Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/1901613guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
COMPSAC '10: Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference
2010 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
July 19 - 23, 2010
ISBN:
978-0-7695-4085-6
Published:
19 July 2010

Reflects downloads up to 04 Oct 2024Bibliometrics
Abstract

No abstract available.

Article
Article
Article
Article
Article
Reviewers
Article
Software Development Productivity: Challenges and Future Trends

In recent years, the software development productivity has been attracting higher attention by the professional community because of its increasing importance for the development of complex software systems and applications. At the same time, component-...

Article
Challenges and Future Directions of Cyber-Physical System Software

Under the current weak state of the art in cyber-physical system (CPS) software engineering a number of problems that plague the industry cannot be contained easily. Low quality of network-based CPS software, low productivity of CPS software engineers, ...

Article
Internetware: Challenges and Future Direction of Software Paradigm for Internet as a Computer

Internet is becoming an open, global, ubiquitous and smarter computer for our society and planet. Such “Internet as a Computer” requires substantial improvements in software characteristics such as collaborative, situational, autonomous, evolvable and ...

Article
Challenges and Future Directions of Software Technology: Secure Software Development

Developing large scale software systems has major security challenges. This paper describes the issues involved and then addresses two topics: formal methods for emerging secure systems and secure services modeling.

Article
Towards Secure Virtual Directories: A Risk Analysis Framework

Directory services are used by almost every enterprise computing environment to provide data concerning users, computers, contacts, and other objects. Virtual directories are components that provide directory services in a highly customized manner. ...

Article
Using a Hypervisor to Migrate Running Operating Systems to Secure Virtual Machines

We propose HyperShield, which is a hypervisor that can be inserted into and removed from a running operating system, for improving security. While many existing security-oriented hypervisors require modifying or rebooting an overlying operating system, ...

Article
A New Concurrent Checkpoint Mechanism for Real-Time and Interactive Processes

This paper presents a new concurrent checkpoint mechanism that allows the checkpointed process to run without stopping while checkpoints are set. The checkpointed process can keep running until a memory access request is captured by tracing TLB misses ...

Article
An Analysis of Tool-Based Research in Software Engineering

Many research approaches in software engineering propose models or extensions to existing models. This includes system models, such as UML models, and project management artifacts, such as bug reports or tasks. For evaluating a research approach these ...

Article
A Task-Oriented Navigation Approach to Enhance Architectural Description Comprehension

The way to document architecture is called Architecture Description (AD). It contains all the key design decisions, presents how the system is composed, specifies the interface of the component, and etc. Such information is needed not only during the ...

Article
Improving Software Performance and Reliability with an Architecture-Based Self-Adaptive Framework

Modern computer systems for distributed service computing become highly complex and difficult to manage. A selfadaptive approach that integrates monitoring, analyzing, and actuation functionalities has the potential to accommodate to a dynamically ...

Article
An Approach for Ensuring Robust Safeguard against Location Privacy Violation

The challenge of preserving user’s location privacy is more important now than ever before with the proliferation of handheld devices and the pervasive use of location based services. To protect location privacy, we must ensure k-anonymity so that the ...

Article
Design and Implementation of a Middleware for Development and Provision of Stream-Based Services

This paper proposes MISSA, a novel middleware to facilitate the development and provision of stream-based services in emerging pervasive environments. The stream-based services utilize voluminous and continuously updated data streams as their input. The ...

Article
geoXmart - A Marketplace for Geofence-Based Mobile Services

This paper describes the concept and architecture of geoXmart, a marketplace for proactive context-aware services, which enables users to easily find and subscribe to interesting services and allows providers to specify, export and maintain their ...

Article
Applying Particle Swarm Optimization to Pairwise Testing

Combinatorial testing (also called interaction testing) is an effective specification-based test input generation technique. By now most of research work in combinatorial testing aims to propose novel approaches trying to generate test suites with ...

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations