Quality Attribute-Driven Software Architecture of a Pervasive Multimodal Computing System
暂无分享,去创建一个
Amar Ramdane-Cherif | Nicole Lévy | Chakib Tadj | Manolo Dulva Hina | A. Ramdane-Cherif | C. Tadj | M. D. Hina | N. Lévy
[1] Sebastián Ventura,et al. Data mining in course management systems: Moodle case study and tutorial , 2008, Comput. Educ..
[2] Louis Leung,et al. Unwillingness-to-communicate and college students' motives in SMS mobile messaging , 2007, Telematics Informatics.
[3] Rvb. Below the fold , 1998, The Lancet.
[4] Yoav Raz,et al. Concurrency Control in B+-Trees Databases Using Preparatory Operations , 1985, VLDB.
[5] J. A. Obrien. Management Information System , 2004 .
[6] Colin Baskin,et al. ICT integration in schools: Where are we now and what comes next? , 2006 .
[7] Alfred V. Aho,et al. Data Structures and Algorithms , 1983 .
[8] Giovanni Toffetti Carughi. Modeling Data-intensive Rich Internet Applications with Server Push Support , 2007, MDWE.
[9] David Garlan,et al. Architectural Styles, Design Patterns, And Objects , 1997, IEEE Softw..
[10] Leonard J. Bass,et al. Designing software architectures to achieve quality attribute requirements , 2005, IEE Proc. Softw..
[11] Ignacio Pajón Leyra. Anywhere, Anytime , 2007 .
[12] Michael R. Lyu,et al. Framework for modeling software reliability, using various testing-efforts and fault-detection rates , 2001, IEEE Trans. Reliab..
[13] Hussein Zedan,et al. Why Moodle , 2008, 2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems.
[14] Vanessa A. Cooper,et al. E-Readiness to G-Readiness: Developing a Green Information Technology Readiness Framework , 2008 .
[15] Mohammad Ubaidullah Bokhari,et al. SOFTWARE RELIABILITY GROWTH MODELING FOR EXPONENTIATED WEIBULL FUNCTION WITH ACTUAL SOFTWARE FAILURES DATA , 2007 .
[16] Simson L. Garfinkel,et al. How to make secure email easier to use , 2005, CHI.
[17] Edmund K. Burke,et al. Practice and Theory of Automated Timetabling III , 2001, Lecture Notes in Computer Science.
[18] Shigeru Yamada,et al. Test-effort dependent software reliability measurement , 1991 .
[19] Dharma P. Agrawal,et al. WAP: Present and Future , 2003, IEEE Pervasive Comput..
[20] Fiona Fui-Hoon Nah,et al. Mobile technology in education: uses and benefits , 2007, Int. J. Mob. Learn. Organisation.
[21] Mohammad Ubaidullah Bokhari,et al. Analysis of a software reliability growth models: the case of log-logistic test-effort function , 2006 .
[22] Moshe Tennenholtz,et al. Ranking systems: the PageRank axioms , 2005, EC '05.
[23] T. H. Tse,et al. A Tale of Clouds: Paradigm Comparisons and Some Thoughts on Research Issues , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[24] Rudolf Bayer,et al. Symmetric binary B-Trees: Data structure and maintenance algorithms , 1972, Acta Informatica.
[25] Ho-Won Jung,et al. Optimizing Value and Cost in Requirements Analysis , 1998, IEEE Softw..
[26] Alok Aggarwal,et al. The input/output complexity of sorting and related problems , 1988, CACM.
[27] Shigeru Yamada,et al. Software Reliability Growth Models with Testing-Effort , 1986, IEEE Transactions on Reliability.
[28] John D. Musa,et al. A theory of software reliability and its application , 1975, IEEE Transactions on Software Engineering.
[29] Beynon-DaviesP.,et al. Rapid application development (RAD) , 1999 .
[30] Tore Dybå,et al. Empirical studies of agile software development: A systematic review , 2008, Inf. Softw. Technol..
