Quality Attribute-Driven Software Architecture of a Pervasive Multimodal Computing System

[1]  Sebastián Ventura,et al.  Data mining in course management systems: Moodle case study and tutorial , 2008, Comput. Educ..

[2]  Louis Leung,et al.  Unwillingness-to-communicate and college students' motives in SMS mobile messaging , 2007, Telematics Informatics.

[3]  Rvb Below the fold , 1998, The Lancet.

[4]  Yoav Raz,et al.  Concurrency Control in B+-Trees Databases Using Preparatory Operations , 1985, VLDB.

[5]  J. A. Obrien Management Information System , 2004 .

[6]  Colin Baskin,et al.  ICT integration in schools: Where are we now and what comes next? , 2006 .

[7]  Alfred V. Aho,et al.  Data Structures and Algorithms , 1983 .

[8]  Giovanni Toffetti Carughi Modeling Data-intensive Rich Internet Applications with Server Push Support , 2007, MDWE.

[9]  David Garlan,et al.  Architectural Styles, Design Patterns, And Objects , 1997, IEEE Softw..

[10]  Leonard J. Bass,et al.  Designing software architectures to achieve quality attribute requirements , 2005, IEE Proc. Softw..

[11]  Ignacio Pajón Leyra Anywhere, Anytime , 2007 .

[12]  Michael R. Lyu,et al.  Framework for modeling software reliability, using various testing-efforts and fault-detection rates , 2001, IEEE Trans. Reliab..

[13]  Hussein Zedan,et al.  Why Moodle , 2008, 2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems.

[14]  Vanessa A. Cooper,et al.  E-Readiness to G-Readiness: Developing a Green Information Technology Readiness Framework , 2008 .

[15]  Mohammad Ubaidullah Bokhari,et al.  SOFTWARE RELIABILITY GROWTH MODELING FOR EXPONENTIATED WEIBULL FUNCTION WITH ACTUAL SOFTWARE FAILURES DATA , 2007 .

[16]  Simson L. Garfinkel,et al.  How to make secure email easier to use , 2005, CHI.

[17]  Edmund K. Burke,et al.  Practice and Theory of Automated Timetabling III , 2001, Lecture Notes in Computer Science.

[18]  Shigeru Yamada,et al.  Test-effort dependent software reliability measurement , 1991 .

[19]  Dharma P. Agrawal,et al.  WAP: Present and Future , 2003, IEEE Pervasive Comput..

[20]  Fiona Fui-Hoon Nah,et al.  Mobile technology in education: uses and benefits , 2007, Int. J. Mob. Learn. Organisation.

[21]  Mohammad Ubaidullah Bokhari,et al.  Analysis of a software reliability growth models: the case of log-logistic test-effort function , 2006 .

[22]  Moshe Tennenholtz,et al.  Ranking systems: the PageRank axioms , 2005, EC '05.

[23]  T. H. Tse,et al.  A Tale of Clouds: Paradigm Comparisons and Some Thoughts on Research Issues , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[24]  Rudolf Bayer,et al.  Symmetric binary B-Trees: Data structure and maintenance algorithms , 1972, Acta Informatica.

[25]  Ho-Won Jung,et al.  Optimizing Value and Cost in Requirements Analysis , 1998, IEEE Softw..

[26]  Alok Aggarwal,et al.  The input/output complexity of sorting and related problems , 1988, CACM.

[27]  Shigeru Yamada,et al.  Software Reliability Growth Models with Testing-Effort , 1986, IEEE Transactions on Reliability.

[28]  John D. Musa,et al.  A theory of software reliability and its application , 1975, IEEE Transactions on Software Engineering.

[29]  Beynon-DaviesP.,et al.  Rapid application development (RAD) , 1999 .

[30]  Tore Dybå,et al.  Empirical studies of agile software development: A systematic review , 2008, Inf. Softw. Technol..

[31]  Claude Lemaréchal,et al.  Lagrangian Relaxation , 2000, Computational Combinatorial Optimization.

[32]  Mary Beth Rosson,et al.  Looking for trouble: understanding end-user security management , 2007, CHIMIT '07.

