{"title":"用户文档的逆向工程:试点研究","authors":"G. Reece","doi":"10.1109/IPCC.1997.637076","DOIUrl":null,"url":null,"abstract":"The incorporation of instructional design (ID) strategies into user software documents is investigated, and a new, reverse engineering-based, approach to the problem of determining the ID strategies that are used in the production of documents is presented. This approach disassembles the document into its individual components and relationships then uses that information to construct a high-level model of the document specification and identify the methods used to construct the document. An initial pilot study that tests the implementation of the method is also presented. In that study, responses from a selected group of evaluators are used to perform the reverse engineering of two documents for word processing programs, and a possible statistical analysis of the results is examined.","PeriodicalId":255103,"journal":{"name":"Proceedings of IPCC 97. Communication","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1997-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Reverse engineering of user documents: a pilot study\",\"authors\":\"G. Reece\",\"doi\":\"10.1109/IPCC.1997.637076\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The incorporation of instructional design (ID) strategies into user software documents is investigated, and a new, reverse engineering-based, approach to the problem of determining the ID strategies that are used in the production of documents is presented. This approach disassembles the document into its individual components and relationships then uses that information to construct a high-level model of the document specification and identify the methods used to construct the document. An initial pilot study that tests the implementation of the method is also presented. In that study, responses from a selected group of evaluators are used to perform the reverse engineering of two documents for word processing programs, and a possible statistical analysis of the results is examined.\",\"PeriodicalId\":255103,\"journal\":{\"name\":\"Proceedings of IPCC 97. Communication\",\"volume\":\"70 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1997-10-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of IPCC 97. Communication\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IPCC.1997.637076\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of IPCC 97. Communication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IPCC.1997.637076","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Reverse engineering of user documents: a pilot study
The incorporation of instructional design (ID) strategies into user software documents is investigated, and a new, reverse engineering-based, approach to the problem of determining the ID strategies that are used in the production of documents is presented. This approach disassembles the document into its individual components and relationships then uses that information to construct a high-level model of the document specification and identify the methods used to construct the document. An initial pilot study that tests the implementation of the method is also presented. In that study, responses from a selected group of evaluators are used to perform the reverse engineering of two documents for word processing programs, and a possible statistical analysis of the results is examined.