(3.235.245.219) 您好!臺灣時間:2021/05/10 02:00
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:胡維中
研究生(外文):Wei-ChungHu
論文名稱:對於潛在關聯軟體開發資源的響應式驗證設計
論文名稱(外文):Reactive Validation on Collaborative Development Resources
指導教授:焦惠津
指導教授(外文):Hewijin Christine Jiau
學位類別:博士
校院名稱:國立成功大學
系所名稱:電腦與通信工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2016
畢業學年度:104
語文別:英文
論文頁數:143
中文關鍵詞:響應式驗證群眾式軟體開發群眾外包軟體代理人架構敏捷開發計算機支持協同工作
外文關鍵詞:Reactive ValidationCrowd-based Software ProcessCrowdsourcingSoftware AgentAgile ProcessComputer-Supported Collaborative Work
相關次數:
  • 被引用被引用:0
  • 點閱點閱:80
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在過去的十數年以來,軟體團隊的開發思維 (Development Paradigm) 有了顯著的變化。雖然傳統的軟體開發模型,例如瀑布型、螺旋型、增量模型等等,在管理風險以及善用開發成本方面仍然很重要,然而在應對人為變量 (Human Variation) 明顯較大的情況,則顯得笨拙。也因此敏捷開發 (Agile Paradigm) 的思維開始成為主流。有別於傳統開發模型以開發流程 (Software Process) 為思考導向,在敏捷開發的思維中,是以人力資源 (Human Resources) 作為思考導向。不再強調所有的人力資源需要滿足統一的能力標準以及效能,而是強調能夠整合正確的人力資源組合,並且在短週期 (Sprint) 的開發中讓人力資源有所成長,進而提升開發效率以及品質。敏捷開發思維建立在將計畫本身難以提升的適應力 (Adaptability) 讓人力資源來處理,帶來的效果則是團隊能夠在短週期的工作中,與外部人力資源(例如:其他開發團隊,使用者或顧客)緊密溝通合作,處理需求的變動,不斷地維持軟體服務與市場需求的契合度。

在敏捷開發的思維基礎上,團隊成員傾向於在理解彼此共識以及願景 (Common Vision) 的前提下,獨立或是小組作業以追求開發效率。不同的成員或工作小組,有較多的自由可以決定所使用的各種開發資源 (Development Resources),以快速完成階段目標。本畢業論文主要研究在軟體開發計畫內,對於各種潛在關聯軟體開發資源的響應式驗證設計。在軟體開發計畫中,如何管理關聯的開發資源,以期當改變發生時,可以即時一致性地更新相關的開發資源,是一個很重要的議題。而近代軟體開發流程中,隨著外部可利用的潛在開發資源數量急遽增加,如何找到潛在可利用資源,招募潛在可關聯資源,並對於潛在可關聯資源進行後續管理,則是軟體管理在下一個世代的新議題。本畢業論文基於過去數年,學生對於開放原始碼社群的開發與溝通模式之探討,以及對於軟體開發中,開發者使用設計工具如何確保開發資源的一致性,管理者如何建立專屬的品質管理觀點,來評估潛在的外部開發資源。如何在需求工程中引入群眾開發者作為潛在開發資源來得到更有有效的需求資料,整理出一個以代理人技術為基礎的響應式驗證設計,可以用於軟體開發計畫中,用以建立具備高度適應力,可延伸,可重用,可累積之潛在關聯軟體開發資源管理環境。
Development paradigm in software teams is changing in the last decade. Instead of “one team, one project” paradigm, creative software companies now encourage employees to follow “one team, multiple projects” paradigm. The paradigm shift enables creative software companies to explore more possibilities based on the same development foundation. Further, the paradigm brings flexibility for company managers to adjust business strategies according to changing market. Success of the paradigm is based on the fact that development resources in modern software industry are getting richer and more diverse. For example, the human resource, along with other resources, now comes from both internal and external sources of software companies. The external resources are called crowd-based resources.

To effectively manage crowd-based resources, the idea of crowd sourced software process is proposed to decorate existing software process with crowd-centric features. In crowd sourced software process, vendor groups acquire crowd users and developers with complementary skills to collaborate with each other flexibly. By validating prior stakeholders and gathering expertise effectively from the crowd, vendor groups can have improved productivity and increased innovation in software application projects. To maintain effective and consistent communication, distributed knowledge of validation from up-to-date assets to collaborative activities must be captured and accumulated for software teams. Conventional engineering methods, such as requirement acquisition and elicitation methods, are analyst-centric. Very little discussion is in adapting conventional tools for validation in crowd-centric context.

In conventional workspace, development resources are passively validated. A software team must deal with complex validation needs among resources. It is impractical to crowd sourced software process. The vast number and diversity of development resources need new systems to maintain effective collaboration. The effective collaboration requires development resources to continuously validate each other, perform self-correction, provide channels for reporting unreliable information and requesting evidence. It is defined as reactive validation in this study. To achieve reactive validation, development resources must be encapsulated as reactive objects. Reactive objects provide appropriate granularity for software teams to accumulate their optimal reactive validation knowledge. Through reactive validation, vendor groups can grow their reactive knowledge network which responds to development resource changes instantly and reveals collaboration opportunities intelligently.
