


default search action
30th COMPSAC 2006: Chicago, Illinois, USA - Volume 2
- 30th Annual International Computer Software and Applications Conference, COMPSAC 2006, Chicago, Illinois, USA, September 17-21, 2006. Volume 2. IEEE Computer Society 2006

Pervasive/Performance
- Kamala Subramaniam, Alan L. Tharp, Arne A. Nilsson:

Location Updates In Cellular Networks Using Bloom Filters. 3-9 - Kyosuke Yasuda, Takao Miura, Isamu Shioya:

Distributed Processes on Tree Hash. 10-13 - Lorenz Froihofer, Johannes Osrael, Karl M. Göschka:

Trading Integrity for Availability by Means of Explicit Runtime Constraints. 14-17 - Zhou Yanming, Qu Mingbin Mingbin:

A Run-time Adaptive and Code-size Efficient XML Parser. 18-21 - Upsorn Praphamontripong, Swapna S. Gokhale, Aniruddha S. Gokhale

, Jeff Gray
:
Performance Analysis of an Asynchronous Web Server. 22-28
Requirements/Design
- João Araújo

, Jon Whittle, Ana Moreira
:
Choosing the Right Time to Compose Aspectual Scenarios. 29-32 - Michael E. Shin, Fernando Paniagua:

Self-Management of COTS Component-Based Systems Using Wrappers. 33-36 - Andreas S. Andreou

, Dimitrios Vogiatzis
, George A. Papadopoulos
:
Intelligent Classification and Retrieval of Software Components. 37-40 - Yao-Dong Feng, Gang Huang, Jie Yang, Hong Mei:

Traceability between Software Architecture Models. 41-44 - Xiaodong Liu, Yankui Feng, Jon M. Kerridge

:
Achieving Dependable Component-Based Systems Through Generative Aspect Oriented Component Adaptation. 45-48 - Zhao Liu, Gang Huang, Hong Mei:

The Model and Implementation of Component Array Container. 49-54
Design/Security
- Jihong Zuo, Qianxiang Wang, Hong Mei:

Preventing Feature Interactions by Constraints. 55-58 - Matt Barrett, Clark D. Thomborson

:
Frameworks Built on the Trusted Platform Module. 59-62 - Pierre-Etienne Poirot, Shangping Ren, Jerzy Nogiec, Jeffrey J. P. Tsai:

Separating Functional and Non-functional Concerns through Coordination: An Application to Reliability. 63-66 - Moushumi Sharmin, Sheikh Iqbal Ahamed, Shameem Ahmed, Haifeng Li:

SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment. 67-70 - Lin Liu, Eric S. K. Yu, John Mylopoulos:

Security Design Based on Social Modeling. 71-78
Security
- Dianxiang Xu, Vivek Goel, Kendall E. Nygard:

An Aspect-Oriented Approach to Security Requirements Analysis. 79-82 - Arnab Ray, Rance Cleaveland:

A Software Architectural Approach to Security by Design. 83-86 - Gernot Schmoelzer, Christian Kreiner

, Zsolt Kovács, Michael Thonhauser:
Reflective, Model-Based Data Access with the Type-Safe Entity Container. 87-92
Testing
- Adenilso da Silva Simão

, Rodrigo Fernandes de Mello
, Luciano José Senger:
A Technique to Reduce the Test Case Suites for Regression Testing Based on a Self-Organizing Neural Network Architecture. 93-96 - Sung Kim, Garrett Hoff:

Realization of Systematic Reliability Analysis of Decomposable Systems. 97-100 - Adnan Ashraf

, Aamer Nadeem
:
Automating the Generation of Test Cases from Object-Z Specifications. 101-104 - Yvan Labiche

:
Planning and Scheduling from a Class Test Order. 105-108 - Feng-Jian Wang, Chia-Lin Hsu, Huin-Jen Hsu:

Analyzing Inaccurate Artifact Usages in a Workflow Schema. 109-114
Web Services/Applications
- Yong Wang, Dick B. Simmons:

