ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Evaluation of Novel Approaches to Software Engineering: 15th International Conference, ENASE 2020, Prague, Czech Republic, May 5–6, 2020, Revised ... in Computer and Information Science)

دانلود کتاب ارزیابی رویکردهای نوین به مهندسی نرم افزار: پانزدهمین کنفرانس بین المللی، ENASE 2020، پراگ، جمهوری چک، 5-6 مه 2020، تجدید نظر شده ... در علوم کامپیوتر و اطلاعات)

Evaluation of Novel Approaches to Software Engineering: 15th International Conference, ENASE 2020, Prague, Czech Republic, May 5–6, 2020, Revised ... in Computer and Information Science)

مشخصات کتاب

Evaluation of Novel Approaches to Software Engineering: 15th International Conference, ENASE 2020, Prague, Czech Republic, May 5–6, 2020, Revised ... in Computer and Information Science)

ویرایش:  
نویسندگان: , ,   
سری:  
ISBN (شابک) : 3030700054, 9783030700058 
ناشر: Springer 
سال نشر: 2021 
تعداد صفحات: 508
[503] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 45 Mb 

قیمت کتاب (تومان) : 31,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 8


در صورت تبدیل فایل کتاب Evaluation of Novel Approaches to Software Engineering: 15th International Conference, ENASE 2020, Prague, Czech Republic, May 5–6, 2020, Revised ... in Computer and Information Science) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب ارزیابی رویکردهای نوین به مهندسی نرم افزار: پانزدهمین کنفرانس بین المللی، ENASE 2020، پراگ، جمهوری چک، 5-6 مه 2020، تجدید نظر شده ... در علوم کامپیوتر و اطلاعات) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب ارزیابی رویکردهای نوین به مهندسی نرم افزار: پانزدهمین کنفرانس بین المللی، ENASE 2020، پراگ، جمهوری چک، 5-6 مه 2020، تجدید نظر شده ... در علوم کامپیوتر و اطلاعات)

این کتاب شامل مقالات منتخب، اصلاح‌شده و توسعه‌یافته پانزدهمین کنفرانس بین‌المللی ارزیابی رویکردهای بدیع در مهندسی نرم‌افزار، ENASE 2020 است که در قالب مجازی، در می 2020 برگزار شد. 19 مقاله کامل اصلاح‌شده ارائه‌شده با دقت بررسی و از بین 96 مورد ارسالی انتخاب شدند. مقالات موجود در این کتاب به درک روندهای مرتبط تحقیقات فعلی در مورد رویکردهای جدید به مهندسی نرم افزار برای توسعه و نگهداری سیستم ها و برنامه های کاربردی کمک می کند، به ویژه در رابطه با: مهندسی نرم افزار مدل محور، مهندسی نیازمندی ها، مهندسی نرم افزار تجربی، مهندسی نرم افزار سرویس گرا، مدیریت و مهندسی فرآیندهای کسب و کار، مدیریت و مهندسی دانش، مهندسی نرم افزار معکوس، بهبود فرآیند نرم افزار، مدیریت تغییر و پیکربندی نرم افزار، معیارهای نرم افزار، الگوهای نرم افزار و بازسازی، یکپارچه سازی برنامه ها، معماری نرم افزار، محاسبات ابری و رسمی روش ها


توضیحاتی درمورد کتاب به خارجی

This book constitutes selected, revised and extended papers of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2020, held in virtual format, in May 2020. The 19 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers included in this book contribute to the understanding of relevant trends of current research on novel approaches to software engineering for the development and maintenance of systems and applications, specically with relation to: model-driven software engineering, requirements engineering, empirical software engineering, service-oriented software engineering, business process management and engineering, knowledge management and engineering, reverse software engineering, software process improvement, software change and configuration management, software metrics, software patterns and refactoring, application integration, software architecture, cloud computing, and formal methods.



