By Topic

29th Annual International Computer Software and Applications Conference (COMPSAC'05)

26-28 July 2005

Go

Filter Results

Displaying Results 1 - 25 of 65
  • Proceedings of the 29th Annual International Computer Software and Applications Conference (COMPSAC 2005)

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (227 KB)
    Freely Available from IEEE
  • 29th Annual International Computer Software and Applications Conference - Title Page

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • 29th Annual International Computer Software and Applications Conference - Copyright Page

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • 29th Annual International Computer Software and Applications Conference - Table of contents

    Publication Year: 2005, Page(s):v - xix
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • COMPSAC 2005 Fast Abstracts

    Publication Year: 2005, Page(s): x
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (16 KB)

    Presents abstracts for the articles comprising the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Message from the COMPSAC 2005 Fast Abstract Co-Chairs

    Publication Year: 2005, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (23 KB) | HTML iconHTML
    Freely Available from IEEE
  • 2nd International Workshop on Quality Assurance and Testing of Web-Based Applications (QATWBA’05)

    Publication Year: 2005, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (20 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Message from the QATWBA’05 Program Co-Chairs

    Publication Year: 2005, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (27 KB) | HTML iconHTML
    Freely Available from IEEE
  • 2nd International Workshop on Software Cybernetics (IWSC’05)

    Publication Year: 2005, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Message from the IWSC’05 Workshop Organizers

    Publication Year: 2005, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (28 KB) | HTML iconHTML
    Freely Available from IEEE
  • 2nd International Workshop on Languages, Methods, and Tools for Model-Driven Agile Development (MAD’05)

    Publication Year: 2005, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Message from the MAD’05 Workshop Chairs

    Publication Year: 2005, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (30 KB) | HTML iconHTML
    Freely Available from IEEE
  • 1st International Workshop on Testing and Quality Assurance of Component-Based Software (TQACBS 2005)

    Publication Year: 2005, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Message from the TQACBS 2005 Program Co-Chairs

    Publication Year: 2005, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (26 KB) | HTML iconHTML
    Freely Available from IEEE
  • A different view of fault prediction

    Publication Year: 2005, Page(s):3 - 4 Vol. 1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (49 KB)

    We investigated a different mode of using the prediction model to identify the files associated with a fixed percentage of the faults. The tester could ask the tool to identify which files are likely to contain the bulks of faults, with the tester selecting any desired percentage of faults. Again the tool would return a list ordered in decreasing order of the predicted numbers of faults in the fil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A specification construction unit-based editor for Z

    Publication Year: 2005, Page(s):5 - 6 Vol. 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    This paper proposes a formal specification supporting tool. It is designed on the basis of the specification reusability and the convenience to construct specification repository. The tool, called ZEditor, is designed for supporting the Z specification language. Two remarkable features of ZEditor are as follows. Firstly, we focus attention on some Z specification construction units so that ZEditor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental class testing from a class test order

    Publication Year: 2005, Page(s):7 - 12 Vol. 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (83 KB)

    Many approaches exist to decide the order in which classes should be integrated during (integration) testing. Most of them, based on an analysis of class dependencies (for instance described in a UML class diagram) aim at producing a partial order indicating which classes should be tested in sequence and which ones can be tested in parallel. We argue in this article that, thanks to the specifics o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards verification via supercompilation

    Publication Year: 2005, Page(s):9 - 10 Vol. 1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (67 KB)

    Supercompilation, or supervised compilation is a technique for program specialization, optimization and, more generally, program transformation. We present an idea to use supercompilation for verification of parameterized programs and protocols, present a case study and report on our initial experiments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What is SINS?

    Publication Year: 2005, Page(s):11 - 12 Vol. 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (54 KB)

    The goal of the NRL secure middleware project (SINS) is to develop infrastructure for the deployment and protection of time- and mission-critical applications on a distributed computing platform, in a hostile computing environment such as the Internet, while using unreliable or untrusted COTS components. In this project, we are rethinking basic ways in which distributed applications are developed,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Configuration-oriented symbolic test sequence construction method for EFSM

    Publication Year: 2005, Page(s):13 - 18 Vol. 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (68 KB)

    This paper presents a new approach to generating configuration-oriented executable symbolic test sequences from extended finite state machine (EFSM) models. The information about the values of the context variables and the domain intervals of the input parameters are exploited to guide the derivation of the test sequences. Meanwhile, the transition guards along the test sequences are continually u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PerAd-Service: a middleware service for pervasive advertisement in m-business

    Publication Year: 2005, Page(s):17 - 18 Vol. 1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (95 KB)

    In this paper, primarily, we delineate the numerous challenges that can arise in mobile-business (m-business) to provide the highest degree of proliferation of pervasive advertisement. Later, we demonstrate the feasibility of PerAd-Service, an integral part of, MARKS (middleware adaptability for knowledge usability, resource discovery, and self-healing) to address those challenges. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iterative metamorphic testing

    Publication Year: 2005, Page(s):19 - 24 Vol. 2
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (81 KB)

    An enhanced version of metamorphic testing, namely n-iterative metamorphic testing, is proposed to systematically exploit more information out of metamorphic tests by applying metamorphic relations in a chain style. A contrastive case study, conducted within an integrated testing environment MTest, shows that n-iterative metamorphic testing exceeds metamorphic testing and special case testing in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Product families on-chip - combining the software product family paradigm with run-time reprogrammable hardware technology

    Publication Year: 2005, Page(s):21 - 22 Vol. 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (79 KB)

    Hardware and software can be co-designed as a single system to obtain high-performance computing solutions that use a minimum of resources such as CPU cycles and memory. Hardware/software co-design is often a complex and time consuming process. Software functionality is typically developed independently from hardware functionality and functional elements are not reused across similar products. Co-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A HAL for component-based embedded operating systems

    Publication Year: 2005, Page(s):23 - 24 Vol. 1
    Cited by:  Papers (2)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (85 KB)

    Many standards for operating system interfaces or on-chip bus interfaces have been developed. Component-based EOS projects are seeking approaches to adapt component based software development technologies to embedded systems. An important issue is to develop hardware independent software that meets differing requirements pertinent to embedded applications. The hardware abstraction layer (HAL) pres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software test selection patterns and elusive bugs

    Publication Year: 2005, Page(s):25 - 32 Vol. 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (86 KB)

    Traditional white and black box testing methods are effective in revealing many kinds of defects, but the more elusive bugs slip past them. Model-based testing incorporates additional application concepts in the selection of tests, which may provide more refined bug detection, but does not go far enough. Test selection patterns identify defect-oriented contexts in a program. They also identify sug... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.