Modeling Web Accessibility: A Case Study on Texas A&M University People Website. 115-118 - José Antonio de Frutos, Esther Cadiñanos, Juan Ignacio Pérez, Sara García:

Tool for Analysis and Simulation of TTCAN Communication in Distributed Systems. 119-122 - R. Krishnan, Margaret Nadworny:

Moving Software from Expense to Asset. 123-126 - Russell Lock:

Automated Negotiation for Service Contracts. 127-134 - Li Ruan, Yongji Wang, Qing Wang, Fengdi Shu, Haitao Zeng, Shen Zhang:

ARIMAmmse: An Improved ARIMA-based. 135-138 - Zhenbang Chen, Ji Wang, Wei Dong, Zhichang Qi, Wing Lok Yeung:

An Interface Theory Based Approach to Verification of Web Services. 139-144
The Third International Workshop on Quality Assurance and Testing Web-Based Applications (QATWBA'06)
- Hong Zhu:

A Framework for Service-Oriented Testing of Web Services. 145-150 - Hany F. El Yamany

, Miriam A. M. Capretz
, Luiz Fernando Capretz:
A Multi-Agent Framework for Testing Distributed Systems. 151-156 - Nuo Li, Qin-qin Ma, Ji Wu, Maozhong Jin, Chao Liu:

A Framework of Model-Driven Web Application Testing. 157-162 - Wei-Tek Tsai, Jerry Gao, Xiao Wei, Yinong Chen

:
Testability of Software in Service-Oriented Architecture. 163-170
Second International Workshop on Testing and Quality Assurance for Component-Based Systems (TQACBS 2006)
- Dima Suliman, Barbara Paech, Lars Borner, Colin Atkinson

, Daniel Brenner, Matthias Merdes, Rainer Malaka
:
The MORABIT Approach to Runtime Component Testing. 171-176 - Fariaz Karim, Harish Thanneer:

Automated Health-Assessment of Software Components using Management Instrumentatio. 177-182 - Valdivino Alexandre de Santiago Jr.

, Ana Silvia Martins do Amaral, Nandamudi L. Vijaykumar, Maria de Fátima Mattiello-Francisco, Eliane Martins, Odnei Cuesta Lopes:
A Practical Approach for Automated Test Case Generation using Statecharts. 183-188 - Pekka Mäki-Asiala, Mari Matinlassi:

Quality Assurance of Open Source Components: Integrator Point of View. 189-194
Security, Privacy, and Trust for Pervasive Applications (SPTPA 2006)
- Hyun Seok Kim, Jeong-Hyun Oh, Jin-Young Choi

:
Security Analysis of RFID Authentication for Pervasive Systems using Model Checking. 195-202 - Bo Zhou, Qi Shi, Madjid Merabti:

Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test. 203-208 - John F. Buford, Emré Celebi, Phyllis G. Frankl:

Property-Based Peer Trust in the Sleeper Service Discovery Protocol. 209-214 - Zhengping Wu, Alfred C. Weaver

:
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing. 215-222
The Third International Workshop on Software Cybernetics (IWSC'06)
- Kai-Yuan Cai, Lei Zhao, Feng Wang:

A Dynamic Partitioning Approach for GUI Testing. 223-228 - Mohamad S. Bayan, João W. Cangussu:

Automatic Stress and Load Testing for Embedded Systems. 229-233 - Q. P. Hu

, Yuan-Shun Dai, Min Xie
, Szu Hui Ng:
Early Software Reliability Prediction with Extended ANN Model. 234-239 - Dianxun Shuai, Bin Zhang, Cunpai Lu:

A New Generalized Particle Dynamics Model For Software Cybernetics. 240-245 - Dianxun Shuai, Bin Zhang, Cunpai Lu:

Self-Organizing Software Processes Based on Particle Dynamics Model. 246-251 - Qianxiang Wang, Min Li, Na Meng:

A Visual Constraint Specifying Approach for Adaptive Software. 252-257 - Jay S. Bayne:

A Theory of Software-Mediated Enterprise Governance. 258-264 - Sami Beydeda:

Self-Metamorphic-Testing Components. 265-272
International Workshop on Engineering Semantic Agent Systems (ESAS 2006)
- Duygu Çelik

, Atilla Elçi:
Discovery and Scoring of Semantic Web Services based on Client Requirement(s) through a Semantic Search Agent. 273-278 - Ergun Biçici

:
Consensus Ontology Generation in a Socially Interacting MultiAgent System. 279-284 - Dianxun Shuai, Cunpai Lu, Bin Zhang:

Entanglement Partitioning of Quantum Particles for Data Clustering. 285-290 - Xian Shen, Xin Jin, Rongfang Bie, Yunchuan Sun:

MSC: A Semantic Ranking for Hitting Results of Matchmaking of Services. 291-296 - James Kirby Jr.:

Model-Driven Agile Development of Reactive Multi-Agent Systems. 297-302 - Deepak Dahiya

, Rajinder K. Sachdeva:
Understanding Requirements: Aspect Oriented Software Development. 303-308 - Darren Xu, Lein Harn, Mayur Narasimhan, Junzhou Luo:

An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks. 309-314 - Mohamed M. Kouta

, Mohammed M. Abou Rizka, Ahmed M. Elmisery
:
Secure e-Payment using Multi-agent Architecture. 315-320 - Stanislav Ustymenko

, Daniel G. Schwartz:
An Agent-Oriented Logic for Belief and Trust. 321-326 - Kashif Zafar, Shahzad Badar Qazi, Abdul Rauf Baig:

Mine Detection and Route Planning in Military Warfare using Multi Agent System. 327-332 - Mehmet Tahir Sandikkaya

, Bülent Örencik:
Agent-Based Offline Electronic Voting. 333-340
PH-D Papers
- Scott D. Miller:

A Control-Theoretic Aid to Managing the Construction Phase in Incremental Software Development (Extended Abstract). 341-343 - Ryan Babbitt:

Information Privacy Management in Smart Home Environments: Modeling, Verification, and Implementation. 344-346 - Xia Wang:

Intrusion Detection Techniques in Wireless Ad Hoc Networks. 347-349 - Paskorn Champrasert

, Junichi Suzuki:
SymbioticSphere: A Biologically-Inspired Autonomic Architecture for Self-Managing Network Systems. 350-352 - Hiroshi Wada, Junichi Suzuki:

A Domain Specific Modeling Framework for Secure Network Applications. 353-355 - Ayman Z. Faza

, Sahra Sedigh-Ali
:
A General Purpose Framework for Wireless Sensor Network Applications. 356-358 - Jinchun Xia:

QoS-Based Service Composition. 359-361 - Hsinyi Jiang:

Can the Genetic Algorithm Be a Good Tool for Software Engineering Searching Problems? 362-366
Fast Abstracts
- Nai Yan Zhao, Mi Wan Shum:

Technical Solution to Automate Smoke Test Using Rational Functional Tester and Virtualization Technology. 367 - K. R. Jayaram:

Identifying andTesting for Insecure Paths in Cryptographic Protocol Implementations. 368-369 - Sandro Ronaldo Bezerra Oliveira, Alexandre Marcos Lins de Vasconcelos

:
A Continuous Improvement Model in ImPProS. 370-371 - Tuomas Lindroth

, Raicea Lavinia, Tiberiu Seceleanu
, Nastooh Avessta, Jukka Teuhola:
Building a UML Profile for On-Chip Distributed Platforms. 372-373 - James H. Cross II, T. Dean Hendrix, Larry A. Barowski, Jhilmil Jain:

Dynamic Object Viewers for Java. 374-375 - John R. Koch, Thomas V. Freiberger:

Autonomous Real-Time Monitoring of Hydrological Environments. 376-377 - Valerio Plessi, Filippo Bastianini, Sahra Sedigh-Ali

:
An Autonomous and AdaptableWireless Device for Flood Monitoring. 378-379
Supplement
- Mahmoud O. Elish, David C. Rine:

Design Structural Stability Metrics and Post-Release Defect Density: An Empirical Study. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














