Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Embedding Software Engineering Disciplines in Entry-Level Programming
Lung-Lung Liu
Pages - 76 - 82 | Revised - 05-05-2009 | Published - 18-05-2009
MORE INFORMATION
KEYWORDS
Software Engineering Practice, Preventive Maintenance, Requirement Change
ABSTRACT
Software engineering disciplines can be embedded in entry-level programming assignments as a very basic requirement for teachers to the students in the classrooms and mentors to their apprentices in the offices. We are to use three examples to demonstrate how easily some of these software engineering disciplines can be embedded, and we will then prove that they are helpful for quality and productive software development from the point of being with “no source code modification” when some requirements are changed. In fact, convergence can be confirmed even there have been these changes. If the entry-level programming works are with software engineering disciplines, then the total software development effort should be decreased. With this concept in mind for project managers, actually, there are simple refactoring skills that can be further applied to those programs already coded.
1 | Liulong Long. (2010). I have several views of software engineering teaching computer education, 23, 007. |
.www.sans.org | |
Abraham Silberschatz, Peter Baer Galvin, and Greg Gagne, “Operating Systems Concepts,” Seventh Edition, John Wiley and Sons, Inc., Ch. 5, 2005 | |
Arun Shamar, Rajesh Kumar, and P S Grover, “Managing Component-Based Systems with Reusable Components,” in International Journal of Computer Science and Security, Volume 1: Issue (2), pp, 60~65, July/August 2007 | |
Brian W. Kernighan, “Programming in C: A Tutorial,” Bell Laboratories, Murray Hills, N.J., USA, 1974 | |
Charlie Kaufman st al. “ Network Security “ PRIVATE Communication in a PUBLIC World. , Prentice Hall of India Private Limited. 2003 | |
Claude Shannon's " Communication Theory of Secrecy Systems" . | |
Donald. E. Knuth, “The Art of Computer Programming, Volume 3: Sorting and Searching,” Second Edition, Addison Wesley, Ch. 5, 1998 | |
Douglas R, Stinson “ CRYPTOGRPHY Theory and Practice “ Second Edition . | |
Information Technology Journal 4(3) : 204-221, 2005 | |
Lung-Lung Liu, “Software Maintenance and CMMI for Development: A Practitioner’s Point of View,” in Journal of Software Engineering Studies, Volume 1, No. 2, pp. 68~77, December 2006 | |
Martin Fowler, Kent Beck, John Brant, William Opdyke, and Don Roberts, “Refactoring: Improving the Design of Existing Code,” Addison Wesley, Ch. 8, 2000 | |
Neal R. Wagner “The Laws of Cryptography: Perfect Cryptography: The One-Time Pad “ | |
Ritter, Terry 1991. The Efficient Generation of Cryptographic Confusion Sequences. Cryptologia “15: 81-139. | |
Roger S. Pressman, “Software Engineering: A Practitioner’s Approach,” Sixth Edition, McGraw-Hill, Ch. 31, International Edition, 2005 | |
Watts Humphrey, “PSP, A Self-Improvement for Software Engineers,” Addison Wesley, Ch. 1, 2005 | |
Watts Humphrey, “PSP, A Self-Improvement for Software Engineers,” Addison Wesley, Ch. 1, 2005 | |
www.EFYMAG.com - February-2007 | |
www.zdnetindia.com | |
Assistant Professor Lung-Lung Liu
- Taiwan
llliu@computer.org
|
|
|
|
View all special issues >> | |
|
|