Abstract(Chinese) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i
Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Incorporating Collaborative Development Resources in Software Development . . . . . . . 3
1.2 Managing Collaborative Development Resources . . . . . . . . . . . . . . . . . . . . . . . 4
1.3 The Need of Distributed Reactive Validation . . . . . . . . . . . . . . . . . . . . . . . . . 5
2 Development of Reactive Validation in Software Teams . . . . . . . . . . . . . . . . . 9
2.1 Reactive Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.2 Definition of Reactive Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.3 Essence of Reactive Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.3.1 Representing Time-Varying Values . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.3.2 Encapsulating Reaction Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.3.3 Collaborative Evaluation Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.3.4 Support for Distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.3.5 Snapshot Determination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.4 An In-House Reactive Validation Example . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.5 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2.6 Short Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3 Reactive Validation on Crowd-Centric Requirement Acquisition . . . . . . . . . . . 27
3.1 Crowd Sourced Requirement Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.2 Applying Reactive Validation Paradigm . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.2.1 Representing Time-Varying Values . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
3.2.2 Collaborative Evaluation Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
3.2.3 Encapsulating Reaction Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.2.4 Support for Distribution and Snapshot Determination . . . . . . . . . . . . . . . . 46
3.3 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
3.3.1 First Stage: Input without UCFrame . . . . . . . . . . . . . . . . . . . . . . . . . . 49
3.3.2 Second Stage: Input with UCFrame . . . . . . . . . . . . . . . . . . . . . . . . . . 49
3.3.3 Third Stage: Evaluation and Observation . . . . . . . . . . . . . . . . . . . . . . . 54
3.4 Case Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
4 Reactive Validation on Automatic Qualification Matching for Software Job Seeking and Recruitment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
4.1 Recruitment Process and Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
4.1.1 Challenge: Vague Job Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.1.2 Challenge: Sharing of Job Match Knowledge . . . . . . . . . . . . . . . . . . . . . 67
4.2 Applying Reactive Validation Paradigm . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
4.2.1 Representing Time-Varying Values and Encapsulating Reaction Operations . . . . 74
4.2.2 Collaborative Evaluation Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
4.2.3 Support for Distribution and Snapshot Determination . . . . . . . . . . . . . . . . 86
4.3 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
4.4 Case Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
5 Reactive Validation on Building Sustainable Programming Learning Environment 93
5.1 Sustainable Education Game and Its Challenges . . . . . . . . . . . . . . . . . . . . . . . 94
5.1.1 Observation from the Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
5.1.2 Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
5.2 Applying Reactive Validation Paradigm . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
5.2.1 Representing Time-Varying Values and Encapsulating Reaction Operations . . . . 105
5.2.2 Collaborative Evaluation Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
5.3 Snapshot Determination and Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
5.4 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
5.5 Case Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Vita . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
[1] M. M. Rejab, J. Noble, and G. Allan, “Distributing Expertise in Agile Software Development
Projects, Proceedings of the Agile Conference, pp. 33–36, July 2014.
[2] N. B. Moe, D. ˇ Smite, A. ˇ S¯ablis, A.-L. B¨orjesson, and P. Andr´easson, “Networking in a Large-Scale
Distributed Agile Project, Proceedings of the International Symposium on Empirical Software
Engineering and Measurement, no. 12, Sept. 2014.
[3] N. B. Moe, T. Dingsøy, and T. Dyb˚a, “Overcoming barriers to self-management in software teams,
IEEE Software, vol. 26, no. 6, pp. 20–26, Nov.-Dec. 2009.
[4] R. Hoda, J. Noble, and S. Marshall, “Self-organizing roles on agile software development teams,
IEEE Transactions on Software Engineering, vol. 39, no. 3, pp. 422–444, Mar. 2013.
[5] S. Augustine, B. Payne, F. Sencindiver, and S. Woodcock, “Agile project management: Steering
from the edges, Communications of the ACM, vol. 48, no. 12, pp. 85–89, Dec. 2005.
[6] H. C. Jiau, J. C. Chen, and K. F. Ssu, “Enhancing self-motivation in learning programming using
game-based simulation and metrics, IEEE Transactions on Education, vol. 52, no. 4, pp. 555–562,
Nov. 2009.
[7] H. C. Jiau, L. W. Mar, and J. C. Chen, “Obey: Optimal batched refactoring plan execution for
class responsibility redistribution, IEEE Transactions on Software Engineering, vol. 39, no. 9,
pp. 1245–1263, Sept. 2013.
[8] W. L. Melo, N. Belkhatir, and J. Estublier, “A software engineering environment driven by eventcondition-
action rules and its trigger mechanism, Information and Software Technology, vol. 37,
no. 10, pp. 580–587, 1995.
[9] J. C. Grundy, W. B. Mugridge, and J. G. Hosking, “Utilising Past Event Histories in a Process-
Centred Software Engineering Environment, Proceedings of the Australian Software Engineering
Conference, pp. 127–136, Oct. 1997.
[10] J. E. Cook and A. L. Wolf, “Discovering models of software processes from event-based data,
ACM Transactions on Software Engineering and Methodology, vol. 7, no. 3, pp. 215–249, July
1998.
[11] D. Wahyudin and A. M. Tjoa, “Event-Based Monitoring of Open Source Software Projects, Pro-
ceedings of the Second International Conference on Availability, Reliability and Security, pp. 1108–
1115, Apr. 2007.
[12] W.-N. Chen and J. Zhang, “Ant colony optimization for software project scheduling and staffing
with an event-based scheduler, IEEE Transactions on Software Engineering, vol. 39, no. 1, pp. 1–
17, Jan. 2013.
[13] J. Cleland-Huang, C. K. Chang, and M. Christensen, “Event-based traceability for managing
evolutionary change, IEEE Transactions on Software Engineering, vol. 29, no. 9, pp. 796–810,
Sept. 2003.
[14] S. Karus, “Automatic Means of Identifying Evolutionary Events in Software Development, Pro-
ceedings of the 29th IEEE International Conference on Software Maintenance, pp. 412–415, Sept.
2013.
[15] L. Leite, C. Treude, and F. F. Filho, “UEDashboard: Awareness of Unusual Events in Commit
Histories, Proceedings of the 10th Joint Meeting on Foundations of Software Engineering, pp. 978–
981, Sept. 2015.
[16] J. Nocks, “Multiple Simultaneous Projects with One Extreme Programming Team, Proceedings
of the Agile Conference, pp. 170–174, July 2006.
[17] L. Stojanovic, S. Sen, J. Ma, and D. Riemer, “ALERT: Semantic Event-Driven Collaborative Platform
for Software Development, Proceedings of the ACM International Conference on Distributed
Event-Based Systems, pp. 385–386, July 2012.
[18] R. Abreu, H. Erdogmus, and A. Perez, “CodeAware: Sensor-Based Fine-Grained Monitoring and
Management of Software Artifacts, Proceedings of IEEE/ACM 37th IEEE International Confer-
ence on Software Engineering, pp. 551–554, May 2015.
[19] N. Houari and B. H. Far, “A Decentralized Evolutional Approach to Handle Schedule Execution in
Software Projects, Proceedings of Sixth International Conference on Autonomic and Autonomous
Systems, pp. 116–124, Mar. 2010.
[20] E. M. Shahrivar, B. Moshiri, and M. Rezagholizadeh, “Decision Consensus in Cooperative Fuzzy
Decision Making, Proceedings of the Iranian Conference on Electrical Engineering, pp. 1–6, May
2011.
