default search action
33rd COMPSAC 2009: Seattle, Washington, USA - Volume 1
- Sheikh Iqbal Ahamed, Elisa Bertino, Carl K. Chang, Vladimir Getov, Lin Liu, Ming Hua, Rajesh Subramanyan:
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 1. IEEE Computer Society 2009, ISBN 978-0-7695-3726-9
Location Based Services I (Privacy Protection in Location Based Services)
- Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Mohammad Tanviruzzaman:
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services. 1-10 - Mehrab Monjur, Sheikh Iqbal Ahamed, Chowdhury Sharif Hasan:
ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems. 11-20 - Hendrik Lemelson, Stephan Kopf, Thomas King, Wolfgang Effelsberg:
Improvements for 802.11-Based Location Fingerprinting Systems. 21-28
Location Based Services II (Privacy Protection in Location Based Services)
- Paolo Bellavista, Antonio Corradi, Luca Foschini:
Enhancing the Scalability of IMS-Based Presence Service for LBS Applications. 29-36 - Peter Ruppel, Florian Gschwandtner, Corina Kim Schindhelm, Claudia Linnhoff-Popien:
Indoor Navigation on Distributed Stationary Display Systems. 37-44
Software Evolution I (Software Architecture Development and Evaluation)
- Kwanwoo Lee, Goetz Botterweck, Steffen Thiel:
Aspectual Separation of Feature Dependencies for Flexible Feature Composition. 45-52 - Dong Li, Carl K. Chang:
Initiating and Institutionalizing Software Product Line Engineering: From Bottom-Up Approach to Top-Down Practice. 53-60 - Marko Komssi, Marjo Kauppinen, Juho Heiskari, Matti Ropponen:
Transforming a Software Product Company into a Service Business: Case Study at F-Secure. 61-66 - Mike Mannion, Juha Savolainen, Timo Asikainen:
Viewpoint-Oriented Variability Modeling. 67-72
Testing I (Context-aware Software Analysis)
- Daniel Eichhorn, Agnes Koschmider, Yu Li, Peter Stürzel, Andreas Oberweis, Ralf Trunko:
3D Support for Business Process Simulation. 73-80 - Lijun Mei, W. K. Chan, T. H. Tse, Fei-Ching Kuo:
An Empirical Study of the Use of Frankl-Weyuker Data Flow Testing Criteria to Test BPEL Web Services. 81-88 - Tsung-Han Tsai, Chin-Yu Huang, Jun-Ru Chang:
A Study of Applying Extended PIE Technique to Software Testability Analysis. 89-98
Testing II (Modularization, Composition and Reuse)
- Bo Jiang, Zhenyu Zhang, T. H. Tse, Tsong Yueh Chen:
How Well Do Test Case Prioritization Techniques Support Statistical Fault Localization. 99-106 - Youngki Park, Woosung Jung, Byungjeong Lee, Chisu Wu:
Automatic Discovery of Web Services Based on Dynamic Black-Box Testing. 107-114 - Siripol Noikajana, Taratip Suwannasart:
An Improved Test Case Generation Method for Web Service Testing from WSDL-S and OCL with Pair-Wise Testing Technique. 115-123
Testing III (Testing Economics, Models and Analysis)
- Carl J. Mueller, Dan E. Tamir, Oleg V. Komogortsev, Liam Feldman:
An Economical Approach to Usability Testing. 124-129 - Lixiao Zheng, Duanyi Wu:
A Sentence Generation Algorithm for Testing Grammars. 130-135 - Sergiy A. Vilkomir, W. Thomas Swain, Jesse H. Poore:
Software Input Space Modeling with Constraints among Parameters. 136-141 - Qichang Chen, Liqiang Wang, Zijiang Yang:
HEAT: An Integrated Static and Dynamic Approach for Thread Escape Analysis. 142-147
Testing IV (Testing Theory, Methodology and Application)
- Hojun Jaygarl, Carl K. Chang, Sunghun Kim:
Practical Extensions of a Randomized Testing Tool. 148-153 - Martin Weiglhofer, Franz Wotawa:
Asynchronous Input-Output Conformance Testing. 154-159 - Arnaud Gotlieb, Matthieu Petit:
Towards a Theory for Testing Non-terminating Programs. 160-165 - Lian Yu, Wei Zhao, Xiaofeng Di, Changzhu Kong, Wenbo Zhao, Qianxiang Wang, Jun Zhu:
Towards Call for Testing: An Application to User Acceptance Testing of Web Applications. 166-171
