By Topic

12th Asia-Pacific Software Engineering Conference (APSEC'05)

Date 15-17 Dec. 2005

Filter Results

Displaying Results 1 - 25 of 112
  • Proceedings. 12th Asia-Pacific Software Engineering Conference

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • 12th Asia-Pacific Software Engineering Conference - Title Page

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • 12th Asia-Pacific Software Engineering Conference - Copyright

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • 12th Asia-Pacific Software Engineering Conference - Table of contents

    Publication Year: 2005, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • Conference Chair's message

    Publication Year: 2005, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (97 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Chairs' message

    Publication Year: 2005, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (97 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organizers

    Publication Year: 2005, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2005, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2005, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Goal-oriented requirements engineering

    Publication Year: 2005
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • The essential components of software architecture design and analysis

    Publication Year: 2005
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (75 KB)

    Summary form only given. Architecture analysis and design methods such as ATAM, QAW, ADD and CBAM have enjoyed modest success in recent years and are being adopted by many companies as part of their standard software development processes. They are used in the software lifecycle, as a means of understanding business goals and stakeholder concerns, mapping these onto an architectural representation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vision, strategy, and practice of software research & development in industry

    Publication Year: 2005
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    Summary form only given. This article focuses on Fujitsu's roadmap on software advancements, especially on R&D of middleware, including middleware platform, middleware ubiquitous, middleware business-support and software development environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AD2US: an automated approach to generating usage scenarios from UML activity diagrams

    Publication Year: 2005
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Although attention has been given to the use of UML (Unified Modelling Language) activity diagrams in the generation of scenarios, thin-threads and test-cases, the processes described in the literature rely heavily on manual intervention either in the information extraction process or in the process of transforming them to an alternate structure. This paper introduces an approach that capture, sto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systematic use case interviews for specification of automotive systems

    Publication Year: 2005
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    Automotive software systems are becoming increasingly complex, driven both by advances in technology and by demands for more powerful applications. The design of such complex systems calls for advanced techniques in requirements engineering. This paper is concerned with developing and validating a new concept in order to elicit and specify user requirements of automotive software functions. Text-b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancement of a use cases based requirements engineering approach with scenarios

    Publication Year: 2005
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    Use cases and scenarios are sometimes considered as analogous. In this paper, we take the position that use cases and scenarios are different but play complementary roles in requirements engineering. A use case is a collection of scenarios. Use cases are appropriate as specification of a system required behavior in interaction with its actors. A scenario is an example of execution involving a syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accommodating software development collaboration

    Publication Year: 2005
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    With the rapid progress of Internet technology, more and more software projects adopt e-development to facilitate the software development process in a world wide context. However, collaborative software e-development activity itself is a complex orchestration. It involves many people working together without the barrier of time and space difference. Therefore, how to efficiently monitor and contr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A temporal logic for input output symbolic transition systems

    Publication Year: 2005
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    In this paper, we present a temporal logic called ℱ whose interpretation is over input output symbolic transition systems (IOSTS). IOSTS extend transition systems to communications and data in order to tackle communications with system environment. ℱ is then defined as an extension of temporal logic CTL* (a temporal logic which mixes together the features of linear temporal logic (LTL) a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model checking interrupt-dependent software

    Publication Year: 2005
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Embedded control programs are hard to analyse because their behaviour depends on how they interact with hardware devices. In particular, embedded code typically uses interrupts to respond to external events in a timely manner. Such asynchronous control constructs make static analysis difficult due to the potentially large number of alternative control-flow paths they allow. We show how model check... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A lightweight integration of theorem proving and model checking for system verification

    Publication Year: 2005
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Theorem proving and model checking are known as two formal verification techniques that have complementary features. In this paper, we describe a lightweight integration of the two techniques by a translation from theorem proving formalism to model checking formalism, and then treating model checking as part of the decision procedure. In the translation, system and property specifications defined ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model checking class specifications for Web applications

    Publication Year: 2005
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    This paper proposes an approach for verifying class specifications of Web applications using model checking. We first present a method to model a dynamic behavior of a Web application from a class specification. We next propose two methods to verify consistencies of the class specification and other design specifications: (1) a page flow diagram which is one of the most essential specifications fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-driven semantic Web service composition

    Publication Year: 2005
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    As the number of available Web services increases there is a growing demand to realise complex business processes by combining and reusing available Web services. The reuse and combination of services results in a composition of Web services that may also involve services provided in the Internet. With semantically described Web services, an automated matchmaking of capabilities can help identify ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Client profiling for QoS-based Web service recommendation

    Publication Year: 2005
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5456 KB) | HTML iconHTML

    Quality of service (QoS) is one of the important factors when choosing a Web service (WS) provided by a particular WS provider. In this paper we focus on performance, which is one of the important QoS attributes. Performance can be evaluated from the client-side as well as the server-side. As clients are connected through heterogeneous network environments, different clients can experience differe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for application server based Web services management

    Publication Year: 2005
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    Web services are considered as solution for solving the interoperability problem and the challenge of integration. How to manage Web services more efficiently is a key problem to the applications based on Web services at present. This paper presents a framework for application server based Web services management named FASWSM. The main contribution of FASWSM is Web service adaptation, so that a We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On simulation of BPEL4WS/UML descriptions

    Publication Year: 2005
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    Increasing developments of systems using Web applications, SOA (service oriented architecture) based development becomes the focus of attention. However, in SOA based development, it is difficult to understand behaviors of system, which is integrated with many Web applications. Therefore, it is necessary to simulate the entire behavior in early stage. A formal semantics for UML activity diagrams h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating an idea generation method into a goal-oriented analysis method for requirements elicitation

    Publication Year: 2005
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (976 KB) | HTML iconHTML

    This paper proposes an extension of goal-oriented analysis method where an idea generation method is combined. Goal-oriented analysis methods are one of the promising approaches for requirements elicitation. However, they have two major shortcomings; 1) little support for goal elicitation and decomposition into sub-goals and 2) no explicit support for collaborative activities by stakeholders to el... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.