By Topic

Software Engineering Conference, 2006. APSEC 2006. 13th Asia Pacific

Date 6-8 Dec. 2006

Filter Results

Displaying Results 1 - 25 of 67
  • XIII Asia Pacific Software Engineering Conference - Cover

    Publication Year: 2006 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (518 KB)  
    Freely Available from IEEE
  • XIII Asia Pacific Software Engineering Conference - Title

    Publication Year: 2006 , Page(s): i - iii
    Save to Project icon | Request Permissions | PDF file iconPDF (43 KB)  
    Freely Available from IEEE
  • XIII Asia Pacific Software Engineering Conference - Copyright

    Publication Year: 2006 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (43 KB)  
    Freely Available from IEEE
  • XIII Asia Pacific Software Engineering Conference - Table of contents

    Publication Year: 2006 , Page(s): v - ix
    Save to Project icon | Request Permissions | PDF file iconPDF (58 KB)  
    Freely Available from IEEE
  • Conference Chairs

    Publication Year: 2006 , Page(s): x
    Save to Project icon | Request Permissions | PDF file iconPDF (27 KB)  
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2006 , Page(s): xi
    Save to Project icon | Request Permissions | PDF file iconPDF (33 KB)  
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2006 , Page(s): xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (28 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2006 , Page(s): xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (37 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Secrobat: Secure and Robust Component-based Architectures

    Publication Year: 2006 , Page(s): 3 - 10
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (290 KB) |  | HTML iconHTML  

    Software systems, component-based systems (CBS) in particular, have a lot of vulnerabilities that may be exploited by intruders. Companies spend much time and money to "patch " them up. It is partly due to the fact that a system's security features are often added to the system after its functional requirements have been addressed. As such, system security features are not systematically designed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A precise estimation technique for test coverage of components in object-oriented frameworks

    Publication Year: 2006 , Page(s): 11 - 18
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (260 KB) |  | HTML iconHTML  

    In general, a component-based system uses only a part of the functions of its software components. Therefore, precise structural testing for components requires to specify what functions of the components are used in the system. In addition, in the case with an object-oriented component, some existing studies point out that testing of all possible bindings between a call site and the methods that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach Based on Modeling Dynamic Behavior of the System to Assess the Impact of COTS Upgrades

    Publication Year: 2006 , Page(s): 19 - 26
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (249 KB) |  | HTML iconHTML  

    Traditional approaches of executing complete system test suite to validate software systems on deploying the upgrades of commercial off-the-shelf (COTS) software components is typically costly and time-consuming, resulting in delay in deploying the upgrades. In this paper, we present a process that examines the test case dependencies at finer granularity level of altered-functions in the upgrades ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Component composition through architectural patterns for problem frames

    Publication Year: 2006 , Page(s): 27 - 36
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (174 KB) |  | HTML iconHTML  

    In this paper, we present a pattern-based software development process using problem frames and corresponding architectural patterns. In decomposing a complex problem into simple subproblems, the relationships between the sub-problems are recorded explicitly. Based on this information, we give guidelines on how to derive the software architecture for the overall problem from the software architect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Component-based Development of MILLS: A Case Study in the development of an Inter-library Loan Software System

    Publication Year: 2006 , Page(s): 37 - 44
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (460 KB) |  | HTML iconHTML  

    Component-based software development (CBSD) is based on the idea of developing software systems by selecting appropriate off-the-shelf components and integrating them under a specified architecture. Such an approach prevents a software developer from having to reinvent the wheel, reduces software development cost and time, and promotes flexibility and maintainability. In this paper, we describe th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adopting Model-Driven Development for Integrated Services and Appliances in Home Network Systems

    Publication Year: 2006 , Page(s): 45 - 52
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (358 KB) |  | HTML iconHTML  

    The technology of a home network system (HNS) allows integration of several kinds of home appliances to provide a user with value-added integrated services. Development of the integrated HNS services requires implementation of the appliance components (with APIs) and the services, according to each home-network environment. There are various implementation standards such as DLNA, ECHONET, OSGi and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Component Based Software Engineering using the TCEM Methodology and the TCET Tool

    Publication Year: 2006 , Page(s): 53 - 60
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (337 KB) |  | HTML iconHTML  

    Currently there are no comprehensive tools that can be used to harness the full potential of component based software engineering (CBSE). In this paper, we describe a novel component-based software development methodology, called the "total component engineering methodology" (TCEM) that we have conceived, formulated and tested that can be efficiently and effectively applied to every phase of the C... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward a Code Search Engine Based on the State-of-Art and Practice

