Metrics evaluation for context-aware computing
This paper proposed a software product quality metrics for Context-aware Computing, based on Boehm Model, McCall Model and ISO/IEC 9126. This new evaluation metrics are based on the combinations of two aspects of the evaluation process, which are the technological and the social aspects and two di...
| Main Author: | Mantoro, Teddy |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
ACM New York, NY, USA
2009
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/125/ http://irep.iium.edu.my/125/1/1._Metrics_Evaluation_for_Context-Aware_Computing.pdf |
Similar Items
Metrics evaluation for context-aware computing
by: Mantoro, Teddy
Published: (2009)
by: Mantoro, Teddy
Published: (2009)
A Context-Aware Based Authorization
System For Pervasive Grid Computing
by: Lim , Marilyn Chien Hui
Published: (2015)
by: Lim , Marilyn Chien Hui
Published: (2015)
Prediction of high cost performance metrics in information retrieval evaluation / Muwanei Sinyinda
by: Muwanei , Sinyinda
Published: (2022)
by: Muwanei , Sinyinda
Published: (2022)
Evaluated reputation-based trust for WSN security
by: Said Alkalbani, Abdullah, et al.
Published: (2014)
by: Said Alkalbani, Abdullah, et al.
Published: (2014)
TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking
by: Afrig, Aminuddin, et al.
Published: (2024)
by: Afrig, Aminuddin, et al.
Published: (2024)
iLukBa ver 1.1 : indoor user location system with speech recognition for mobile users
by: Mantoro, Teddy, et al.
Published: (2010)
by: Mantoro, Teddy, et al.
Published: (2010)
Computational properties of Watson-Crick context-free grammars
by: Mohamad Zulkufli, Nurul Liyana, et al.
Published: (2016)
by: Mohamad Zulkufli, Nurul Liyana, et al.
Published: (2016)
Distributed context processing for intelligent environments
by: Mantoro, Teddy
Published: (2010)
by: Mantoro, Teddy
Published: (2010)
Unveiling the support of 3D representation in mobile devices for pedestrians navigation aid
by: Abubakar, Adamu, et al.
Published: (2012)
by: Abubakar, Adamu, et al.
Published: (2012)
Web application development process
by: Ibrahim, Adamu Abubakar, et al.
Published: (2011)
by: Ibrahim, Adamu Abubakar, et al.
Published: (2011)
A Coupling and Cohesion Metrics Suite for Object-Oriented Software
by: Husein, S., et al.
Published: (2009)
by: Husein, S., et al.
Published: (2009)
Development of an imputation technique - INI for software metric database with incomplete data
by: Wasito, Ito, et al.
Published: (2007)
by: Wasito, Ito, et al.
Published: (2007)
Computer security and ethics awareness among IIUM students: an empirical study
by: Aliyu, Mansur, et al.
Published: (2010)
by: Aliyu, Mansur, et al.
Published: (2010)
A high-throughput routing metric for multi-hop underwater acoustic networks
by: Azad, Saiful, et al.
Published: (2015)
by: Azad, Saiful, et al.
Published: (2015)
Context Aware Handover Algorithms For Mobile Positioning Systems
by: Zaman Khan, Sazid, et al.
Published: (2014)
by: Zaman Khan, Sazid, et al.
Published: (2014)
BitTorrent: extra-locality P2P approach for grid content distribution networks
by: Mantoro, Teddy, et al.
Published: (2009)
by: Mantoro, Teddy, et al.
Published: (2009)
Development of saliency metric for autonomous landmark selection in cognitive robot navigation / Gao Hanyang
by: Gao , Hanyang
Published: (2022)
by: Gao , Hanyang
Published: (2022)
QSroute: Enhancing software defined networking routing scheme through advanced QoS metrics integration
by: Imran Edzereiq, Kamarudin, et al.
Published: (2025)
by: Imran Edzereiq, Kamarudin, et al.
Published: (2025)
Kulliyyah of Information and Communication Technology (KICT) postgraduate system
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Addressing imbalance in health datasets: A new method NR-clustering SMOTE and distance metric modification
by: Hairani, Hairani, et al.
