168 results on '"· Taibi, D."'
Search Results
2. Learning to Prompt in the Classroom to Understand AI Limits: A Pilot Study
- Author
-
Basili, R, Lembo, D, Limongelli, C, Orlandini, A, Theophilou, E, Koyutürk, C, Yavari, M, Bursic, S, Donabauer, G, Telari, A, Testa, A, Boiano, R, Hernandez-Leo, D, Ruskov, M, Taibi, D, Gabbiadini, A, Ognibene, D, Theophilou E., Koyutürk C., Yavari M., Bursic S., Donabauer G., Telari A., Testa A., Boiano R., Hernandez-Leo D., Ruskov M., Taibi D., Gabbiadini A., Ognibene D., Basili, R, Lembo, D, Limongelli, C, Orlandini, A, Theophilou, E, Koyutürk, C, Yavari, M, Bursic, S, Donabauer, G, Telari, A, Testa, A, Boiano, R, Hernandez-Leo, D, Ruskov, M, Taibi, D, Gabbiadini, A, Ognibene, D, Theophilou E., Koyutürk C., Yavari M., Bursic S., Donabauer G., Telari A., Testa A., Boiano R., Hernandez-Leo D., Ruskov M., Taibi D., Gabbiadini A., and Ognibene D.
- Abstract
Artificial intelligence’s (AI) progress holds great promise in tackling pressing societal concerns such as health and climate. Large Language Models (LLM) and the derived chatbots, like ChatGPT, have highly improved the natural language processing capabilities of AI systems allowing them to process an unprecedented amount of unstructured data. However, the ensuing excitement has led to negative sentiments, even as AI methods demonstrate remarkable contributions (e.g. in health and genetics). A key factor contributing to this sentiment is the misleading perception that LLMs can effortlessly provide solutions across domains, ignoring their limitations such as hallucinations and reasoning constraints. Acknowledging AI fallibility is crucial to address the impact of dogmatic overconfidence in possibly erroneous suggestions generated by LLMs. At the same time, it can reduce fear and other negative attitudes toward AI. This necessitates comprehensive AI literacy interventions that educate the public about LLM constraints and effective usage techniques, i.e. prompting strategies. With this aim, a pilot educational intervention was performed in a high school with 21 students. It involved presenting high-level concepts about intelligence, AI, and LLMs, followed by practical exercises involving ChatGPT in creating natural educational conversations and applying established prompting strategies. Encouraging preliminary results emerged, including high appreciation of the activity, improved interaction quality with the LLM, reduced negative AI sentiments, and a better grasp of limitations, specifically unreliability, limited understanding of commands leading to unsatisfactory responses, and limited presentation flexibility. Our aim is to explore AI acceptance factors and refine this approach for more controlled future studies.
- Published
- 2023
3. Preface
- Author
-
Fulantelli G., Burgos D., Casalino G., Cimitile M., Lo Bosco G., Taibi D., Giovanni Fulantelli, Daniel Burgos, Gabriella Casalino, Marta Cimitile, Giosuè Lo Bosco, Davide Taibi, Fulantelli G., Burgos D., Casalino G., Cimitile M., Lo Bosco G., and Taibi D.
- Subjects
Higher Education Online Learning Methodologies ,Higher Education Online Learning Technologies - Abstract
This volume of Communications in Computer and Information Science (CCIS) contains the post-proceedings of HELMeTO 2022, the fourth International Conference on Higher Education Learning Methodologies and Technologies Online, which took place during September 21–23, 2022 in Palermo, Italy. The conference was organized by the Department of Mathematics and Computer Science at the University of Palermo and by the Institute of Educational Technology of the National Research Council of Italy. The 2022 edition of HELMeTO also marked the return of the event in presence, as the previous two editions had been held entirely online due to the Covid-19 emergency
- Published
- 2023
4. Empirically Investigating Virtual Learning Companions to Enhance Social Media Literacy
- Author
-
Fulantelli, G, Burgos, D, Casalino, G, Cimitile, M, Lo Bosco, G, Taibi, D, Theophilou, E, Schwarze, V, Börsting, J, Sánchez-Reina, R, Scifo, L, Lomonaco, F, Aprin, F, Ognibene, D, Hernández-Leo, D, Eimler, S, Fulantelli, G, Burgos, D, Casalino, G, Cimitile, M, Lo Bosco, G, Taibi, D, Theophilou, E, Schwarze, V, Börsting, J, Sánchez-Reina, R, Scifo, L, Lomonaco, F, Aprin, F, Ognibene, D, Hernández-Leo, D, and Eimler, S
- Abstract
Social media platforms provide opportunities for users across the world to connect and communicate between them and engage into acts of social support and entertainment. Yet it can also bring negative consequences as it has been associated with poor mental health and life dissatisfaction. This underlines the importance of delivering social media literacy (SML) interventions that raise awareness of the dangers and threats that are hidden within. To this date, SML initiatives have shown their benefits towards the acquisition of SML skills through the forms of school interventions and mini-games. However, studies on promoting SML through social media platforms need to be also encouraged and innovative approaches to provide interactive scenarios with hands-on experiences need to be formulated. Hence, the project COURAGE introduces a new approach towards SML by proposing the integration of educational opportunities within a controlled social media platform. To provide students the opportunity to learn whilst they naturally explore social media we propose the integration of virtual learning companions. In this paper we report seven empirical approaches towards SML skills acquisition powered by virtual learning companions. The paper concludes with a discussion towards the benefits and limitations of using this type of SML interventions.
- Published
- 2023
5. The anatomy of a vulnerability database:a systematic mapping study
- Author
-
Li, X. (Xiaozhou), Moreschini, S. (Sergio), Zhang, Z. (Zheying), Palomba, F. (Fabio), Taibi, D. (Davide), Li, X. (Xiaozhou), Moreschini, S. (Sergio), Zhang, Z. (Zheying), Palomba, F. (Fabio), and Taibi, D. (Davide)
- Abstract
Software vulnerabilities play a major role, as there are multiple risks associated, including loss and manipulation of private data. The software engineering research community has been contributing to the body of knowledge by proposing several empirical studies on vulnerabilities and automated techniques to detect and remove them from source code. The reliability and generalizability of the findings heavily depend on the quality of the information mineable from publicly available datasets of vulnerabilities as well as on the availability and suitability of those databases. In this paper, we seek to understand the anatomy of the currently available vulnerability databases through a systematic mapping study where we analyze (1) what are the popular vulnerability databases adopted; (2) what are the goals for adoption; (3) what are the other sources of information adopted; (4) what are the methods and techniques; (5) which tools are proposed. An improved understanding of these aspects might not only allow researchers to take informed decisions on the databases to consider when doing research but also practitioners to establish reliable sources of information to inform their security policies and standards.
