2013
DOI: 10.3844/jcssp.2013.16.29
|View full text |Cite
|
Sign up to set email alerts
|

Design of Object-Oriented Debugger Model by Using Unified Modeling Language

Abstract: Debugging on computer program is a complex cognitive activity. Although it is complex, it's still one of the popular issues in computer programming task. It is a difficult task, which is to understand what the error is and how to solve such error? In computer programming the difficulty is to understand the Object-Oriented programming concept together with the programming logic. If the programming logic is incorrect, the program codes will have such error named as logic error and can caused highly maintenance c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…In a situation where there is high level of security, authentication process would take a longer time to verify a full message [21][22][23]. According to [17], efficiency is captured by measuring the time required to complete a task or the number of clicks or buttons pressed to achieve the required goal. Hence, a system is not only considered good by its functionality and level of protection, but it also must be efficient by enabling users to achieve their goal within a reasonable amount of time [24].…”
Section: Telkomnikatelecommun Comput El Controlmentioning
confidence: 99%
See 1 more Smart Citation
“…In a situation where there is high level of security, authentication process would take a longer time to verify a full message [21][22][23]. According to [17], efficiency is captured by measuring the time required to complete a task or the number of clicks or buttons pressed to achieve the required goal. Hence, a system is not only considered good by its functionality and level of protection, but it also must be efficient by enabling users to achieve their goal within a reasonable amount of time [24].…”
Section: Telkomnikatelecommun Comput El Controlmentioning
confidence: 99%
“…The implementation of the attack recognition technique has been in existence for a long time and has also expanded over the past decades to include in the computer security domain, particularly in intrusion detection systems (IDSs) and intrusion prevention systems (IPSs). This research incorporates a plan recognition technique of [17] as attack recognition into the authentication systems.…”
Section: Introductionmentioning
confidence: 99%