By Topic

Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)

Date 9-11 Aug. 2006

Filter Results

Displaying Results 1 - 25 of 70
  • Fourth International Conference on Software Engineering Research, Management and Applications [Cover]

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Fourth International Conference on Software Engineering Research, Management and Applications - Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Fourth International Conference on Software Engineering Research, Management and Applications - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • Fourth International Conference on Software Engineering Research, Management and Applications [Table of contents]

    Publication Year: 2006, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • Message from the Conference Chairs

    Publication Year: 2006, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (34 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2006, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Conference organizers

    Publication Year: 2006, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • International Technical Program Committee

    Publication Year: 2006, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Principles for Designing Software Architecture to Achieve Quality Attribute Requirements

    Publication Year: 2006, Page(s): 2
    Cited by:  Papers (3)
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • Challenges in Requirements Engineering for a Platform group: Case Study with a Medical Imaging Platform

    Publication Year: 2006, Page(s):5 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    Requirements engineering is an essential phase in the software engineering lifecycle, more so for a software platform. In addition to the conventional requirements engineering challenges, software platforms should address issues such as: (1) handling the continuous inflow of requirements from various application groups, (2) align to the roadmaps of the various product groups, (3) striking a balanc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Models Derived from Automatically Analyzed Textual User Requirements

    Publication Year: 2006, Page(s):13 - 21
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    Requirements engineering is an important area of software engineering concerned with the extraction and presentation of knowledge from user requirements. There is a considerable gap between the various types of presentation of the same kinds of knowledge - those of the user written in natural language (NL) and those of requirements engineering (RE) depicted using diagrams (de facto standard UML di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying a Goal-Oriented Method for Hazard Analysis: A Case Study

    Publication Year: 2006, Page(s):22 - 30
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (485 KB) | HTML iconHTML

    Traceability between hazards and countermeasures is important for hazard analysis to give confidence and help justify whether relevant hazards have been considered and sufficiently mitigated. However, use case modeling, the current de facto standard technique for requirements elicitation lacks negative modeling constructs for representing hazards. This paper presents a case study to apply a goal-o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectures Supporting RosettaNet

    Publication Year: 2006, Page(s):31 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    RosettaNet standards are industry standards for B2B integration. Although it has been adopted by many companies in informational technology, electronic components, and semiconductor manufacturing industries, etc., there are still many questions need to be answered. The paper introduces the typical scenario and benefits of using RosettaNet standards, provides a survey on the architectures supportin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOFA 2.0: Balancing Advanced Features in a Hierarchical Component Model

    Publication Year: 2006, Page(s):40 - 48
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    Component-based software engineering is a powerful paradigm for building large applications. However, our experience with building application of components is that the existing advanced component models (such as those offering component nesting, behavior specification and checking, dynamic reconfiguration to some extent, etc.) are subject to a lot of limitations and issues which prevent them from... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Effective Method to Design CBD Components in Enterprise JavaBeans (EJB)

    Publication Year: 2006, Page(s):49 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    Enterprise JavaBeans (EJB) has been accepted for supporting component-based development (CBD). A component is a large-grained reuse unit consisting of several objects; however, an enterprise bean in EJB is a unit of atomic object and so multiple enterprise beans should be composed to support larger-grained reuse. Therefore, we need practical methods for designing and implementing components with E... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frameworks for Secured Business Process Management Systems

    Publication Year: 2006, Page(s):57 - 65
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (390 KB) | HTML iconHTML

    This paper formally defines a role-driven security and access control model of a business process in order eventually to provide a theoretical basis for realizing the secured business process management systems. That is, we propose a graphical representation and formal description of the mechanism that generates a set of role-driven security and access control models from a business process modele... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Representation of Variability in Software Product Line Using Aspect-Oriented Programming

    Publication Year: 2006, Page(s):66 - 73
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    Software development methodology has been being developed for the goal of improvement in productivity and reduction in time-to-market through the reuse of component asset, and software product line is designed for the effective management and use of the asset through the separation of commonality and variability. The existing methods that implement software product line interfere massively with th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing Variability for Software Product-Line

    Publication Year: 2006, Page(s):74 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    Software development based on the software product-line can develop software products more easily and fast by reusing the developed core assets. One of key issues of software product-line is to handle variability between product families. That is, the variation management for software product-line decides the success of software development. There are considerable researches relating to model the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparison of Two Contributive Analysis Methods Applied to an ANN Modeling Facial Attractiveness

    Publication Year: 2006, Page(s):82 - 86
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (122 KB) | HTML iconHTML

    Artificial neural networks (ANNs) are powerful predictors. ANNs, however, essentially function like 'black boxes' because they lack explanatory power regarding input contribution to the model. Various contributive analysis algorithms (CAAs) have been developed to apply to ANNs to illuminate the influences and interactions between the inputs and thus, to enhance understanding of the modeled functio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Parallel Apriori Algorithm for Frequent Itemsets Mining

    Publication Year: 2006, Page(s):87 - 94
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    Finding frequent itemsets is one of the most investigated fields of data mining. The Apriori algorithm is the most established algorithm for frequent itemsets mining (FIM). Several implementations of the Apriori algorithm have been reported and evaluated. One of the implementations optimizing the data structure with a trie by Bodon catches our attention. The results of the Bodon's implementation f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Apriori, Association Rules, Data Mining,Frequent Itemsets Mining (FIM), Parallel Computing

    Publication Year: 2006, Page(s):95 - 100
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    The job-shop scheduling problem is concerned with allocating limited resources to operations over time. Although the job shop scheduling has an important role in various fields, it is one of the most difficult problems in combinational optimization. In this paper, we propose a new scheduling technique that combines Ant Colony Optimization (ACO) with GT method in order to realize effective scheduli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recommends System using Re-extraction methods on the Groups with a similarity pattern such as Clustered User's preference tendency

    Publication Year: 2006, Page(s):101 - 107
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    As the amount of information provided to the customer becomes larger, unnecessary information can lead to difficulty in finding the information customer wanted. This also may lead to a customer being dissatisfied with the service. However, the existing systems that apply a similar concept fail to address the individual user's demands. In addition, in considering similarities between users, each it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Prediction Model for improving Reliability in Self-Healing System

    Publication Year: 2006, Page(s):108 - 116
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    In ubiquitous environments, which involve an even greater number of computing devices, with more informal modes of operation, this type of problem have rather serious consequences. In order to solve these problems when they arise, effective reliable systems are required. Also, system management is changing from a conventional central administration, to autonomic computing. However, most existing r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Bayesian Belief Networks to Model Software Project Management Antipatterns

    Publication Year: 2006, Page(s):117 - 124
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (178 KB) | HTML iconHTML

    In spite of numerous traditional and agile software project management models proposed, process and project modeling still remains an open issue. This paper proposes a Bayesian network (BN) approach for modeling software project management antipatterns. This approach provides a framework for project managers, who would like to model the cause-effect relationships that underlie an antipattern, taki... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reuse-based Methodology in Developing System-on-Chip (SoC)

    Publication Year: 2006, Page(s):125 - 131
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    System-on-chip (SoC) plays a key role in building various embedded systems. With the advance of SoC technology, the complexity of SoC is sharply increasing. In addition, there is a great industry demand on technologies for producing reusable SoC components. However, conventional SoC approaches focus largely on designing the lower-level details of SoC at hardware level without going through model-l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.