- Published
- 2023
6. Visualizing anti-patterns in microservices at runtime:a systematic mapping study
- Author
-
Parker, G. (Garrett), Kim, S. (Samuel), Maruf, A. A. (Abdullah Al), Cerny, T. (Tomas), Frajtak, K. (Karel), Tisnovsky, P. (Pavel), Taibi, D. (Davide), Parker, G. (Garrett), Kim, S. (Samuel), Maruf, A. A. (Abdullah Al), Cerny, T. (Tomas), Frajtak, K. (Karel), Tisnovsky, P. (Pavel), and Taibi, D. (Davide)
- Abstract
In the world of microservices, companies must be able to create systems that operate in the most efficient way. To achieve this, anti-patterns must be avoided because of their detriment to the quality of the system. Some of the most troubling anti-patterns are hard to detect because of their appearance at runtime. Effectively removing anti-patterns from a system requires dynamic analysis because of the large size of microservice-based systems. While the detection of anti-patterns is helpful, being able to visualize them offers a great benefit to companies working with microservices. Seeing how the overall system is flowing and recognizing the existence of anti-patterns can help improve microservice-based systems. In this paper, a systematic mapping study was performed to find the current state of research on visualizing anti-patterns in microservices from the dynamic perspective. Several hundred papers were examined and a total of 31 were found to be relevant to the research topic. The papers, when analyzed, revealed that there are mechanisms to detect anti-patterns at runtime in microservices, and there are also mechanisms for visualizing the architecture of a microservice-based system. This study’s findings could help to identify and remove anti-patterns that occur during runtime in microservices, as well as a means of visualizing these anti-patterns.
- Published
- 2023
7. Analyzing organizational structure of microservice projects based on contributor collaboration
- Author
-
Li, X. (Xiaozhou), Abdelfattah, A. S. (Amr S.), Yero, J. (Jorge), d'Aragona, D. A. (Dario Amoroso), Cerny, T. (Tomas), Taibi, D. (Davide), Li, X. (Xiaozhou), Abdelfattah, A. S. (Amr S.), Yero, J. (Jorge), d'Aragona, D. A. (Dario Amoroso), Cerny, T. (Tomas), and Taibi, D. (Davide)
- Abstract
Software system quality is strongly affected by the organizational structure and collaboration across developers. Effective and loosely coupled organization structures reflect the high quality of the system architecture and the efficiency with which this system can evolve. Especially for microservice-based systems, as the notion of “one-microservice-per-team” is highly recommended and advocated as one of the best practices in the industry, it is crucial for the companies to be aware of the status of their organizational structure and the critical contributors therein. To such an end, this paper proposes an approach to analyze the organizational structure of microservice-based software projects in terms of contributor collaboration and to identify the core contributors therein. Furthermore, we can also monitor the evolution of the project’s organizational structure via the growing collaboration activities through different releases. The proposed method shall help the companies and organizations adopting microservices better understand their organizational structure and make more effective decisions in maintaining the quality of microservice architectures.
- Published
- 2023
8. Microservice logical coupling:a preliminary validation
- Author
-
d’Aragona, D. A. (Dario Amoroso), Pascarella, L. (Luca), Janes, A. (Andrea), Lenarduzzi, V. (Valentina), Taibi, D. (Davide), d’Aragona, D. A. (Dario Amoroso), Pascarella, L. (Luca), Janes, A. (Andrea), Lenarduzzi, V. (Valentina), and Taibi, D. (Davide)
- Abstract
Coupling is one of the most frequently mentioned metric in software systems. However, to measure logical coupling between microservices, runtime information is needed or the availability of service-log files to analyze the calls between services is required. This work presents our emerging results, in which we propose a metric to statically calculate logical coupling between microservices based on commits to versioning systems. We performed an initial validation of the proposed metric with a dataset containing 145 open-source microservices projects. The results illustrate how logical coupling affects every system and increases overtime. However, we did not find a correlation between the number of commits or the number of developers and the introduction of logical coupling. In future, we investigate why, how, and when logical coupling is introduced in a system.
- Published
- 2023
9. Comparing 2D and augmented reality visualizations for microservice system understandability:a controlled experiment
- Author
-
Abdelfattah, A. S. (Amr S.), Cerny, T. (Tomas), Taibi, D. (Davide), Vegas, S. (Sira), Abdelfattah, A. S. (Amr S.), Cerny, T. (Tomas), Taibi, D. (Davide), and Vegas, S. (Sira)
- Abstract
Microservice-based systems are often complex to understand, especially when their sizes grow. Abstracted views help practitioners with the system understanding from a certain perspective. Recent advancement in interactive data visualization begs the question of whether established software engineering models to visualize system design remain the most suited approach for the service-oriented design of microservices. Our recent work proposed presenting a 3D visualization for microservices in augmented reality. This paper analyzes whether such an approach brings any benefits to practitioners when dealing with selected architectural questions related to system design quality. For this purpose, we conducted a controlled experiment involving 20 participants investigating their performance in identifying service dependency, service cardinality, and bottlenecks. Results show that the 3D enables novices to perform as well as experts in the detection of service dependencies, especially in large systems, while no differences are reported for the identification of service cardinality and bottlenecks. We recommend industry and researchers to further investigate AR for microservice architectural analysis, especially to ease the onboarding of new developers in microservice projects.
- Published
- 2023
10. Resolving security issues via quality-oriented refactoring:a user study
- Author
-
Gigante, D. (Domenico), Pecorelli, F. (Fabiano), Barletta, V. S. (Vita Santa), Janes, A. (Andrea), Lenarduzzi, V. (Valentina), Taibi, D. (Davide), Baldassarre, M. T. (Maria Teresa), Gigante, D. (Domenico), Pecorelli, F. (Fabiano), Barletta, V. S. (Vita Santa), Janes, A. (Andrea), Lenarduzzi, V. (Valentina), Taibi, D. (Davide), and Baldassarre, M. T. (Maria Teresa)
- Abstract
Software quality is crucial in software development: if not addressed in early phases of the software development life cycle, it may even lead to technical bankruptcy, i.e., a situation in which modifications cost more than redeveloping the application from scratch. In addition, code security must also be addressed to reduce software vulnerabilities and to comply with legal requirements. In this work, we aim to investigate the relationship between refactoring code quality and software security, with the purpose of understanding whether and to what extent improving software quality could have a positive impact on software security as well. Specifically, we investigate to what extent rule violations of a software quality tool such as SonarQube overlap with rule violations of a software vulnerability tool like Fortify Static Code Analyzer. We first compared the rules encoded in the quality models of both tools, to discover possible overlapping cases. Later, we compared the issues raised by both tools on a set of open source Java projects; we also investigated the cases in which a quality refactoring process impacts over software security (thus removing one or more vulnerabilities). We furthermore validated our results statistically. Our results show that resolving software quality issues might also resolve security issues but only in part: many security issues still persist in the source code; also, some quality aspects are more likely to be improved in respect to others. In addition, this empirical study uncovers rule co-occurrences between the two tools. This study confirms the need for using a security-oriented static analysis tool to enforce software security instead of relying only on a quality-oriented one. Results have highlighted important insights for practitioners.
- Published
- 2023
11. Benchmarks for end-to-end microservices testing
- Author
-
Smith, S. (Sheldon), Robinson, E. (Ethan), Frederiksen, T. (Timmy), Stevens, T. (Trae), Cerny, T. (Tomas), Bures, M. (Miroslav), Taibi, D. (Davide), Smith, S. (Sheldon), Robinson, E. (Ethan), Frederiksen, T. (Timmy), Stevens, T. (Trae), Cerny, T. (Tomas), Bures, M. (Miroslav), and Taibi, D. (Davide)
- Abstract
Testing microservice systems involves a large amount of planning and problem-solving. The difficulty of testing microservice systems increases as the size and structure of such systems become more complex. To help the microservice community and simplify experiments with testing and traffic simulation, we created a test benchmark containing full functional testing coverage for two well-established open-source microservice systems. Through our benchmark design, we aimed to demonstrate ways to overcome certain challenges and find effective strategies when testing microservices. In addition, to demonstrate our benchmark use, we conducted a case study to identify the best approaches to take to validate a full coverage of tests using service-dependency graph discovery and business process discovery using tracing.
