 基于聚类数据挖掘的空间数据库离群点检测
Amitava Karmaker, Syed M. Rahman
{"title":"Outlier Detection in Spatial Databases Using Clustering Data Mining","authors":"Amitava Karmaker, Syed M. Rahman","doi":"10.1109/ITNG.2009.198","DOIUrl":"https://doi.org/10.1109/ITNG.2009.198","url":null,"abstract":"Data mining refers to extracting or “mining” knowledge from large amounts of data. Thus, it plays an important role in extracting spatial patterns and features. It is an essential process where intelligent methods are applied in order to extract data patterns. In this paper, we have proposed a technique with which it is possible to detect whether a given data set is erroneous. Furthermore, our technique locates the possible errors and comprehends the pattern of errors to minimize outliers. Finally, it ensures the integrity and correctness of large databases. We have made use of some of the existing clustering algorithms (like PAM, CLARA, CLARANS) to formulate our proposed technique. The proposed outlier detection and minimization method is simpler to implement, efficient comparing with respect to both time and memory complexity than other existing methods.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133445235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Teaching Software Design Using a Case Study on Model Transformation 教学软件设计——以模型转换为例
Yanxia Jia, Yonglei Tao
{"title":"Teaching Software Design Using a Case Study on Model Transformation","authors":"Yanxia Jia, Yonglei Tao","doi":"10.1109/ITNG.2009.114","DOIUrl":"https://doi.org/10.1109/ITNG.2009.114","url":null,"abstract":"Modeling is a fundamental concept in software engineering. While model evolution is an essential topic due to the popularity of object-oriented design and iterative development, model transformation has not received adequate attention in the software engineering education community. Model transformation involves a change of the viewpoint from which a design problem is viewed and a change of the structure of the design model. As such, it makes possible for instructors to underscore important design concepts. We in this paper present a case study on model transformation. Initial classroom use of the case study demonstrated that model transformation is a worthy topic and can offer students a unique learning experience which might not be easily achievable otherwise.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133986210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Virtual Globe on the Android - Remote vs. Local Rendering Android上的虚拟地球-远程与本地渲染
M. Sterk, Mariano Agustin Cecowski Palacio
{"title":"Virtual Globe on the Android - Remote vs. Local Rendering","authors":"M. Sterk, Mariano Agustin Cecowski Palacio","doi":"10.1109/ITNG.2009.258","DOIUrl":"https://doi.org/10.1109/ITNG.2009.258","url":null,"abstract":"Two approaches are presented and compared for developing a lightweight three-dimensional terrain visualization, i.e. virtual globe application, for mobile devices. Android was chosen as the target platform. The first approach relies completely on remote rendering by a rendering server running NASA WorldWind Java SDK, and streaming the resulting frames to the mobile client. The second approach uses a scaled-down version of the geographical data to locally render a small area, and displays the rest of the visible landscape with an impostor box. Visual quality and network requirements of both versions are studied and compared to the full version of the WorldWind Java SDK.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134519392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
T-PIM: Trusted Password Input Method against Data Stealing Malware T-PIM:可信密码输入法防止数据窃取恶意软件
Manabu Hirano, Tomohiro Umeda, T. Okuda, Eiji Kawai, S. Yamaguchi
{"title":"T-PIM: Trusted Password Input Method against Data Stealing Malware","authors":"Manabu Hirano, Tomohiro Umeda, T. Okuda, Eiji Kawai, S. Yamaguchi","doi":"10.1109/ITNG.2009.35","DOIUrl":"https://doi.org/10.1109/ITNG.2009.35","url":null,"abstract":"Internet-based financial services like online shopping and online banking have become popular in the past several years. However, most end-user's environments constructed on existing operating systems always face a threat of malware like keylogger and screenlogger. Especially, conventional anti-virus technology cannot prevent a new type of hypervisor-based stealth viruses yet. This paper proposes a novel password protection mechanism called T-PIM (Trusted Password Input Method). Proposed T-PIM mechanism provides a secure password input method to users. Our proposal employs a hypervisor to isolate a trusted domain. This paper shows a design, a prototype implementation, and results of a performance measurement. We discuss security and usability of proposed T-PIM mechanism, preventable and unpreventable attacks, and comparison with conventional measures against data stealing malware.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"316 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133800056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
DASIMA: A Flexible Management Middleware in Multi-Scale Contexts DASIMA:多尺度环境中的灵活管理中间件
M. Kessis, C. Roncancio, A. Lefebvre
{"title":"DASIMA: A Flexible Management Middleware in Multi-Scale Contexts","authors":"M. Kessis, C. Roncancio, A. Lefebvre","doi":"10.1109/ITNG.2009.338","DOIUrl":"https://doi.org/10.1109/ITNG.2009.338","url":null,"abstract":"Tiny devices, smart objects, home gateways, sensor networks, have become an integral part of our everyday life and of our socio-economic ecosystem. However their large number, their distribution and their volatility andheterogeneity make their management fiendishly complex. Traditional management systems, that are mainly ad-hoc or centralized, reach their limits in such complex management contexts. This paper introduces our responseto overcome these difficulties by proposing a flexible management middleware for multi-scale contexts. This middleware named DASIMA, implements a new approach combining domain-based and architecture-based management. DASIMA is a fully component-based management middleware intended to scale-up and down according to the number and the distribution of managedresources. This proposal breaks with current management paradigms mainly related to quite rigid and monolithic systems. DASIMA has been experimented in a real industrial application in the Machine to Machine (M2M) context. These experiments confirm the interest of developing adaptable middleware to manage networked systems in multi-scale contexts.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115052524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信