By Topic

2007 IEEE/ACS International Conference on Computer Systems and Applications

Date 13-16 May 2007

Filter Results

Displaying Results 1 - 25 of 151
  • AICCSA'2007 General Chair's Welcome Message

    Publication Year: 2007, Page(s):nil1 - nil2
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Patron and Opening Ceremony Distinguished Keynote Speaker

    Publication Year: 2007, Page(s): nil3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB)

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speech 1: Secure Information Sharing and Dissemination in the Context of Public Security

    Publication Year: 2007, Page(s):nil4 - nil5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2127 KB) | HTML iconHTML

    In the context of homeland security, one of the key challenges in such environment is achieving effective, timely and orderly collaboration and information sharing among various government agencies at the Federal, state, and local levels. These agencies are using the Web as one of the means for sharing related information that is of different forms. In case of a crisis, a virtual response team nee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speech 2: Routing Techniques in Wireless Sensor Networks

    Publication Year: 2007, Page(s):nil6 - nil7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1234 KB)

    Wireless sensor networks (WSN) will witness a huge growth in the near future and both the academia and industry have commenced intensive research. Routing protocol design in WSN is one of the most important areas of active research due to the open issues and its importance. WSNs usually contain a large number of nodes typically with highly correlated collected data. These networks can be categoriz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speech 3: Discrete-Event Computer Simulation as a Paradigm of Scientific Investigations

    Publication Year: 2007, Page(s): nil8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB)

    Summary form only given. Advances of computer technology initiated in the twentieth century have resulted in adoption of computer simulation as the most popular tool of performance evaluation studies of such complex stochastic dynamic systems as e.g. modern multimedia telecommunication networks. Such widespread reliance on simulation studies raises the question of credibility of their results. Thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Executive Committee

    Publication Year: 2007, Page(s): nil9
    Request permission for commercial reuse | PDF file iconPDF (278 KB)
    Freely Available from IEEE
  • Other Committees

    Publication Year: 2007, Page(s): nil10
    Request permission for commercial reuse | PDF file iconPDF (565 KB)
    Freely Available from IEEE
  • Track Chairs

    Publication Year: 2007, Page(s): nil11
    Request permission for commercial reuse | PDF file iconPDF (447 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2007, Page(s): nil12
    Request permission for commercial reuse | PDF file iconPDF (699 KB)
    Freely Available from IEEE
  • List of reviewers

    Publication Year: 2007, Page(s):nil13 - nil14
    Request permission for commercial reuse | PDF file iconPDF (1611 KB)
    Freely Available from IEEE
  • Single Machine Total Weighted Tardiness Problem with Genetic Algorithms

    Publication Year: 2007, Page(s):1 - 8
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (523 KB) | HTML iconHTML

    Genetic algorithms can provide good solutions for scheduling problems. In this paper we present a genetic algorithm to solve the single machine total weighted tardiness problem, a scheduling problem which is known to be NP-hard. First, we present a new concept of genetic operators for scheduling problems. Then, we present a developed software tool, called HybFlexGA, to examine the performance of v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Agents and Apache Cocoon for a CV Generation System

    Publication Year: 2007, Page(s):9 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (8138 KB) | HTML iconHTML

    A dynamic system - based on multiagent systems (MAS) with XML and Apache Cocoon - for the automatic and dynamic generation of CV documents is presented in this paper. This pretends to be a useful application in particular for an academic and research environment, since every University model usually requires its members to manage a big amount of personal data, such as publications in journals and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach for Specification-based Test Case Generation for Web Services

    Publication Year: 2007, Page(s):16 - 23
    Cited by:  Papers (9)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Web services applications are built by the integration of many loosely coupled and reusable services using open standards. Testing Web service is important in detecting faults and assessing quality attributes. A difficulty in testing Web services applications is the unavailability of the source code for both the application builder and the broker. This paper propose a solution to this problem by p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Construct Metadata Model based on Coupling Information to Increase the Testability of Component-based Software

    Publication Year: 2007, Page(s):24 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (8161 KB) | HTML iconHTML

    A software component must be tested every time it is reused, to guarantee the quality of both the component itself and the system in which it is to be integrated. So how to increase testability of component has become a key technology in the software engineering community. This paper introduces a method to increase component testability. Firstly we analyze the meanings of component testability and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reference Model of Grouped-Metadata Object and a Change Model based on it Appling for Component-based Software Integration Testing

    Publication Year: 2007, Page(s):32 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7435 KB) | HTML iconHTML