فهرست مطالب

Preface
Organization
Contents
Service Science and Business Information Systems
Resilient Process Modeling and Execution Using Process Graphs
	1 Introduction
	2 Challenges of Resilient Process Operation
		2.1 Business Model and Notation 2.0
		2.2 Resilient BPMN
	3 From Process Models to Directed Acyclic Graphs
		3.1 Resilience Metrics
		3.2 Transition Rules
		3.3 Graph Analysis
	4 Evaluation
		4.1 Evaluation Scenario
		4.2 Generation of Process Graphs
		4.3 Performance Analysis
		4.4 Resilience Analysis
		4.5 Scalability Analysis
	5 Discussion and Recommendations
	6 Related Work
	7 Conclusion
	References
Application of Fuzzy Logic to Evaluate the Performance of Business Process Models
	1 Introduction
	2 Related Work
		2.1 Measures Related to the Actor Characteristics
		2.2 Measures Related to BPMN Elements Characteristics
	3 Design Methodology for Thresholds Determination
		3.1 Analyze Data
		3.2 Validate Data
		3.3 Discussion
	4 Fuzzy Logic for BP Performance Assessment
		4.1 Fuzzification
		4.2 Inference
		4.3 Defuzzification
	5 FuzzyPer: Fuzzy Performance Tool
	6 Experiments
	7 Threats to Validity
	8 Conclusion
	References
Cloud Services Discovery Assistant for Business Process Development
	1 Introduction
	2 Problem Statement
	3 Cloud Services Discovery Assistant
		3.1 BP4Cloud Language
		3.2 ULID: Unified cLoud ServIces Data-Set
		3.3 Activity-Services Matching Algorithm
	4 Application and Performance Analysis
		4.1 BP4Cloud Evaluation
		4.2 ULID Construction Component Evaluation
		4.3 Activity-Service Matching Algorithm Evaluation
	5 Related Work
	6 Conclusion
	References
Software Engineering
Data-Driven Requirements Engineering: A Guided Tour
	1 Introduction
	2 An Overall View of Data-Driven Requirements Engineering
	3 Explicit Feedback Management
		3.1 Explicit Feedback Gathering
		3.2 Explicit Feedback Analysis
	4 Implicit Feedback Management
		4.1 Types of Implicit Feedback
		4.2 Gathering Implicit Feedback
		4.3 Importance of Context
		4.4 Combining Explicit and Implicit Feedback
	5 Decision-Making
		5.1 Software Analytic Tools
		5.2 Release Planning
	6 Challenges
	7 Discussion
		7.1 Related Areas
		7.2 Lessons Learned
	8 Conclusions
	References
BiDaML in Practice: Collaborative Modeling of Big Data Analytics Application Requirements
	1 Introduction
	2 Our Motivating Industrial Case Studies
		2.1 ANZ REALas
		2.2 VicRoads
		2.3 Alfred Hospital and Monash Clinical Data Science
	3 Data Analytics Software Development Challenges and Related Works
		3.1 Key Challenges
		3.2 Related Work
	4 Our Approach
		4.1 BiDaML Visual Language
		4.2 BiDaML Support Tool
		4.3 BiDaML-Web
	5 BiDaML in Industry Practice
	6 Evaluation
		6.1 Physics of Notations Evaluation
		6.2 Cognitive Walk-Through of BiDaML Support Tool
		6.3 Group User Study of Handwritten BiDaML Diagrams
		6.4 BiDaML-Web User Study
	7 Discussions
	8 Conclusions
	References
Challenges and Decisions in WOBCompute Design, a P2P Computing System Architecture
	1 Introduction
	2 Related Work
		2.1 P2P Computing Systems
		2.2 P2P Topologies
		2.3 Clustering and Super-Peers
	3 System Architecture
		3.1 Topology Considerations
		3.2 Clustering
		3.3 Overall Topology
		3.4 Communication and Messages
		3.5 Middleware
		3.6 Application Design
	4 Simulation Results
		4.1 Topology Simulations
		4.2 Election Impact Simulation
	5 Conclusions
	References
