The needs of collaborative tool for practicing pair programming in educational setting
Pair programming is a technique which is introduced for helping programmers to develop high quality codes. Beside technical aspects, collaboration and working in team are the important skills needed in practicing the technique. These skills are essential to be instilled among our engineering studen...
| Main Authors: | Asnawi, Ani Liza, Ahmad, Amalina, Mohamed Azmin, Nor Fadhillah, Ismail, Kamsiah, Jusoh, Ahmad Zamani, Ibrahim, Siti Noorjannah, Mohd Ramli, Huda Adibah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
International Association of Online Engineering (IAOE) Kirchengasse
2019
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/73268/ http://irep.iium.edu.my/73268/1/AniLiza_IJIM2019.pdf |
Similar Items
The effects of neuroticism on pair programming: an empirical study in the higher education context
by: Salleh, Norsaremah, et al.
Published: (2010)
by: Salleh, Norsaremah, et al.
Published: (2010)
Library online database system (LODS) for undergraduate students to support studies and research: the users evaluation
by: Zulkifli, Zahidah, et al.
Published: (2019)
by: Zulkifli, Zahidah, et al.
Published: (2019)
Comparison of X-band satellite link measurements with radar derived rain attenuation in the tropics
by: Badron, Khairayu, et al.
Published: (2014)
by: Badron, Khairayu, et al.
Published: (2014)
Development of voice control and home security for smart home automation
by: Abidi, M.Ebrahim, et al.
Published: (2018)
by: Abidi, M.Ebrahim, et al.
Published: (2018)
Modelling of intelligent intrusion detection system: making a case for snort
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
A Q-Switched thulium-doped fiber laser with a graphene thin film-based saturable absorber
by: Saidin, Norraida, et al.
Published: (2013)
by: Saidin, Norraida, et al.
Published: (2013)
International collaboration in information and communication technology of Malaysian scholars
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
Collaborative cloud IDS in detecting denial of service by dendritic cell mechanism
by: Ahmad, Azuan, et al.
Published: (2019)
by: Ahmad, Azuan, et al.
Published: (2019)
Simplified channel authentication algorithm for secure quantum key distribution
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
Building textual OLAP cubes using real-time intelligent heterogeneous approach
by: Alzeini, Haytham I. M., et al.
Published: (2018)
by: Alzeini, Haytham I. M., et al.
Published: (2018)
Parameters used in gateway selection schemes for Internet connected MANETs: a review
by: Mahmood, Zainab S., et al.
Published: (2015)
by: Mahmood, Zainab S., et al.
Published: (2015)
Collaborative learning, using Facebook's page and Groups
by: Ataie, Farib, et al.
Published: (2015)
by: Ataie, Farib, et al.
Published: (2015)
KAED ICT labs utilization performance report: semester 1 Vs. semester 2 of 2015/2016
by: Ayob, Mohd Fairullazi
Published: (2016)
by: Ayob, Mohd Fairullazi
Published: (2016)
Reasoning of collaborative human behaviour in security-critical work practices: a framework
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
A Web 2.0-based collaborative learning to promote the practices of Islam as a way of life
by: Ataie, Fariba, et al.
Published: (2019)
by: Ataie, Fariba, et al.
Published: (2019)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Human activity recognition for video surveillance using sequences of postures
by: Htike, Kyaw Kyaw, et al.
Published: (2014)
by: Htike, Kyaw Kyaw, et al.
Published: (2014)
An empirical analysis on the effect of OFDM parameters to the performance of wireless communication system via USRP-based transceiver
by: Muslimin, Jusnaini, et al.
Published: (2017)
by: Muslimin, Jusnaini, et al.
Published: (2017)
Visualization of job availability based on text analytics localization approach
by: Mohamad Zamani, Nur Azmina, et al.
Published: (2019)
by: Mohamad Zamani, Nur Azmina, et al.
