By Topic

Computer Software and Applications Conference, 2005. COMPSAC 2005. 29th Annual International

Date 26-28 July 2005

Go

Filter Results

Displaying Results 1 - 25 of 65
  • Proceedings of the 29th Annual International Computer Software and Applications Conference (COMPSAC 2005)

    Publication Year: 2005
    Save to Project icon | Request Permissions | PDF file iconPDF (227 KB)  
    Freely Available from IEEE
  • 29th Annual International Computer Software and Applications Conference - Title Page

    Publication Year: 2005 , Page(s): i - iii
    Save to Project icon | Request Permissions | PDF file iconPDF (53 KB)  
    Freely Available from IEEE
  • 29th Annual International Computer Software and Applications Conference - Copyright Page

    Publication Year: 2005 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (46 KB)  
    Freely Available from IEEE
  • 29th Annual International Computer Software and Applications Conference - Table of contents

    Publication Year: 2005 , Page(s): v - xix
    Save to Project icon | Request Permissions | PDF file iconPDF (57 KB)  
    Freely Available from IEEE
  • COMPSAC 2005 Fast Abstracts

    Publication Year: 2005 , Page(s): x
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (16 KB)  

    Presents abstracts for the articles comprising the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Message from the COMPSAC 2005 Fast Abstract Co-Chairs

    Publication Year: 2005 , Page(s): xi
    Save to Project icon | Request Permissions | PDF file iconPDF (23 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • 2nd International Workshop on Quality Assurance and Testing of Web-Based Applications (QATWBA’05)

    Publication Year: 2005 , Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (20 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Message from the QATWBA’05 Program Co-Chairs

    Publication Year: 2005 , Page(s): xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (27 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • 2nd International Workshop on Software Cybernetics (IWSC’05)

    Publication Year: 2005 , Page(s): xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (21 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Message from the IWSC’05 Workshop Organizers

    Publication Year: 2005 , Page(s): xv
    Save to Project icon | Request Permissions | PDF file iconPDF (28 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • 2nd International Workshop on Languages, Methods, and Tools for Model-Driven Agile Development (MAD’05)

    Publication Year: 2005 , Page(s): xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (19 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Message from the MAD’05 Workshop Chairs

    Publication Year: 2005 , Page(s): xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (30 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • 1st International Workshop on Testing and Quality Assurance of Component-Based Software (TQACBS 2005)

    Publication Year: 2005 , Page(s): xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (21 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Message from the TQACBS 2005 Program Co-Chairs

    Publication Year: 2005 , Page(s): xix
    Save to Project icon | Request Permissions | PDF file iconPDF (26 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • A different view of fault prediction

    Publication Year: 2005 , Page(s): 3 - 4 Vol. 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (49 KB)  

    We investigated a different mode of using the prediction model to identify the files associated with a fixed percentage of the faults. The tester could ask the tool to identify which files are likely to contain the bulks of faults, with the tester selecting any desired percentage of faults. Again the tool would return a list ordered in decreasing order of the predicted numbers of faults in the files the model expects to be most problematic. If the number of files identified is too large, the tester could reselect a smaller percentage of faults. This would make the number of files requiring particular scrutiny manageable. We expect both modes to be valuable to professional software testers and developers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A specification construction unit-based editor for Z

    Publication Year: 2005 , Page(s): 5 - 6 Vol. 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (408 KB)  

    This paper proposes a formal specification supporting tool. It is designed on the basis of the specification reusability and the convenience to construct specification repository. The tool, called ZEditor, is designed for supporting the Z specification language. Two remarkable features of ZEditor are as follows. Firstly, we focus attention on some Z specification construction units so that ZEditor provides several specified input screens for them. Specifications described by ZEditor can be saved as the LATEX format or the XML one from each input screen. In each input screen, syntax and type checking of specifications can be also available. Secondly, the author can construct and edit an appropriate specification from some specification construction units which passed syntax and type checking. ZEditor will make it possible to describe specifications easily, to reuse correct specification construction units, and to support constructing specification repository. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental class testing from a class test order

    Publication Year: 2005 , Page(s): 7 - 12 Vol. 2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (83 KB)  

    Many approaches exist to decide the order in which classes should be integrated during (integration) testing. Most of them, based on an analysis of class dependencies (for instance described in a UML class diagram) aim at producing a partial order indicating which classes should be tested in sequence and which ones can be tested in parallel. We argue in this article that, thanks to the specifics of such a class test order, it is possible to define an incremental strategy for testing classes that promotes reuse during testing, not only along class inheritance hierarchies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards verification via supercompilation

    Publication Year: 2005 , Page(s): 9 - 10 Vol. 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (67 KB)  

    Supercompilation, or supervised compilation is a technique for program specialization, optimization and, more generally, program transformation. We present an idea to use supercompilation for verification of parameterized programs and protocols, present a case study and report on our initial experiments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What is SINS?