Reflections on the Design of Parallel Programming Frameworks
	1 Introduction
	2 Requirements for a Multiparadigm Parallel Programming Framework
		2.1 Requirements for a Model of Parallel Computation
		2.2 The Importance on Relying on Software Engineering Methodologies and Patterns
	3 The JPLF Framework
		3.1 PowerList Theory as a Model of Parallel Computation
		3.2 JPLF Design and Implementation
		3.3 Executors
		3.4 Granularity Balancer
		3.5 User Interactor
		3.6 Metrics Analyser
		3.7 Extensions
	4 Related Work
	5 Conclusions and Further Work
	References
Energy-Aware Pattern Framework: The Energy-Efficiency Challenge for Embedded Systems from a Software Design Perspective
	1 Introduction
	2 Related Work
	3 Approach
		3.1 Power Consumption of Embedded Systems
		3.2 Impact of Software on Power Characteristics
		3.3 Energy-Aware Design Pattern Framework
	4 Introduction of the Pattern Catalog
		4.1 Pattern: Energy-Aware Sampling (EAS)
		4.2 Pattern: Event-Based Computing (EBC)
		4.3 Pattern: PowerMonitor
		4.4 Pattern: Direct Memory Access Delegation (DMAD)
		4.5 Pattern: Mirroring
		4.6 Pattern: Race-To-Sleep
	5 Discussion
	6 Conclusion
	References
Towards Evolvable Ontology-Driven Development with Normalized Systems
	1 Introduction
	2 Related Work
		2.1 RDF and OWL Technologies
		2.2 Normalized Systems
		2.3 Ontology-Based Information Systems
		2.4 Bi-directional Transformations
		2.5 Transformation Between OWL and NS
	3 Transformation Between RDF/OWL and NS
		3.1 Transformation Requirements and Resources
		3.2 Domain-Specific Parts
		3.3 Mapping Between NS and RDF/OWL
		3.4 Overall Architecture
		3.5 RDF/OWL Identifiers
		3.6 NS Metamodel Transformation
	4 Evolvable Transformation Using NS Expanders
		4.1 Structuring Project
		4.2 Vocabulary Expander
		4.3 TreeToOwl Expander
		4.4 TreeFromOwl Expander
		4.5 Non-expanded Code
	5 Demonstration Case
		5.1 Flight Booking NS Model
		5.2 Flight Booking NS Ontology
		5.3 Refining RDF/OWL
		5.4 Information System Generated from RDF
	6 Evaluation
		6.1 Transition from Traditional Utility to Expanders
		6.2 Evolvability of Transformed Ontology
		6.3 Consistency and Integrity
	7 Future Work
		7.1 Extending NS Meta-ontology
		7.2 Integrations with Conceptual Models
		7.3 Analysis of Real-World Systems
	8 Conclusion
	References
Improving Node-RED Flows Comprehension with a Set of Development Guidelines
	1 Introduction
	2 Proposed Guidelines
		2.1 Naming
		2.2 Missing Data
		2.3 Content
		2.4 Layout
	3 Empirical Evaluation of the Comprehension Improvement
		3.1 Treatments
		3.2 Objects
		3.3 Participants
		3.4 Experiment Design
		3.5 Dependent Variables and Hypotheses Formulation
		3.6 Material, Procedure and Execution
		3.7 Analysis
		3.8 Results
		3.9 Post Experiment
		3.10 Discussion on the Experiment
		3.11 Threats to Validity of the Experiment
	4 Analysis of the Top-100 Most Downloaded Flows
	5 Related Work
	6 Conclusion and Future Work
	References
A Study of Maintainability in Evolving Open-Source Software
	1 Introduction
	2 Software Quality Models
	3 Maintainability Models
		3.1 Maintainability Index
		3.2 ARiSA Compendium Model
		3.3 SQALE Model
	4 State of the Art
	5 Case Study
		5.1 Research Questions
		5.2 Target Applications
		5.3 Data Collection
		5.4 Analysis
		5.5 Threats to Validity
	6 Conclusion and Future Work
	References