- Published
- 2023
12. Edge computing tasks orchestration:an energy-aware approach
- Author
-
Thomsen, J. L. (Johan Løhde), Dragsbæk Schmidt Thomsen, K. (Kristian), Schmidt, R. B. (Rasmus B.), Jakobsgaard, S. D. (Søren D.), Beregaard, T. (Thor), Albano, M. (Michele), Moreschini, S. (Sergio), Taibi, D. (Davide), Thomsen, J. L. (Johan Løhde), Dragsbæk Schmidt Thomsen, K. (Kristian), Schmidt, R. B. (Rasmus B.), Jakobsgaard, S. D. (Søren D.), Beregaard, T. (Thor), Albano, M. (Michele), Moreschini, S. (Sergio), and Taibi, D. (Davide)
- Abstract
In this paper, we investigate experimentally the use of auctioning as a method for optimizing task orchestration in distributed computing systems by making selfish agents compete to execute computational tasks. Our goal is to find an approach that can improve the performance of these systems, using a deadline, fines, and reward limits in a reverse second-price sealed bid auction, to incentive and control the system, specifically in terms of improving task throughput and power consumption. With improvements to both energy consumption and task throughput, we have developed a promising approach, that is able to scale with the number of machines in the system. Results suggest that this type of auction may be useful for improving the implementation of these systems in a wide range of scenarios.
- Published
- 2023
13. MLOps pipeline development:the OSSARA use case
- Author
-
Moreschini, S. (Sergio), Hästbacka, D. (David), Taibi, D. (Davide), Moreschini, S. (Sergio), Hästbacka, D. (David), and Taibi, D. (Davide)
- Abstract
Software development based on MLOps practices is entering its early adoption stage. As for it, practitioners and researchers are starting to develop pipelines composed of tools capable of automating the whole software lifecycle. The development of the pipeline however is not as straightforward as it looks and some key points need to be addressed. In this work, we propose our vision for the development of the MLOps pipeline by showing what to keep into account when choosing the tools for each step of a pipeline. The proposition has been backed up by describing a developed use case scenario: the OSSARA use case. We believe that the presented use case, as well as the remarks presented for the process of tool selection for each MLOps phase, will help practitioners and researchers in the process of developing their own pipelines.
- Published
- 2023
14. Catalog and detection techniques of microservice anti-patterns and bad smells:a tertiary study
- Author
-
Cerny, T. (Tomas), Abdelfattah, A. S. (Amr S.), Maruf, A. A. (Abdullah Al), Janes, A. (Andrea), Taibi, D. (Davide), Cerny, T. (Tomas), Abdelfattah, A. S. (Amr S.), Maruf, A. A. (Abdullah Al), Janes, A. (Andrea), and Taibi, D. (Davide)
- Abstract
Background: Various works investigated microservice anti-patterns and bad smells in the past few years. We identified seven secondary publications that summarize these, but they have little overlap in purpose and often use different terms to describe the identified anti-patterns and smells. Objective: This work catalogs recurring bad design practices known as anti-patterns and bad smells for microservice architectures, and provides a classification into categories as well as methods for detecting these practices. Method: We conducted a systematic literature review in the form of a tertiary study targeting secondary studies identifying poor design practices for microservices. Results: We provide a comprehensive catalog of 58 disjoint anti-patterns, grouped into five categories, which we derived from 203 originally identified anti-patterns for microservices. Conclusion: The results provide a reference to microservice developers to design better-quality systems and researchers who aim to detect system quality based on anti-patterns. It also serves as an anti-pattern catalog for development-aiding tools, which are not currently available for microservice system development but could mitigate quality degradation throughout system evolution.
- Published
- 2023
15. Technical debt diffuseness in the Apache ecosystem:a differentiated replication
- Author
-
d’Aragona, D. A. (Dario Amoroso), Pecorelli, F. (Fabiano), Baldassarre, M. T. (Maria Teresa), Taibi, D. (Davide), Lenarduzzi, V. (Valentina), d’Aragona, D. A. (Dario Amoroso), Pecorelli, F. (Fabiano), Baldassarre, M. T. (Maria Teresa), Taibi, D. (Davide), and Lenarduzzi, V. (Valentina)
- Abstract
Technical debt management is a critical activity that is gaining the attention of both practitioners and researchers. Several tools providing automatic support for technical debt management have been introduced over the last years. SonarQube is one of the most widely applied tools to automatically measure technical debt in software systems. SonarQube has been adopted to quantify the diffuseness of technical debt in projects of the Apache Software Foundation ecosystem. Lenarduzzi et al. [1] found that the vast majority of technical debt issues in the code are code smells and that, surprisingly, developers tend to take more time to remove severe issues than the less-severe ones. While this study provides very interesting insights both for researchers and practitioners interested in technical debt management, we identified some major limitations that could have led to results that do not perfectly reflect reality. This study aims to address such limitations by presenting a differentiated replication study. Our findings have pointed out significant differences with the reference work. The results show that technical debt issues appear much more rarely than what the reference work reported. In this study, we implemented a new methodology to calculate the diffuseness of SonarQube issues at project and commit level, based on the reconstruction of the SonarQube quality profile in order to understand how the quality profile has evolved and to compare the number of active rules per category and severity level with the respective number of issues found. The results show that over 50% of rules active in the quality profile, are Code Smell rules and that over 90% of the issues belong to Code Smell category. Furthermore, analyzing the life span of the issues, we found that developers take into account the level of severity of the issues only for the Bug category, thus fixing the issues starting from the most severe, which is not the case for the other categories.
- Published
- 2023
16. Yes, Echo-Chambers Mislead You Too: A Game-Based Educational Experience to Reveal the Impact of Social Media Personalization Algorithms
- Author
-
Fulantelli, G, Burgos, D, Casalino, G, Cimitile, M, Lo Bosco, G, Taibi, D, Lomonaco, F, Trianni, V, Buršić, S, Donabauer, G, Ognibene, D, Fulantelli, G, Burgos, D, Casalino, G, Cimitile, M, Lo Bosco, G, Taibi, D, Lomonaco, F, Trianni, V, Buršić, S, Donabauer, G, and Ognibene, D
- Abstract
We present a digital media literacy activity composed of (i) an educational talk and (ii) a game-based activity. The aim is to support teachers in developing learning activities to increase awareness of social media threats among students. Through this activity students directly experience phenomena like echo chambers and filter bubbles that can be provoked by harmful online interaction dynamics controlled by social media platforms’ recommender systems while remaining invisible to the affected users. Our preliminary findings show that a game-based direct experience, inspired by the wisdom of crowds phenomenon, can increase the perception of social media influence on participants with statistically significant results compared to standard lecture-based activity. We conclude that developing a tool enabling educators and scholars to easily perform the proposed activity can be helpful to improve digital media literacy effectiveness.
