By Topic

Software Engineering Research, Management and Applications, 2006. Fourth International Conference on

Date 9-11 Aug. 2006

Filter Results

Displaying Results 1 - 25 of 70
  • Fourth International Conference on Software Engineering Research, Management and Applications [Cover]

    Publication Year: 2006 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (86 KB)  
    Freely Available from IEEE
  • Fourth International Conference on Software Engineering Research, Management and Applications - Title

    Publication Year: 2006 , Page(s): i - iii
    Save to Project icon | Request Permissions | PDF file iconPDF (69 KB)  
    Freely Available from IEEE
  • Fourth International Conference on Software Engineering Research, Management and Applications - Copyright

    Publication Year: 2006 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (53 KB)  
    Freely Available from IEEE
  • Fourth International Conference on Software Engineering Research, Management and Applications [Table of contents]

    Publication Year: 2006 , Page(s): v - x
    Save to Project icon | Request Permissions | PDF file iconPDF (72 KB)  
    Freely Available from IEEE
  • Message from the Conference Chairs

    Publication Year: 2006 , Page(s): xi
    Save to Project icon | Request Permissions | PDF file iconPDF (34 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2006 , Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (37 KB)  
    Freely Available from IEEE
  • Conference organizers

    Publication Year: 2006 , Page(s): xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (34 KB)  
    Freely Available from IEEE
  • International Technical Program Committee

    Publication Year: 2006 , Page(s): xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (44 KB)  
    Freely Available from IEEE
  • Principles for Designing Software Architecture to Achieve Quality Attribute Requirements

    Publication Year: 2006 , Page(s): 2
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | PDF file iconPDF (59 KB)  
    Freely Available from IEEE
  • Challenges in Requirements Engineering for a Platform group: Case Study with a Medical Imaging Platform

    Publication Year: 2006 , Page(s): 5 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (297 KB) |  | HTML iconHTML  

    Requirements engineering is an essential phase in the software engineering lifecycle, more so for a software platform. In addition to the conventional requirements engineering challenges, software platforms should address issues such as: (1) handling the continuous inflow of requirements from various application groups, (2) align to the roadmaps of the various product groups, (3) striking a balance between catering to the cutting edge features while being backward compatible with existing features. This paper attempts to identify such requirements engineering challenges that are highly prevalent for a software platform and explain why traditional requirements engineering techniques alone cannot handle these issues. The paper also outlines the creative approaches taken by the platform group at Philips Medical Systems to address these challenges. It also lists out the lessons learnt in the process and the open issues that we would like to handle in the near future View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Models Derived from Automatically Analyzed Textual User Requirements

    Publication Year: 2006 , Page(s): 13 - 21
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (189 KB) |  | HTML iconHTML  

    Requirements engineering is an important area of software engineering concerned with the extraction and presentation of knowledge from user requirements. There is a considerable gap between the various types of presentation of the same kinds of knowledge - those of the user written in natural language (NL) and those of requirements engineering (RE) depicted using diagrams (de facto standard UML diagrams, for example). Our research is aimed at filling that gap. In this paper, we introduce a universal formalism based on the basic building unit of NL, which is the relation triad. Through the definition of these basic relations in NL, we create three RE models: the use case path model, the hybrid activity diagram model and the domain model. These models are abstractions of the knowledge contained in the text, and serve as the basis for deriving UML diagrams View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying a Goal-Oriented Method for Hazard Analysis: A Case Study

    Publication Year: 2006 , Page(s): 22 - 30
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (485 KB) |  | HTML iconHTML  

    Traceability between hazards and countermeasures is important for hazard analysis to give confidence and help justify whether relevant hazards have been considered and sufficiently mitigated. However, use case modeling, the current de facto standard technique for requirements elicitation lacks negative modeling constructs for representing hazards. This paper presents a case study to apply a goal-oriented method for car security related hazard analysis where hazards are represented as operationalizations with negative contribution toward system non-functional requirements (NFRs). In turn, countermeasures are represented as operationalizations with negative contribution toward the respective hazards to negate their negative effect on the NFRs. The study finds that using the goal-oriented approach is most suitable for risk-driven applications, but also compatible and complementary to other applications View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectures Supporting RosettaNet

    Publication Year: 2006 , Page(s): 31 - 39
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (349 KB) |  | HTML iconHTML  

    RosettaNet standards are industry standards for B2B integration. Although it has been adopted by many companies in informational technology, electronic components, and semiconductor manufacturing industries, etc., there are still many questions need to be answered. The paper introduces the typical scenario and benefits of using RosettaNet standards, provides a survey on the architectures supporting RosettaNet. We also provide a comparison of these architectures, and propose an architecture supporting RosettaNet using Web services architecture View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOFA 2.0: Balancing Advanced Features in a Hierarchical Component Model

    Publication Year: 2006 , Page(s): 40 - 48
    Cited by:  Papers (22)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (317 KB) |  | HTML iconHTML  

