2015 International Conference on Data and Software Engineering (ICoDSE)

25-26 Nov. 2015

Filter Results

Displaying Results 1 - 25 of 52
  • [Front cover]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (889 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • General chair's message

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (82 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee

    Publication Year: 2015, Page(s):ii - iv
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • Reviewer

    Publication Year: 2015, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2015, Page(s):viii - xi
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2015, Page(s):xii - xiv
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • A declarative query language based on speech act theory for web systems

    Publication Year: 2015, Page(s):60 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1937 KB) | HTML iconHTML

    The World Wide Wide provides an enormous resources to be utilized by human. There are many possibilities of their existence, from unstructured data (can only be processed by human), semi structured data (structured data inside unstructured data), and fully structured data. In this context, many web scraper software exist to fetch and extract those data from the Web. However, until now, those tools... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A domain-specific language for automatic generation of checkers

    Publication Year: 2015, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1564 KB) | HTML iconHTML

    One of the important modules of a black-box automatic program grader is a "checker". In programming competition environment, a checker is a program written for the purpose to check the output of the contestant's program for a task that has many solutions. Usually, a checker is written manually as needed. In this paper, the idea of the output checker in the programming competition environment is ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A metamodel for disaster risk models

    Publication Year: 2015, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2310 KB) | HTML iconHTML

    As the world faces an increasing number of both natural and social disasters, attempts to support disaster risk reduction are also increasing. Although there is a general rule to calculate the disaster risk on an area based on the components of hazard, vulnerability, and capacity, disaster risk studies result in a number of disaster risk models which present different characteristics in terms of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A proposal for a quality model for e-govemment website

    Publication Year: 2015, Page(s):19 - 24
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1921 KB) | HTML iconHTML

    The goal of an E-Government system is to allow the government services via an electronic means by providing online information for public accesses. In addition, the services should also focus on improving the quality of public services effectively and efficiently. The website should not only provide information and services, but also should have some certain qualities as key factors for the succes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A proposal of software maintainability model using code smell measurement

    Publication Year: 2015, Page(s):25 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1991 KB) | HTML iconHTML

    Maintenance is a very important phase in a software's life cycle. More than half of the effort and cost of software is in the maintenance phase. Code smell is one of the problems that need to be dealt with in this phase. Code smell can be caused by bad design and implementation choice. In the end, it has the potential to degrade code maintainability. This paper proposes a new software maintainabil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of disaster situation management using mobile technology in Yogyakarta

    Publication Year: 2015, Page(s):31 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2406 KB) | HTML iconHTML

    Indonesia is located in a natural disaster prone area. Hence, it is important for the government to establish a disaster management system. Situation management is an important part of disaster management, especially in terms of collection, process, and organization of situation information. This situation information will be used to develop plans for the disaster resolution. This paper discusses ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Literature Review1

    Publication Year: 2015, Page(s):37 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1875 KB) | HTML iconHTML

    This paper intends to review some of the existing literature and find out the common points recorded regarding the integration of User Centered Design and Agile system. The literature has been classified as proposals and case studies and each of their observations are investigated to understand the impact and benefits for the Software model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aircraft anomaly detection using algorithmic model and data model trained on FOQA data

    Publication Year: 2015, Page(s):42 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1487 KB) | HTML iconHTML

    Two models of anomaly detection are put to use in detecting anomalies in aircraft operation. Self-Organizing Map Neural Network (SOM NN) is used from the culture of algorithmic modeling and One-Class Support Vector Machine (SVM) is used from the culture of data modeling. The goal of the research is to find anomalies within the data of aircraft operation or otherwise known as Flight Operations Qual... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of K-means algorithm for VM allocation in cloud computing

    Publication Year: 2015, Page(s):48 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1393 KB) | HTML iconHTML

    Cloud computing is known as dynamic service providers using physical resource or virtualized on the internet. Virtual machine technology is used by cloud computing client who do not require dedicated server. Important challenge in cloud computing is resource management to improve utilization. Virtual machine allocation method is one of the way to improve resource utilization in cloud computing. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated data consistency checking using SBVR: Case study: Academic data in a University

    Publication Year: 2015, Page(s):54 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2006 KB) | HTML iconHTML

    Data are the most important asset of an organization. Even though the application or business rules change, consistent data stored in the database must be kept. This research is intended to propose a framework for checking the consistency of an existing database to the business rules in which the data must comply. The research focuses on the situation where the documents of database and the applic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Confidentiality and privacy information security risk assessment for Android-based mobile devices

    Publication Year: 2015, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1402 KB) | HTML iconHTML

    Increasing use of smartphones for work and private purposes have mingled both the valuable personal data to work data unintentionally. Android permission-based security model are used to restrict the ability of applications to access device resources, but it failed to provide an adequate control for users and a visibility of how third party applications using personal data of users. The permission... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Database analysis and design learning tool based on problem/project-based learning

    Publication Year: 2015, Page(s):65 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1933 KB) | HTML iconHTML

    The study of database analysis and design is typically a core in an informatics/computer science undergraduate/postgraduate study program. However, a survey conducted by Connolly in 2005 concluded that in Europe, companies considered the skill of database design is the most lacking skill in IT graduate recruits. To overcome the problem, Connolly and Begg in 2006 proposed the problem/project-based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decision tree modeling for predicting research productivity of university faculty members

    Publication Year: 2015, Page(s):70 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1884 KB) | HTML iconHTML

    Research productivity is a common issue for university management, especially in most teaching-based universities. This research aims to investigate the various factors contributing to the research productivity of university faculty members through the use of decision tree modeling. Three separate models, each for junior, intermediate, and senior faculty members, were developed to quantitatively p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defending one-time pad cryptosystems from denial-of-service attacks

    Publication Year: 2015, Page(s):77 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1939 KB) | HTML iconHTML

    A one-time pad (OTP) can be conceived of as a stream cipher where the plaintext and key have equal length and the key is never reused. This cipher has easily proven properties of deniability and mathematical unbreakability, even in situations where an eavesdropper has access to unlimited computing power. Yet OTPs also have non-intuitive bottlenecks in CPU, RAM, disk I/O, and key material consumpti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deriving labeled training data for topic link detection by alternating words

    Publication Year: 2015, Page(s):83 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1535 KB) | HTML iconHTML

    Although classifiers can be trained to estimate whether two short text segments relate to a common topic, obtaining training data for supervised learning presents a hurdle. The natural approach would be to train with topic-aligned pairs of text segments from a large corpus, but nothing is available to locate such alignments. We offer that simply partitioning the words of a large document according... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing a game for preschoolers: What character, emotion and reward will tend to hack preschoolers?

    Publication Year: 2015, Page(s):89 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1931 KB) | HTML iconHTML

    Games can be evolved into a creature that can condition the users enjoy doing activities especially for the kids. User interface elements are a major factor to attract kids to play. This subject aim to identify the preschoolers' propensity to game's user interface, particularly the character, emotion and reward. The method applied is the research and development focusing on the user interface nece... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Replicated Block Device (DRDB) implementation on cluster storage data migration

    Publication Year: 2015, Page(s):93 - 97
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2333 KB) | HTML iconHTML

    Data Center systems are required to have high availability in order to meet the continuing needs of the user. If the server or application in which a failure or require maintenance, the virtual machine will be migrated to another server in the cluster are still available. The role of shared storage is very important here to keep a virtual machine that can continue the work and do not lose data on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.