[21] H. K. Dam and A. Ghose, “An Agent-based Framework for Distributed Collaborative Model
Evolution, Proceedings of the 12th International Workshop on Principles of Software Evolution
and the 7th Annual ERCIM Workshop on Software Evolution, pp. 121–130, Sept. 2011.
[22] A. Biswas, T. Donaldson, J. Singh, S. Diamond, D. Gauthier, and M. Longford, “Assessment of
Mobile Experience Engine, the Development Toolkit for Context Aware Mobile Applications, Pro-
ceedings of the ACM SIGCHI International Conference on Advances in Computer Entertainment
Technology, June 2006.
[23] A. Khambati, J. Grundy, J. Warren, and J. Hosking, “Model-Driven Development of Mobile
Personal Health Care Applications, Proceedings of the 23rd IEEE/ACM International Conference
on Automated Software Engineering, pp. 467–470, Sept. 2008.
[24] B. Unhelkar and S. Murugesan, “The Enterprise Mobile Applications Development Framework,
IT Professional, vol. 12, no. 3, pp. 33–39, May-June 2010.
[25] H. Wang, Y. Wang, and J. Wang, “A Participant Recruitment Framework for Crowdsourcing
Based Software Requirement Acquisition, IEEE 9th International Conference on Global Software
Engineering, pp. 65–73, Aug. 2014.
[26] I. Plaza, L. Mart´ın, S. Martin, and C. Medrano, “Mobile Applications in an Aging Society: Status
and Trends, Journal of Systems and Software, vol. 84, no. 11, pp. 1977–1988, Nov. 2011.
[27] S. L. Lim, P. J. Bentley, N. Kanakam, F. Ishikawa, and S. Honiden, “Investigating Country Differences
in Mobile App User Behavior and Challenges for Software Engineering, IEEE Transactions
on Software Engineering, vol. 41, no. 1, pp. 40–64, Jan. 2015.
[28] L. Karlsson,˚Asa G. Dahlstedt, B. Regnell, J. N. och Dag, and A. Persson, “Requirements Engineering
Challenges in Market-Driven Software Development - An Interview Study with Practitioners,
Information and Software Technology, vol. 49, no. 6, pp. 588–604, June 2007.
[29] D. Mishra and A. Mishra, “Market-Driven Software Project through Agility: Requirements Engineering
Perspective, Lecture Notes in Business Information Processing, vol. 37, pp. 103–112,
2009.
[30] H. Khalid, E. Shihab, M. Nagappan, and A. E. Hassan, “What Do Mobile App Users Complain
About? A Study on Free iOS Apps, IEEE Software, vol. 32, no. 3, pp. 70–77, May-June 2014.
[31] S. Diewald, L. Roalter, A. M¨oller, and M. Kranz, “Towards a Holistic Approach for Mobile Application
Development in Intelligent Environments, Proceedings of the 10th International Conference
on Mobile and Ubiquitous Multimedia, pp. 73–80, Dec. 2011.
[32] N. Paternoster, C. Giardino, M. Unterkalmsteiner, T. Gorschek, and P. Abrahamsson, “Software
development in startup companies: A systematic mapping study, Information and Software Tech-
nology, vol. 56, no. 10, pp. 1200–1218, Oct. 2014.
[33] P. Abrahamsson, A. Hanhineva, H. Hulkko, T. Ihme, J. J¨a¨alinoja, M. Korkala, J. Koskela,
P. Kyll¨onen, and O. Salo, “Mobile-D: An Agile Approach for Mobile Application Development,
Companion Proceedings of the 19th Annual ACM SIGPLAN Conference on Object-Oriented Pro-
gramming Systems, Languages, and Applications, pp. 174–175, 2004.
[34] J. A. Blotner, “Agile Techniques to Avoid Firefighting at a Start-up, OOPSLA Practitioners
Reports, Nov. 2002.
[35] M. Franzago, H. Muccini, and I. Malavolta, “Towards a Collaborative Framework for the Design
and Development of Data-Intensive Mobile Applications, Proceedings of the 1st International
Conference on Mobile Software Engineering and Systems, pp. 58–61, 2014.
[36] E. M. Gerber and J. Hui, “Crowdfunding: Motivations and deterrents for participation, ACM
Transactions on Computer-Human Interaction, vol. 20, no. 6, Dec. 2013.
[37] M. Hosseini, K. Phalp, J. Taylor, and R. Ali, “Towards Crowdsourcing for Requirements Engineering,
The 20th International Working Conference on Requirements Engineering: Foundation
for Software Quality, Apr. 2014.
[38] J. S. Hui, E. M. Gerber, and S. P. Dow, “Crowd-based Design Activities: Helping Students Connect
with Users Online, Proceedings of the Conference on Designing Interactive Systems, pp. 875–884,
June 2014.
[39] R. Snijders, F. Dalpiaz, M. Hosseini, A. Shahri, and R. Ali, “Crowd-Centric Requirements Engineering,
Proceedings of the IEEE/ACM 7th International Conference on Utility and Cloud Com-
puting, pp. 614–615, Dec. 2014.
[40] R. Snijders, A. Ozum, S. Brinkkemper, and F.Dalpiaz, “Crowd-Centric Requirements Engineering,
Department of Information and Computing Sciences, Utrecht University, Utrecht, The
Netherlands, Technical Report UU-CS-2015-004, Mar. 2015.
[41] S. L. Lim, D. Damian, and A. Finkelstein, “StakeSource2.0: Using Social Networks of Stakeholders
to Identify and Prioritise Requirements, Proceedings of the 33rd International Conference on
Software Engineering, pp. 1022–1024, May 2011.
[42] C.-H. Chu, M. Wan, Y. Yang, J. Gao, and L. Deng, “Building On-demand Marketing SaaS for
Crowdsourcing, IEEE 8th International Symposium on Service Oriented System Engineering,
pp. 430–438, Apr. 2014.
[43] T. D. LaToza, W. B. Towne, C. M. Adriano, and A. van der Hoek, “Microtask Programming:
Building Software with a Crowd, Proceedings of the 27th Annual ACM Symposium on User
Interface Software and Technology, pp. 43–54, Oct. 2014.
crowdsourcing,
IEEE Software, vol. 31, no. 2, pp. 30–36, Mar.-Apr. 2014.