    Component-based software engineering is a powerful paradigm for building large applications. However, our experience with building application of components is that the existing advanced component models (such as those offering component nesting, behavior specification and checking, dynamic reconfiguration to some extent, etc.) are subject to a lot of limitations and issues which prevent them from being accepted more widely (by industry in particular). We claim that these issues are specifically related to (a) the lack of support for dynamic reconfigurations of hierarchical architectures, (b) poor support for modeling and extendibility of the control part of a component, and (c) the lack of support for different communication styles applied in inter-component communication. In this paper, we show how these problems can be addressed and present an advanced component system SOFA 2.0 as a proof of the concept. This system is based on its predecessor SOFA, but it incorporates a number of enhancements and improvements View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Effective Method to Design CBD Components in Enterprise JavaBeans (EJB)

    Publication Year: 2006 , Page(s): 49 - 56
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (267 KB) |  | HTML iconHTML  

    Enterprise JavaBeans (EJB) has been accepted for supporting component-based development (CBD). A component is a large-grained reuse unit consisting of several objects; however, an enterprise bean in EJB is a unit of atomic object and so multiple enterprise beans should be composed to support larger-grained reuse. Therefore, we need practical methods for designing and implementing components with EJB. In this paper, we propose instructions and techniques for designing CBD elements with EJB constructs. That is, we define methods for designing and implementing single and composite components, white and black-box components, multiple interfaces, and variability mechanisms in EJB platform. We evaluate the proposed method by performing a case study and comparing the characteristics of CBD components with the method. Consequently, the method is supposed to improve reusability, applicability, portability of components in EJB platform View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frameworks for Secured Business Process Management Systems

    Publication Year: 2006 , Page(s): 57 - 65
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (390 KB) |  | HTML iconHTML  

    This paper formally defines a role-driven security and access control model of a business process in order eventually to provide a theoretical basis for realizing the secured business process management systems. That is, we propose a graphical representation and formal description of the mechanism that generates a set of role-driven security and access control models from a business process modeled by the information control net (ICN) modeling methodology that is a typical business process modeling approach for defining and specifying business processes. Based upon the mechanism, we are able to design and accomplish a secured business process management system that provides an unified resource access control mechanism of the business process management engine domains and the application domains. Finally, we strongly believe that the secured access control policies from the role-driven security and access control model can be easily transformed into the RBAC (role-based access control) model that is a standardized security technology for computer and communications systems of commercial and civilian government organizations View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Representation of Variability in Software Product Line Using Aspect-Oriented Programming

    Publication Year: 2006 , Page(s): 66 - 73
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (173 KB) |  | HTML iconHTML  

    Software development methodology has been being developed for the goal of improvement in productivity and reduction in time-to-market through the reuse of component asset, and software product line is designed for the effective management and use of the asset through the separation of commonality and variability. The existing methods that implement software product line interfere massively with the core asset, which require high cost in assembling level reducing the effectiveness. This paper introduces aspect-oriented programming (AOP) as the method for the improvement of the assembling process in software product line. The method that assembles core asset and variabilities is described by grammar elements such as Join point, pointcut and advice without code-change. We analyze the requirements of the mini-system as an example adapting AOP and show its practicality by the implementation of aspect-oriented language, AspectJ View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing Variability for Software Product-Line

    Publication Year: 2006 , Page(s): 74 - 81
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (333 KB) |  | HTML iconHTML  

    Software development based on the software product-line can develop software products more easily and fast by reusing the developed core assets. One of key issues of software product-line is to handle variability between product families. That is, the variation management for software product-line decides the success of software development. There are considerable researches relating to model the variability in software product-line. However, the existing researches do not explicitly define artifacts and any relevant relationships between them used in each process. Therefore, in this paper, processes and artifacts of each process to manage uniformly variability over the life cycle of software product-line are proposed. Furthermore, in order to show how to apply those into a specific domain, especially electronic medical record (EMR) system, case study is presented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparison of Two Contributive Analysis Methods Applied to an ANN Modeling Facial Attractiveness

    Publication Year: 2006 , Page(s): 82 - 86
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (122 KB) |  | HTML iconHTML  

    Artificial neural networks (ANNs) are powerful predictors. ANNs, however, essentially function like 'black boxes' because they lack explanatory power regarding input contribution to the model. Various contributive analysis algorithms (CAAs) have been developed to apply to ANNs to illuminate the influences and interactions between the inputs and thus, to enhance understanding of the modeled function. In this study two CAAs were applied to an ANN modeling facial attractiveness. Conflicting results from these CAAs imply that more research is needed in the area of contributive analysis and that researchers should be cautious when selecting a CAA method View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Parallel Apriori Algorithm for Frequent Itemsets Mining

    Publication Year: 2006 , Page(s): 87 - 94
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (169 KB) |  | HTML iconHTML  

