default search action
30th COMPSAC 2006: Chicago, Illinois, USA - Volume 1
- 30th Annual International Computer Software and Applications Conference, COMPSAC 2006, Chicago, Illinois, USA, September 17-21, 2006. Volume 1. IEEE Computer Society 2006, ISBN 0-7695-2655-1
Keynote
- George Cybenko, Vincent H. Berk, Ian D. Gregorio-De Souza, Chad Behre:
Practical Autonomic Computing. 3-14
Panels
- Stephen S. Yau:
Future Trends of Software Technology and Applications. 15 - Paul C. Clements:
Future Trends of Software Technology and Applications: Software Architecture. 16 - Warren Harrison:
Future Trends of Software Technology and Applications: The Phone is the Computer. 17 - John C. Knight:
Future Trends of Software Technology and Applications Model-Based Development. 18 - Tsau Young Lin:
Introduction to Panels on E-Security, Granular Computing and Web Intelligence. 21 - Tsau Young Lin:
Granular Computing, Computer Security andWeb Intelligence. 22-23 - Ning Zhong:
How to Make "Web Intelligence (WI) meets Brain Informatics (BI)" Successfully? 24-25 - Shusaku Tsumoto:
Data Structure and Algorithm in Data Mining: Granular Computing View. 26-27 - Ann Miller, John McLean, O. Sami Saydjari, Jeffrey M. Voas:
COMPSAC Panel Session on Trustworthy Computing. 31 - John McLean:
Trustworthy Software: Why we need it, Why we don't have it, How we can get it. 32-33 - Ann Miller:
Trustworthy Computing Needs. 34 - Jeffrey M. Voas:
Reliability and Fault Tolerance in Trust. 35-36 - O. Sami Saydjari:
Risk: A Good System Security Measure. 37-38 - Jane Cleland-Huang:
Just Enough Requirements Traceability. 41-42 - Carl K. Chang:
Software Engineering Education in the New Millennium - A View from Asia. 45 - Dick B. Simmons:
Software Engineering Education in the New Millennium. 46-47 - Monica Adya:
Imparting Global Software Development Experience via an IT Project Management Course: Critical Success Factors. 51-52 - Umesh Bellur:
An Academic Perspective on Globalization in the Software Industry. 53-54 - Venu Vasudevan:
Global Software Enterpreneurship. 55-56 - Rajiv Ramnath:
Global Software Development for the Enterprise. 57-58 - Sheikh Iqbal Ahamed:
Model for Global Software Engineering Project Life Cycle and How to Use it in Classroom for Preparing Our Students for the Globalization. 59-60
Applications
- Vibhu Saujanya Sharma, Pankaj Jalote, Kishor S. Trivedi:
A Performance Engineering Tool for Tiered Software Systems. 63-70 - Amandeep S. Sidhu, Tharam S. Dillon, Farookh Khadeer Hussain:
Accomplishments and Challenges of Protein Ontology. 71-76 - Edward W. Y. Ho, Dickson K. W. Chiu, Patrick C. K. Hung:
Alert Based Monitoring of Stock Trading Systems. 77-86
Architecture 1
- Tae-hyung Kim, Carl K. Chang:
An Aspect-Oriented Approach to Resource Composition in Petri net-based Software Architectural Models. 87-94 - Michel Jaring:
Engineering Reconfigurable Product Families - Architecting the Variability Infrastructure of a Product Family On-Chip. 95-102 - Paskorn Champrasert, Junichi Suzuki:
A Biologically-Inspired Autonomic Architecture for Self-Healing Data Centers. 103-112
Architecture 2
- Federico Balaguer, Thuc S. M. Ho, Ralph E. Johnson:
Detecting Data Races on Framework-Based Applications. 113-120 - Qian Zhang, Jian Wu, Hong Zhu:
Tool Support to Model-based Quality Analysis of Software Architecture. 121-128 - Rabih Zbib, Ashish Jain, Devasis Bassu, Hiralal Agrawal:
Generating Domain Specific Graphical Modeling Editors from Meta Models. 129-138
Formal Methods/Models 1
- Anduo Wang, Fei He, Ming Gu, Xiaoyu Song:
Verifying Java Programs By Theorem Prover HOL. 139-142 - Kuangnan Chang, David Chenho Kung:
Model Checking with Induction. 143-149 - Jimin Gao, Mats Per Erik Heimdahl, David Owen, Tim Menzies:
On the Distribution of Property Violations in Formal Models: An Initial Study. 150-160
Formal Methods/Models 2
- Matthias Book, Volker Gruhn:
Efficient Modeling of Hierarchical Dialog Flows for Multi-ChannelWeb Applications. 161-168 - Raoul Praful Jetley, S. Purushothaman Iyer, Paul L. Jones, William Spees:
A Formal Approach to Pre-Market Review for Medical Device Software. 169-177 - Shalom N. Rosenfeld, Ioana Rus, Michel Cukier:
Modeling the Symptomatic Fixes Archetype in Enterprise Computer Security. 178-188
Maintenance
- Rivalino Matias, Paulo José de Freitas Filho:
An Experimental Study on Software Aging and Rejuvenation in Web Servers. 189-196 - Tien N. Nguyen:
A Novel Structure-Oriented Difference Approach for Software Artifacts. 197-204 - Feng Chen, Hongji Yang, Bing Qiao, William Cheng-Chung Chu:
A Formal Model Driven Approach to Dependable Software Evolution. 205-214
Metrics
- Mahmoud O. Elish:
Do Structural Design Patterns Promote Design Stability? 215-220 - Márcio Rodrigo Braz, Silvia Regina Vergilio:
Software Effort Estimation Based on Use Cases. 221-228 - Jing Liu, Keqing He, Yutao Ma, Rong Peng:
Scale Free in Software Metrics. 229-235 - Yaw-Chung Chen, Wen-Yen Chen:
An Agent-Based Metric for Quality of Services over Wireless Networks. 236-246
Pervasive Computing
- Shaya Potter, Jason Nieh:
Highly Reliable Mobile Desktop Computing in Your Pocket. 247-254 - Henry Novianus Palit, Chi-Hung Chi, Lin Liu:
Proxy-Based Pervasive Multimedia Content Delivery. 255-264
Requirements Design 1
- Xuchang Zou, Raffaella Settimi, Jane Cleland-Huang:
Phrasing in Dynamic Requirements Trace Retrieva. 265-272 - Matt Ryan, Sule Simsek, Xiaoqing Frank Liu, Bruce M. McMillin, Ying Cheng:
An Instance-Based Structured Object Oriented Method for Co-analysis/Co-design of Concurrent Embedded Systems. 273-280 - Yan Sun, Xiaoqing Frank Liu, Bruce M. McMillin:
A Methodology for Structured Object-Oriented Elicitation and Analysis of Temporal Constraints in Hardware/Software Co-analysis and Co-design of Real-Time Systems. 281-290
Requirements Design 2
- Jiang Guo:
A Coordination Framework for Software Component Based Development. 291-298 - Nearchos Paspallis, George A. Papadopoulos:
An Approach for Developing Adaptive, Mobile Applications with Separation of Concerns. 299-306 - Katsunori Oyama, Atsushi Takeuchi, Hiroshi Fujimoto:
CAPIS Model Based Software Design Method for Sharing Experts' Thought Processes. 307-316
Security 1
- Dae-Kyoo Kim, Priya Gokhale:
A Pattern-Based Technique for Developing UML Models of Access Control Systems. 317-324 - Mohammad Al-Subaie, Mohammad Zulkernine:
Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection. 325-332 - Yonggang Zhang, Juergen Rilling, Volker Haarslev:
An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns. 333-342
Security 2
- Ashish Aggarwal, Pankaj Jalote:
Integrating Static and Dynamic Analysis for Detecting Vulnerabilities. 343-350 - Orest Pilskalns, Daniel Williams, Damir Aracic, Anneliese Amschler Andrews:
Security Consistency in UML Designs. 351-358 - Hiroshi Wada, Junichi Suzuki, Katsuya Oba:
A Service-Oriented Design Framework for Secure Network Applications. 359-368
Testing 1
- Koichiro Rinsaka, Kazuya Shibata, Tadashi Dohi:
Proportional Intensity-Based Software Reliability Modeling with Time-Dependent Metrics. 369-376 - João W. Cangussu, Michael Baron:
Automatic Identification of Change Points for the System Testing Process. 377-384 - Jun Yan, Jian Zhang:
Backtracking Algorithms and Search Heuristics to Generate Test Suites for Combinatorial Testing. 385-394
Testing 2
- Donglin Liang, Kai Xu:
Testing Scenario Implementation with Behavior Contracts. 395-402 - Man Fai Lau, Ying Liu, Yuen-Tak Yu:
On Detection Conditions of Double Faults Related to Terms in Boolean Expressions. 403-410 - Dennis Jeffrey, Neelam Gupta:
Test Case Prioritization Using Relevant Slices. 411-420
Testing 3
- Gabriela Jacques-Silva, Roberto Jung Drebes, Júlio Gerchman, Joana Matos Fonseca da Trindade, Taisy Silva Weber, Ingrid Jansch-Pôrto:
A Network-Level Distributed Fault Injector for Experimental Validation of Dependable Distributed Systems. 421-428 - W. K. Chan, Shing-Chi Cheung, Jeffrey C. F. Ho, T. H. Tse:
Reference Models and Automatic Oracles for the Testing of Mesh Simplification Software for Graphics Rendering. 429-438
Testing 4
- Jonatan Alava, Tariq M. King, Peter J. Clarke:
Automatic Validation of Java Page Flows Using Model-Based Coverage Criteria. 439-446 - Bei-Bei Yin, Yan Shi, Chenggang Bai, Kai-Yuan Cai:
A Case Study for Invalidating the Markovian Property of GUI Software Structural Profile. 447-454 - Jerry Gao, Deepa Gopinathan, Quan Mai, Jingsha He:
A Systematic Regression Testing Method and Tool For Software Components. 455-466
Testing 6
- Anton Michlmayr, Pascal Fenkam, Schahram Dustdar:
Architecting a Testing Framework for Publish/Subscribe Applications. 467-474 - Johannes Mayer, Ralph Guderlei:
An Empirical Study on the Selection of Good Metamorphic Relations. 475-484 - Kwok Ping Chan, Tsong Yueh Chen, Dave Towey:
Forgetting Test Cases. 485-494
Web Service 1
- Swapna S. Gokhale, Jijun Lu:
Performance and Availability Analysis of an E-Commerce Site. 495-502 - Stephen S. Yau, Haishan Gong, Dazhi Huang, Wei Gao, Luping Zhu:
Automated Agent Synthesis for Situation Awareness in Service-Based Systems. 503-512
Web Service 2
- Zhi Jin, Lin Liu:
Web Service Retrieval: An Approach Based on Context Ontology. 513-520 - Yi Deng, Seyed Masoud Sadjadi, Peter J. Clarke, Chi Zhang, Vagelis Hristidis, Raju Rangaswami, Nagarajan Prabakar:
A Communication Virtual Machine. 521-531 - Chi-Hung Chi, Lin Liu, LuWei Zhang:
Quantitative Analysis on the Cacheability Factors of Web Objects. 532-538
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.