    Publication Year: 2006 , Page(s): 61 - 70
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (204 KB) |  | HTML iconHTML  

    Software engineering and reuse-oriented tools have been studied along the last years, aiming to provide help in the software development. With the importance of reuse growing significantly, effective software reuse tools and environments started to be needed. This paper presents and discusses some works that comprise many issues related to source code search tools, covered by university and indust... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security-Oriented Service Composition and Evolution

    Publication Year: 2006 , Page(s): 71 - 78
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (137 KB) |  | HTML iconHTML  

    This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the security objectives and properties at the service and system levels, the negotiation and re-negotiation techniques for service composition and evolution, and the analysis techniques for checking the security compatibility b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Coupling-based Complexity Metric for Remote Component-based Software Systems Toward Maintainability Estimation

    Publication Year: 2006 , Page(s): 79 - 86
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (311 KB) |  | HTML iconHTML  

    Remote-component-based software systems (CBS) must provide high maintainability to support operation over long periods of time and correspond to changes in enterprise requirements/environments. Measurements of the degree of complexity of a system are one technique for evaluating maintainability. However, conventional complexity metrics are unable to reflect the overall complexity of the system, be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Formal Framework for Component Pr otocols Behavioural Compatibility

    Publication Year: 2006 , Page(s): 87 - 94
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (285 KB) |  | HTML iconHTML  

    In this paper, we present a new and optimistic approach to the definition of component protocols compatibility, and we provide a framework for modeling component protocols together with their composition. This framework is discussed in terms of compatibility and substitutability checks of protocols. According to the optimistic approach, two protocols are compatible if they are composable and their... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Portable Interceptor Mechanism on SOAP for Continuous Audit

    Publication Year: 2006 , Page(s): 95 - 104
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (144 KB) |  | HTML iconHTML  

    Web services has become popular in modern distributed applications, and the SOAP technology currently is the most used in Web services. Recent middleware research works widely use interception approach for many problem domains, for example fault tolerance, continuous audit {CA), security etc. Instead of providing a portable interceptor as CORBA does, SOAP 1.2 provides an intermediary mechanism. Du... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Practical Estimation Method for Complex RE

    Publication Year: 2006 , Page(s): 105 - 112
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (324 KB) |  | HTML iconHTML  

    Software projects typically require effort estimation from the software development life cycle (SDLC) staff at the commencement of the software development activities. Inaccuracies in effort estimation of software projects early on in the SDLC continues to be a perennial problem. Typically, improved estimates for software projects are provided under circumstances where requirements engineering (RE... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Requirements Retrieval Using Use Case Terms and Structure Similarity Computation

    Publication Year: 2006 , Page(s): 113 - 120
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (314 KB) |  | HTML iconHTML  

    For a large scale of software development, there is a tremendous number of software requirements documents in a collection which may be produced for different domains by different developer teams. They may be later reused to reduce cost and time for the next development. Thus, there is a need to retrieve ones that meet user's need efficiently. This paper presents an approach for software requireme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Goal Oriented Requirement Engineering: A Critical Study of Techniques

    Publication Year: 2006 , Page(s): 121 - 130
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (224 KB) |  | HTML iconHTML  

    The term "Goal" is increasingly being used in Requirement Engineering. Goal-Oriented requirement engineering (GORE) provides an incremental approach for elicitation, analysis, elaboration & refinement, specification and modeling of requirements. Various Goal Oriented Requirement Engineering (GORE) methods exist for these requirement engineering processes like KAOS, GBRAM etc. GORE techniques a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating Stateful Services in Workflow

    Publication Year: 2006 , Page(s): 131 - 138
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (9567 KB) |  | HTML iconHTML  

    Long running business processes require composition of services for task accomplishment. BPEL provide a mechanism to model business workflow among collaborating Web Services distributed across organizations. For effective execution and consistent outcomes from such composite services in a loosely coupled environment, management of state, transaction, notification and execution monitoring are the k... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Value-Based Dynamic Composition of Web Services

    Publication Year: 2006 , Page(s): 139 - 146
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (678 KB) |  | HTML iconHTML  

    Dynamic composition of Web services encounters many challenges including selecting qualified services, composing services dynamically, and assuring quality of services. This article proposes a value model and its representation language, VSDL (value-based service description language), of Web services, and an architecture of value-added service broker of dynamically composing Web services based on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.