[33]  Paul Dourish,et al.  Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.

[34]  Liam O'Brien,et al.  Moving towards quality attribute driven software architecture reconstruction , 2003, 10th Working Conference on Reverse Engineering, 2003. WCRE 2003. Proceedings..

[35]  William Puech,et al.  Analysis and Cryptanalysis of a Selective Encryption Method for JPEG Images , 2007, Eighth International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS '07).

[36]  Douglas Comer,et al.  Ubiquitous B-Tree , 1979, CSUR.

[37]  Günther Ruhe,et al.  Hybrid Intelligence in Software Release Planning , 2004, Int. J. Hybrid Intell. Syst..

[38]  Paul Brett,et al.  An investigation into students' use of a computer-based social learning space: lessons for facilitating collaborative approaches to learning , 2005, Br. J. Educ. Technol..

[39]  J. H. ter Bekke Semantic data modeling , 1992 .

[40]  Mahadev Satyanarayanan,et al.  Mobile Information Access , 1996 .

[41]  Günther Ruhe,et al.  Software release planning for evolving systems , 2005, Innovations in Systems and Software Engineering.

[42]  Shigeru Yamada,et al.  Software Reliability Models , 2002 .

[43]  Steel T. Huang,et al.  Statistical modeling applied to managing global 5ESS®-2000 switch software development , 1997, Bell Labs Technical Journal.

[44]  David A. Penny,et al.  An estimation-based management framework for enhancive maintenance in commercial software products , 2002, International Conference on Software Maintenance, 2002. Proceedings..

[45]  Mahadev Satyanarayanan,et al.  Categories and Subject Descriptors: D.4.3 [Software]: File Systems Management—Distributed , 2022 .

[46]  I. E. Allen,et al.  Staying the course: online education in the United States, 2008 , 2008 .

[47]  Claes Wohlin,et al.  Estimation of Software Reliability Growth Model Parameters , 2007 .

[48]  Marco Brambilla,et al.  Building Semantic Web Portals with WebML , 2007, ICWE.

[49]  Günther Ruhe,et al.  12 Decision Support for Value-Based Software Release Planning , 2022 .

[50]  Victor R. Basili,et al.  Understanding and predicting the process of software maintenance releases , 1996, Proceedings of IEEE 18th International Conference on Software Engineering.

[51]  Jan Bosch,et al.  Software architecture design: evaluation and transformation , 1999, Proceedings ECBS'99. IEEE Conference and Workshop on Engineering of Computer-Based Systems.

[52]  César Hervás-Martínez,et al.  Data Mining Algorithms to Classify Students , 2008, EDM.

[53]  Sara Comai,et al.  Designing Rich Internet Applications with Web Engineering Methodologies , 2007, 2007 9th IEEE International Workshop on Web Site Evolution.

[54]  D. G. Johnson,et al.  SlotManager: a microcomputer-based decision support system for university timetabling , 2000, Decis. Support Syst..

[55]  M. McLinden,et al.  Participation in Online Problem‐based Learning: Insights from postgraduate teachers studying through open and distance education , 2006 .

[56]  Günther Ruhe,et al.  A family of empirical studies to compare informal and optimization-based planning of software releases , 2006, ISESE '06.

[57]  Shunji Osaki,et al.  Discrete software reliability growth models , 1985 .

[58]  Norman F. Schneidewind,et al.  Software Reliability Model with Optimal Selection of Failure Data , 1993, IEEE Trans. Software Eng..

[59]  Amrit L. Goel,et al.  Software Reliability Models: Assumptions, Limitations, and Applicability , 1985, IEEE Transactions on Software Engineering.

[60]  Leonard J. Bass,et al.  Introduction to the attribute driven design method , 2001, ICSE.

[61]  Panagiotis Miliotis,et al.  An automated university course timetabling system developed in a distributed environment: A case study , 2004, Eur. J. Oper. Res..

[62]  Michael R. Lyu,et al.  An Assessment of Testing-Effort Dependent Software Reliability Growth Models , 2007, IEEE Transactions on Reliability.