[45] W.-T. Tsai, W. Wu, and M. N. Huhns, “Cloud-based software crowdsourcing, IEEE Internet
Computing, vol. 18, no. 3, pp. 78–83, May-June 2014.
[46] D. Leffingwell and D. Widrig, Managing Software Requirements : A Use Case Approach. Addison
Wesley, 2003.
[47] S. R. Schach, Object-Oriented and Classical Software Engineering. McGraw-Hill, 2002.
[48] A. Cockburn, Writing Effective Use Cases. Addison Wesley, 2001.
[49] T. A. Alspaugh and A. I. Ant´on, “Scenario Support for Effective Requirements, Information and
Software Technology, vol. 50, no. 3, pp. 198–220, Feb. 2008.
[50] N. Mansurov and D. Vasura, “New Visual Interface for Engineering Use Case Models, Proceedings
of The 15th IEEE International Conference on Automated Software Engineering, pp. 297–300,
Sept. 2000.
[51] K. Winbladh, H. Ziv, and D. J. Richardson, “iMuse: Interactive Model-based Use-Case and Storytelling
Environment, Proceedings of the 18th ACM SIGSOFT International Symposium on
Foundations of Software Engineering, pp. 383–384, Nov. 2010.
[52] J. Coughlan, M. Lycett, and R. D. Macredie, “Communication Issues in Requirements Elicitation:
A Content Analysis of Stakeholder Experiences, Information and Software Technology, vol. 45,
no. 8, pp. 525–537, June 2003.
[53] N. Maiden and S. Robertson, “Developing Use Cases and Scenarios in the Requirements Process,
Proceedings of the 27th International Conference on Software Engineering, pp. 561–570, May 2005.
[54] G. Butler, P. Grogono, and F. Khendek, “A Z Specification of Use Cases: A Preliminary Report,
Proceedings of the 4th Asia Pacific Software Engineering Conference, pp. 505–506, Dec. 1997.
[55] X. Li, Z. Liu, and J. He, “Formal and Use-Case Driven Requirement Analysis in UML, Proceedings
of The 25th International Computer Software and Applications Conference, pp. 215–224, Oct. 2001.
[56] B. Roussev, “Generating OCL Specifications and Class diagrams from Use Cases: A Newtonian
Approach, Proceedings of the 36th Annual Hawaii International Conference on System Sciences,
Jan. 2003.
[57] S. Sengupta and S. Bhattacharya, “Formalization of UML Use Case Diagram - A Z Notation based
Approach, International Conference on Computing & Informatics, pp. 1–6, June 2006.
[58] D. Sinnig, P. Chalin, and F. Khendek, “LTS Semantics for Use Case Models, Proceedings of the
ACM Symposium on Applied Computing, pp. 365–370, Mar. 2009.
[59] S. S. Som´e, “Supporting Use Case based Requirements Engineering, Information and Software
Technology, vol. 48, no. 1, pp. 43–58, 2006.
[60] S. S. Som´e, “Formalization of Textual Use Cases Based on Petri Nets, International Journal of
Software Engineering and Knowledge Engineering, vol. 20, no. 5, pp. 695–737, 2010.
[61] S. Tiwari and A. Gupta, “Does Increasing Formalism in the Use Case Template Help?, Proceedings
of the 7th India Software Engineering Conference, 2014.
[62] A. Fantechi, S. Gnesi, G. Lami, and A. Maccari, “Application of Linguistic Techniques for Use
Case Analysis, Proceedings of IEEE Joint International Conference on Requirements Engineering,
pp. 157–164, 2002.
[63] K. P. Sawant, S. Roy, D. Parachuri, F. Plesse, and P. Bhattacharya, “Enforcing Structure on
Textual Use Cases via Annotation Models, Proceedings of the 7th India Software Engineering
Conference, 2014.
[64] K. P. Sawant, S. Roy, S. Sripathi, F. Plesse, and A. S. M. Sajeev, “Deriving Requirements Model
from Textual Use Cases, Companion Proceedings of the 36th International Conference on Software
Engineering, pp. 235–244, May 2014.
[65] P. Scandurra, A. Arnoldi, T. Yue, and M. Dolci, “Functional Requirements Validation by transforming
Use Case Models into Abstract State Machines, Proceedings of the 27th Annual ACM
Symposium on Applied Computing, pp. 1063–1068, Mar. 2012.
[66] L. L. Constantine and L. A. D. Lockwood, Software for Use: A Practical Guide to the Models and
Methods of Usage-Centered Design. ACM Press/Addison Wesley, 1999.
[67] M. Kamalrudin, J. Hosking, and J. Grundy, “Improving Requirements Quality using Essential
Use Case Interaction Patterns, Proceedings of the 33rd International Conference on Software
Engineering, pp. 531–540, May 2011.
[68] M. Collins-Cope, “The Requirements/Service/Interface (RSI) Approach to Use Case Analysis,
Proceedings of Technology of Object-Oriented Languages and Systems, pp. 172–183, July 1999.
[69] B. Anda and D. I. K. Sjøberg, “Towards an Inspection Technique for Use Case Models, Proceed-
ings of the 14th International Conference on Software Engineering and Knowledge Engineering,
pp. 127–134, July 2002.
[70] K. T. Phalp, J. Vincent, and K. Cox, “Assessing the Quality of Use Case Descriptions, Software
Quality Journal, vol. 15, no. 1, pp. 69–97, Mar. 2007.
[71] D. Sinnig, P. Chalin, and F. Khendek, “Use Case and Task Models: An Integrated Development
Methodology and Its Formal Foundation, ACM Transactions on Software Engineering and
Methodology, vol. 22, no. 3, July 2013.
[72] K. T. Phalp, J. Vincent, and K. Cox, “Improving the Quality of Use Case Descriptions: Empirical
Assessment of Writing Guidelines, Software Quality Journal, vol. 15, no. 4, pp. 383–399, Dec.
2007.
[73] T. Osaki, A. Kobayashi, and T. Kato, “Writing Use-Case with a Minimal Set of Words, Pro-
ceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science,
pp. 393–398, July 2006.
[74] F. G. Dias, E. A. Schmitz, M. L. M. Campos, A. L. Correa, and A. J. Alencar, “Elaboration of
Use Case Specifications: an Approach based on Use Case Fragments, Proceedings of the ACM
Symposium on Applied Computing, pp. 614–618, Mar. 2008.
[75] M. Manoel and M. Lencastre, “M-4REuse: Reusing Use Cases Specifications, Proceedings of the
30th Annual ACM Symposium on Applied Computing, pp. 1390–1396, Apr. 2015.
[76] S. Tiwari and A. Gupta, “A systematic literature review of use case specifications research,
Information and Software Technology, vol. 67, no. 11, pp. 128–158, Nov. 2015.
[77] S. Tiwari and A. Gupta, “A Controlled Experiment to Assess the Effectiveness of Eight Use Case
Templates, Proceedings of the 20th Asia-Pacific Software Engineering Conference, pp. 207–214,
Dec. 2013.
[78] W. J. Lee, S. D. Cha, and Y. R. Kwon, “Integration and Analysis of Use Cases Using Modular
Petri Nets in Requirements Engineering, IEEE Transactions on Software Engineering, vol. 24,
no. 12, pp. 1115–1130, Dec. 1998.
[79] J. P. Campos, J. L. Braga, A. M. P. de Resende, and C. H. O. Silv, “Identification of Aspect
Candidates by Inspecting Use Cases Descriptions, ACM SIGSOFT Software Engineering Notes,
vol. 35, no. 4, pp. 1–9, July 2010.
[80] T. Nakatani, T. U. S. Ohmura, and T. Tamai, “A Requirements Description Metamodel for Use
Cases, Proceedings of the 8th Asia-Pacific Software Engineering Conference, pp. 251–258, Dec.
2001.
[81] L. Zhang, D. Xie, and W. Zou, “Viewing Use Cases as Active Objects, ACM SIGSOFT Software
Engineering Notes, vol. 26, no. 2, pp. 44–48, Mar. 2001.
[82] K. Cox and K. T. Phalp, “Practical Experience of Eliciting Classes from Use Case Descriptions,
Journal of Systems and Software, vol. 80, no. 8, pp. 1286–1304, Aug. 2007.
[83] J. Jurkiewicz and J. Nawrocki, “Automated Events Identification in Use Cases, Information and
Software Technology, vol. 58, pp. 110–122, Feb. 2015.
[84] F. d’Amorim and P. Borba, “Modularity Analysis of Use Case Implementations, Journal of Sys-
tems and Software, vol. 85, no. 4, pp. 1012–1027, Apr. 2012.
[85] J. W. Ratcliff and D. E. Metzener, “Pattern Matching: The Gestalt Appproach, Dr.Dobb’s
Journal, vol. 13, no. 7, pp. 46–72, July 1988.
[86] K. S. Cheung, T. Y. Cheung, and K. O. Chow, “A Petri-Net-Based Synthesis Methodology for
Use-Case-Driven System Design, Journal of Systems and Software, vol. 79, no. 6, pp. 772–790,
June 2006.
[87] D. Jagielska, P. Wernick, M. Wood, and S. Bennett, “How Natural is Natural Language? How
Well do Computer Science Students Write Use Cases?, Companion to the 21st ACM SIGPLAN Symposium on Object-Oriented Programming Systems, Languages, and Applications, pp. 914–924, Oct. 2006.
[88] J. H. Hausmann, R. Heckel, and G. Taentzer, “Detection of Conflicting Functional Requirements
in a Use Case-Driven Approach, Proceedings of the International Conference on Software Engi-
neering, pp. 105–115, May 2002.
[89] A. Loh and M. Robey, “Generating Web Applications from Use Case Scenarios, Proceedings of
Australian Software Engineering Conference, pp. 320–328, 2004.
[90] N. Bolloju and S. X. Y. Sun, “Benefits of Supplementing Use Case Narratives with Activity
Diagrams - An Exploratory Study, Journal of Systems and Software, vol. 85, no. 9, pp. 2182–
2191, Sept. 2012.
[91] I. Hadar, T. Kuflik, A. Perini, I. Reinhartz-Berger, F. Ricca, and A. Susi, “An Empirical Study
of Requirements Model Understanding: Use Case vs. Tropos Models, Proceedings of the ACM
Symposium on Applied Computing, pp. 2324–2329, Mar. 2010.
[92] D. Bartram, “Internet Recruitment and Selection: Kissing Frogs to find Princes, International
Journal of Selection and Assessment, vol. 8, no. 4, pp. 261–274, Dec. 2000.
[93] B. J. Jansen, K. J. Jansen, and A. Spink, “Using the Web to Look for Work Implications for
Online Job Seeking and Recruiting, Internet Research, vol. 15, no. 1, pp. 49–66, 2005.
[94] R. Munger, “Technical Communicators Beware: the Next Generation of High-Tech Recruiting
Methods, IEEE Transactions on Professional Communication, vol. 45, no. 4, pp. 276–290, Dec.
2002.
[95] S. Lang, S. Laumer, C. Maier, and A. Eckhardt, “Drivers, Challenges and Consequences of ERecruiting:
A Literature Review, Proceedings of the 49th SIGMIS Annual Conference on Com-
puter Personnel Research, pp. 26–35, May 2011.
[96] D. Chinn, “Uncovering Student Values for Hiring in the Software Industry, Journal on Educational
Resources in Computing, vol. 7, no. 4, Jan. 2008.
[97] M. Exter, “Comparing Educational Experiences and On-the-Job Needs of Educational Software
Designers, Proceedings of the 45th ACM Technical Symposium on Computer Science Education,
pp. 355–360, Mar. 2014.
[98] R. Buettner, “A Framework for Recommender Systems in Online Social Network Recruiting: An
Interdisciplinary Call to Arms, Proceedings of 47th Hawaii International Conference on System
Sciences, pp. 1415–1424, Jan. 2014.
[99] P. Montuschi, V. Gatteschi, F. Lamberti, A. Sanna, and C. Demartini, “Job Recruitment and
Job Seeking Processes: How Technology Can Help, IT Professional, vol. 16, no. 5, pp. 41–49,
Sept.-Oct. 2014.
[100] E. Malherbe, M. Cataldi, and A. Ballatore, “Bringing Order to the Job Market: Efficient Job Offer
Categorization in E-Recruitment, Proceedings of the 38th International ACM SIGIR Conference
on Research and Development in Information Retrieval, pp. 1101–1104, Aug. 2015.