[31] Claude Lemaréchal,et al. Lagrangian Relaxation , 2000, Computational Combinatorial Optimization.
[32] Mary Beth Rosson,et al. Looking for trouble: understanding end-user security management , 2007, CHIMIT '07.
[33] Paul Dourish,et al. Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.
[34] Liam O'Brien,et al. Moving towards quality attribute driven software architecture reconstruction , 2003, 10th Working Conference on Reverse Engineering, 2003. WCRE 2003. Proceedings..
[35] William Puech,et al. Analysis and Cryptanalysis of a Selective Encryption Method for JPEG Images , 2007, Eighth International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS '07).
[36] Douglas Comer,et al. Ubiquitous B-Tree , 1979, CSUR.
[37] Günther Ruhe,et al. Hybrid Intelligence in Software Release Planning , 2004, Int. J. Hybrid Intell. Syst..
[38] Paul Brett,et al. An investigation into students' use of a computer-based social learning space: lessons for facilitating collaborative approaches to learning , 2005, Br. J. Educ. Technol..
[39] J. H. ter Bekke. Semantic data modeling , 1992 .
[40] Mahadev Satyanarayanan,et al. Mobile Information Access , 1996 .
[41] Günther Ruhe,et al. Software release planning for evolving systems , 2005, Innovations in Systems and Software Engineering.
[42] Shigeru Yamada,et al. Software Reliability Models , 2002 .
[43] Steel T. Huang,et al. Statistical modeling applied to managing global 5ESS®-2000 switch software development , 1997, Bell Labs Technical Journal.
[44] David A. Penny,et al. An estimation-based management framework for enhancive maintenance in commercial software products , 2002, International Conference on Software Maintenance, 2002. Proceedings..
[45] Mahadev Satyanarayanan,et al. Categories and Subject Descriptors: D.4.3 [Software]: File Systems Management—Distributed , 2022 .
[46] I. E. Allen,et al. Staying the course: online education in the United States, 2008 , 2008 .
[47] Claes Wohlin,et al. Estimation of Software Reliability Growth Model Parameters , 2007 .
[48] Marco Brambilla,et al. Building Semantic Web Portals with WebML , 2007, ICWE.
[49] Günther Ruhe,et al. 12 Decision Support for Value-Based Software Release Planning , 2022 .
[50] Victor R. Basili,et al. Understanding and predicting the process of software maintenance releases , 1996, Proceedings of IEEE 18th International Conference on Software Engineering.
[51] Jan Bosch,et al. Software architecture design: evaluation and transformation , 1999, Proceedings ECBS'99. IEEE Conference and Workshop on Engineering of Computer-Based Systems.
[52] César Hervás-Martínez,et al. Data Mining Algorithms to Classify Students , 2008, EDM.
[53] Sara Comai,et al. Designing Rich Internet Applications with Web Engineering Methodologies , 2007, 2007 9th IEEE International Workshop on Web Site Evolution.
[54] D. G. Johnson,et al. SlotManager: a microcomputer-based decision support system for university timetabling , 2000, Decis. Support Syst..
[55] M. McLinden,et al. Participation in Online Problem‐based Learning: Insights from postgraduate teachers studying through open and distance education , 2006 .
[56] Günther Ruhe,et al. A family of empirical studies to compare informal and optimization-based planning of software releases , 2006, ISESE '06.
[57] Shunji Osaki,et al. Discrete software reliability growth models , 1985 .
[58] Norman F. Schneidewind,et al. Software Reliability Model with Optimal Selection of Failure Data , 1993, IEEE Trans. Software Eng..
[59] Amrit L. Goel,et al. Software Reliability Models: Assumptions, Limitations, and Applicability , 1985, IEEE Transactions on Software Engineering.
[60] Leonard J. Bass,et al. Introduction to the attribute driven design method , 2001, ICSE.
[61] Panagiotis Miliotis,et al. An automated university course timetabling system developed in a distributed environment: A case study , 2004, Eur. J. Oper. Res..