Software Quality I (Software Quality Measurement, Modelling and Analysis)
- Tae Yeon Kim, Yun Kyu Kim, Heung Seok Chae:
Towards Improving OCL-Based Descriptions of Software Metrics. 172-179 - Michael Grottke, Christian A. Graf:
Modeling and Predicting Software Failure Costs. 180-189 - Beihong Jin, Haibin Weng, Yunfeng Wen, Faen Zhang:
A Service Discovery System Analyzed with a Queueing Theory Model. 190-198
Software Quality II (Software and Services Reliability Models)
- Lijun Wang, Xiaoying Bai, Lizhu Zhou, Yinong Chen:
A Hierarchical Reliability Model of Service-Based Software System. 199-208 - Arne Beckhaus, Lars M. Karg, Gerrit Hanselmann:
Applicability of Software Reliability Growth Modeling in the Quality Assurance Phase of a Large Business Software Vendor. 209-215 - Chang-Ai Sun:
Towards Transaction-Based Reliable Service Compositions. 216-221
Software Quality III (Software Quality Improvement Technique)
- Fang Deng, Qianxiang Wang, Jin Shao:
Toward Middleware-Based Online Application Migration. 222-227 - Hong Zhu, Ian Bayley, Lijun Shan, Richard Amphlett:
Tool Support for Design Pattern Recognition at Model Level. 228-233 - M. K. Abdi, Hakim Lounis, Houari A. Sahraoui:
Predicting Change Impact in Object-Oriented Applications with Bayesian Networks. 234-239 - Xiaozhi Du, Yong Qi, Di Hou, Ying Chen, Xiao Zhong:
Modeling and Performance Analysis of Software Rejuvenation Policies for Multiple Degradation Systems. 240-245
Social Networks I (Collaborative Networks)
- Jordi Nin, Barbara Carminati, Elena Ferrari, Vicenç Torra:
Computing Reputation for Collaborative Private Networks. 246-253 - Yingbo Wang, Yali Wu, Andrew A. Allen, Barbara Espinoza, Peter J. Clarke, Yi Deng:
Towards the Operational Semantics of User-Centric Communication Models. 254-262 - Yi Wang, Huihui Shi:
Software Outsourcing Subcontracting and Its Impacts: An Exploratory Investigation. 263-270
Social Networks II (Trust and Contracting in Social Networks)
- Karim M. El Defrawy, John Solis, Gene Tsudik:
Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks. 271-279 - Claudia Canali, Michele Colajanni, Riccardo Lancellotti:
Hot Set Identification for Social Network Applications. 280-285 - Manling Zhu, Zhi Jin:
An Agent-Based Framework Supporting Trust Evaluation for Service Selection. 286-291 - Dongwan Shin, Rodrigo Lopes, William R. Claycomb, Gail-Joon Ahn:
A Framework for Enabling User-Controlled Persona in Online Social Networks. 292-297
Embedded Systems I (Design and Verification of Embedded Systems)
- Youngsam Shin, Seungwon Lee:
ACaMES: A Novel Design Methodology on Multicore Embedded System. 298-304 - Nicholas T. Pilkington, Juncao Li, Fei Xie:
ESIDE: An Integrated Development Environment for Component-Based Embedded Systems. 305-314 - Hai Wan, Gang Chen, Xiaoyu Song, Ming Gu:
Formalization and Verification of PLC Timers in Coq. 315-323
Requirements Engineering I (Requirements Structure, Analysis, and Traceability)
- Zhe Chen, Gilles Motet:
System Safety Requirements as Control Structures. 324-331 - Gustaf Juell-Skielse, Erik Perjons:
Improving E-Government through Benefit Analysis and Value Modeling. 332-339 - Jörn David, Maximilian Koegel, Helmut Naughton, Jonas Helming:
Traceability ReARMed. 340-348
Requirements Engineering II (Process Analysis and Service Management)
- Sophie Ramel, Eric Grandry, Eric Dubois:
Towards a Design Method Supporting the Alignment between Business and Software Services. 349-354 - Chris Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong:
A Framework for Cost Sensitive Assessment of Intrusion Response Selection. 355-360 - Ying Jin, Jing Zhang, Pengfei Ma, Weiping Hao, Shutong Luo, Zepeng Li:
Applying PageRank Algorithm in Requirement Concern Impact Analysis. 361-366 - Dongmei Xu, Jun Kurogi, Yoshihide Ohgame, Atsuo Hazeyama:
Distributed Collaborative Modeling Support System Associating UML Diagrams with Chat Messages. 367-372
Security I (Security Analysis and Protection Techniques)
- Hiroyuki Sato:
Analyzing Semantics of Documents by Using a Program Analysis Method. 373-382 - Shucai Xiao, Jung-Min Park, Yanzhu Ye:
Tamper Resistance for Software Defined Radio Software. 383-391 - Zhenyun Zhuang, Ying Li, Zesheng Chen:
PAIDS: A Proximity-Assisted Intrusion Detection System for Unidentified Worms. 392-399 - Kai Wang, Xukai Zou, Yan Sui:
A Multiple Secret Sharing Scheme based on Matrix Projection. 400-405
Security II (Intelligent Applications)
- Johan Åkerberg, Mats Björkman:
Exploring Security in PROFINET IO. 406-412 - Hyun-il Lim, Heewan Park, Seokwoo Choi, Taisook Han:
A Static Java Birthmark Based on Control Flow Edges. 413-420 - M. Fahim Ferdous Khan, Takeshi Yashiro, Ito So, Masahiro Bessho, Ken Sakamura:
A Secure and Flexible Electronic-Ticket System. 421-426
Software Architecture I (Software Architecture Development and Scheduling)
- Chao You, Minghui Zhou, Zan Xiao, Hong Mei:
Towards a Well Structured and Dynamic Application Server. 427-434 - Ali Razavi, Kostas Kontogiannis:
ProtoTalk: A Generative Software Engineering Framework for Prototyping Protocols in Smalltalk. 435-442 - Dongsun Kim, Seokhwan Kim, Sooyong Park:
Usage History-Based Architectural Scheduling. 443-451
Software Architecture II (Software Architecture Specification and Analysis)
- J. Marco Mendes, Axel Bepperling, João Pinto, Paulo Leitão, Francisco J. Restivo, Armando W. Colombo:
Software Methodologies for the Engineering of Service-Oriented Industrial Automation: The Continuum Project. 452-459 - Holger Arndt, Markus Bundschus, Andreas Nägele:
Towards a Next-Generation Matrix Library for Java. 460-467 - Zan Xiao, Donggang Cao, Chao You, Minghui Zhou, Hong Mei:
Towards Dynamic Component Updating: A Flexible and Lightweight Approach. 468-473
Software Architecture III (Analysis of Software Updates)
- Liang-Jie Zhang, Jia Zhang:
Design of Service Component Layer in SOA Reference Architecture. 474-479 - George H. Ford Jr., Ramesh K. Karne, Alexander L. Wijesinha, Patrick Appiah-Kubi:
The Design and Implementation of a Bare PC Email Server. 480-485 - Feng Chen, Zhuopeng Zhang, Jianzhi Li, Jian Kang, Hongji Yang:
Service Identification via Ontology Mapping. 486-491
Mobile and Pervasive Computing I (RFID, Wireless Network and Services)
- Wei Ye, Wen Zhao, Yu Huang, Wenhui Hu, Shikun Zhang, Lifu Wang:
Towards Passive RFID Event. 492-499 - Mi-Young Park, Sang-Hwa Chung, Prasanthi Sreekumari:
Estimating Rate of Queue Usage to Differentiate Cause of Packet Loss in Multi-hop Wireless Networks. 500-508 - Antonin Chazalet, Philippe Lalanda:
Deployment of Services Applications in Services Execution Environments. 509-516
Mobile and Pervasive Computing II (Software Testing and Re-engineering)
- Kyungman Kwak, Gonzalo Huerta Cánepa, Yangwoo Ko, Dongman Lee, Soon J. Hyun:
An Overlay-Based Resource Monitoring Scheme for Social Applications in MANET. 517-524 - Lijun Mei, Zhenyu Zhang, W. K. Chan:
More Tales of Clouds: Software Engineering Research Issues from the Cloud Application Perspective. 525-530 - Sushamna Deodhar, Alan L. Tharp:
Shift Hashing for Memory-Constrained Applications. 531-536 - Tiberiu Seceleanu, Ivica Crnkovic, Cristina Cerschi Seceleanu:
Transaction Level Control for Application Execution on the SegBus Platform. 537-542
Formal Methods (Formal Specification and Model Checking)
- Jiaqi Zhu, Yu Huang, Hanpin Wang:
A Formal Descriptive Language and an Automated Detection Method for Complex Events in RFID. 543-552 - Min Zhou, Fei He, Ming Gu, Xiaoyu Song:
Translation-Based Model Checking for PLC Programs. 553-562 - Yuan Dong, Shengyuan Wang, Liwei Zhang, Ping Yang:
Modular Certification of Low-Level Intermediate Representation Programs. 563-570
Best Practice
- Jonas Helming, Jörn David, Maximilian Koegel, Helmut Naughton:
Integrating System Modeling with Project Management - A Case Study. 571-578 - Gerhard Wellein, Georg Hager, Thomas Zeiser, Markus Wittmann, Holger Fehske:
Efficient Temporal Blocking for Stencil Computations by Multicore-Aware Wavefront Parallelization. 579-586 - Cheng-Zen Yang, Ing-Xiang Chen, Jia-Da Ye:
Extensions for Integrated Queries on Heterogeneous Semantic Web Resources. 587-592 - Tad Gonsalves, Kei Yamagishi, Kiyoshi Itoh:
Swarm Intelligence in the Fine-Tuning of Software Development Cost Estimation Models. COMPSAC (1) 2009: 593-598
Education and Learning (Domain Specific Software Architecture Design)
- Steven Burrows, Alexandra L. Uitdenbogerd, Andrew Turpin:
Temporally Robust Software Features for Authorship Attribution. 599-606 - Li Jin, Zhigang Wen:
An Augmented Social Interactive Learning Approach through Web2.0. 607-611 - Shaoshan Liu, Chengrui Deng, Xiao-Feng Li, Jean-Luc Gaudiot:
RHE: A Lightweight JVM Instructional Tool. 612-619
Fast Abstracts I (Formal Methods, Software Tools, Robotics)
- Holger Arndt:
The Java Data Mining Package - A Data Processing Library for Java. 620-621 - Chih-Hong Cheng, Markus Rickert, Christian Buckl, Edward A. Lee, Alois C. Knoll:
Toward the Design of Robotic Software with Verifiable Safety. 622-623 - Bingu Shim, Beomho Baek, Sooyong Park:
A Systematic Robot Fault-Tolerance Approach. 624-625 - James D. McCaffrey:
Generation of Pairwise Test Sets Using a Genetic Algorithm. 626-631 - Han Li, Feng Chen, Hongji Yang, He Guo, William Cheng-Chung Chu, Yuansheng Yang:
An Ontology-Based Approach for GUI Testing. 632-633 - David S. Allison, Hany F. El Yamany, Miriam A. M. Capretz:
A Fine-Grained Privacy Structure for Service-Oriented Architecture. 634-635
Fast Abstracts II (Software Engineering, MDA)
- Clênio F. Salviano:
A Multi-model Process Improvement Methodology Driven by Capability Profiles. 636-637 - Xiao He, Zhiyi Ma, Yan Zhang, Weizhong Shao:
On Model Transformation Reuse. 638-639 - Xiaohong Li, Qiang Liu:
Requirement Risk Assessment Focused-On Stakeholder Risk Analysis. 640-641 - Mira Kajko-Mattsson, Jan Lundholm, Jonas Norrby:
Industrial Opinion on the Effectiveness of Risk Management Methods. 642-643 - Nancy R. Mead, Antonio Drommi, Daniel Shoemaker, Jeffrey A. Ingalsbe:
A Study of the Impact on Students Understanding Cross Cultural Differences in Software Engineering Work. 644-645 - Richard C. Millham, Hongji Yang:
Industrial Report: Data Reengineering of COBOL Sequential Legacy Systems. 646-647
Doctoral Symposium
- David A. Cape, Bruce M. McMillin:
Dihomotopic Reduction Used in Deadlock Detection. 648-651 - Aneta Vulgarakis:
Towards a Resource-Aware Component Model for Embedded Systems. 652-655 - Jan Stender:
Efficient Management of Consistent Backups in a Distributed File System. 656-659 - Ravi Akella, Bruce M. McMillin:
Model-Checking BNDC Properties in Cyber-Physical Systems. 660-663 - Cristian Dittamo:
On Expressing Different Concurrency Paradigms on Virtual Execution Systems. 664-667 - Jing Lin, Sahra Sedigh, Ann Miller:
A General Framework for Quantitative Modeling of Dependability in Cyber-Physical Systems: A Proposal for Doctoral Research. 668-671 - Ayman Z. Faza, Sahra Sedigh, Bruce M. McMillin:
Reliability Modeling for the Advanced Electric Power Grid: A Proposal for Doctoral Research. 672-675 - Qichang Chen, Liqiang Wang:
An Integrated Framework for Checking Concurrency-Related Programming Errors. 676-679
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.