Risk Treatment: An Iterative Method for Identifying Controls
	1 Introduction
	2 Background
		2.1 Problem Frames
		2.2 CORAS
	3 Our Previous Work
		3.1 Template for Incident Scenarios
		3.2 Template for Controls
	4 Metamodel
		4.1 Security Model
		4.2 Requirements Model
	5 Iterative Risk Treatment
		5.1 Initial Input
		5.2 Part A: Selection
		5.3 Part B: Documentation
		5.4 Part C: Security Review
		5.5 Decision Point: Treatment Satisfactory?
	6 Case Study
	7 Tool Support
		7.1 Functionalities
		7.2 Frontend
		7.3 Backend
	8 Discussion
		8.1 Usability
		8.2 Scalability
		8.3 Precision
	9 Related Work
	10 Conclusion
	References
Combined Similarity Based Automated Program Repair Approaches for Expression Level Bugs
	1 Introduction
	2 Background
		2.1 Concepts Related to Software Bug
		2.2 Concepts Related to Source Code
	3 Related Work
	4 Methodology
	5 Experiment
		5.1 Implementation
		5.2 Dataset
		5.3 Evaluation Metrics
	6 Result Analysis
	7 Threats to Validity
	8 Conclusion and Future Work
	References
A Multi-engine Aspect-Oriented Language with Modeling Integration for Video Game Design
	1 Introduction
		1.1 Shortcomings of Game Design Tools
		1.2 Introduction to GAMESPECT
		1.3 Organization of This Paper
	2 Background
		2.1 Design Tools
		2.2 Metaprogramming, Aspect-Oriented Programming and DSAL’s
	3 Similar Languages and Frameworks
		3.1 Similar Metaprogramming Languages
		3.2 Similar Game Balancing Frameworks
	4 Development Methodology
		4.1 GAMESPECT Architecture
		4.2 External Tools
		4.3 Weaving Process
		4.4 MDAML Extensions for GAMESPECT
	5 Results
		5.1 Testing Process
		5.2 Accuracy Measurements
		5.3 Efficiency Measurements
		5.4 Pluggability and Modularity Measurements
	6 Summary
		6.1 Summary
		6.2 Future Work
	References
Model-Based Timing Analysis of Automotive Use Case Developed in UML
	1 Introduction
		1.1 Model-Based Development of Automotive Software
		1.2 Model-Based Timing Analysis
		1.3 Relation to Author's Previous Work and Novel Contributions
	2 Background and Related Work
		2.1 AUTOSAR Framework
		2.2 Timing Modeling
		2.3 Model-Based Timing Analysis
		2.4 Research Gap and Challenge
	3 Early Timing Analysis of Automotive Use Cases Developed in UML
		3.1 Generic Timing Metamodel
		3.2 Mapping Among Metamodels for Timing Properties
		3.3 Model-to-Model (M2M) Transformations
	4 Autonomous Emergency Braking System (AEBS)
		4.1 Requirements Specification
		4.2 Control Flow
		4.3 Timing Behavior
	5 AUTOSAR Model of AEBS Use Case
		5.1 Software Components
		5.2 Internal Behavior
		5.3 Software Composition
		5.4 ECU Description
		5.5 System Description
		5.6 Timing Attributes
		5.7 Task Configuration for Timing Analysis
	6 Model-to-Model (M2M) Transformations
		6.1 Matched Rule
		6.2 Lazy Rule
		6.3 Helpers
		6.4 Synthesis of Timing Analysis Model
	7 Results of the Timing Analysis
	8 Conclusions
	References
Internal Software Quality Evaluation of Self-adaptive Systems Using Metrics, Patterns, and Smells
	1 Introduction
	2 Related Work
	3 Main Elements of Our Analysis
		3.1 SAS Analyzed Examples
		3.2 NSAS Analyzed Examples
		3.3 Evaluation Mechanisms
		3.4 Tool Support
	4 Results of SAS and NSAS Analysis
		4.1 Software Metrics Computation Results
		4.2 Design Patterns Detection Results
		4.3 Code Smells Detection Results
		4.4 Architectural Smell Detection Results
	5 Threats to Validity
	6 Discussion and Concluding Remarks
