


default search action
29th COMPSAC 2005: Edinburgh, Scotland, UK - Volume 1
- 29th Annual International Computer Software and Applications Conference, COMPSAC 2005, Edinburgh, Scotland, UK, July 25-28, 2005. Volume 1. IEEE Computer Society 2005, ISBN 0-7695-2413-3

Introduction
- Message from the Standing Committee Chair.

- Message from the General Chair.

- Message from the Program Co-Chairs.

- Committees.

- Reviewers.

Keynote Address I
- Graham Spittle:

Industry Trends and Software Assurance. 3
Software Testing (I)
- Yvan Labiche

:
Incremental Class Testing from a Class Test Order. 7-12 - Shuhao Li, Ji Wang, Xin Wang, Zhi-Chang Qi:

Configuration-Oriented Symbolic Test Sequence Construction Method for EFSM. 13-18 - Peng Wu:

Iterative Metamorphic Testing. 19-24 - William E. Howden:

Software Test Selection Patterns and Elusive Bugs. 25-32
Process Management
- Scott D. Miller, Aditya P. Mathur, Raymond A. DeCarlo:

DIG: A Tool for Software Process Data Extraction and Grooming. 35-40 - Ching-Pao Chang, Jia-Lyn Lv, Chih-Ping Chu:

A Defect Estimation Approach for Sequential Inspection Using a Modified Capture-Recapture Model. 41-46 - G. Lorenzo Thione, Dewayne E. Perry:

Parallel Changes: Detecting Semantic Interferences. 47-56
Software Architecture and Metric
- Jody L. Sharpe, João W. Cangussu:

A Productivity Metric Based on Statistical Pattern Recognition. 59-64 - Victor K. Y. Chan, W. Eric Wong:

Optimizing and Simplifying Software Metric Models Constructed Using Maximum Likelihood Methods. 65-70 - Tingting Han, Taolue Chen

, Jian Lu:
Structure Analysis for Dynamic Software Architecture Based on Spatial Logic. 71-76 - Swapna S. Gokhale, Sherif M. Yacoub:

Performability Analysis of a Pipeline Software Architecture. 77-82
Panel: High-Assurance Software for Mobile Tele-Health Systems
- Jose C. Lacal:

High-Assurance Software Design for Mobile Tele-Health Systems. 85 - Robert S. H. Istepanian:

Wireless Security for Personalized and Mobile Healthcare Services. 86
Software Reengineering and Service-Based Systems
- Ying Pan, Lei Wang, Lu Zhang, Bing Xie, Fuqing Yang:

An Extended Approach to Improving the Semantic Interoperation Among Reuse Repositories. 89-94 - Dowming Yeh, Pei-Chen Sun, William Cheng-Chung Chu, Chien-Lung Lin, Hongji Yang:

An Empirical Study of a Reverse Engineering Method for Aggregation Relationship Based on Operation Propagation. 95-100 - Wei-Tek Tsai, Yinong Chen

, Raymond A. Paul, Hai Huang, Xinyu Zhou, Xiao Wei:
Adaptive Testing, Oracle Generation, and Test Case Ranking for Web Services. 101-106 - Stephen S. Yau, Dazhi Huang, Haishan Gong, Hasan Davulcu:

Situation-Awareness for Adaptive Coordination in Service-Based Systems. 107-112
Middleware and Agent-Based Systems
- Nader Mohamed:

Self-Configuring Communication Middleware Model for Multiple Network Interfaces. 115-120 - Arnor Solberg, Devon M. Simmonds, Raghu Reddy

, Sudipto Ghosh, Robert B. France:
Using Aspect Oriented Techniques to Support Separation of Concerns in Model Driven Development. 121-126 - Ji Wang, Rui Shen, Hong Zhu:

Agent Oriented Programming Based on SLABS. 127-132 - Shung-Bin Yan, Zu-Nien Lin, Hsun-Jen Hsu, Feng-Jian Wang:

Intention Scheduling for BDI Agent Systems. 133-140
Security and Privacy (I)
- Mohammad Feroz Raihan, Mohammad Zulkernine:

Detecting Intrusions Specified in a Software Specification Language. 143-148 - Hiroyasu Nishiyama:

SecureC: Control-Flow Protection Against General Buffer Overflow Attack. 149-155 - David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:

Buffer Overrun Prevention Through Component Composition Analysis. 156-163 - Ammar Masood, Sahra Sedigh-Ali

, Arif Ghafoor:
Efficiently Managing Security Concerns in Component Based System Design. 164-169
Panel: Industry and Academia: Can They Agree on Best Practice Within Software Engineering?
- J. Barrie Thompson:

Industry and Academia: Can They Agree on Best Practice Within Software Engineering?. 173 - Stephen Chen:

Best Practices in Software Engineering: Does Anybody in Industry or Academia Care? 174 - Pierre Bourque:

Principles Should Underlie Standards and Best Practices. 175
Requirement and Design (I)
- Mechelle Gittens, Yong Kim, David Godwin:

The Vital Few Versus the Trivial Many: Examining the Pareto Principle for Software. 179-185 - Juha Savolainen, Ian Oliver, Mike Mannion

, Hailang Zuo:
Transitioning from Product Line Requirements to Product Line Architecture. 186-195 - Cristina Cerschi Seceleanu

:
Designing Controllers for Reachability. 196-203 - Yukiteru Yoshihara, Takao Miura:

Melody Classification Using EM Algorithm. 204-210
Formal Methods
- Sukhamay Kundu, Nigel Gwee:

A Formal Approach to Designing a Class-Subclass Structure Using a Partial-Order on the Functions. 213-220 - Yanhui Li, Baowen Xu

, Jianjiang Lu, Dazhou Kang, Peng Wang:
A Family of Extended Fuzzy Description Logics. 221-226 - Weijia Deng, Huimin Lin:

Extended Symbolic Transition Graphs with Assignment. 227-232 - Martin P. Ward

, Hussein Zedan:
MetaWSL and Meta-Transformations in the FermaT Transformation System. 233-238
Networked, Distributed, and Embedded Systems (I)
- Mark Grechanik

, Dewayne E. Perry, Don S. Batory:
Using AOP to Monitor and Administer Software for Grid Computing Environments. 241-248 - Ryosuke Miyoshi, Takao Miura, Isamu Shioya:

Nearest Neighbor Queries on Extensible Grid Files Using Dimensionality Reduction. 249-255 - Austin Armbruster, Michael R. Gosnell, Bruce M. McMillin

, Mariesa L. Crow
:
Power Transmission Control Using Distributed Max Flow. 256-263
Plenary Panel: Security and Privacy in Distributed Collaborative Systems
- Stephen S. Yau:

Security and Privacy in Collaborative Distributed Systems. 267 - Piero A. Bonatti

:
Rule Languages for Security and Privacy in Cooperative Systems. 268-269 - Dengguo Feng, Ji Xiang:

Experiences on Intrusion Tolerance Distributed Systems. 270-271
Internet Web Systems
- John Oliver Bailey, Elizabeth Burd:

Tree-Map Visualization for Web Accessibility. 275-280 - Yuh-Jzer Joung

, Cheng Yen, Chung-Tang Huang, Yi-Jhan Huang:
On Personal Data License Design and Negotiation. 281-286 - Michael Ruth, Feng Lin, Shengru Tu:

Adapting Single-Request/Multiple-Response Messaging to Web Services. 287-292 - I-Chen Wu

, Jui-Yuan Su, Loon-Been Chen:
A Web Data Extraction Description Language and Its Implementation. 293-298
Verification and Validation
- Yu Lei, David Chenho Kung, Qizhi Ye:

A Blocking-Based Approach to Protocol Validation. 301-306 - Jinchun Xia, Yujia Ge, Carl K. Chang:

An Empirical Performance Study for Validating a Performance Analysis Approach: PSIM. 307-312 - Yanlong Zhang, Hong Zhu, Sue Greenwood:

Empirical Validation of Website Timeliness Measures. 313-318 - Puntip Pattaraintakorn, Nick Cercone, Kanlaya Naruedomkul:

Hybrid Intelligent Systems: Selecting Attributes for Soft-Computing Analysis. 319-325
Panel: Model-Based Software Testing and Verification
- Aditya P. Mathur:

Model-Based Software Testing and Verification. 329 - Mats Per Erik Heimdahl:

Model-Based Testing: Challenges Ahead. 330 - Ashish Jain:

Model-Based Testing for Enterprise Software Solutions. 331 - T. H. Tse

:
Research Directions on Model-Based Metamorphic Testing and Verification. 332
Mobile and Pervasive/Ubiquitous Computing
- Geoff A. W. West, Stewart Greenhill

, Svetha Venkatesh
:
A Probabilistic Approach to the Anxious Home for Activity Monitoring. 335-340 - Alexei Iliasov, Alexander B. Romanovsky

:
Exception Handling in Coordination-Based Mobile Environments. 341-350 - Jon Davis, Andrew Tierney, Elizabeth Chang

:
A User-Adaptable User Interface Model to Support Ubiquitous User Access to EIS Style Applications. 351-358 - Insuk Park, Dongman Lee, Soon J. Hyun:

A Dynamic Context-Conflict Management Scheme for Group-Aware Ubiquitous Computing Environments. 359-364
Panel: 21st-Century Global Software Development and Education
- Dick B. Simmons:

Twenty-First Century Software Production Paradigms. 367 - Chris Nelson:

SSI, Academia and Industry Collaboration. 368 - Victoria Livschitz:

Conquering the Crisis in Software Engineering. 369 - James H. Cross II:

21st-Century Global Software Development and Education Position Statement. 370 - Xiaoqing Frank Liu:

Collaborative Global Software Development and Education. 371
Requirement and Design (II)
- Fumiko Nagoya, Shaoying Liu, Yuting Chen:

A Tool and Case Study for Specification-Based Program Review. 375-380 - Mitchell Loeb, Alan L. Tharp:

Tridirectional Computed Chaining: An Efficient Hashing Algorithm for Limited Space Applications. 381-387 - Vicky Nassis, Rajagopal Rajugan, Tharam S. Dillon, J. Wenny Rahayu:

A Requirement Engineering Approach for Designing XML-View Driven, XML Document Warehouses. 388-395 - Matt Ryan, Sojan Markose, Xiaoqing Frank Liu, Ying Cheng:

Structured Object-Oriented Co-Analysis/Co-Design of Hardware/Software for the FACTS Power System. 396-402
Reliable Systems
- Koji Ohishi, Hiroyuki Okamura

, Tadashi Dohi
:
Gompertz Software Reliability Model and Its Application. 405-410 - Jing Zhao, Hongwei Liu, Gang Cui, Xiao-Zong Yang:

Software Reliability Growth Model Considering Testing Profile and Operation Profile. 411-416 - Engelbert Hubbers, Bart Jacobs, Wolter Pieters:

RIES - Internet Voting in Action. 417-424 - Tim Storer, Ishbel Duncan

:
Two Variations to the mCESG Pollsterless E-Voting Scheme. 425-430
Keynote Address II
- Jeena Srinivas, Stephen Chen:

Towards a Model of Seamless Mobility - User Value and Security in Computing, Content, and Communications. 433-434
Software Testing (II)
- Tafline Murnane, Richard Hall, Karl Reed:

Towards Describing Black-Box Testing Methods as Atomic Rules. 437-442 - Jian Bing Li, James Miller:

Testing the Semantics of W3C XML Schema. 443-448 - Arnaud Gotlieb, Tristan Denmat, Bernard Botella:

Goal-Oriented Test Data Generation for Programs with Pointer Variables. 449-454 - George Devaraj, Mats Per Erik Heimdahl, Donglin Liang:

Coverage-Directed Test Generation with Model Checkers: Challenges and Opportunities. 455-462 - Jerry Gao, Raquel Espinoza, Jingsha He

:
Testing Coverage Analysis for Software Component Validation. 463-470
Dependability and Fault Tolerance
- Sergiy A. Vilkomir, David Lorge Parnas, Veena B. Mendiratta, Eamonn Murphy:

Availability Evaluation of Hardware/Software Systems with Several Recovery Procedures. 473-478 - Nik Looker, Malcolm Munro, Jie Xu:

A Comparison of Network Level Fault Injection with Code Insertion. 479-484 - Tiancheng Liu, Gang Huang, Gang Fan, Hong Mei:

The Coordinated Recovery of Data Service and Transaction Service in J2EE. 485-490 - Guohui Li, LihChyun Shu:

A Low-Latency Checkpointing Scheme for Mobile Computing Systems. 491-496
Panel: How Democratic Will E-Democracy Be?
- Stuart Anderson

, Massimo Felici:
How Democratic Will E-Democracy Be? 499 - Ian Brown:

Who Is Enfranchised by Remote Voting? 500 - Peter Ryan

:
Prospects for E-Voting. 501 - Jacques Bus:

How Democratic Will E-Democracy Be? 502
Security and Privacy (II)
- Michael Maaser, Peter Langendörfer

:
Automated Negotiation of Privacy Contracts. 505-510 - En Tzu Wang, Guanling Lee, Yu Tzu Lin:

A Novel Method for Protecting Sensitive Knowledge in Association Rules Mining. 511-516 - Engin Kirda, Christopher Krügel:

Protecting Users Against Phishing Attacks with AntiPhish. 517-524 - Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang

:
A Performance-Based Grid Intrusion Detection System. 525-530
Networked, Distributed, and Embedded Systems (II)
- Hung-Chang Hsiao, Chung-Ta King:

Scoped Broadcast in Dynamic Peer-to-Peer Networks. 533-538 - Kyungsook Bae, Kye Kyung Kim, Yun Koo Chung, Wonpil Yu

:
Character Recognition System for Cellular Phone with Camera. 539-544 - Egon Teiniker, Robert Lechner, Gernot Schmoelzer, Christian Kreiner

, Zsolt Kovács, Reinhold Weiss:
Towards a Contract Aware CORBA Component Container. 545-550 - Hidenori Umeno, Masato Kiyama, Takafumi Fukunaga, Takashige Kubo:

New Method for Dispatching Waiting Logical Processors in Virtual Machine Systems. 551-560 - Bhavani Thuraisingham:

Trust Management in a Distributed Environment. 561-562

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