[63]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[64]  Eric S. K. Yu,et al.  Using non-functional requirements to systematically support change , 1995, Proceedings of 1995 IEEE International Symposium on Requirements Engineering (RE'95).

[65]  Tom Gross,et al.  Analysing a workflow management system: three levels of failure , 2008, CHiMiT '08.

[66]  Rudolf Bayer,et al.  Binary B-trees for virtual memory , 1971, SIGFIDET '71.

[67]  San Murugesan,et al.  Harnessing Green IT: Principles and Practices , 2008, IT Professional.

[68]  Mark Harman,et al.  Search Based Software Engineering for Program Comprehension , 2007, 15th IEEE International Conference on Program Comprehension (ICPC '07).

[69]  Brian Hayes,et al.  What Is Cloud Computing? , 2019, Cloud Technologies.

[70]  Subhashni Appana,et al.  A Review of Benefits and Limitations of Online Learning in the Context of the Student, the Instructor and the Tenured Faculty , 2008 .

[71]  Andrzej Kraslawski,et al.  Case-Based Reasoning Approach , 2008 .

[72]  Kishor S. Trivedi,et al.  On a method for mending time to failure distributions , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[73]  Laura Naismith Using text messaging to support administrative communication in higher education , 2007 .

[74]  Mitsuru Ohba,et al.  Inflection S-Shaped Software Reliability Growth Model , 1984 .

[75]  Jeffrey Scott Vitter,et al.  Paradigms for optimal sorting with multiple disks , 1993, [1993] Proceedings of the Twenty-sixth Hawaii International Conference on System Sciences.

[76]  Martin L. Shooman,et al.  Probabilistic Models for Software reliability Prediction , 1972, Statistical Computer Performance Evaluation.

[77]  Cecilia Mary Fischer Rubira,et al.  An Idealized Fault-Tolerant Architectural Component , 2002 .

[78]  Albert L. Lederer,et al.  The technology acceptance model and the World Wide Web , 2000, Decis. Support Syst..

[79]  Edmund K. Burke,et al.  Examination Timetabling in British Universities: A Survey , 1995, PATAT.

[80]  Ibrahim Sogukpinar,et al.  Analysis and Comparison of Image Encryption Algorithms , 2007 .

[81]  Basil M. Al-Kasasbeh,et al.  A new cryptographic algorithm for the real time applications , 2008 .

[82]  Ross J. Anderson Why cryptosystems fail , 1994, CACM.

[83]  Chin-Yu Huang,et al.  Analysis of a software reliability growth model with logistic testing-effort function , 1997, Proceedings The Eighth International Symposium on Software Reliability Engineering.

[84]  Kaveh Pahlavan Principles Of Wireless Networks , 2001 .

[85]  Henry Jay Becker,et al.  School Investments in Instructional Technology , 2001 .

[86]  John M. Anderson,et al.  A UNIVERSITY EXAMINATION-SCHEDULING MODEL TO MINIMIZE MULTIPLE-EXAMINATION DAYS FOR STUDENTS , 1981 .

[87]  Elisa Bertino,et al.  The specification and enforcement of authorization constraints in workflow management systems , 1999, TSEC.

[88]  Jeffrey Scott Vitter,et al.  Algorithms for parallel memory, I: Two-level memories , 2005, Algorithmica.

[89]  Mark Nichols,et al.  A theory for eLearning , 2003, J. Educ. Technol. Soc..

[90]  Sanja Petrovic,et al.  Recent research directions in automated timetabling , 2002, Eur. J. Oper. Res..

[91]  Amrit L. Goel,et al.  Time-Dependent Error-Detection Rate Model for Software Reliability and Other Performance Measures , 1979, IEEE Transactions on Reliability.

[92]  Mikael Lindvall,et al.  Evaluating software architectures , 2004, Adv. Comput..

[93]  Mark W. Newman,et al.  The Work to Make a Home Network Work , 2005, ECSCW.

[94]  Günther Ruhe,et al.  The art and science of software release planning , 2005, IEEE Software.

