: Student Reactions (An Experience Report)”, Proceedings of the 13th Conference on Software Engineering Education and Training, Austin, TX, USA, March 6-8, 2000, pp.169-175. [8] Moore, M. M. and Brennan, T., “Process Improvement in the Classroom,” Proceedings of the 8th SEI CSEE Conference, Lecture Notes in Computer Science, New Orleans, LA, USA, Springer, March/April 1995, pp. 123-130. [9] Moore, M. M. and Potts, C., “Learning by Doing: Goals and Experiences of Two Software Engineering Project Courses,” Proceedings of the 7th SEI CSEE Conference, Lecture Notes in Computer Science, Springer-Verlag, January 1994. [10] Naur, P. and Randell B. (eds), Software Engineering: A Report on a Conference
related and engineering programs as well. Some of the reasons for this decline is a. decline in the IT industry b. increase in outsourcing c. misconception of the incoming students that CS and SE are fields focused primarily on programming and Web design d. Incoming students focus on the job market today, which may be entirely different four years later. Student employees form a transitional workforce. Students move in and out of projects due to various reasons: graduation, transfer in and out of university/program, Page 11.318.4 or transfer in and out of research projects. The decline in enrollment makes it hard
. Bishop, “Software Security Checklist for the Software Life Cy- cle,” Proceedings of the 12th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2003) pp. 243-248, June 2003.[12] OWASP, A Guide for Building Secure Web Applications and Web Services, http://www.owasp.org/ documentation/guide.html, 2.0 Black Hat Edition, July 27, 2005.[13] B. Arkin, S. Stender, and G. McGraw, “Software Penetration Testing,” IEEE Security and Privacy 3(1), pp. 84-87, Jan. 2005.[14] Paros Proxy Tool, http://www.parosproxy.org/.[15] R. Anderson, “Why Cryptosystems Fail,” Proceedings of the 1st ACM Conference on Computer and Communications Security (ACMCCS 1993) pp. 215-227, 1993.[16] S
for internal consistency 1.0 Text manipulation 1.0 Synchronize interactions with users 1.5 Generate output 1.0 Perform simple calculations 0.7 Perform complex calculations 2.0These weights for the functional requirements are used to calculate the sizing parameter asfollows:Total Sizing = Weight * * (log2 * )Finally, the estimated time to complete the project is calculated as Estimated time = Constant A * Total Sizing ^ Constant Bwhere ‘Constant A’ and ‘Constant B’ are to be defined by the
the anonymous reviewers, whoprovided constructive comments that improved the quality of the paper.Bibliography1. Association for Computing Machinery (ACM). Computing curricula 2001 Computer Science. http://www.acm.org/eductation/curricula.html2. Beck, K. Test-driven development by example, Addison-Wesley, 20033. Braude, E. Software engineering: an object-oriented perspective, Wiley, 20004. Bruegge, B and Dutoit, A. Object-oriented software engineering using UML, patterns, and Java, 2nd ed., Prentice Hall, 20045. Eriksson, H. et al. UML 2 Toolkit, OMG Press, 2004.6. FreeTTS 1.2. http://freetts.sourceforge.net/docs/index.php7. Gamma, E. et al. Design patterns: elements of object-orient software, Addison-Wesley, 1995.8
2006-1788: THE COLLABORATIVE ENOTEBOOK: A COLLABORATIVELEARNING AND KNOWLEDGE MANAGEMENT TESTBEDJ. Scott Hawker, Rochester Institute of Technology Dr. Hawker is an Assistant Professor of Software Engineering at Rochester Institute of Technology. He graduated with a B.S. and M.S. in Electrical Engineering from Texas Tech University in Lubbock, Texas, in 1981 and 1982, respectively. He graduated with a Ph.D. in Electrical Engineering from Lehigh University in Bethlehem, Pennsylvania, in 1990. He has over 15 years of industry experience developing large-scale, multi-agent information and control systems for diverse applications including manufacturing (at Motorola Semiconductor Products
elementsin the underlying set.The declaration of a relation within a signature means the relation consists of tuples whose firstelement is an atom from the signature’s underlying set. Thus known is a binary relation mappingeach book to those persons recorded in the book, and dates is a ternary relation, whose tuplesconsist of a book, a person known in that book, and that person’s birthday. Or at least that’s whatwe intend: without further constraints there is nothing to ensure the persons known in a book areexactly those whose dates are recorded.To create the needed constraints we add “facts” – predicates that must hold in any legal state ofthe system. In our case, we can state our constraint in one fact:fact { all b : BirthdayBook | b.known
engineering was taught using both collaboration and competition. In this course,students collaborated in two ways. First, they worked with their teammates in the projects. Page 11.1223.2Second, each team had representatives to form three cross-team committees. (a) The stan-dard committee defined the common interface and wrote the library so that the programbuilt by each team could compete. (b) The quality committee wrote testing code that usedthe standard interface. Any team that failed the tests would be disqualified from the finalcompetition. (c) The contest committee decided the competition rules and wrote the codeto decide the winner in each game. The
• Jim McDonald, Monmouth University • Massood Towhid Nejad, Embry-Riddle Aeronautical University (Florida) References1. ABET Engineering Accreditation Commission. Criteria for Accrediting Engineering Programs, ABET, Inc., Baltimore, Maryland, USA, 17 November 2004. Page 11.1325.72. Ardis, Mark A. and Ford, Gary A., 1989 SEI Report on Graduate Software Engineering Education, Carnegie Mellon TR CMU/SEI-89-TR-21, June 1989.3. Bagert, Donald J.; Hilburn, Thomas B.; Hislop, Greg; Lutz, Michael; McCracken, Michael and Mengel, Susan., Guidelines for Software Engineering
Reflective Learning1. Interviews 1. Split the team into 2 pairs of 2 people, • Interviews (Y)2. Group Meetings subgroups “A” and “B”… • Group Meetings (Y): XXX met3. Brainstorming 2. Subgroup A should read Domain with the customer and his4. Storyboarding Description 1 and formulate interview team...This method proved to5. Ethnography methods and questions. be more useful to the customers6. Questionnaires than the analyst, allowing them7. Domain research 3. Subgroup B assigns 1 person the role “User” to organize their
