By Topic

30th Annual International Computer Software and Applications Conference (COMPSAC'06)

Date 17-21 Sept. 2006

Go

Filter Results

Displaying Results 1 - 25 of 87
  • 30th Annual International Computer Software and Applications Conference - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (370 KB)
    Freely Available from IEEE
  • 30th Annual International Computer Software and Applications Conference - Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • 30th Annual International Computer Software and Applications Conference - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • 30th Annual International Computer Software and Applications Conference - TOC

    Publication Year: 2006, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2006, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (88 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Co-chairs

    Publication Year: 2006, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (134 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Workshop Chair

    Publication Year: 2006, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (115 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Doctoral Symposium and Fast Abstracts Chair

    Publication Year: 2006, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (103 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2006, Page(s):xvi - xviii
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2006, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Location Updates In Cellular Networks Using Bloom Filters

    Publication Year: 2006, Page(s):3 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB) | HTML iconHTML

    Location updates (LU) are emergency 911 procedures mandated by the FCC for cellular networks today; helping locate mobiles within 100 meters of their vicinity. This requires paging all mobiles within a vicinity regularly thereby leading to an increased use of bandwidth. This paper analyzes the existing schemes of hash based paging in LU procedures using Bloom filters (BF) and introduces two new sc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Processes on Tree Hash

    Publication Year: 2006, Page(s):10 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    Dynamic hash allows us to adjust the size of hash space dynamically according to the amount of data so that we obtain the nice time/space efficiency of the hash space. One of the proposed techniques is linear hash (LH). However, practically the technique doesn't always provide us with suitable results, especially in the case of collective (consecutive) inserts. In this investigation, we propose a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trading Integrity for Availability by Means of Explicit Runtime Constraints

    Publication Year: 2006, Page(s):14 - 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB) | HTML iconHTML

    Data integrity is one of the dependability attributes in data-centric applications. However, applications exist, e.g., safety or mission critical systems, where availability is more important for dependability than strict data integrity. Consequently, in such systems availability can be increased by temporarily relaxing data integrity. Potential inconsistencies are accepted by constraint validatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Run-time Adaptive and Code-size Efficient XML Parser

    Publication Year: 2006, Page(s):18 - 21
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    This paper proposes a new method for designing and implementing a manual XML parser named BNFParser, which is based on the mechanism of XML document matching against a BNF tree that built on XML formal grammar represented by extended Backus-Naur form (EBNF) notation. Compared with generic XML parsers, e.g. top-down Xerces/LibXML parser and bottom-up YACC-assisted parser, BNFParser is designed to b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of an Asynchronous Web Server

    Publication Year: 2006, Page(s):22 - 28
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (98 KB) | HTML iconHTML

    Concurrency can be implemented in a Web server using synchronous and asynchronous mechanisms offered by the underlying operating system. Compared to the synchronous mechanisms, the asynchronous mechanisms are attractive because they provide the benefit of concurrency while alleviating much of the overhead and complexity of multithreading. The proactor pattern in middleware, which effectively encap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Choosing the Right Time to Compose Aspectual Scenarios

    Publication Year: 2006, Page(s):29 - 32
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (109 KB) | HTML iconHTML

    Aspect-oriented software development (AOSD) provides effective modularization and composition mechanisms and can be applied at any stage of the software lifecycle. Aspect composition is a crucial feature of AOSD since it allows a developer to get an overall understanding of a system and better analyze the impact of a concern to a set of other concerns. The effort involved in composition, however, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-Management of COTS Component-Based Systems Using Wrappers

    Publication Year: 2006, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB) | HTML iconHTML

    This paper describes an approach to designing COTS (commercial off-the-shelf) components-based software system in which each COTS component is self-managed by a wrapper to improve dependability of systems. The wrapper for self-managing a COTS component detects the anomalies of the component; it reconfigures the anomalous component at run-time; and it repairs the anomalous component. The wrappers c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Classification and Retrieval of Software Components

    Publication Year: 2006, Page(s):37 - 40
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    This work proposes a new methodology for intelligent classification and retrieval of software components based on user-defined requirements. The classification scheme utilizes a dedicated genetic algorithm which evolves a small number of classifiers by dividing the set of available components stored in a database into certain subsets (clusters). Each classifier thus becomes the leader-representati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traceability between Software Architecture Models

    Publication Year: 2006, Page(s):41 - 44
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (145 KB) | HTML iconHTML

    Software architecture (SA) is the blueprint of the software system and considered as one of the most important artifacts in component based development. The design and analysis of SA can be very complex. Under the inspiration of model-driven development, the design of SA has been no more constrained in one stage. It is a trend to construct multiple SA models in multiple stages during the software ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieving Dependable Component-Based Systems Through Generative Aspect Oriented Component Adaptation

    Publication Year: 2006, Page(s):45 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    Mismatches between pre-qualified existing components and the particular reuse context in applications are often inevitable and have been a major hurdle of component reusability and smooth composition. Although component adaptation has acted as a key solution of eliminating these mismatches, existing practices are either only capable for adaptation at a rather simple level, or requires too much int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Model and Implementation of Component Array Container

    Publication Year: 2006, Page(s):49 - 54
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB)

    A component array is a group of component implementations that provide the same functions but have different qualities. At runtime, a component array can adapt to changes of the system and environment by executing different implementations. When developing component arrays, developers have to implement them from the scratch and consider all such things as how to manage component implementations, h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preventing Feature Interactions by Constraints

    Publication Year: 2006, Page(s):55 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (106 KB) | HTML iconHTML

    As software systems evolve by adding new extensions some unexpected conflicts may occur, which is known as the feature interaction problem (PIP). PIP is a threat to the dependability of software systems as it can break system security and safety. A major cause for PIP is the non-determinism related with sending or receiving the predefined signals of the base subsystem by extensions. This paper ana... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frameworks Built on the Trusted Platform Module

    Publication Year: 2006, Page(s):59 - 62
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    We discuss two secure operating system frameworks built upon the Trusted Computing Group's Trusted Platform Module intended to assure remote execution. The security implications of the respective design decisions are discussed, as well as highlighting vulnerabilities in protocol and system design. A novel theoretical attack on the TPM is proposed, which makes use of the lack of curtained memory in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Separating Functional and Non-functional Concerns through Coordination: An Application to Reliability

    Publication Year: 2006, Page(s):63 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    This paper presents a software architecture that ensures system dependability through external coordination. Under this architecture, a distributed system is decomposed into two types of entities, i.e., computational components and coordinators. The system's computational functionalities are carried out by computational components, whereas coordinators are to coordinate these computational compone... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment

    Publication Year: 2006, Page(s):67 - 70
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    SSRD is a secure resource discovery model for devices running in a pervasive computing environment. SSRD is based on a lightweight trust model. SSRD+ is an extension of the existing SSRD model. In SSRD+, we enhance the trust model by adding dynamic trust relationship and also specifying behavioral characteristics that determine the level of trust among devices. We also add a risk model to address ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.