- Published
- 2023
17. The Role of Educational Interventions in Facing Social Media Threats: Overarching Principles of the COURAGE Project
- Author
-
Fulantelli, G, Burgos, D, Casalino, G, Cimitile, M, Lo Bosco, G, Taibi, D, Börsting, J, Hoppe, U, Ognibene, D, Hernández-Leo, D, Eimler, S, Kruschwitz, U, Taibi, Davide, Börsting, Johanna, Hoppe, Ulrich, Ognibene, Dimitri, Hernández-Leo, Davinia, Eimler, Sabrina C., Kruschwitz, Udo, Fulantelli, G, Burgos, D, Casalino, G, Cimitile, M, Lo Bosco, G, Taibi, D, Börsting, J, Hoppe, U, Ognibene, D, Hernández-Leo, D, Eimler, S, Kruschwitz, U, Taibi, Davide, Börsting, Johanna, Hoppe, Ulrich, Ognibene, Dimitri, Hernández-Leo, Davinia, Eimler, Sabrina C., and Kruschwitz, Udo
- Abstract
Social media are offering new opportunities for communication and interaction way beyond what was possible only a few years ago. However, social media are also virtual spaces where young people are exposed to a variety of threats. Digital addiction, discrimination, hate speech, misinformation, polarization as well as manipulative influences of algorithms, body stereotyping, and cyberbullying are examples of challenges that find fertile ground on social media. Educators and students are not adequately prepared to face these challenges. To this aim, the COURAGE project, presented in this paper, introduces new tools and learning methodologies that can be adopted within higher education learning paths to train educators to deal with social media threats. The overarching principles of the COURAGE project leverage the most recent advances in the fields of artificial intelligence and in the educational domain paired with social and media psychological insights to support the development of the COURAGE ecosystem. The results of the experiments currently implemented with teachers and students of secondary schools as well as the impact of the COURAGE project on societal changes and ethical questions are presented and discussed.
- Published
- 2023
18. The “Courage Companion” – An AI-Supported Environment for Training Teenagers in Handling Social Media Critically and Responsibly
- Author
-
Fulantelli, G, Burgos, D, Casalino, G, Cimitile, M, Lo Bosco, G, Taibi, D, Aprin, F, Malzahn, N, Lomonaco, F, Donabauer, G, Ognibene, D, Kruschwitz, U, Hernández-Leo, D, Hoppe, H, Aprin, Farbod, Malzahn, Nils, Lomonaco, Francesco, Donabauer, Gregor, Ognibene, Dimitri, Kruschwitz, Udo, Hernández-Leo, Davinia, Fulantelli, Giovanni, Hoppe, H. Ulrich, Fulantelli, G, Burgos, D, Casalino, G, Cimitile, M, Lo Bosco, G, Taibi, D, Aprin, F, Malzahn, N, Lomonaco, F, Donabauer, G, Ognibene, D, Kruschwitz, U, Hernández-Leo, D, Hoppe, H, Aprin, Farbod, Malzahn, Nils, Lomonaco, Francesco, Donabauer, Gregor, Ognibene, Dimitri, Kruschwitz, Udo, Hernández-Leo, Davinia, Fulantelli, Giovanni, and Hoppe, H. Ulrich
- Abstract
The provision of toxic content and misinformation is a frequent phenomenon in current social media with specific impact and risks for younger users. We report on efforts taken in the project Courage to mitigate and overcome these threats through dedicated educational technology inspired by psychological and pedagogical approaches. The aim is to empower adolescents to confidently interact with and utilize social media and to increase their awareness and resilience. For this purpose, we have adopted approaches from the field of Intelligent Tutoring Systems, namely the provision of a virtual learning companion (VLC). The technical system is a browser-based environment that allows for combining a controllable social media space with a VLC as a plugin. This environment is backed by an API that bundles Machine Learning and Natural Language Processing algorithms for detecting and classifying different types of risks. The pedagogical scenarios that are supported by this technical environment and approach range from chat-based dialogues to more complex narrative scripts.
- Published
- 2023
19. Challenging social media threats using collective well-being-aware recommendation algorithms and an educational virtual companion
- Author
-
Ognibene, D, Wilkens, R, Taibi, D, Hernández-Leo, D, Kruschwitz, U, Donabauer, G, Theophilou, E, Lomonaco, F, Bursic, S, Alejandro Lobo, R, Roberto Sánchez-Reina, J, Scifo, L, Schwarze, V, Börsting, J, Hoppe, U, Aprin, F, Malzahn, N, Sabrina Eimler, A, Dimitri Ognibene, Rodrigo Wilkens, Davide Taibi, Davinia Hernández-Leo, Udo Kruschwitz, Gregor Donabauer, Emily Theophilou, Francesco Lomonaco, Sathya Bursic, Rene Alejandro Lobo, J. Roberto Sánchez-Reina, Lidia Scifo, Veronica Schwarze, Johanna Börsting, Ulrich Hoppe, Farbod Aprin, Nils Malzahn, and Sabrina Eimler, Ognibene, D, Wilkens, R, Taibi, D, Hernández-Leo, D, Kruschwitz, U, Donabauer, G, Theophilou, E, Lomonaco, F, Bursic, S, Alejandro Lobo, R, Roberto Sánchez-Reina, J, Scifo, L, Schwarze, V, Börsting, J, Hoppe, U, Aprin, F, Malzahn, N, Sabrina Eimler, A, Dimitri Ognibene, Rodrigo Wilkens, Davide Taibi, Davinia Hernández-Leo, Udo Kruschwitz, Gregor Donabauer, Emily Theophilou, Francesco Lomonaco, Sathya Bursic, Rene Alejandro Lobo, J. Roberto Sánchez-Reina, Lidia Scifo, Veronica Schwarze, Johanna Börsting, Ulrich Hoppe, Farbod Aprin, Nils Malzahn, and and Sabrina Eimler
- Abstract
Social media have become an integral part of our lives, expanding our interlinking capabilities to new levels. There is plenty to be said about their positive effects. On the other hand, however, some serious negative implications of social media have been repeatedly highlighted in recent years, pointing at various threats to society and its more vulnerable members, such as teenagers, in particular, ranging from much-discussed problems such as digital addiction and polarization to manipulative influences of algorithms and further to more teenager-specific issues (e.g., body stereotyping). The impact of social media—both at an individual and societal level—is characterized by the complex interplay between the users' interactions and the intelligent components of the platform. Thus, users' understanding of social media mechanisms plays a determinant role. We thus propose a theoretical framework based on an adaptive “Social Media Virtual Companion” for educating and supporting an entire community, teenage students, to interact in social media environments in order to achieve desirable conditions, defined in terms of a community-specific and participatory designed measure of Collective Well-Being (CWB). This Companion combines automatic processing with expert intervention and guidance. The virtual Companion will be powered by a Recommender System (CWB-RS) that will optimize a CWB metric instead of engagement or platform profit, which currently largely drives recommender systems thereby disregarding any societal collateral effect. CWB-RS will optimize CWB both in the short term by balancing the level of social media threats the users are exposed to, and in the long term by adopting an Intelligent Tutor System role and enabling adaptive and personalized sequencing of playful learning activities. We put an emphasis on experts and educators in the educationally managed social media community of the Companion. They play five key roles: (a) use the Companion in classroom-base
- Published
- 2023
20. Tilt-fractional order proportional integral derivative control for DC motor using particle swarm optimization
- Author
-
Amieur, T., primary, Taibi, D., additional, Kahla, S., additional, Bechouat, M., additional, and Sedraoui, M., additional
- Published
- 2023
- Full Text
- View/download PDF
21. A systematic literature review on Technical Debt prioritization: Strategies, processes, factors, and tools
- Author
-
Lenarduzzi, V, Besker, T, Taibi, D, Martini, A, Arcelli Fontana, F, Lenarduzzi V., Besker T., Taibi D., Martini A., Arcelli Fontana F., Lenarduzzi, V, Besker, T, Taibi, D, Martini, A, Arcelli Fontana, F, Lenarduzzi V., Besker T., Taibi D., Martini A., and Arcelli Fontana F.