[62] Michael R. Lyu,et al. An Assessment of Testing-Effort Dependent Software Reliability Growth Models , 2007, IEEE Transactions on Reliability.
[63] Mahadev Satyanarayanan,et al. Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..
[64] Eric S. K. Yu,et al. Using non-functional requirements to systematically support change , 1995, Proceedings of 1995 IEEE International Symposium on Requirements Engineering (RE'95).
[65] Tom Gross,et al. Analysing a workflow management system: three levels of failure , 2008, CHiMiT '08.
[66] Rudolf Bayer,et al. Binary B-trees for virtual memory , 1971, SIGFIDET '71.
[67] San Murugesan,et al. Harnessing Green IT: Principles and Practices , 2008, IT Professional.
[68] Mark Harman,et al. Search Based Software Engineering for Program Comprehension , 2007, 15th IEEE International Conference on Program Comprehension (ICPC '07).
[69] Brian Hayes,et al. What Is Cloud Computing? , 2019, Cloud Technologies.
[70] Subhashni Appana,et al. A Review of Benefits and Limitations of Online Learning in the Context of the Student, the Instructor and the Tenured Faculty , 2008 .
[71] Andrzej Kraslawski,et al. Case-Based Reasoning Approach , 2008 .
[72] Kishor S. Trivedi,et al. On a method for mending time to failure distributions , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[73] Laura Naismith. Using text messaging to support administrative communication in higher education , 2007 .
[74] Mitsuru Ohba,et al. Inflection S-Shaped Software Reliability Growth Model , 1984 .
[75] Jeffrey Scott Vitter,et al. Paradigms for optimal sorting with multiple disks , 1993, [1993] Proceedings of the Twenty-sixth Hawaii International Conference on System Sciences.
[76] Martin L. Shooman,et al. Probabilistic Models for Software reliability Prediction , 1972, Statistical Computer Performance Evaluation.
[77] Cecilia Mary Fischer Rubira,et al. An Idealized Fault-Tolerant Architectural Component , 2002 .
[78] Albert L. Lederer,et al. The technology acceptance model and the World Wide Web , 2000, Decis. Support Syst..
[79] Edmund K. Burke,et al. Examination Timetabling in British Universities: A Survey , 1995, PATAT.
[80] Ibrahim Sogukpinar,et al. Analysis and Comparison of Image Encryption Algorithms , 2007 .
[81] Basil M. Al-Kasasbeh,et al. A new cryptographic algorithm for the real time applications , 2008 .
[82] Ross J. Anderson. Why cryptosystems fail , 1994, CACM.
[83] Chin-Yu Huang,et al. Analysis of a software reliability growth model with logistic testing-effort function , 1997, Proceedings The Eighth International Symposium on Software Reliability Engineering.
[84] Kaveh Pahlavan. Principles Of Wireless Networks , 2001 .
[85] Henry Jay Becker,et al. School Investments in Instructional Technology , 2001 .
[86] John M. Anderson,et al. A UNIVERSITY EXAMINATION-SCHEDULING MODEL TO MINIMIZE MULTIPLE-EXAMINATION DAYS FOR STUDENTS , 1981 .
[87] Elisa Bertino,et al. The specification and enforcement of authorization constraints in workflow management systems , 1999, TSEC.
[88] Jeffrey Scott Vitter,et al. Algorithms for parallel memory, I: Two-level memories , 2005, Algorithmica.
[89] Mark Nichols,et al. A theory for eLearning , 2003, J. Educ. Technol. Soc..
[90] Sanja Petrovic,et al. Recent research directions in automated timetabling , 2002, Eur. J. Oper. Res..
[91] Amrit L. Goel,et al. Time-Dependent Error-Detection Rate Model for Software Reliability and Other Performance Measures , 1979, IEEE Transactions on Reliability.
[92] Mikael Lindvall,et al. Evaluating software architectures , 2004, Adv. Comput..
[93] Mark W. Newman,et al. The Work to Make a Home Network Work , 2005, ECSCW.