the Software Engineering Body ofKnowledge project (SWEBOK) 1 was released, so SWEBOK provided the initial framework forthe project. The module categories in the prototype web site – design, process, quality, andrequirements – corresponded directly to major focus areas of SWEBOK. Page 11.1125.2More recently, the Computing Curriculum in Software Engineering (SE 2004) 2 became availableand influenced the development of the SWENET project. SE 2004 gave rise to a more detailedbody of knowledge for education. This software engineering education body of knowledge (orSEEK) had the advantages of (a) relating directly to the mission of SWENET, and (b
presentations. All necessary clarifications orreclassifications of data were resolved during these weekly status presentations.Each software project team was graded on the basis of the following criteria. - meeting the functional requirements - meeting the schedule (both intermediate and final) - monitoring the project effectivelyThe teams may earn similar letter grade such as B, but they were also given numericalgrades to retain a finer level of granularity. Project team success is defined in terms of theproject team grade, and the numerical grade served as the measuring scale for success.The following are the specific questions that we will address in this paper. 1. Does the amount of communications affect
developed forthe final report [Appendix B]. It was developed from first principles for a requirements finalreport. As with the previous rubric, it was provided to students well in advance of the Page 11.332.7assignment due date so that they could focus their work on what the instructors consideredimportant. And, again, faculty using the rubric have the option of establishing a direct mappingof rubric scores to assignment scores, potentially easing their grading process. The facultymember who used this new rubric during the 2005–2006 offering of the course found that itsignificantly reduced his grading effort, while not seeming to reduce the
0.1 0 0 0 100 200 300 400 500 600 700 800 900 0 100 200 300 400 500 600 700 800 900 Number of Characters Number of Characters (a) (b) Characters per Comments
! Thesubsequent semesters’ results were less gratifying, but were still an improvement over the resultsfrom previous semesters.The percentages of students in CSSE2-II earning each grade from the past nine semesters areshown in Table 1. Figure 1 shows the same data as a stacked bar chart. The last five semestersincorporated the new techniques. It should be pointed out that the instructors varied fromsemester to semester, but all have a history of similar grading styles for the different courses thatthey teach. # Term A B C D F W C or Better Students F01 12.2% 12.2% 24.5% 4.1% 22.5
2006-800: GAME DEVELOPMENT IS MORE THAN PROGRAMMINGBruce Maxim, University of Michigan Professor Maxim is Associate Professor of Computer and Information Science at the University of Michigan -Dearborn. He has taught game design, artificial intelligence, and software engineering courses for 20 years. His current research interests include software usability, accessibility issues, and software quality assurance. Page 11.660.1© American Society for Engineering Education, 2006 Game Development is More Than ProgrammingAbstractGame development generates a great deal of excitement among undergraduate
a 1997 task force report onengineering education assessment6. Maxim7 has provided an excellent overview of onesoftware engineering program’s plan to assess their program.Criterion 2 of ABET’s current criteria for accreditation of engineering programs4 requiresthat, “Each engineering program for which an institution seeks accreditation orreaccreditation must have in place: (a) detailed published educational objectives that are consistent with the mission of the institution and these criteria Page 11.1384.2 (b) a process based on the needs of the program’s various constituencies in which the objectives are determined and periodically
University, West Long Branch, New Jersey, USA. From January 2001 to August 2004, he was a member of scientific staff with Nortel Networks in Richardson, Texas. Prior to joining Nortel, he was a research associate of the School of Computer Science, Florida International University (FIU) at Miami. Prior to joining FIU, he was an associate professor at NUST. His research interests include software engineering, discrete event systems, formal methods, wireless networking, and real-time distributed systems. He authored Timed Petri Nets: Theory and Application (Norwell, MA: Kluwer, 1998), and published more than 50 research papers in journals and conferences. He is an editor of IEEE Transactions on
2006-1695: ACCREDITATION -- APPLYING CMM TO SOFTWAREENGINEERING EDUCATIONSheryl Duggins, Southern Polytechnic State University Page 11.154.1© American Society for Engineering Education, 2006 Accreditation – Applying CMM to Software Engineering EducationThe software engineering department at Southern Polytechnic State University has decided toembark on a journey that will hopefully result in ABET accreditation. Since ABET only startedaccrediting software engineering programs in 2003, this is all new to us, and we find ourselvestrying desperately to understand and apply the process. As anyone who has gone through thisprocess knows
2006-1761: ADDING SYSTEMS ENGINEERING ACTIVITIES TO THESOFTWARE CURRICULUMHarry Koehnemann, Arizona State University Dr. Harry Koehnemann is an Associate Professor in the Division of Computing Studies at Arizona State University where he performs teaching and research in the areas of distributed software systems, software process, and modeling software-intensive systems. Prior to joining ASU in 2001, Harry worked several years as a software architect and software developer on software systems ranging from large enterprise applications to embedded control systems. Harry has also provided training and consulting services in software tools and technologies, software modeling, and software