- Abstract
Background: Software companies need to manage and refactor Technical Debt issues. Therefore, it is necessary to understand if and when refactoring of Technical Debt should be prioritized with respect to developing features or fixing bugs. Objective: The goal of this study is to investigate the existing body of knowledge in software engineering to understand what Technical Debt prioritization approaches have been proposed in research and industry. Method: We conducted a Systematic Literature Review of 557 unique papers published until 2020, following a consolidated methodology applied in software engineering. We included 44 primary studies. Results: Different approaches have been proposed for Technical Debt prioritization, all having different goals and proposing optimization regarding different criteria. The proposed measures capture only a small part of the plethora of factors used to prioritize Technical Debt qualitatively in practice. We present an impact map of such factors. However, there is a lack of empirical and validated set of tools. Conclusion: We observed that Technical Debt prioritization research is preliminary and there is no consensus on what the important factors are and how to measure them. Consequently, we cannot consider current research conclusive. In this paper, we therefore outline different directions for necessary future investigations.
- Published
- 2021
22. An Overview and Comparison of Technical Debt Measurement Tools
- Author
-
Avgeriou, P, Taibi, D, Ampatzoglou, A, Arcelli Fontana, F, Besker, T, Chatzigeorgiou, A, Lenarduzzi, V, Martini, A, Moschou, N, Pigazzini, I, Saarimaki, N, Sas, D, de Toledo, S, Tsintzira, A, Avgeriou P. C., Taibi D., Ampatzoglou A., Arcelli Fontana F., Besker T., Chatzigeorgiou A., Lenarduzzi V., Martini A., Moschou N., Pigazzini I., Saarimaki N., Sas D. D., de Toledo S. S., Tsintzira A. A., Avgeriou, P, Taibi, D, Ampatzoglou, A, Arcelli Fontana, F, Besker, T, Chatzigeorgiou, A, Lenarduzzi, V, Martini, A, Moschou, N, Pigazzini, I, Saarimaki, N, Sas, D, de Toledo, S, Tsintzira, A, Avgeriou P. C., Taibi D., Ampatzoglou A., Arcelli Fontana F., Besker T., Chatzigeorgiou A., Lenarduzzi V., Martini A., Moschou N., Pigazzini I., Saarimaki N., Sas D. D., de Toledo S. S., and Tsintzira A. A.
- Abstract
There are numerous commercial tools and research prototypes that offer support for measuring technical debt. However, different tools adopt different terms, metrics, and ways to identify and measure technical debt. These tools offer diverse features, and their popularity / community support varies significantly. Therefore, (a) practitioners face difficulties when trying to select a tool matching their needs; and (b) the concept of technical debt and its role in software development is blurred. We attempt to clarify the situation by comparing the features and popularity of technical debt measurement tools, and analyzing the existing empirical evidence on their validity. Our findings can help practitioners to find the most suitable tool for their purposes, and researchers by highlighting the current tool shortcomings.
- Published
- 2021
23. Visualizing microservice architecture in the dynamic perspective:a systematic mapping study
- Author
-
Gortney, M. E. (Mia E.), Harris, P. E. (Patrick E.), Cerny, T. (Tomas), Maruf, A. A. (Abdullah Al), Bures, M. (Miroslav), Taibi, D. (Davide), Tisnovsky, P. (Pavel), Gortney, M. E. (Mia E.), Harris, P. E. (Patrick E.), Cerny, T. (Tomas), Maruf, A. A. (Abdullah Al), Bures, M. (Miroslav), Taibi, D. (Davide), and Tisnovsky, P. (Pavel)
- Abstract
As microservices become more popular, more drawbacks become apparent to developers. One issue that many teams face today is the failure to visualize the entire system architecture holistically. Without a full view of the system, the architecture can become convoluted as teams add and subtract from their system without reconciling their changes. One established practice to determine a view on the entire system involves dynamic analysis of microservice interaction and dependencies. In this mapping study, we investigate dynamic analysis as a way to visualize system architecture. Capturing the architectural view with dynamic analysis has the ability to build the system and then show its behavior at run-time. We identify dynamic analysis techniques, the corresponding tools, and the models that these practices can generate. The findings of this study are relevant to developers of decentralized systems looking for a way to visualize their system architecture in a dynamic perspective.
- Published
- 2022
24. Cloud continuum:the definition
- Author
-
Moreschini, S. (Sergio), Pecorelli, F. (Fabiano), Li, X. (Xiaozhou), Naz, S. (Sonia), Hästbacka, D. (David), Taibi, D. (Davide), Moreschini, S. (Sergio), Pecorelli, F. (Fabiano), Li, X. (Xiaozhou), Naz, S. (Sonia), Hästbacka, D. (David), and Taibi, D. (Davide)
- Abstract
The cloud continuum concept has drawn increasing attention from practitioners, academics, and funding agencies and been adopted progressively. However, the concept remains mired in various definitions with different studies providing contrasting descriptions. Therefore, to understand the concept of cloud continuum and to provide its definition, in this work we conduct a systematic mapping study of the literature investigating the different definitions, how they evolved, and where does the cloud continue. The main outcome of this work is a complete definition that merges all the common aspects of cloud continuum, which enables practitioners and researchers to better understand what cloud continuum is.
- Published
- 2022
25. Architectural languages in the microservice era:a systematic mapping study
- Author
-
Lelovic, L. (Luka), Mathews, M. (Michael), Elsayed, A. (Amr), Cerny, T. (Tomas), Frajtak, K. (Karel), Tisnovsky, P. (Pavel), Taibi, D. (Davide), Lelovic, L. (Luka), Mathews, M. (Michael), Elsayed, A. (Amr), Cerny, T. (Tomas), Frajtak, K. (Karel), Tisnovsky, P. (Pavel), and Taibi, D. (Davide)
- Abstract
In modern software systems, Microservice Architecture (MSA) has gained popularity over monolithic design by providing the ability for flexible and independently upgradable services. Although there are considerable benefits that MSA provides, as new microservices are introduced into these MSA-based systems, they can become increasingly complex and hard to understand. Architectural languages are a potential solution to this problem because they can provide a comprehensive overview of system’s architecture as it changes. In this paper, the authors conduct a systematic mapping study to identify the architectural languages discussed in academia. In particular, the authors observe the architectural languages that have the capability of representing MSA-based systems. Through the use of a detailed query in 4 reliable indexers, a collection of 402 papers were filtered down to a small set of 19 relevant papers. This filtration was done based on a research paper inclusion criteria and a language inclusion criteria. With these papers, a total of 12 architectural languages were investigated for the representation of MSA-based systems.
