By Topic

Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International

Date 24-27 July 2007

Go

Filter Results

Displaying Results 1 - 25 of 121
  • 31st Annual International Computer Software and Applications Conference - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (390 KB)
    Freely Available from IEEE
  • 31st Annual International Computer Software and Applications Conference - Title Page

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • 31st Annual International Computer Software and Applications Conference - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • 31st Annual International Computer Software and Applications Conference - Table of contents

    Publication Year: 2007, Page(s):v - xv
    Request permission for commercial reuse | PDF file iconPDF (201 KB)
    Freely Available from IEEE
  • Message from the Standing Committee Chair

    Publication Year: 2007, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Message from the Program Co-chairs

    Publication Year: 2007, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (170 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Workshop Chair

    Publication Year: 2007, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (62 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2007, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2007, Page(s): xxv
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • Specifying Pointcuts in AspectJ

    Publication Year: 2007, Page(s):5 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    Program verification is a promising approach to improving program quality. To formally verify aspect- oriented programs, we have to find a way to formally specify programs written in aspect-oriented languages. Pipa is a BISL tailored to AspectJ for specifying AspectJ programs. However, Pipa has not provided specification method for pointcuts in AspectJ programs. Based on the exist work of Pipa, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A tool for compiler construction based on aspect-oriented specifications

    Publication Year: 2007, Page(s):11 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (662 KB) | HTML iconHTML

    Aspect-oriented programming (AOP) provides a way to modularize crosscutting concerns. Crosscuting concerns can be found in various representations of software artifacts and in different steps of software life cycle (e.g., source code, models, requirements, language grammars). This paper provides an introduction to the AspectLISA tool and its aspect-oriented specification language for programming l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AOP-based automated unit test classification of large benchmarks

    Publication Year: 2007, Page(s):17 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (117 KB) | HTML iconHTML

    Despite the availability of a variety of program analysis tools, evaluation of these tools is difficult, as only few benchmark suites exist. Existing benchmark suites lack the uniformity needed for automation of experiments. We introduce the design of a uniform build/installation platform, which constitutes an important part of the solution. This platform is used to manage the build and test proce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aspect-Based Instrumentation for Locating Memory Leaks in Java Programs

    Publication Year: 2007, Page(s):23 - 28
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    Despite the built-in garbage collector, Java programs can still suffer the memory leak problem resulted from the unhealthy programming style of retaining unwanted references. This paper presents an aspect-based tool for assisting programmers in locating such references to fix the problem. This tool, FindLeaks, utilizes an aspect to collect memory consumption statistics and object references create... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Combined Concept Location Method for Java Programs

    Publication Year: 2007, Page(s):29 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    Concept location is one of the fundamental activities during software maintenance which locates the parts of the source code where a specific concept is implemented. The methods for concept location include static and dynamic approaches: the former includes string pattern matching, dependence graph search, and IR-based techniques, while the latter includes debugging, profiling, and tracing. Both c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Instant Messaging Framework for Flexible Interaction with Rich Clients

    Publication Year: 2007, Page(s):43 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    Today, we are seeing an increasing number of software applications that users want to use anywhere, anytime. Such mobile applications often deliver their user interfaces (UIs) to client devices over the World Wide Web. However, Web-based UIs cannot provide the same level of usability as window-based UIs on mobile devices with their small screens and occasional network dropouts. To address this cha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding 2D-BarCode Technology and Applications in M-Commerce - Design and Implementation of A 2D Barcode Processing Solution

    Publication Year: 2007, Page(s):49 - 56
    Cited by:  Papers (12)  |  Patents (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (479 KB) | HTML iconHTML

    With the swift increase of the number of mobile device users, more wireless information services and mobile commerce applications are needed. Since various barcodes have been used for decades as a very effective means in many traditional commerce systems, today people are looking for innovative solutions to use barcodes in the wireless world. Recently, the mobile industry began to pay more attenti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Optimization Method for Real-Time Natural Phenomena Simulation on WinCE Platform

    Publication Year: 2007, Page(s):57 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    We present a new optimized algorithm of particle system for simulating flame, so that it can be implemented on WinCE platform which has only limited resources. Our approach mainly intends to store some traces first and then load them randomly during the simulation to reduce the computation complexity of the particle system. We have tested this approach in the simulation of a flame, and our method ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MiniWap: Navigating WAP with Minimo

    Publication Year: 2007, Page(s):63 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (455 KB) | HTML iconHTML

    Wireless application protocol(WAP) enabled mobile users to enjoy much valuable information and a large number of commercial services over mobile networks. The significance of WAP browsing, which has been a service dedicated to mobile phones, is rising as devices get smarter and networks become faster. A WAP browser would be equally practical on PC's and hand-held devices. This paper presents our r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A One-Dimensional Probabilistic Model of Wireless Multihop Internet Access

    Publication Year: 2007, Page(s):69 - 74
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    Wireless multihop access networks, where clients can access the Internet through Internet gateways by direct or multihop transmissions, are potential for future wireless data services and vehicular network applications. In the context of multihop transmissions, less number of gateways is required for Internet access while a certain level of Internet connectivity still holds. In this paper, we inve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks

    Publication Year: 2007, Page(s):75 - 80
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    A mobile ad hoc network is a multi-path autonomous system comprised of many mobile nodes with wireless transmission capability. In this paper, we first review current research in intrusion detection in ad hoc networks. Then, by considering the characteristics of such networks in which free movement of mobile nodes can lead to frequent topological changes, especially network separation and converge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Aspect Oriented Middleware Architecture for Adaptive Mobile Computing Applications

    Publication Year: 2007, Page(s):81 - 86
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    Mobile computing applications are required to operate in environments in which the availability for resources and services may change significantly during system operation. Thus, mobile computing applications need to be capable of adapting to these changes to offer the best possible level of service to their users. However, traditional middleware is limited in its capability of adapting to the env... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Virtual Machine-Based Programming Environment for Rapid Sensor Application Development

    Publication Year: 2007, Page(s):87 - 95
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    In recent years, TinyOS and nesC are gradually becoming the de facto software development platform for implementing sensor applications. However, developing sensor applications is difficult for programmers since the programming paradigm used in nesC is different from that used in other popular programming languages. In view of this, we propose in this paper a virtual machine-based programming envi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Framework for Local Ambient Intelligence Space: The AmI-Space Project

    Publication Year: 2007, Page(s):95 - 100
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (737 KB) | HTML iconHTML

    A simple and clear framework for a local Ambient Intelligence (Am1) Space application system is very important, because it can help the designers develop new applications in Am1 Space, even will help the users configure their future home Am1 system. In this paper, first, the open problems in the Am1research field are discussed. Then, a framework of a typical Am1 Space application system is present... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Service Discovery Architecture based on Anycast in Pervasive Computing Environments

    Publication Year: 2007, Page(s):101 - 108
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    Service discovery is very useful in pervasive computing environments. A service discovery architecture based on anycast is proposed. A well- known anycast address is defined first, which stands for a group of directory servers supporting service discovery. Each node in pervasive environment determines whether it is qualified to be a directory server in accordance with its capability, such as its m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vs Golf - Developing Location-based Multi-Player Games

    Publication Year: 2007, Page(s):109 - 114
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (650 KB) | HTML iconHTML

    Location-based multi-player games are currently being pushed by the industry, one main factor being that highly-accurate positioning technologies like GPS as well as broadband mobile networks like UMTS are finally getting widespread. Nevertheless, generic frameworks for efficiently managing user locations are still missing, which strongly complicates game development. This paper presents TraX, a d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.