	References
A Workflow for Automatic Code Generation of Safety Mechanisms via Model-Driven Development
	1 Introduction
	2 Background
		2.1 IEC 61508 Lifecycle
		2.2 Model-Driven Development
	3 Workflow
		3.1 High-Level Overview of the Approach
		3.2 Enabling the Automatic Code Generation of Safety Mechanisms
	4 Application Example: Generation of Timing Constraint Monitoring Mechanisms
		4.1 Need for Timing Constraint Monitoring at Runtime
		4.2 Information on Timing Constraint Monitoring
		4.3 A Model Representation for Timing Constraint Monitoring
		4.4 A Model-Driven Software Architecture for Monitoring Timing Constraints at Runtime
		4.5 Model Transformations for the Automatic Code Generation of Timing Constraint Monitoring at Runtime
	5 Related Work
		5.1 Related Work on Improving the Development of Safety-Critical Systems
		5.2 Related Work on Code Generation via Model-Driven Development
	6 Conclusion
	References
HumaniSE: Approaches to Achieve More Human-Centric Software Engineering
	1 Introduction
	2 Motivation and Related Work
		2.1 Motivating Example: A Smart Home for Ageing
		2.2 Model-Driven Software Engineering
		2.3 Domain-Specific Visual Languages
		2.4 Human Aspects of Software
	3 Our Approach
	4 A Human-Centric Agile Living Lab
		4.1 Review of Human Aspects in Other Disciplines
		4.2 Review of How Human Aspects Impact Developers
		4.3 Survey of How Developers Currently Handle End User Human Aspects
		4.4 Analysis of How Human Aspects of Software Are Currently Discussed by Software Engineers
		4.5 A Taxonomy of Human-Centric Software Requirements
	5 Human Aspects in Requirements Engineering
		5.1 Extracting Human Aspects from Requirements
		5.2 Human Aspects Impacting Requirements Engineers in Agile Teams
		5.3 How Are Human Aspects Discussed in Requirements Engineering Documents
		5.4 New DSVLs to Model Human-Centric Requirements
		5.5 Capturing Human Aspects with Personas
	6 Using Human Aspects in Design and Implementing Software
		6.1 Software Design Decision Support
		6.2 Collaborative Human-Centric Domain-Specific Visual Languages
		6.3 Extending Design Models to Include Human Aspects
		6.4 Human-Centric Design Critics and Modelling Patterns
		6.5 Using Human Aspects in Model Driven Engineering
	7 Evaluating and Applying Human Aspects in Software Engineering
		7.1 How Can We Provide Better Fixes for Human Aspect-Related Defects
		7.2 Gender Bias in IT Job Ads
		7.3 How Age Affects Users' Interaction with Software
		7.4 eHealth Applications
		7.5 How Developers Address Accessibility Issues in Mobile Apps
		7.6 Developing Better Apps with Personas
		7.7 COVID-19 Apps
		7.8 Environmental and Sustainability Software Applications
		7.9 Human Aspects in SE Education and Practice
	8 Conclusion
	References
Finding and Use of Source Code Changes for Aspect-Oriented Software
	1 Introduction
	2 Background and Motivating Example
	3 Changes of Aspect-Oriented Software
		3.1 Finding Changes for Aspect-Oriented Programs
		3.2 Use of Changes for Aspect-Oriented Programs
	4 Approach to Finding Changes Between AO Programs
		4.1 Aspect-Oriented Control-Flow Graph
		4.2 Comparison of Method Bodies
		4.3 Implementation Details
	5 Evaluation of AjDiff
		5.1 Quantitative Analysis
		5.2 Qualitative Analysis
		5.3 Threats to Validity
	6 Usage Example
	7 Conclusion
	References
Author Index




نظرات کاربران