[101] M. S. Mehrabad and M. F. Brojeny, “The Development of An Expert System for Effective Selection
and Appointment of the Jobs Applicants in Human Resource Management, Computers &
Industrial Engineering, vol. 53, no. 2, pp. 306—-312, Sept. 2007.
[102] J. Downey, “An Artifact-Centric Method for Creating Software Job Descriptions, Proceedings of
the 2008 ACM SIGMIS Conference on Computer Personnel Doctoral Consortium and Research,
pp. 12–21, Apr. 2008.
[103] T. Jungmann and P. Ossenberg, “Recruiting the Right Engineering Students, Proceedings of
IEEE Global Engineering Education Conference, pp. 834–839, Mar. 2013.
[104] M. Carroll, M. Marchington, J. Earnshaw, and S. Taylor, “Recruitment in Small Firms: Processes,
Methods and Problems, Employee Relations, vol. 21, no. 3, pp. 236–250, 1999.
[105] J. A. Breaugh and M. Starke, “Research on Employee Recruitment: So Many Studies, So Many
Remaining Questions, Journal of Management, vol. 26, no. 3, pp. 405–434, 2000.
[106] F. F¨arber, T. Weitzel, and T. Keim, “An Automated Recommendation Approach to Selection
in Personnel Recruitment, Proceedings of the Americas Conference on Information Systems,
pp. 2329–2339, 2003.
[107] I. Lee, “An Architecture for a Next-Generation Holistic E-Recruiting System, Communications
of the ACM, vol. 50, no. 7, pp. 81–85, July 2007.
[108] C. Litecky, A. J. Igou, and A. Aken, “Skills in the Management Oriented IS and Enterprise System
Job Markets, Proceedings of the 50th Annual Conference on Computers and People Research,
pp. 35–44, June 2012.
[109] C.-F. Chien and L.-F. Chen, “Data Mining to Improve Personnel Selection and Enhance Human
Capital: A Case Study in High-Technology Industry, Expert Systems with Applications, vol. 34,
no. 1, pp. 280—-290, Jan. 2008.
[110] M. Cataldo and J. D. Herbsleb, “Coordination Breakdowns and Their Impact on Development
Productivity and Software Failures, IEEE Transactions on Software Engineering, vol. 39, no. 3,
pp. 343–360, Mar. 2014.
[111] T. Wolf and A. Schr
[112] N. Tsantalis, A. Chatzigeorgiou, G. Stephanides, and S. T. Halkidis, “Design Pattern Detection
Using Similarity Scoring, IEEE Transactions on Software Engineering, vol. 32, no. 11, pp. 896–
909, Nov. 2006.
[113] A. Alali, H. Kagdi, and J. I. Maletic, “What’s a Typical Commit? A Characterization of Open
Source Software Repositories, Proceedings of the 16th IEEE International Conference on Program
Comprehension, pp. 182–191, June 2008.
[114] L. Hattori andM. Lanza, “Mining the History of Synchronous Changes to Refine Code Ownership,
Proceedings of the 6th IEEE International Working Conference on Mining Software Repositories,
pp. 141–150, May 2009.
[115] A. Begel, Y. P. Khoo, and T. Zimmermann, “Codebook: Discovering and Exploiting Relationships
in Software Repositories, Proceedings of the 32nd ACM/IEEE International Conference on
Software Engineering, pp. 125–134, May 2010.
[116] G. Valetto, M. Helander, K. Ehrlich, S. Chulani, M. Wegman, and C. Williams, “Using Software
Repositories to Investigate Socio-technical Congruence in Development Projects, Fourth Interna-
tional Workshop on Mining Software Repositories, May 2007.
[117] P. Weisgerber, M. Pohl, and M. Burch, “Visual Data Mining in Software Archives to Detect How
DevelopersWork Together, Fourth International Workshop on Mining Software Repositories, May
2007.
[118] D. J. Armstrong, “The Quarks of Object-Oriented Development, Communications of the ACM,
vol. 49, no. 2, pp. 123–128, Feb. 2006.
[119] J. Bansiya and C. G. Davis, “A Hierarchical Model for Object-Oriented Design Quality Assessment,
IEEE Transactions on Software Engineering, vol. 28, no. 1, pp. 4–17, Jan. 2002.
[120] B. A. Kitchenham, T. Dyba, and M. Jorgensen, “Evidence-Based Software Engineering, Proceed-
ings of the 26th International Conference on Software Engineering, pp. 273–281, May 2004.
[121] A. S. Jadhav and R. M. Sonar, “Evaluating and Selecting Software Packages: A Review, Infor-
mation and Software Technology, vol. 51, no. 3, pp. 555––563, Mar. 2009.
[122] B. Kitchenham, “What’s Up with Software Metrics? – A Preliminary Mapping Study, Journal
of Systems and Software, vol. 82, no. 1, pp. 37––51, 2010.
[123] B. Fitzgerald, M. Musia l, and K.-J. Stol, “Evidence-based Decision Making in Lean Software
Project Management, Companion Proceedings of the 36th International Conference on Software
Engineering, pp. 93–102, May 2014.
[124] W.-C. Hu, C. H. Kao, F.-P. Yang, H. C. Jiau, and K. F. Ssu, “VESTA: A View-based Software
Quality Assessment Model for Software Evolution Management, Proceedings of the 22nd
International Conference on Software Engineering and Knowledge Engineering, pp. 345–348, July
2010.
[125] C. Litecky, A. Aken, A. Ahmad, and H. J. Nelson, “Mining for Computing Jobs, IEEE Software,
vol. 27, no. 1, pp. 78–85, Jan. 2010.
[126] S. Supjarerndee, Y. Temtanapat, and U. Phalavonk, “Recruitment Filtering With Personality-Job
Fit Model, Proceedings of the International Conference on Information Technology: Coding and
Computing, pp. 46–51, Apr. 2002.
[127] E. Faliagka, A. Tsakalidis, and G. Tzimas, “An Integrated E-Recruitment System for Automated
Personality Mining and Applicant Ranking, Internet Research, vol. 22, no. 5, pp. 551–568, 2012.
[128] L. Gou, M. X. Zhou, and H. Yang, “KnowMe and ShareMe: Understanding Automatically Discovered
Personality Traits from Social Media and User Sharing Preferences, Proceedings of the
SIGCHI Conference on Human Factors in Computing Systems, pp. 955–964, May 2014.