- Published
- 2022
26. A systematic literature review on Technical Debt prioritization: Strategies, processes, factors, and tools
- Author
-
Lenarduzzi V., Besker T., Taibi D., Martini A., Arcelli Fontana F., Lenarduzzi, V, Besker, T, Taibi, D, Martini, A, and Arcelli Fontana, F
- Subjects
Technical Debt prioritization ,Technical Debt ,ING-INF/05 - SISTEMI DI ELABORAZIONE DELLE INFORMAZIONI ,Systematic Literature Review - Abstract
Background: Software companies need to manage and refactor Technical Debt issues. Therefore, it is necessary to understand if and when refactoring of Technical Debt should be prioritized with respect to developing features or fixing bugs. Objective: The goal of this study is to investigate the existing body of knowledge in software engineering to understand what Technical Debt prioritization approaches have been proposed in research and industry. Method: We conducted a Systematic Literature Review of 557 unique papers published until 2020, following a consolidated methodology applied in software engineering. We included 44 primary studies. Results: Different approaches have been proposed for Technical Debt prioritization, all having different goals and proposing optimization regarding different criteria. The proposed measures capture only a small part of the plethora of factors used to prioritize Technical Debt qualitatively in practice. We present an impact map of such factors. However, there is a lack of empirical and validated set of tools. Conclusion: We observed that Technical Debt prioritization research is preliminary and there is no consensus on what the important factors are and how to measure them. Consequently, we cannot consider current research conclusive. In this paper, we therefore outline different directions for necessary future investigations.
- Published
- 2021
27. An innovative platform to promote social media literacy in school contexts
- Author
-
Taibi D., Fulantelli G., Monteleone V., Schicchi D., Scifo L., Taibi D., Fulantelli G., Monteleone V., Schicchi D., and Scifo L.
- Subjects
Social media risks ,Social media literacy ,Social learning environments - Abstract
In spite of the impressive number of adolescents using social media, only a minority is aware of the risks associated with the use of the Internet. Hate speech, violation of personal rights, psychological attacks, deceiving people with fake accounts, as well as cyberbullying, harassment and insults are some examples of toxic content that can jeopardize adolescent well-being on the Web. Social Media literacy paths in school contexts provide students with the proper defence instruments to face these problems. Furthermore, it is important to underline the role of social media on both the intrinsic and extrinsic motivation of adolescents which has short-and long-term influences when using these virtual environments. However, traditional teaching approaches are not enough to engage students, and the need for innovative learning activities and tools emerges. In this paper we present an online platform specifically designed to support the development of competences related to Information and Data Literacy, Communication and Collaboration and Digital Content Creation. These competences are connected to the most recent versions of the Digital Competence Framework for Citizens, and the Global framework of reference on digital literacy skills promoted by UNESCO. The platform is based on PixelFed, an open-source alternative to Instagram, so that adolescents can practice with an environment they are familiar with. Our platform extends the PixelFed environment with functionalities designed to implement use cases that make students aware of the mechanisms behind social media, such as the use of artificial intelligence algorithms to filter the content they have access to. This platform has been experimented during a pilot run with secondary school students, by proposing them educational activities based on our platform, aimed at educating and supporting students to increase their awareness and counteract the problems that arise within social media.
- Published
- 2021
28. A New Optimization Approach for a Solar Tracker Based on an Inertial Measurement Unit
- Author
-
Rezoug, M. R., primary, Benaouadj, M., additional, Taibi, D., additional, and Chenni, R., additional
- Published
- 2021
- Full Text
- View/download PDF
29. Sensorless direct torque control for salient-pole PMSM based on extended Kalman filter fed by AC/DC/AC converter
- Author
-
Benchabane, F., Titaouine, A., Bennis, O., Yahia, K., Taibi, D., and Guettaf, A.
- Published
- 2012
- Full Text
- View/download PDF
30. Sensorless fuzzy sliding mode control for permanent magnet synchronous motor fed by AC/DC/AC converter
- Author
-
Benchabane, F., Titaouine, A., Bennis, O., Yahia, K., and Taibi, D.
- Published
- 2012
- Full Text
- View/download PDF
31. Direct field oriented control scheme for space vector modulated AC/DC/AC converter fed induction motor
- Author
-
Benchabane, F., Titaouine, A., Bennis, O., Yahia, K., and Taibi, D.
- Published
- 2012
- Full Text
- View/download PDF
32. An improved efficiency of fuzzy sliding mode control of permanent magnet synchronous motor for wind turbine generator pumping system
- Author
-
Benchabane, F., Titaouine, A., Bennis, O., Guettaf, A., Yahia, K., and Taibi, D.
- Published
- 2012
- Full Text
- View/download PDF
33. Are architectural smells independent from code smells? An empirical study
- Author
-
Arcelli Fontana, F, Lenarduzzi, V, Roveda, R, Taibi, D, Arcelli Fontana F., Lenarduzzi V., Roveda R., Taibi D., Arcelli Fontana, F, Lenarduzzi, V, Roveda, R, Taibi, D, Arcelli Fontana F., Lenarduzzi V., Roveda R., and Taibi D.
- Abstract
Background. Architectural smells and code smells are symptoms of bad code or design that can cause different quality problems, such as faults, technical debt, or difficulties with maintenance and evolution. Some studies show that code smells and architectural smells often appear together in the same file. The correlation between code smells and architectural smells, however, is not clear yet; some studies on a limited set of projects have claimed that architectural smells can be derived from code smells, while other studies claim the opposite. Objective. The goal of this work is to understand whether architectural smells are independent from code smells or can be derived from a code smell or from one category of them. Method. We conducted a case study analyzing the correlations among 19 code smells, six categories of code smells, and four architectural smells. Results. The results show that architectural smells are correlated with code smells only in a very low number of occurrences and therefore cannot be derived from code smells. Conclusion. Architectural smells are independent from code smells, and therefore deserve special attention by researchers, who should investigate their actual harmfulness, and practitioners, who should consider whether and when to remove them.
- Published
- 2019
34. The Role of Masked Solutions in the Accuracy of Insight Problem-Solving Task
- Author
-
Taibi D, Puvia E, and Patrizio E. Tressoldi
- Subjects
Text mining ,business.industry ,Computer science ,Artificial intelligence ,computer.software_genre ,business ,computer ,Natural language processing - Abstract
Objective: The primary aim of the study was to test the allegedly facilitating role of insight-like strategy in the detection of masked solutions Compound Remote Associates problems (CRA problems). Method: A sample of 114 participants solved 19 CRA problems presented online. Participants were requested to solve the problems in which either the solution to the CRA problems was randomly presented in a masked condition or no solution was provided. After each trial participants were requested to report whether they used insight or analytical strategy.Participants were also required to complete a sensation seeking scale and a measure of creativity. Results: The results showed a small, but robust correlation between the CRA problems accuracy and the degree of insight-type strategy used for their solution. The degree of sensation seeking, the score of creativity and the outcome of the manipulation check did not reveal any influence on the CRA problems solution.Conclusion: The use of intuitive strategies may facilitate psi-related creative problem solving, but confirmatory research is needed.
