default search action
28th COMPSAC 2004: Hong Kong, China - Regular Papers
- 28th International Computer Software and Applications Conference (COMPSAC 2004), Design and Assessment of Trustworthy Software-Based Systems, 27-30 September 2004, Hong Kong, China, Proceedings. IEEE Computer Society 2004, ISBN 0-7695-2209-2
Component-Based Software I
- Eduardo Santana de Almeida, Alexandre Alvaro, Daniel Lucrédio, Antônio Francisco do Prado, Luís Carlos Trevelin:
Distributed Component-Based Software Development: An Incremental Approach. 4-9 - Tino Lourens:
TiViPE - Tino's Visual Programming Environment. 10-15 - David Budgen, Pearl Brereton, Mark Turner:
Codifying a Service Architectural Style. 16-22 - Bhim Prasad Upadhyaya, Zhiming Liu:
Formal Support for Development of JavaBeans? Component Systems. 23-28
Process Management I
- Kevin McKeever, Jonathan Morrison, Eric Peterson:
Assuring Assessment Success. 30-37 - Zhe Shan, Qing Li, Kamalakar Karlapalem:
Enacting Conformance Assessment of Business Processes - An ebXML Based Approach in E-ADOME. 38-43 - Seok Jun Yun, Dick B. Simmons:
Continuous Productivity Assessment and Effort Prediction Based on Bayesian Analysis. 44-49 - M. K. Serour, Brian Henderson-Sellers:
Introducing Agility: A Case Study of Situational Method Engineering Using the OPEN Process Framework. 50
Software Testing I
- Durga Prasad Mohapatra, Rajib Mall, Rajeev Kumar:
An Edge Marking Technique for Dynamic Slicing of Object-Oriented Programs. 60-65 - Yingzhou Zhang, Baowen Xu, Liang Shi, Bixin Li, Hongji Yang:
Modular Monadic Program Slicing. 66-71 - Toshiaki Shiba, Tatsuhiro Tsuchiya, Tohru Kikuno:
Using Artificial Life Techniques to Generate Test Cases for Combinatorial Testing. 72-77 - Kwok Ping Chan, Tsong Yueh Chen, Fei-Ching Kuo, Dave Towey:
A Revisit of Adaptive Random Testing by Restrictio. 78-85
Panel on Risk Management and Dependability - What are the Key Factors?
- Lucas Chi Kwong Hui, Kam-Pui Chow, Kevin K. H. Pun, Siu-Ming Yiu, Wai Wan Tsang, C. F. Chong, H. W. Chan:
Risk Management of Corporate Confidential Information in Digital Form. 88-89
Formal Method I
- Peter Henderson, Robert John Walters, Stephen Crouch:
Implementing Hierarchical Features in a Graphically Based Formal Modelling Language. 92-98 - Francisco A. C. Pinheiro:
Situated Modelling of Scenarios. 99-107 - Jianzhou Zhao, Jinian Bian, Weimin Wu:
PFGASAT- A Genetic SAT Solver Combining Partitioning and Fuzzy Strategie. 108-113 - Lijun Shan, Hong Zhu:
Consistency Check in Modelling Multi-Agent Systems. 114-119
Middlware
- Yongjie Zheng, Alvin T. S. Chan:
Stream Composition for Highly Adaptive and Reconfigurable Mobile Middleware. 122-127 - Wei Xu, Jun Wei, Yu Liu, Jing Li:
SOWAC: A Service-Oriented Workflow Access Control Model. 128-134 - Gang Huang, Tiancheng Liu, Hong Mei, Zizhan Zheng, Zhao Liu, Gang Fan:
Towards Autonomic Computing Middleware via Reflection. 135-140 - Jinling Wang, Beihong Jin, Jing Li, Danhua Shao:
A Semantic-Aware Publish/Subscribe System with RDF Patterns. 141-14
Real-Time Systems
- Lei Wang, Zhaohui Wu, Mingde Zhao:
Worst-Case Response Time Analysis for OSEK/VDX Compliant Real-Time Distributed Control Systems. 148-153 - Shu-Chen Cheng, Yueh-Min Huang:
Dynamic Real-Time Scheduling for Multi-Processor Tasks Using Genetic Algorithm. 154-160 - Hai Jin, Hanhua Chen, Jian Chen, Ping Kuang, Li Qi, Deqing Zou:
Real-Time Strategy and Practice in Service Grid. 161-166 - Albert Mo Kim Cheng, Rong Wang:
A New Scheduling Algorithm and a Compensation Strategy for Imprecise Computation. 167-172
Panel on Computer Curricula for Software Engineering
- David Budgen:
Computing Curricula Software Engineering: Position Paper. 174-175 - T. H. Tse:
Computing Curriculum - Software Engineering: Its Impact on Professional Software Engineering Education. 176-177
Software Reliability
- Ji Wu, Haiyan Yang, Xiao-xia Jia, Chang Liu, Chao Liu, Maozhong Jin:
Application of Maximum Entropy Principle to Software Failure Prediction. 180-185 - Chin-Yu Huang, Chu-Ti Lin, Sy-Yen Kuo, Michael R. Lyu, Chuan-Ching Sue:
Software Reliability Growth Models Incorporating Fault Dependency with Various Debugging Time Lags. 186-191 - Allen P. Nikora, John C. Munson:
The Effects of Fault Counting Methods on Fault Model Quality. 192-201 - Marco Vieira, Henrique Madeira:
Portable Faultloads Based on Operator Faults for DBMS Dependability Benchmarking. 202-209
Security I
- Zhenwei Yu, Jeffrey J. P. Tsai:
A Multi-Class SLIPPER System for Intrusion Detection. 212-217 - Lu Ma, Jeffrey J. P. Tsai, Tadao Murata:
A Secure Mobile Agent System Model Based on Extended Elementary Object System. 218-223 - Changjie Wang, Ho-fung Leung:
A Secure and Fully Private Borda Voting Protocol with Universal Verifiability. 224-229 - Christian Payne:
Enhanced Security Models for Operating Systems: A Cryptographic Approach. 230-235
Panel on Research Directions in Software Process Improvement
- David N. Card:
Research Directions in Software Process Improvement. 238 - Miguel A. Serrano:
State of the Art and Future of Research in Software Process Improvement. 239
Keynote Address 2
- Jean-Claude Laprie:
Dependable Computing: Concepts, Challenges, Directions. 242
Component-Based Software II
- Valerie Maxville, Jocelyn Armarego, Chiou Peng Lam:
Intelligent Component Selection. 244-249 - Loe M. G. Feijs, Jun Hu:
Component-Wise Mapping of Media-Needs to a Distributed Presentation Environment. 250-257 - Fan Ye, Tim Kelly:
Component Failure Mitigation According to Failure Type. 258-264 - Cristina Cerschi Seceleanu, Tiberiu Seceleanu:
Modular Design of Reactive Systems. 265-271
Process Management II
- Victor K. Y. Chan:
Software Effort Prediction Models Using Maximum Likelihood Methods Require Multivariate Normality of the Software Metrics Data Sample: Can Such a Sample Be Made Multivariate Normal? 274-279 - Shaohua Liu, Dan Ye, Jun Wei, Gang Xu, Yonglin Xia, Yu Liu:
POP beyond SODA, Reaching the New Horizon of Service Cooperation. 280-285 - Kazuma Aizawa, Haruhiko Kaiya, Kenji Kaijiri:
FC Method: A Practical Approach to Improve Quality and Efficiency of Software Processes for Embedded System Revision. 286-292 - Haifeng Shen, Chengzheng Sun:
A Complete Textual Merging Algorithm for Software Configuration Management Systems. 293-298
Software Testing II
- Hu Li, Maozhong Jin, Chao Liu, Zhongyi Gao:
Test Criteria for Context-Free Grammars. 300-305 - Robert Nilsson, Jeff Offutt, Sten F. Andler:
Mutation-Based Testing Criteria for Timeliness. 306-311 - Yu Lei, Richard H. Carver:
Reachability Testing of Semaphore-Based Programs. 312-317 - Eric Ying Kwong Chan, Pak-Lok Poon, Yuen-Tak Yu:
On the Testing of Particular Input Conditions. 318-325
Panel on Computer Supported Cooperative Work in Software Engineering
- J. Jenny Li, Tangqiu Li, Zongkai Lin, Aditya P. Mathur, Karama Kanoun:
Computer Supported Cooperative Work in Software Engineering. 328
Formal Method II
- Taolue Chen, Tingting Han, Jian Lu:
Towards a Model Logic for p-Calculus. 330-335 - Lihua Xu, Marcio S. Dias, Debra J. Richardson:
Generating Regression Tests via Model Checking. 336-341 - Amit M. Paradkar, Tim Klinger:
Automated Consistency and Completeness Checking of Testing Models for Interactive Systems. 342-348 - Yongjian Li, Rui Xue:
Design of a CIL Connector to SPIN. 349-354
Software Architecture
- Michel Jaring, Jan Bosch:
A Taxonomy and Hierarchy of Variability Dependencies in Software Product Family Engineering. 356-361 - Hoong Chuin Lau, Wee Chong Wan, Min Kwang Lim, Steven Halim:
A Development Framework for Rapid Meta-Heuristics Hybridization. 362-367 - Weihang Wu, Tim Kelly:
Safety Tactics for Software Architecture Design. 368-375 - Jia Zhang, Carl K. Chang, Jeffrey M. Voas:
A Uniform Meta-Model for Mediating Formal Electronic Conferences. 376-383
Security II
- Qianhong Wu, Changjie Wang, Xiaofeng Chen, Yumin Wang:
Publicly Verifiable Auctions with Minimal Leakage. 384-389 - Long Qin, Si Duanfeng, Han Xinhui, Zou Wei:
A Hybrid Security Framework of Mobile Code. 390-395 - Tzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian:
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy. 396-397
Panel on Embedded Software Systems
- Dongman Lee:
Active Surroundings: A Group-Aware Middleware for Embedded Application System. 404-405 - Stephen S. Yau:
Embedded Software in Real-Time Pervasive Computing Environments. 406-407
Requirement & Design
- Xiaoqing Frank Liu, Chandra Sekhar Veera, Yan Sun, Kunio Noguchi, Yuji Kyoya:
Priority Assessment of Software Requirements from Multiple Perspectives. 410-415 - Jungyoon Kim, Doo-Hwan Bae:
An Approach to Feature Based Modelling by Dependency Alignment for the Maintenance of the Trustworthy System. 416-423 - Guanling Lee, Chien-Yu Chang, Arbee L. P. Chen:
Hiding Sensitive Patterns in Association Rules Mining. 424-429 - Wenpo Yang, Guanling Lee:
Efficient Partial Multiple Periodic Patterns Mining without Redundant Rules. 430-435
Pervasive/Ubiquitous Computing
- Kimio Kuramitsu, Hideyuki Tokuda:
Materializing Ubiquitous Computing Environments. 438-443 - Antonio Corradi, Rebecca Montanari, Daniela Tibaldi:
Context-Based Access Control for Ubiquitous Service Provisioning. 444-451 - Stephen S. Yau, Dazhi Huang, Haishan Gong, Siddharth Seth:
Development and Runtime Support for Situation-Aware Application Software in Ubiquitous Computing Environments. 452-457 - T. H. Tse, Stephen S. Yau, W. K. Chan, Heng Lu, Tsong Yueh Chen:
Testing Context-Sensitive Middleware-Based Software Applications. 458-466
Internet Web System
- Cássia Trojahn dos Santos, Fernando Santos Osório:
AdapTIVE: An Intelligent Virtual Environment and Its Application in E-Commerce. 468-473 - Wei Li, W. K. Daniel Pun, Minjie Zhang:
Identifying and Breaking Necessary Constraints to Web-Based Metacomputing. 474-479 - Tsung-Yuan Liu, Yuh-Jzer Joung:
Multi-Dimension Browse. 480-485 - Theophilos A. Limniotes, George A. Papadopoulos, Farhad Arbab:
Coordinating Web Services Using Channel Based Communication. 486-491 - Giuseppe A. Di Lucca, Anna Rita Fasolino, Porfirio Tramontana, Ugo de Carlini:
Supporting Concept Assignment in the Comprehension of Web Applications. 492-497
Keynote Address 3
- Huimin Lin:
Formal Methods for Trustworthy Mobile Computing. 500
Software Re-Engineering
- Tomaz Kosar, Marjan Mernik, Viljem Zumer:
JART: Grammar-Based Approach to Refactoring. 502-507 - Qiming Teng, Xiangqun Chen, Xia Zhao, Wei Zhu, Lu Zhang:
Extraction and Visualization of Architectural Structure Based on Cross References among Object Files. 508-513 - Feng Chen, Hongji Yang, He Guo, Baowen Xu:
Agentification for Web Services. 514-519 - Ming Huo, June M. Verner, Liming Zhu, Muhammad Ali Babar:
Software Quality and Agile Method. 520-525
Quality Assurance
- Guillaume Lussier, Hélène Waeselynck, Karim Guennoun:
Proof-Guided Testing: An Experimental Study. 528-533 - Ch. Ali Asad, Muhammad Irfan Ullah, Muhammad Jaffar-Ur Rehman:
An Approach for Software Reliability Model Selection. 534-539 - Chih-Hung Chang, William C. Chu, Chih-Wei Lu, Don-Lin Yang:
An Integrated Software Development Environment with XML Internal Representation. 540-545 - Xiaoqing Bai, Chiou Peng Lam, Huaizhong Li:
An Approach to Generate the Thin-Threads from the UML Diagrams. 546-552
Embedded Systems
- Wei-Tek Tsai, Weiwei Song, Raymond A. Paul, Zhibin Cao, Hai Huang:
Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed Computing. 554-559 - Kon Papazis, Naveen K. Chilamkurti, Ben Soh:
A New Receiver-Based Layered-Rate Estimator Algorithm for Fair Bandwidth Distribution. 560-565 - Baojiang Cui, Jun Liu, Gang Wang, Jing Liu:
Study on Performance of IP-SWAN Based on Distributed NS-RAID. 566-571 - Zhaohui Wu, Lei Wang, Kougen Zheng:
A Reliable OS Kernel for Smart Sensors. 572-577
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.