[129] S. T. Acu˜na1 and N. Juristo, “Assigning People to Roles in Software Projects, Software: Practice
and Experience, vol. 34, no. 7, pp. 675—-696, June 2004.
[130] G. Beranek, W. Zuser, and T. Grechenig, “Functional Group Roles in Software Engineering
Teams, ACM SIGSOFT Software Engineering Notes, vol. 30, no. 4, pp. 1–7, July 2005.
[131] A. Mockus, R. T. Fielding, and J. D. Herbsleb, “Two Case Studies of Open Source Software
Development: Apache and Mozilla, ACM Transactions on Software Engineering and Methodology,
vol. 11, no. 3, pp. 309–346, July 2002.
[132] L. Yu and S. Ramaswamy, “Change Propagations in the Maintenance of Kernel-based Software
with a Study on Linux, Proceedings of the 45th Annual Southeast Regional Conference, pp. 76–81,
Mar. 2007.
[133] N. L. Carroll and R. A. Calvo, “Certified Assessment Artifacts for ePortfolios, Proceedings of
Third International Conference on Information Technology and Applications, pp. 130–135, July
2005.
[134] H.-J. Chen, “Linking Employees’ E-Learning System Use to Their Overall Job Outcomes: An
Empirical Study based on the IS Success Model, Computers & Education, vol. 55, no. 4, pp. 1628–
–1639, Dec. 2010.
[135] M. Bhattacharya and M. Hartnett, “E-portfolio Assessment in Higher Education, Frontiers In
Education Conference, Oct. 2007.
[136] L. Perennes and D. Duhaut, “E-portfolio for Lifelong Learning, Proceedings of the International
Conference on Education Technology and Computer, Apr. 2009.
[137] K. Smith and H. Tillema, “Clarifying Different Types of Portfolio Use, Assessment & Evaluation
in Higher Education, vol. 28, no. 6, pp. 625–648, 2003.
[138] R. K. Rayudu, E. Heinrich, and M. Bhattacharya, “Introducing ePortfolios to Computer Science
and Engineering Students: A New Zealand Experience, IEEE TENCON, Jan. 2009.
[139] A. Begel, J. Bosch, and M.-A. Storey, “Social Networking Meets Software Development: Perspectives
from GitHub, MSDN, Stack Exchange, and TopCoder, IEEE Software, vol. 30, no. 1,
pp. 52–66, Jan. 2013.
[140] G. Gousios and D. Spinellis, “GHTorrent: Github’s Data from a Firehose, 9th IEEE Working
Conference on Mining Software Repositories, pp. 12–21, June 2012.
[141] D. Schall, “Who to Follow Recommendation in Large-scale Online Development Communities,
Information and Software Technology, vol. 56, no. 12, pp. 1543—-1555, Dec. 2014.
[142] C. Teyton, J.-R. Falleri, F. Morandat, and X. Blanc, “Find Your Library Experts, 20th Working
Conference on Reverse Engineering, pp. 202–211, Oct. 2013.
[143] B. Vasilescu, V. Filkov, and A. Serebrenik, “StackOverflow and GitHub: Associations Between
Software Development and Crowdsourced Knowledge, International Conference on Social Com-
puting, pp. 188–195, Sept. 2013.
[144] S. Onoue, H. Hata, and K. ichi Matsumoto, “A Study of the Characteristics of Developers’ Activities
in GitHub, Proceedings of the 20th Asia-Pacific Software Engineering Conference, pp. 7–12,
Dec. 2013.
[145] J. Marlow and L. Dabbish, “Activity Traces and Signals in Software Developer Recruitment and
Hiring, Proceedings of the Conference on Computer Supported Cooperative Work, pp. 145–156,
Feb. 2013.
[146] M. Prensky, Digital Game-Based Learning. McGraw-Hill, 2004.
[147] M. J. Mayo, “Games for Science and Engineering Education, Communications of the ACM,
vol. 50, no. 7, pp. 30–35, July 2007.
[148] D. Dicheva, C. Dichev, G. Agre, and G. Angelova, “Gamification in Education: A Systematic
Mapping Study, Educational Technology & Society, vol. 18, no. 3, pp. 75–88, 2015.
[149] E. Sweedyk, M. deLaet, M. C. Slattery, and J. Kuffner, “Computer Games and CS Education: Why
and How, Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education,
pp. 256–257, Feb. 2005.
[150] D. C. Cliburn, “The Effectiveness of Games as Assignments in an Introductory Programming
Course, Proceedings of the 36th Annual ASEE/IEEE Frontiers in Education Conference, vol. 24,
pp. 6–10, Oct. 2006.
[151] M. Esteves and A. J. Mendes, “A Simulation Tool to Help Learning of Object Oriented Programming
Basics, Proceedings of the 34th Annual ASEE/IEEE Frontiers in Education Conference,
vol. 2, pp. F4C 7–12, Oct. 2004.
[152] R. Rajaravivarma, “A Games-based Approach for Teaching the Introductory Programming
Course, SIGCSE Bulletin, vol. 37, no. 4, pp. 98–102, Dec. 2005.
[153] R. Lawrence, “Teaching Data Structures Using Competitive Games, IEEE Transactions on Ed-
ucation, vol. 47, no. 4, pp. 459–466, Nov. 2004.
[154] S. Hansen, “The Game of SetR: An Ideal Example for Introducing Polymorphism and Design
Patterns, Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education,
pp. 110–114, Feb. 2004.
[155] M. R.Wick, “Teaching Design Patterns in CS1: A Closed Laboratory Sequence Based on the Game
of Life, Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education,
pp. 487–491, Feb. 2005.
[156] R. M. Jones, “Design and Implementation of Computer Games: A Capstone Course for Undergraduate
Computer Science Education, Proceedings of the 31th SIGCSE Technical Symposium on
Computer Science Education, pp. 260–264, Feb. 2000.
[157] W.-K. Chen and Y. C. Cheng, “Teaching Object-Oriented Programming Laboratory With Computer
Game Programming, IEEE Transactions on Education, vol. 50, no. 3, pp. 197–203, Aug.
2007.
[158] E. Adams and A. Rollings, Fundamentals of Game Design. Prentice-Hall, 2006.