    Publication Year: 2005 , Page(s): 11 - 12 Vol. 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (54 KB)  

    The goal of the NRL secure middleware project (SINS) is to develop infrastructure for the deployment and protection of time- and mission-critical applications on a distributed computing platform, in a hostile computing environment such as the Internet, while using unreliable or untrusted COTS components. In this project, we are rethinking basic ways in which distributed applications are developed, deployed, configured, and maintained. Such a methodology and infrastructure are crucial for the deployment of mission-critical applications in a collaborative environment spanning multiple sites, by multiple agencies, and across multiple enterprises. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Configuration-oriented symbolic test sequence construction method for EFSM

    Publication Year: 2005 , Page(s): 13 - 18 Vol. 2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (68 KB)  

    This paper presents a new approach to generating configuration-oriented executable symbolic test sequences from extended finite state machine (EFSM) models. The information about the values of the context variables and the domain intervals of the input parameters are exploited to guide the derivation of the test sequences. Meanwhile, the transition guards along the test sequences are continually used to reduce the domain intervals of the input parameters. Experiments indicate that this method significantly reduces the EFSM state space to be explored and the number of non-executable symbolic test sequences to be generated. Since parameterized input events are allowed to occur in EFSM cycles, this method is suitable for testing the open reactive systems that interact with the environments via parameterized input events. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PerAd-Service: a middleware service for pervasive advertisement in m-business

    Publication Year: 2005 , Page(s): 17 - 18 Vol. 1
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (95 KB)  

    In this paper, primarily, we delineate the numerous challenges that can arise in mobile-business (m-business) to provide the highest degree of proliferation of pervasive advertisement. Later, we demonstrate the feasibility of PerAd-Service, an integral part of, MARKS (middleware adaptability for knowledge usability, resource discovery, and self-healing) to address those challenges. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iterative metamorphic testing

    Publication Year: 2005 , Page(s): 19 - 24 Vol. 2
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (81 KB)  

    An enhanced version of metamorphic testing, namely n-iterative metamorphic testing, is proposed to systematically exploit more information out of metamorphic tests by applying metamorphic relations in a chain style. A contrastive case study, conducted within an integrated testing environment MTest, shows that n-iterative metamorphic testing exceeds metamorphic testing and special case testing in terms of their fault detection capabilities. Another advantage of n-iterative metamorphic testing is its high efficiency in test case generation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Product families on-chip - combining the software product family paradigm with run-time reprogrammable hardware technology

    Publication Year: 2005 , Page(s): 21 - 22 Vol. 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (79 KB)  

    Hardware and software can be co-designed as a single system to obtain high-performance computing solutions that use a minimum of resources such as CPU cycles and memory. Hardware/software co-design is often a complex and time consuming process. Software functionality is typically developed independently from hardware functionality and functional elements are not reused across similar products. Co-design is particularly important in system on-chip (SoC) development where an entire system consisting of both software and hardware is integrated on a single chip. Developing high-performance computing solutions in the form of SoCs in a repeatable manner is technically possible, but knowing how to apply software concepts in a hardware context and vice versa is still demanding at best. This paper summarizes the concepts and considerations that outline a case study that aims at combining the software product family paradigm with run-time reprogrammable hardware technology. The goal of the study is to define a formal framework for developing product families on-chip in a repeatable manner. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A HAL for component-based embedded operating systems

    Publication Year: 2005 , Page(s): 23 - 24 Vol. 1
    Cited by:  Papers (1)  |  Patents (9)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (85 KB)  

    Many standards for operating system interfaces or on-chip bus interfaces have been developed. Component-based EOS projects are seeking approaches to adapt component based software development technologies to embedded systems. An important issue is to develop hardware independent software that meets differing requirements pertinent to embedded applications. The hardware abstraction layer (HAL) presented here is to serve this purpose. In JBEOS, a component based EOS developed at Peking Univ. The following aspects are stressed: abstraction of basic data types, including their in-memory representation and operations; encapsulation of H/W dependent features into clear interfaces for kernel and user applications; H/W peculiarities should be encapsulated but not masked, i.e., HAL should provide mechanisms to access H/W directly when desired; minimized ROM and RAM footprints; supports for EOS above with no bias to any specific design and/or implementation; minimum efforts required when porting to a new platform. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software test selection patterns and elusive bugs

    Publication Year: 2005 , Page(s): 25 - 32 Vol. 2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (86 KB)  

    Traditional white and black box testing methods are effective in revealing many kinds of defects, but the more elusive bugs slip past them. Model-based testing incorporates additional application concepts in the selection of tests, which may provide more refined bug detection, but does not go far enough. Test selection patterns identify defect-oriented contexts in a program. They also identify suggested tests for risks associated with a specified context. A context and its risks is a kind of conceptual trap designed to corner a bug. The suggested tests will find the bug if it has been caught in the trap. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.