Published: (2025)
by: Hairani, Hairani, et al.
Published: (2025)
Improving the lifetime of wireless sensor networks based on routing power factor
by: Alkalbani, Abdullah Said, et al.
Published: (2012)
by: Alkalbani, Abdullah Said, et al.
Published: (2012)
Dynamic interactive 3D mobile navigation aid
by: Adamu, Abubakar Ibrahim, et al.
Published: (2012)
by: Adamu, Abubakar Ibrahim, et al.
Published: (2012)
Evaluating Cyber Security Awareness Levels For Employees In DRB-Hicom Auto Solutions
by: Mohd Fadli Kasim,
Published: (2021)
by: Mohd Fadli Kasim,
Published: (2021)
A context-aware architecture for smart space environment
by: Goh, E., et al.
Published: (2007)
by: Goh, E., et al.
Published: (2007)
The effectiveness of problem-based serious games on learning and learning motivation in the context of 3D computer graphics / Meisam Moradi
by: Meisam , Moradi
Published: (2022)
by: Meisam , Moradi
Published: (2022)
Context aware knowledge bases for efficient contextual retrieval: design and methodologies
by: Wani, Sharyar, et al.
Published: (2019)
by: Wani, Sharyar, et al.
Published: (2019)
A mobile dictionary for pilgrims
by: Zeki, Akram M., et al.
Published: (2012)
by: Zeki, Akram M., et al.
Published: (2012)
Fuzzy computing with expressions for evaluating fonts styles on children websites
by: Mahmud, Murni, et al.
Published: (2011)
by: Mahmud, Murni, et al.
Published: (2011)
3D mobile navigation for dynamic users interaction
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Concurrent context-free grammars
by: Mavlankulov, Gairatzhan, et al.
Published: (2014)
by: Mavlankulov, Gairatzhan, et al.
Published: (2014)
Development of computer ethical framework for information security (educational context)
by: Namayander, Meysam
Published: (2009)
by: Namayander, Meysam
Published: (2009)
Energy-efficient and delay-aware offloading scheme using D2D-enabled mobile edge computing / Ramtin Ranji
by: Ramtin , Ranji
Published: (2019)
by: Ramtin , Ranji
Published: (2019)
Binary context-free grammars
by: Turaev, Sherzod, et al.
Published: (2020)
by: Turaev, Sherzod, et al.
Published: (2020)
Cyber Security Awareness Among Students In Ump
by: Nur Madihah, Mazlan
Published: (2023)
by: Nur Madihah, Mazlan
Published: (2023)
NFC based attendance: more than just a touch
by: Zuhedy Zay, Aqqiela Zuhra, et al.
Published: (2015)
by: Zuhedy Zay, Aqqiela Zuhra, et al.
Published: (2015)
Priority based multi-stage laxity-aware workload distribution for collaborative vehicular edge computing / Zeseya Sharmin
by: Zeseya , Sharmin
Published: (2021)
by: Zeseya , Sharmin
Published: (2021)
Software defined networking (SDN) and its security issues
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
A study on green IT awareness among UMP students
by: Farghaly, Alaa Taiseer
Published: (2018)
by: Farghaly, Alaa Taiseer
Published: (2018)
Security awareness: A lesson from Tcpdump and Ethereal
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
Evaluating the quality of UCP-based framework using CK metrics
by: Che Ani, Zhamri, et al.
Published: (2018)
by: Che Ani, Zhamri, et al.
Published: (2018)
Similar Items
-
Metrics evaluation for context-aware computing
by: Mantoro, Teddy
Published: (2009) -
A Context-Aware Based Authorization
System For Pervasive Grid Computing
by: Lim , Marilyn Chien Hui
Published: (2015) -
Prediction of high cost performance metrics in information retrieval evaluation / Muwanei Sinyinda
by: Muwanei , Sinyinda
Published: (2022) -
Evaluated reputation-based trust for WSN security
by: Said Alkalbani, Abdullah, et al.
Published: (2014) -
TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking
by: Afrig, Aminuddin, et al.
Published: (2024)