[159] K. E. DiCerbo, “Game-Based Assessment of Persistence, Educational Technology & Society,
vol. 17, no. 1, pp. 17–28, 2014.
[160] Y.-C. Wu, L. W. Mar, and H. C. Jiau, “A Service-Based Program Evaluation Platform for Enhancing
Student Engagement in Assignments, Educational Technology & Society, vol. 16, no. 4,
pp. 122–132, 2013.
[161] W. Li, T. Grossman, and G. Fitzmaurice, “CADament: A Gamified Multiplayer Software Tutorial
System, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems,
pp. 3369–3378, Apr. 2014.
[162] C. S. Longstreet and K. Cooper, “Experience Report: A Sustainable Serious Educational Game
Capstone Project, 18th International Conference on Computer Games: AI, Animation, Mobile,
Interactive Multimedia, Educational & Serious Games, pp. 217–221, July 2013.
[163] S. R. Foster, S. Esper, and W. G. Griswold, “From Competition to Metacognition: Designing Diverse,
Sustainable Educational Games, Proceedings of the SIGCHI Conference on Human Factors
in Computing Systems, pp. 99–108, Apr. 2013.
[164] B. Vogel, A. Kurti, M. Milrad, E. Johansson, and M. M¨uller, “Mobile Inquiry Learning in Sweden:
Development Insights on Interoperability, Extensibility and Sustainability of the LETS GO
Software System, Educational Technology & Society, vol. 17, no. 2, pp. 43–57, 2014.
[165] K. Tate, Sustainable Software Development: An Agile Perspective. Addison-Wesley, 2005.
[166] K. Stepanyan, A. Littlejohn, and A. Margaryan, “Sustainable e-Learning: Toward a Coherent
Body of Knowledge, Educational Technology & Society, vol. 16, no. 2, pp. 91—-102, 2013.
[167] H. Rajan and M. Hosamani, “Tisa: Toward Trustworthy Services in a Service-Oriented Architecture,
IEEE Transactions on Service Computing, vol. 1, no. 4, pp. 201–213, Oct.-Dec. 2008.
[168] T. Kohlborn, A. Korthaus, T. Chan, and M. Rosemann, “Identification and Analysis of Business
and Software Services – A Consolidated Approach, IEEE Transactions on Service Computing,
vol. 2, no. 1, pp. 50–64, Jan.-March 2009.
[169] N. Serrano, J. Hernantes, and G. Gallardo, “Service-Oriented Architecture and Legacy Systems,
IEEE Software, vol. 31, no. 5, pp. 15–19, Sept.-Oct. 2014.
[170] S. Esper, S. R. Foster, W. G. Griswold, C. Herrera, and W. Snyder, “CodeSpells: Bridging Educational
Language Features with Industry-Standard Languages, Proceedings of the 14th Koli
Calling International Conference on Computing Education Research, pp. 5–14, Nov. 2014.
[171] B. B. L. Lim, C. Jong, and P. Mahatanankoon, “On Integrating Web Services from the Ground
Up into CS1/CS2, Proceedings of the 36th SIGCSE technical symposium on Computer science
education, pp. 241–245, Feb. 2005.
[172] P. Pasatcha and K. Sunat, “A Distributed e-Education System Based on the Service Oriented
Architecture, Proceedings of the IEEE International Conference on Web Services, pp. 791–794,
Sept. 2008.
[173] Q. Li, H. Xu, D. Wang, L. Ren, and C. Ma, “SSOA-E: Research on Semantic Service Oriented
Architecture for Education Information System Integration, IEEE International Symposium on
IT in Medicine & Education, pp. 184–189, Aug. 2009.
[174] R. Kamatchi, “A Service Oriented Life Cycle Model for Educational Information System, Pro-
ceedings of the CUBE International Information Technology Conference, pp. 409–412, Sept. 2012.
[175] T. Marinho, E. B. Costa, D. Dermeval, R. Ferreira, L. M. Braz, I. I. Bittencourt, and H. P. L. Luna,
“An Ontology-based Software Framework to Provide Educational Data Mining, Proceedings of
the ACM Symposium on Applied Computing, pp. 1433–1437, Mar. 2010.
[176] G. Kotonya and J. Lee, “Teaching Reuse-Driven Software Engineering through Innovative Role
Playing, Companion Proceedings of the 36th International Conference on Software Engineering,
pp. 276–282, May 2014.
[177] A. BinSubaih and S. Maddock, “Game Portability Using A Service-Oriented Approach, Interna-
tional Journal of Computer Games Technology, vol. 2008, no. 3, pp. 171–185, Jan. 2008.
[178] W. T. Tsai, X. Sun, Y. Chen, Q. Huang, G. Bitter, and M. White, “Teaching Service-Oriented
Computing and STEM Topics via Robotic Games, Proceedings of the 11th IEEE Symposium on
Object Oriented Real-Time Distributed Computing, pp. 131–137, May 2008.
[179] R. Connolly, “A Funny Thing Happened on the Way to the Form: Using Game Development and
Web Services in an Emerging Technology Course, Information Systems Education Journal, vol. 3,
no. 38, Aug. 2005.
[180] F. Arslan, “Towards Service Oriented Architecture (SOA) for Massive Multiplayer Online Games
(MMOG), Proceedings of the 14th International Conference on Computer Modelling and Simula-
tion, pp. 538–543, Mar. 2012.
[181] D. G. Colin Knight and G. Richards, “An Ontology-Based Framework for Bridging Learning Design
and Learning Content, Educational Technology & Society, vol. 9, no. 1, pp. 23–37, 2006.
[182] J. Torrente, P. Moreno-Ger, I. Mart´ınez-Ortiz, and B. Fernandez-Manjon, “Integration and Deployment
of Educational Games in e-Learning Environments: The Learning Object Model Meets
Educational Gaming, Educational Technology & Society, vol. 12, no. 4, pp. 359––371, 2009.
[183] ´ Angel del Blanco, J. Torrente, E. J.Marchiori, I.Mart´ınez-Ortiz, P.Moreno-Ger, and B. Fern´andez-
Manj´on, “A Framework for Simplifying Educator Tasks Related to the Integration of Games in
the Learning Flow, Educational Technology & Society, vol. 15, no. 4, pp. 305—-318, 2012.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關論文
 
無相關期刊
 
無相關點閱論文
 
系統版面圖檔 系統版面圖檔