Published: (2019)
The use of non-authoring software for the production of an interactive digital image map
by: Jaafar, Samsuddin
Published: (2012)
by: Jaafar, Samsuddin
Published: (2012)
JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
Issues in location based marketing: a review of literature
by: Jaradat, Ahmad, et al.
Published: (2015)
by: Jaradat, Ahmad, et al.
Published: (2015)
Enhancement of fast pedestrian detection using HOG features
by: Baghdadi, Ahmad, et al.
Published: (2015)
by: Baghdadi, Ahmad, et al.
Published: (2015)
The semantics in GPS based mobile applications for blind users navigation outdoor
by: Akbar, Israh, et al.
Published: (2019)
by: Akbar, Israh, et al.
Published: (2019)
Empirical studies of pair programming for CS/SE teaching in higher education: a systematic literature review
by: Salleh, Norsaremah, et al.
Published: (2011)
by: Salleh, Norsaremah, et al.
Published: (2011)
Disparity between theory & practice beyond the worst-case competitive analysis
by: Iqbal, Javeria, et al.
Published: (2019)
by: Iqbal, Javeria, et al.
Published: (2019)
Competitive algorithms for online conversion problems with interrelated prices
by: Iqbal, Javeria, et al.
Published: (2019)
by: Iqbal, Javeria, et al.
Published: (2019)
Protecting personal medical information: Asian perspectives
by: Samsuri, Suhaila, et al.
Published: (2013)
by: Samsuri, Suhaila, et al.
Published: (2013)
Towards implementing a privacy policy: an observation on existing practices in hospital information system
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Privacy models for protecting personal medical information: a preliminary study
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Adopting a knowledge management concept in securing the privacy of electronic medical record systems
by: Samsuri, Suhaila, et al.
Published: (2013)
by: Samsuri, Suhaila, et al.
Published: (2013)
Performance evaluation of multi-user detection in Cdma using micro-genetic algorithm
by: Ahmad, Azmi, et al.
Published: (2005)
by: Ahmad, Azmi, et al.
Published: (2005)
Relation mining using cross correlation of multi domain social networks
by: Noor, Fozia, et al.
Published: (2015)
by: Noor, Fozia, et al.
Published: (2015)
Ethical perspective of students in Global Learning Environment
by: Muhammad, AbdulHafeez, et al.
Published: (2013)
by: Muhammad, AbdulHafeez, et al.
Published: (2013)
A security-based survey and classification of cloud architectures, state of the art and future directions
by: Waqas, Ahmad, et al.
Published: (2013)
by: Waqas, Ahmad, et al.
Published: (2013)
Analysis of design principles and requirements for procedural rigging of bipeds and quadrupeds characters with custom manipulators for animation
by: Bhati, Zeeshan, et al.
Published: (2015)
by: Bhati, Zeeshan, et al.
Published: (2015)
Information sharing in governance of flood management in Malaysia: COBIT based framework
by: Maidin, Siti Sarah, et al.
Published: (2014)
by: Maidin, Siti Sarah, et al.
Published: (2014)
A revised free space path loss (FSPL) formulation for satellite link operating in tropical region
by: Badron, Khairayu, et al.
Published: (2019)
by: Badron, Khairayu, et al.
Published: (2019)
Sharing of attacks information across clouds for improving security:a conceptual framework
by: Waqas, Ahmad, et al.
Published: (2014)
by: Waqas, Ahmad, et al.
Published: (2014)
Implementation e-government initiatives among Malaysian local authorities
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
Similar Items
-
The effects of neuroticism on pair programming: an empirical study in the higher education context
by: Salleh, Norsaremah, et al.
Published: (2010) -
Library online database system (LODS) for undergraduate students to support studies and research: the users evaluation
by: Zulkifli, Zahidah, et al.
Published: (2019) -
Comparison of X-band satellite link measurements with radar derived rain attenuation in the tropics
by: Badron, Khairayu, et al.
Published: (2014) -
Development of voice control and home security for smart home automation
by: Abidi, M.Ebrahim, et al.
Published: (2018) -
Modelling of intelligent intrusion detection system: making a case for snort
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)