    Component metadata is one of the most effective methods to improve the testability of component-based software. In this paper, we firstly give a formal definition of component, and summarize the basic meanings of component metadata. Based on these, an idea of grouped-metadata object (GMO) is introduced, which is divided into two types, respectively named descriptive metadata and operative metadata... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Eclipse Plug-in: Dependency Browser

    Publication Year: 2007, Page(s):40 - 46
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (8485 KB) | HTML iconHTML

    Dependency search is an important tactic in many software activities, particularly during software maintenance. Eclipse has a few powerful tools to support such activity but they can be more convenient for programmers to use. In this paper, we proposed a light-weight and agile Eclipse plug-in: Dependency Browser, which parses call dependencies and presents them with a user- friendly interface whic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Component Model for Network Processor Based System

    Publication Year: 2007, Page(s):47 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (107 KB) | HTML iconHTML

    Network processors usually consist of multiple heterogeneous processing and memory units connected by on-chip network, and the target applications generally need to process packets at full line rate from Gbit/s to multiple 10 Gbit/s. Network processor based applications are real-time, resource-constrained and heterogeneous. We believe that component technology is a promising approach for complex e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Maintainability Based Risk Assessment and Severity Analysis in Prioritizing Corrective Maintenance Tasks

    Publication Year: 2007, Page(s):51 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7799 KB) | HTML iconHTML

    A software product spends more than 65% of its lifecycle in maintenance. Software systems with good maintainability can be easily modified to fix faults. We define maintainability-based risk as a product of two factors: the probability of performing maintenance tasks and the impact of performing these tasks. In this paper, we present a methodology for assessing maintainability-based risk in the co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Maintainable Architecture for Process Control Applications

    Publication Year: 2007, Page(s):59 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (8171 KB) | HTML iconHTML

    Development of software systems utilizes only 20%-40% of the overall project cost; the rest is consumed by maintenance. Systems with poor maintainability are difficult to modify and to extend. Maintainability based risk is defined as a product of two factors: the probability of carrying out maintenance tasks and the impact of these tasks. The decision of adopting a single architecture over others ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Meta-analysis Approach to Refactoring and XP

    Publication Year: 2007, Page(s):67 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (9382 KB) | HTML iconHTML

    The mechanics of seventy-two different Java refactorings are described fully in Fowler's text. In the same text, Fowler describes seven categories of refactoring, into which each of the seventy-two refactorings can be placed. A current research problem in the refactoring and XP community is assessing the likely time and testing effort for each refactoring, since any single refactoring may use any ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Formal Approach for Functional and Structural Test Case Generation in Multi-Agent Systems

    Publication Year: 2007, Page(s):76 - 83
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (9647 KB) | HTML iconHTML

    Testing can be functional or structural. Neglecting one technique to the prejudice of the other is fundamentally flawed. In this paper, we propose an automated test case generation for agent based systems. The approach uses the system's specification and implementation. The functional testing uses a combination of the formal language Maude and a new kind of diagrams called InterElement Requirement... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Component based development of non-visual applications using braille-speech widgets

    Publication Year: 2007, Page(s):84 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB) | HTML iconHTML

    This paper exposes how to create reusable components that can be used by developers to implement applications for visually handicapped users. The non visual components are widgets adapted from graphical ones like menus, list boxes, edit boxes, and they use specific input/output devices and specific interaction principles. They are implemented as components to facilitate the component based develop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of a Web Based Database-Centric Workflow Management System Using Rapid Prototyping Approach

    Publication Year: 2007, Page(s):92 - 99
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (442 KB) | HTML iconHTML

    Workflow management systems have gained momentum in recent years due to the several benefits they provide. This paper describes the business process and development of a web based enterprise level workflow management information system (WKFMIS). This system is suggested to manage workflow activities involved in the process of repair requests handling and maintenance of computer systems and associa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SERP: Scalable Efficient Reservation Protocol for the Future Internet

    Publication Year: 2007, Page(s):100 - 107
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (653 KB) | HTML iconHTML

    The fast Internet growth has led to high demands requiring QoS provisioning mechanism to be implemented in the future Internet. This paper presents the development and implementation of a resource reservation scheme to allocate and manage resource in the future internet. We propose a scalable efficient reservation protocol (SERP) to efficiently allocate and manage resources in the future Internet.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Secure Consensus Information Fusion over Sensor Networks

    Publication Year: 2007, Page(s):108 - 115
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    In this work we have examined the problem of consensus information fusion from a novel point of view, challenging the fundamental assumption of mutual trust among the fusion parties. In quest for a method to make information fusion possible while preserving the mutual confidentiality and anonymity of the fused information even in case of collusion of the malicious nodes, we propose the Blind Infor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.