- Published
- 2020
- Full Text
- View/download PDF
35. Serverless Edge Computing: Vision and Challenges
- Author
-
Aslanpour, MS, Toosi, AN, Cicconetti, C, Javadi, B, Sbarski, P, Taibi, D, Assuncao, M, Gill, SS, Gaire, R, Dustdar, S, Aslanpour, MS, Toosi, AN, Cicconetti, C, Javadi, B, Sbarski, P, Taibi, D, Assuncao, M, Gill, SS, Gaire, R, and Dustdar, S
- Abstract
Born from a need for a pure "pay-per-use"model and highly scalable platform, the "Serverless"paradigm emerged and has the potential to become a dominant way of building cloud applications. Although it was originally designed for cloud environments, Serverless is finding its position in the Edge Computing landscape, aiming to bring computational resources closer to the data source. That is, Serverless is crossing cloud borders to assess its merits in Edge computing, whose principal partner will be the Internet of Things (IoT) applications. This move sounds promising as Serverless brings particular benefits such as eliminating always-on services causing high electricity usage, for instance. However, the community is still hesitant to uptake Serverless Edge Computing because of the cloud-driven design of current Serverless platforms, and distinctive characteristics of edge landscape and IoT applications. In this paper, we evaluate both sides to shed light on the Serverless new territory. Our in-depth analysis promotes a broad vision for bringing Serverless to the Edge Computing. It also issues major challenges for Serverless to be met before entering Edge computing.
- Published
- 2021
36. Valerian and sleep.
- Author
-
Landis, C. A., primary, Taibi, D. M., additional, and Vitiello, M. V., additional
- Published
- 2008
- Full Text
- View/download PDF
37. A Learning Analytics Dashboard to Analyse Learning Activities in Interpreter Training Courses
- Author
-
Taibi D., Bianchi F., Kemkes P., Marenzi I., McLaren B.M., Reilly R., Zvacek S., Uhomoibhi J., Taibi, D., Bianchi, F., Kemkes, P., and Marenzi, I.
- Subjects
ComputingMilieux_COMPUTERSANDEDUCATION ,Learning analytics dashboard, Interpreting, Tracking systems - Abstract
Learning analytics dashboards constitute an effective tool for monitoring learning activities that take place in online learning environments. Thanks to dashboards, teachers can promptly detect low levels of student engagement in given tasks, incorrect usage of a system, and other types of pedagogically relevant information, which helps them to better support students in achieving their learning objectives. This study describes the integration of a dashboard in an online learning system. The system includes a tool that guides students in the creation of highly informative bilingual glossaries, a service that traces student searches on the web for reference material, and a service that tracks student interactions with the glossary. The data thus collected are selectively displayed in the newly developed dashboard. The dashboard was specifically designed to allow teachers to monitor the students’ approaches to glossary building and to provide individual remedial feedback, if necessary. It was also intended to spur students to keep on a par with the rest of the class, by seeing their status compared to the rest of the class. The system was tested with two groups of university students specializing in interpreting, and two different teachers. The results of the experiments suggest that this integrated system manages to achieve its goals and provides students and teachers of interpreting with an innovative online tool that concretely fosters and supports vocabulary building.
- Published
- 2019
38. Digital transformation missing ingredients: Data Literacy
- Author
-
Marjanovic U., Taibi D, Cabral P., Urbsiene L., Kasaj A., and Marques S
- Subjects
European competence frameworks ,Digital competences ,Open learning systems ,Desk research - Abstract
Employees with data literacy skills have become highly valuable in today's economy and labor market. More than ever before, employers demand some degree of data literacy from all employees, regardless of their professional role. New technologies offer many exciting possibilities, but there is no point in having increasingly quantities of data if nobody knows how to explore it effi-ciently. The aim of this study is to examine data literacy at the Universities and industry as well as the study of existing certification systems for data literacy competences. Our analysis uses results from online survey conducted in 20 coun-tries in Europe and North Africa. The results will support the universities and industry to offer innovative, competence-based, cross-cutting data courses for all the students interested in developing or fine tuning their data competences needed for a successful digital transformation process in the job market
- Published
- 2020
39. Towards microservice smells detection
- Author
-
Pigazzini, I, Arcelli Fontana, F, Lenarduzzi, V, Taibi, D, Pigazzini, I, Arcelli Fontana, F, Lenarduzzi, V, and Taibi, D
- Abstract
With the adoption of microservices architectural styles, practitioners started noticing increasing pitfalls in managing and maintaining such architectures, with the risk of introducing architectural debt. Previous studies identified different microservice smells (also named anti-patterns) that harm microservices architectures. However, according to our knowledge, there are no tools that can automatically detect microservice smells, so their identification is left to the experience of the developer. In this paper, we extend an existing tool developed for the detection of architectural smells to explore microservices architecture through the detection of three microservice smells: Cyclic Dependencies, Hard-Coded Endpoints, and Shared Persistence. We detected the smells on five open-source projects implemented with microservices and manually validated the precision of the detection results. This work aims to open new perspectives on facing and studying architectural debt in the field of microservices architectures.
- Published
- 2020
40. Architectural smells detected by tools: A catalogue proposal
- Author
-
Azadi, U, Arcelli Fontana, F, Taibi, D, Azadi, U, Arcelli Fontana, F, and Taibi, D
- Abstract
Architectural smells can negatively impact on different software qualities and can represent a relevant source of architectural debt. Several architectural smells have been defined by different researchers. Moreover, both academia and industry proposed several tools for software quality analysis, but it is not always clear to understand which tools provide also support for architectural smells detection and if the tools developed for this specific purpose are effectively available or not. In this paper we propose a catalogue of architectural smells for which, at least one tool able to detect the smell exists. We outline the main differences in the detection techniques exploited by the tools and we propose a classification of these architectural smells according to the violation of three design principles.
- Published
- 2019
41. Lessons learned on communication channels and practices in agile software development
- Author
-
Ahmad, M. O. (Muhammad Ovais), Lenarduzzi, V. (Valentina), Oivo, M. (Markku), Taibi, D. (Davide), Ahmad, M. O. (Muhammad Ovais), Lenarduzzi, V. (Valentina), Oivo, M. (Markku), and Taibi, D. (Davide)
- Abstract
Communication plays an important role in Agile Software Development (ASD). In each ASD practice (e.g., stand-up or retrospective meetings), different communication practices and channels are adopted by different companies. Several works have analyzed the impact of communication channels and practices. However, there are no secondary studies summarizing their impact on ASD. This study presents a Systematic Mapping Study (SMS) that aggregates, summarizes, and discusses the results of 25 relevant primary studies concerning the impact of communication channels and practices in ASD. We followed the well-known systematic mapping methodology in software engineering and analyzed empirical studies published before the end of June 2018. The results of our study have yielded several strategies that can be adopted by practitioners. Communication practices are context dependent. In the case of a distributed team, blended usage of rich-media communication tools, such as shared mind-map tools, videoconferencing, and promoting the exchange of team members between teams, is beneficial. In conclusion, communication can be expensive if teams do not apply the right strategies. Future research direction is to understand how to maximize product quality while reducing communication cost and how to identify the most beneficial communication strategy for the different stages of ASD.
