5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06)

10-12 July 2006

Filter Results

Displaying Results 1 - 25 of 89
  • 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (424 KB)
    Freely Available from IEEE
  • 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse - Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse - Table of contents

    Publication Year: 2006, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • Message from the Conference Chairs

    Publication Year: 2006, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (36 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chair

    Publication Year: 2006, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (37 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organizers

    Publication Year: 2006, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • International Technical Program Committee

    Publication Year: 2006, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Getting in Touch with Your Feelings about Software Architecture

    Publication Year: 2006, Page(s):2 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (77 KB) | HTML iconHTML

    In this keynote address, the presenter will attend to these questions by discussing the nature of software architecture in terms of architectural structures, the role that software architecture plays in an organization, the technical, business, and social influences on software architectures, and the role of quality attribute requirements in architectural design. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Grid Scheduling Algorithm for Bag-of-Tasks Applications Using Multiple Queues with Duplication

    Publication Year: 2006, Page(s):5 - 10
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    Over the past decade the computational grid has emerged as an attractive platform to tackle various large-scale problems, especially in science and engineering. One primary issue associated with the efficient and effective utilization of heterogeneous resources in a grid is scheduling. Grid scheduling involves a number of challenging issues mainly due to the dynamic nature of the grid. In this pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A VQ compression algorithm for a multiprocessor system with a global sort collective function

    Publication Year: 2006, Page(s):11 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    One of the most expensive part of a VQ compression algorithm is a codebook generation. PNN algorithm constructs a codebook by merging the "nearest" vectors and its parallel algorithm needs "Allsort" procedure that sorts locally-sorted lists of all processors into a globally-sorted list and broadcasts the list to all processors on a multiprocessor system. We propose a new collective function, calle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model the MPI Performance for non-Contiguous Data

    Publication Year: 2006, Page(s):17 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    MPI (message passing interface) is the inter-node communication interface used in today PC clusters and other cluster-type parallel/distributed systems. Up-to-date the most popular analytical MPI performance model for parallel/distributed machines is the LogGP model, which is based on system hardware parameters. Recently, the improvements in connection network and communication protocols have lead... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimized Algorithm for Computing Invariants of Ordinary Petri Nets

    Publication Year: 2006, Page(s):23 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    We propose an optimized implementation of the Fourier-Motzkin (FM) algorithm for computing all nonnegative, minimal-support invariants of ordinary Petri nets. The FM algorithm is optimized by detecting the parallel place sets created during each of its iteration, and retaining just one member of each set while deleting the rest. The intermediate invariants obtained are then used to generate all mi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Radiative Heat Transfer Simulation Using Programmable Graphics Hardware

    Publication Year: 2006, Page(s):29 - 37
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (575 KB) | HTML iconHTML

    To analyze physical behaviors of a thermal environment, we have to simulate several heat transfer phenomena such as heat conduction, convection, and radiation. Among those phenomena, radiative heat transfer simulation is much time-consuming. In this paper, therefore, one of acceleration techniques developed in the graphics community that exploits a graphics processing unit (GPU) is applied to the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Study to Investigate Software Estimation Trend in Organizations Targeting CMMI^SM

    Publication Year: 2006, Page(s):38 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    This paper discusses software estimation practices existing in industry and literature, its strengths and weaknesses. Main focus is the gap analysis of organization with respect to CMMI level 3 for SE/SW/IPPD/SS. Data collection reveals that company makes use of heuristic approaches in which expert judgment supplemented with wideband Delphi, was mainly used for software estimation. In the light of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decoupling Metrics for Services Composition

    Publication Year: 2006, Page(s):44 - 47
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    The decoupling is one of the most important features of service components that make Web services successful in the future. Decoupling metrics can be used to measure and evaluate the decoupling attributes of a distributed service oriented software architecture that has very significant impacts on the understandability, maintainability, reliability, testability, and reusability of software componen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Accuracy of Multiple Regression Analysis for Effort Prediction Model

    Publication Year: 2006, Page(s):48 - 55
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    In this paper, we outline the effort prediction model and the evaluation experiment. In addition we explore the parameters in the model. The model predicts effort of embedded software developments via multiple regression analysis using the collaborative filtering. Because companies, recently, focus on methods to predict effort of projects, which prevent project failures such as exceeding deadline ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Analyzing the Windows and Linux Security Models

    Publication Year: 2006, Page(s):56 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    When assessing the potential security risks that exist in the features of different operating systems, there is not a common set of metrics. As a result, it is very difficult to objectively assess the risks associated with a specific feature in the operating system. In this paper, we propose a simple set of metrics to quantify and measure the security risks associated with a specific feature or co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hierarchical Packet Scheduler for Differentiated Services in High-Speed Networks

    Publication Year: 2006, Page(s):63 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    In this paper, we propose a multi-level hierarchical dynamic deficit round-robin (MLHDDRR) scheduling algorithm enhanced from the existing dynamic deficit round-robin (DDRR) for the support of differentiated services. The level of service differentiation can be changed simply by adjusting parameters. The MLHDDRR scheduler can deliver small delays for short packets of each class. This feature can a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Customer-based AQM Routers to Achieve Fair Inter-server Bandwidth Allocation

    Publication Year: 2006, Page(s):69 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    There were more than 50 new AQM algorithms which have been proposed since 1999. All of these approaches are designed on per-flow basis. Ideally, long-lived responsive flows will get their fair shares of bandwidth under the congestion control of a well designed AQM. However, responsive flows may sent by a unresponsive server. This will introduce so-called inter-server fairness problem, and will als... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing the Requirement in FEC Codes via Capillary Routing

    Publication Year: 2006, Page(s):75 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    In off-line packetized streaming, rateless forward error correction (FEC) codes spectacularly improve the reliability of transmission over lossy networks. This success relies on time diversity, which in its turn relies on unrestricted buffering time at the receiver. In realtime streaming the playback buffering time is very limited (shorter than one second) and even strong FEC codes cannot protect ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Gateway for Accessing IPv6 WLAN

    Publication Year: 2006, Page(s):83 - 88
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    The existing IETF standards specify that the network communications can be protected with IPsec authentication header (AH). However, the current specification didn't resolve the problem of automatic key management. Even though several solutions have been proposed, such as CGA and ABK, the implementations for IPv6 are still far away from completeness. This paper presents an approach of security gat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Topology Discovery for Coexisting IPv6 and IPv4 Networks

    Publication Year: 2006, Page(s):89 - 95
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    Having an accurate network topology is vital for network performance optimization, configuration control, and fault monitoring...etc. In this paper, two network layer topology discovery algorithms for IPv6-only and IPv4-only networks, a data link layer topology discovery algorithm, and a transition detection algorithm of coexisting networks are presented. The network layer topology is constructed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Topic Map Architecture for Enterprise Knowledge Management

    Publication Year: 2006, Page(s):96 - 102
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    Topic maps offer a powerful foundation for knowledge representation and the implementation of knowledge management applications. Using ontologies to model knowledge structures, they offer concepts to link these knowledge structures with unstructured data stored in files, external documents etc. This paper presents the architecture and prototypical implementation of a topic map application infrastr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Dynamic Slicing to Analyze Change Impact on Role Type based Component Composition Model

    Publication Year: 2006, Page(s):103 - 108
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    Slicing is an effective technique for narrowing the focus of attention to the relevant parts of a system. Applying dynamic slicing on component interaction trace, this paper presents a change impact analysis approach to support the maintenance and evolution of role type based component composition model. Our approach determines the potential consequences of a given change to role type based compon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.