    Finding frequent itemsets is one of the most investigated fields of data mining. The Apriori algorithm is the most established algorithm for frequent itemsets mining (FIM). Several implementations of the Apriori algorithm have been reported and evaluated. One of the implementations optimizing the data structure with a trie by Bodon catches our attention. The results of the Bodon's implementation for finding frequent itemsets appear to be faster than the ones by Borgelt and Goethals. In this paper, we revised Bodon's implementation into a parallel one where input transactions are read by a parallel computer. The effect a parallel computer on this modified implementation is presented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Apriori, Association Rules, Data Mining,Frequent Itemsets Mining (FIM), Parallel Computing

    Publication Year: 2006 , Page(s): 95 - 100
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (512 KB) |  | HTML iconHTML  

    The job-shop scheduling problem is concerned with allocating limited resources to operations over time. Although the job shop scheduling has an important role in various fields, it is one of the most difficult problems in combinational optimization. In this paper, we propose a new scheduling technique that combines Ant Colony Optimization (ACO) with GT method in order to realize effective scheduling. ACO approach has been applied recently to several combinational optimization problems, e.g., TSP and scheduling problem. However, no studies have ever seen the approach of applying hybrid ACO to job-shop problems. Experimental results using benchmark data show improvement comparison with a conventional scheduling technique. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recommends System using Re-extraction methods on the Groups with a similarity pattern such as Clustered User's preference tendency

    Publication Year: 2006 , Page(s): 101 - 107
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (257 KB) |  | HTML iconHTML  

    As the amount of information provided to the customer becomes larger, unnecessary information can lead to difficulty in finding the information customer wanted. This also may lead to a customer being dissatisfied with the service. However, the existing systems that apply a similar concept fail to address the individual user's demands. In addition, in considering similarities between users, each item's relative importance (weighted value) to each customer are not being taken into account. This leads to problems of scarcity if the common preference items are small and also the problems of expansion, where system slowdown occurs as number of users increase. These inefficiency problems are dealt with, in this paper, an adaptive e-commerce agent system is proposed to cater for individual user's taste for products. This system includes a monitoring agent that monitors user's intentions, a similarity referencing agent that learns user's activities to reference a group with a similar pattern, and an interest extraction agent that creates and updates individual user's activity database whenever change in activity is detected View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Prediction Model for improving Reliability in Self-Healing System

    Publication Year: 2006 , Page(s): 108 - 116
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (280 KB) |  | HTML iconHTML  

    In ubiquitous environments, which involve an even greater number of computing devices, with more informal modes of operation, this type of problem have rather serious consequences. In order to solve these problems when they arise, effective reliable systems are required. Also, system management is changing from a conventional central administration, to autonomic computing. However, most existing research focuses on healing after a problem has already occurred. In order to solve this problem, a prediction model is required to recognize operating environments and predict error occurrence. In this paper, a hybrid prediction model through four algorithms supporting self-healing in autonomic computing is proposed. This prediction model adopts a selective healing model, according to system situations for self-diagnosing and prediction of problems using four algorithms. In this paper, a hybrid prediction model is adopted to evaluate the proposed model in a self-healing system. In addition, prediction is compared with existing research and the effectiveness is demonstrated by experiment View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Bayesian Belief Networks to Model Software Project Management Antipatterns

    Publication Year: 2006 , Page(s): 117 - 124
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (178 KB) |  | HTML iconHTML  

    In spite of numerous traditional and agile software project management models proposed, process and project modeling still remains an open issue. This paper proposes a Bayesian network (BN) approach for modeling software project management antipatterns. This approach provides a framework for project managers, who would like to model the cause-effect relationships that underlie an antipattern, taking into account the inherent uncertainty of a software project. The approach is exemplified through a specific BN model of an antipattern. The antipattern is modeled using the empirical results of a controlled experiment on extreme programming (XP) that investigated the impact of developer personalities and temperaments on communication, collaboration-pair viability and effectiveness in pair programming. The resulting BN model provides the precise mathematical model of a project management antipattern and can be used to measure and handle uncertainty in mathematical terms View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reuse-based Methodology in Developing System-on-Chip (SoC)

    Publication Year: 2006 , Page(s): 125 - 131
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (176 KB) |  | HTML iconHTML  

    System-on-chip (SoC) plays a key role in building various embedded systems. With the advance of SoC technology, the complexity of SoC is sharply increasing. In addition, there is a great industry demand on technologies for producing reusable SoC components. However, conventional SoC approaches focus largely on designing the lower-level details of SoC at hardware level without going through model-level engineering. They also do not address the reusability issues of SoC. In this paper, we propose a solution framework for producing reusable SoC in a cost-effective way by adopting model-level engineering such as domain analysis, variability analysis, and component design. We first identify the three dimensions of reusing SoC, and analyze eight different cases of reusing SoC. Then, we present software engineering techniques that can be effectively utilized in developing reusing SoC. Finally, we define a methodology for a most demanding case. The key contribution of our research lies on three folds; identifying dimensions and feasible cases of reusing SoC, identifying effective software engineering techniques for developing reusable SoC, and defining a reuse-focused methodology of SoC View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.