[95]  Marijn Janssen,et al.  The advantages of web service orchestration in perspective , 2004, ICEC '04.

[96]  Shigeru Yamada,et al.  S-Shaped Reliability Growth Modeling for Software Error Detection , 1983, IEEE Transactions on Reliability.

[97]  Paul Clements,et al.  ATAM: Method for Architecture Evaluation , 2000 .

[98]  Paul Beynon-Davies,et al.  Relational Data Model , 1996 .

[99]  Michael W. Carter A Comprehensive Course Timetabling and Student Scheduling System at the University of Waterloo , 2000, PATAT.

[100]  Jeffrey Scott Vitter,et al.  Efficient Memory Access in Large-Scale Computation , 1991, STACS.

[101]  Alex Berson Client-Server Architecture , 2006, Encyclopedia of Multimedia.

[102]  Kjeld Schmidt,et al.  The story of a working workflow management system , 2007, GROUP.

[103]  Rudolf Bayer,et al.  Organization and maintenance of large ordered indexes , 1972, Acta Informatica.

[104]  Debasis Kundu,et al.  Generalized exponential distribution: different method of estimations , 2001 .

[105]  Paul Clements,et al.  Software architecture in practice , 1999, SEI series in software engineering.

[106]  Robert Yu-Liang Ting,et al.  Mobile learning: current trend and future challenges , 2005, Fifth IEEE International Conference on Advanced Learning Technologies (ICALT'05).

[107]  Victor J. Rayward-Smith,et al.  The next release problem , 2001, Inf. Softw. Technol..

[108]  Jean-Claude Laprie,et al.  Software Reliability Trend Analyses from Theoretical to Practical Considerations , 1994, IEEE Trans. Software Eng..

[109]  Mihalis Yannakakis,et al.  The input/output complexity of transitive closure , 2005, Annals of Mathematics and Artificial Intelligence.

[110]  Juan Carlos Preciado,et al.  An Approach to Support the Web User Interfaces Evolution , 2007, AEWSE.

[111]  Lars Lundberg,et al.  Software architecture - Engineering quality attributes , 2003, J. Syst. Softw..

[112]  Colin Potts,et al.  Design of Everyday Things , 1988 .

[113]  Alison A. Carr-Chellman User Design , 2006 .

[114]  Edmund K. Burke,et al.  A University Timetabling System Based on Graph Colouring and Constraint Manipulation , 1994 .

[115]  Shigeru Yamada,et al.  Cost-Reliability Optimal Release Policies for Software Systems , 1985, IEEE Transactions on Reliability.

[116]  Suku Nair,et al.  A Model for Software Development Effort and Cost Estimation , 1997, IEEE Trans. Software Eng..

[117]  Jane Cleland-Huang,et al.  The incremental funding method: data-driven software development , 2004, IEEE Software.

[118]  Randle Cowcher,et al.  Physical security , 1992 .

[119]  Abdul Hanan Abdullah,et al.  Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique , 2008, 2008 Second Asia International Conference on Modelling & Simulation (AMS).

[120]  David Garlan,et al.  Software architecture: practice, potential, and pitfalls , 1994, Proceedings of 16th International Conference on Software Engineering.

[121]  Tom Carey,et al.  ACM SIGCHI Curricula for Human-Computer Interaction , 1992 .

[122]  A. Kumar,et al.  The Virtual Learning Environment system , 1998, FIE '98. 28th Annual Frontiers in Education Conference. Moving from 'Teacher-Centered' to 'Learner-Centered' Education. Conference Proceedings (Cat. No.98CH36214).

[123]  Moshe Telem,et al.  Information Technology in Educational Management , 1995, IFIP Advances in Information and Communication Technology.

[124]  Douglas Fisher,et al.  Machine Learning Approaches to Estimating Software Development Effort , 1995, IEEE Trans. Software Eng..

[125]  Nenad Medvidovic,et al.  Early prediction of software component reliability , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.

[126]  Julia Kosatka,et al.  From yellow stickies to the world-wide web: the evolution of problem tracking at the University of Houston , 2004, SIGUCCS '04.