Home   >   CSC-OpenAccess Library   >    Manuscript Information
Embedding Software Engineering Disciplines in Entry-Level Programming
Lung-Lung Liu
Pages - 76 - 82     |    Revised - 05-05-2009     |    Published - 18-05-2009
Volume - 3   Issue - 2    |    Publication Date - April 2009  Table of Contents
Software Engineering Practice, Preventive Maintenance, Requirement Change
Software engineering disciplines can be embedded in entry-level programming assignments as a very basic requirement for teachers to the students in the classrooms and mentors to their apprentices in the offices. We are to use three examples to demonstrate how easily some of these software engineering disciplines can be embedded, and we will then prove that they are helpful for quality and productive software development from the point of being with “no source code modification” when some requirements are changed. In fact, convergence can be confirmed even there have been these changes. If the entry-level programming works are with software engineering disciplines, then the total software development effort should be decreased. With this concept in mind for project managers, actually, there are simple refactoring skills that can be further applied to those programs already coded.
CITED BY (1)  
1 Liulong Long. (2010). I have several views of software engineering teaching computer education, 23, 007.
1 Google Scholar 
2 Academic Journals Database 
3 ScientificCommons 
4 Academic Index 
5 CiteSeerX 
6 refSeek 
7 iSEEK 
8 Socol@r  
9 ResearchGATE 
10 Libsearch 
11 Bielefeld Academic Search Engine (BASE) 
12 Scribd 
13 WorldCat 
14 SlideShare 
16 PdfSR 
Abraham Silberschatz, Peter Baer Galvin, and Greg Gagne, “Operating Systems Concepts,” Seventh Edition, John Wiley and Sons, Inc., Ch. 5, 2005
Arun Shamar, Rajesh Kumar, and P S Grover, “Managing Component-Based Systems with Reusable Components,” in International Journal of Computer Science and Security, Volume 1: Issue (2), pp, 60~65, July/August 2007
Brian W. Kernighan, “Programming in C: A Tutorial,” Bell Laboratories, Murray Hills, N.J., USA, 1974
Charlie Kaufman st al. “ Network Security “ PRIVATE Communication in a PUBLIC World. , Prentice Hall of India Private Limited. 2003
Claude Shannon's " Communication Theory of Secrecy Systems" .
Donald. E. Knuth, “The Art of Computer Programming, Volume 3: Sorting and Searching,” Second Edition, Addison Wesley, Ch. 5, 1998
Douglas R, Stinson “ CRYPTOGRPHY Theory and Practice “ Second Edition .
Information Technology Journal 4(3) : 204-221, 2005
Lung-Lung Liu, “Software Maintenance and CMMI for Development: A Practitioner’s Point of View,” in Journal of Software Engineering Studies, Volume 1, No. 2, pp. 68~77, December 2006
Martin Fowler, Kent Beck, John Brant, William Opdyke, and Don Roberts, “Refactoring: Improving the Design of Existing Code,” Addison Wesley, Ch. 8, 2000
Neal R. Wagner “The Laws of Cryptography: Perfect Cryptography: The One-Time Pad “
Ritter, Terry 1991. The Efficient Generation of Cryptographic Confusion Sequences. Cryptologia “15: 81-139.
Roger S. Pressman, “Software Engineering: A Practitioner’s Approach,” Sixth Edition, McGraw-Hill, Ch. 31, International Edition, 2005
Watts Humphrey, “PSP, A Self-Improvement for Software Engineers,” Addison Wesley, Ch. 1, 2005
Watts Humphrey, “PSP, A Self-Improvement for Software Engineers,” Addison Wesley, Ch. 1, 2005
www.EFYMAG.com - February-2007
Assistant Professor Lung-Lung Liu
- Taiwan