- Published
- 2018
42. SaR-WEB: A Semantic Web Tool to Support Search as Learning Practices and Cross-Language Results on the Web
- Author
-
Taibi, D., Fulantelli, G., Marenzi, I., Nejdl, W., Rogers, R., Ijaz, A., Chang, M., Chen, N.-S., Huang, R., Kinshuk, Sampson, D.G., Vasiu, R., ASCA (FGw), and Cultural Transformations & Globalization
- Subjects
Web search query ,Information retrieval ,Computer science ,business.industry ,Search analytics ,05 social sciences ,Search engine indexing ,Semantic search ,Semantics ,World Wide Web ,Search engine ,Digital methods ,0501 psychology and cognitive sciences ,Semantic Web Stack ,cross-language analysis ,0509 other social sciences ,Tag cloud ,050904 information & library sciences ,business ,Semantic Web ,050107 human factors ,Search as learning - Abstract
In this paper, we present SaR-Web, a multimodal web search tool that provides automatic support to searching as learning processes. Inspired by the work of Richard Rogers and the Digital Methods Initiative, SaR-Web compares the results of queries across search engine language domains, and visualizes search results with a semantic added value, thus facilitating cross-linguistic and cross-cultural comparisons of results. The comparison between search results in different languages is enabled through the visualization of semantic concepts extracted by means of a NER tool from the search results. The SaR-Web system has the potential to support highlevel learning activities described in Bloom's taxonomy such as: identifying and analyzing patterns, comparing, integrating, and creating new ideas.
- Published
- 2017
43. Integrating mobile technologies in the Italian educational context
- Author
-
Arrigo M., Fulantelli G., Gentile M., and Taibi D.
- Subjects
mobile learning - Abstract
This chapter focuses on a research activity aimed at investigating the impact of mobile technologies on Italian educational contexts. In particular, the authors report on three mobile learning projects they have carried out over the past four years at the Institute for Educational Technologies (ITD) of the National Research Council (CNR) of Italy.
- Published
- 2016
44. Operationalizing the Experience Factory for Effort Estimation in Agile Processes
- Author
-
Taibi, D., primary, Lenarduzzi, V., additional, Diebold, P., additional, and Lunesu, I., additional
- Published
- 2017
- Full Text
- View/download PDF
45. Comparing communication effort within the Scrum, Scrum with Kanban, XP, and Banana development processes
- Author
-
Taibi, D. (Davide), Lenarduzzi, V. (Valentina), Ahmad, M. O. (Muhammad Ovais), Liukkunen, K. (Kari), Taibi, D. (Davide), Lenarduzzi, V. (Valentina), Ahmad, M. O. (Muhammad Ovais), and Liukkunen, K. (Kari)
- Abstract
Context: Communication plays an important role in any development process. However, communication overhead has been rarely compared among development processes. Objective: The goal of this work is to compare the communication overhead and the different channels applied in three agile processes (XP, Scrum, Scrum with Kanban) and in an unstructured process. Method: We designed an empirical study asking four teams to develop the same application with the four development processes, and we compare the communication overhead among them. Results: As expected, face-to-face communication is most frequently employed in the teams. Scrum with Kanban turned out to be the process that requires the least communication. Unexpectedly, despite requiring much more time to develop the same application, the unstructured process required comparable communication overhead (25% of the total development time) as the agile processes.
- Published
- 2017
46. Comparing requirements decomposition within the Scrum, Scrum with Kanban, XP, and banana development processes
- Author
-
Taibi, D. (Davide), Lenarduzzi, V. (Valentina), Janes, A. (Andrea), Liukkunen, K. (Kari), Ahmad, M. O. (Muhammad Ovais), Taibi, D. (Davide), Lenarduzzi, V. (Valentina), Janes, A. (Andrea), Liukkunen, K. (Kari), and Ahmad, M. O. (Muhammad Ovais)
- Abstract
Context: Eliciting requirements from customers is a complex task. In Agile processes, the customer talks directly with the development team and often reports requirements in an unstructured way. The requirements elicitation process is up to the developers, who split it into user stories by means of different techniques. Objective: We aim to compare the requirements decomposition process of an unstructured process and three Agile processes, namely XP, Scrum, and Scrum with Kanban. Method: We conducted a multiple case study with a replication design, based on the project idea of an entrepreneur, a designer with no experience in software development. Four teams developed the project independently, using four different development processes. The requirements were elicited by the teams from the entrepreneur, who acted as product owner and was available to talk with the four groups during the project. Results: The teams decomposed the requirements using different techniques, based on the selected development process. Conclusions: Scrum with Kanban and XP resulted in the most effective processes from different points of view. Unexpectedly, decomposition techniques commonly adopted in traditional processes are still used in Agile processes, which may reduce project agility and performance. Therefore, we believe that decomposition techniques need to be addressed to a greater extent, both from the practitioners’ and the research points of view.
- Published
- 2017
47. Evaluating relevance of educational resources of Social & Semantic Web
- Author
-
Taibi D., Fulantelli G., Dietze S., and Fetahu B.
- Subjects
Educational relevance of resource ,OER ,Linked Open Data - Abstract
The social web paradigm has modified the way people behave on the Web. Amongst the many consequences of this change the amount of online resources directly produced and shared by users has increased considerably. In this scenario the importance of methods to evaluate the educational relevance of the resources raises up. In this poster we propose an approach based on recent advancements of Linked Open Data.
- Published
- 2013
48. Report dei laboratori nazionali del progetto PNPV Rev 2
- Author
-
Allegra M., Dal Grande V., Fulantelli G., Gentile M., La Guardia D., Messineo L. Ottaviano S., and Taibi D.
- Abstract
Nell'ambito dei network nazionali,previsti nel progetto PNPV ciascun partner ha proceduto alla selezione dei soggetti che hanno partecipato all'attività di testing del nuovo modello. I gruppi target sono: studenti, formatori/docenti/orientatori, e associazioni d'imprese ed imprenditori (nella qualità di mentori).
- Published
- 2012
49. Supporting Communities of Teachers in producing and sharing OER
- Author
-
Fulantelli G., Gentile M., Taibi D., and Allegra M.
- Subjects
OER repositories ,Community of practice ,Open Education Resources ,ComputingMilieux_COMPUTERSANDEDUCATION ,Teacher Training - Abstract
User-generated Open Educational Resources represent an important opportunity for schools. Since 2005, our research team has been working towards the exploitation of this opportunity. During three consecutive European funded projects, we have co-designed and run online courses for teachers on the production of Open Educational Resources using Web 2.0 tools and environments for the production of Learning Objects. Online courses have involved around 800 teachers from Germany, Hungary, Ireland, Italy, Romania, Slovenia, Spain, Turkey. The central idea of the three projects has been that educational content can be effectively designed, developed and shared directly by the community of teachers who will use them. This goal can be achieved provided that teachers are supported through specific training programs. The main lessons learned during the projects are presented in this paper.
- Published
- 2012
50. Towards linking educational resources on the web through clustering and enrichment: the mEducator schema
- Author
-
Giordano D., Dietze S., Spampinato C., Taibi D., Kaldoudi E., Dovrolis N., Mitsopoulou E., Yu H. Q., Konstantinidis S., Charalampos B., and Bamidis P.
- Subjects
Enrichment ,Linked data ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Educational resources ,Clustering ,Semantic web - Abstract
A crucial requirement in the web of data is to describe datasets to facilitate acess, reuse, and interlinking. The mEducator project, a best practice netwrok on medical content sharing and repurposing has developed an RDF schema that departures from current learning metadata standards by adopting linked data principles.
- Published
- 2012
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.