[94] Günther Ruhe,et al. The art and science of software release planning , 2005, IEEE Software.
[95] Marijn Janssen,et al. The advantages of web service orchestration in perspective , 2004, ICEC '04.
[96] Shigeru Yamada,et al. S-Shaped Reliability Growth Modeling for Software Error Detection , 1983, IEEE Transactions on Reliability.
[97] Paul Clements,et al. ATAM: Method for Architecture Evaluation , 2000 .
[98] Paul Beynon-Davies,et al. Relational Data Model , 1996 .
[99] Michael W. Carter. A Comprehensive Course Timetabling and Student Scheduling System at the University of Waterloo , 2000, PATAT.
[100] Jeffrey Scott Vitter,et al. Efficient Memory Access in Large-Scale Computation , 1991, STACS.
[101] Alex Berson. Client-Server Architecture , 2006, Encyclopedia of Multimedia.
[102] Kjeld Schmidt,et al. The story of a working workflow management system , 2007, GROUP.
[103] Rudolf Bayer,et al. Organization and maintenance of large ordered indexes , 1972, Acta Informatica.
[104] Debasis Kundu,et al. Generalized exponential distribution: different method of estimations , 2001 .
[105] Paul Clements,et al. Software architecture in practice , 1999, SEI series in software engineering.
[106] Robert Yu-Liang Ting,et al. Mobile learning: current trend and future challenges , 2005, Fifth IEEE International Conference on Advanced Learning Technologies (ICALT'05).
[107] Victor J. Rayward-Smith,et al. The next release problem , 2001, Inf. Softw. Technol..
[108] Jean-Claude Laprie,et al. Software Reliability Trend Analyses from Theoretical to Practical Considerations , 1994, IEEE Trans. Software Eng..
[109] Mihalis Yannakakis,et al. The input/output complexity of transitive closure , 2005, Annals of Mathematics and Artificial Intelligence.
[110] Juan Carlos Preciado,et al. An Approach to Support the Web User Interfaces Evolution , 2007, AEWSE.
[111] Lars Lundberg,et al. Software architecture - Engineering quality attributes , 2003, J. Syst. Softw..
[112] Colin Potts,et al. Design of Everyday Things , 1988 .
[113] Alison A. Carr-Chellman. User Design , 2006 .
[114] Edmund K. Burke,et al. A University Timetabling System Based on Graph Colouring and Constraint Manipulation , 1994 .
[115] Shigeru Yamada,et al. Cost-Reliability Optimal Release Policies for Software Systems , 1985, IEEE Transactions on Reliability.
[116] Suku Nair,et al. A Model for Software Development Effort and Cost Estimation , 1997, IEEE Trans. Software Eng..
[117] Jane Cleland-Huang,et al. The incremental funding method: data-driven software development , 2004, IEEE Software.
[118] Randle Cowcher,et al. Physical security , 1992 .
[119] Abdul Hanan Abdullah,et al. Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique , 2008, 2008 Second Asia International Conference on Modelling & Simulation (AMS).
[120] David Garlan,et al. Software architecture: practice, potential, and pitfalls , 1994, Proceedings of 16th International Conference on Software Engineering.
[121] Tom Carey,et al. ACM SIGCHI Curricula for Human-Computer Interaction , 1992 .
[122] A. Kumar,et al. The Virtual Learning Environment system , 1998, FIE '98. 28th Annual Frontiers in Education Conference. Moving from 'Teacher-Centered' to 'Learner-Centered' Education. Conference Proceedings (Cat. No.98CH36214).
[123] Moshe Telem,et al. Information Technology in Educational Management , 1995, IFIP Advances in Information and Communication Technology.
[124] Douglas Fisher,et al. Machine Learning Approaches to Estimating Software Development Effort , 1995, IEEE Trans. Software Eng..
[125] Nenad Medvidovic,et al. Early prediction of software component reliability , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.
[126] Julia Kosatka,et al. From yellow stickies to the world-wide web: the evolution of problem tracking at the University of Houston , 2004, SIGUCCS '04.