By Topic

Software Engineering Research, Management & Applications, 2007. SERA 2007. 5th ACIS International Conference on

Date 20-22 Aug. 2007

Filter Results

Displaying Results 1 - 25 of 136
  • 5th ACIS International Conference on Software Engineering Research, Management & Applications - Cover

    Publication Year: 2007 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (86 KB)  
    Freely Available from IEEE
  • 5th ACIS International Conference on Software Engineering Research, Management & Applications-Title

    Publication Year: 2007 , Page(s): i - iii
    Save to Project icon | Request Permissions | PDF file iconPDF (123 KB)  
    Freely Available from IEEE
  • 5th ACIS International Conference on Software Engineering Research, Management & Applications-Copyright

    Publication Year: 2007 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (60 KB)  
    Freely Available from IEEE
  • 5th ACIS International Conference on Software Engineering Research, Management & Applications - TOC

    Publication Year: 2007 , Page(s): v - xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (119 KB)  
    Freely Available from IEEE
  • Conference organizers

    Publication Year: 2007 , Page(s): xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (34 KB)  
    Freely Available from IEEE
  • International Technical Program Committee

    Publication Year: 2007 , Page(s): xviii - xix
    Save to Project icon | Request Permissions | PDF file iconPDF (39 KB)  
    Freely Available from IEEE
  • A message from Conference Chairs

    Publication Year: 2007 , Page(s): xx
    Save to Project icon | Request Permissions | PDF file iconPDF (30 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • A message from Program Chairs

    Publication Year: 2007 , Page(s): xxi
    Save to Project icon | Request Permissions | PDF file iconPDF (34 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Keynote Address 1

    Publication Year: 2007 , Page(s): xxii
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (45 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Address 2

    Publication Year: 2007 , Page(s): xxiii
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (37 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two Sides of Structuring Multi-Functional Software Systems: Function Hierarchy and Component Architecture

    Publication Year: 2007 , Page(s): 3 - 12
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (249 KB) |  | HTML iconHTML  

    We introduce a theory for the identification, modeling, and formalization of two methodologically essential, complementary views onto software and software intensive systems. One view addresses mainly tasks in requirements engineering when describing the overall system functionality from the users' point of view. By this view we aim at the specification of the comprehensive user functionalities of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Processes Improvement and Specifications for Embedded Systems

    Publication Year: 2007 , Page(s): 13 - 18
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (191 KB) |  | HTML iconHTML  

    CMMI is virtual standard scaling software processes capability, but focuses on "What" and are too general to be suitable for different enterprises, especially for development process. Hence, a suit of "software processes improvement solution " referring CMMI level 2~3 for middle size enterprises is established. It is composed of: (I) The software processes specification, which is titled as "Simpli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design Opportunity Tree of Capability Improve for Level-up and Software Process Improvement

    Publication Year: 2007 , Page(s): 19 - 24
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (313 KB) |  | HTML iconHTML  

    There are many risk items of the project development that cause the process maturity level occurring in the quality problems during process management and project progress. This paper designs the opportunity tree that level-up the current environments and their problems solution as well. For the similar projects, we can estimate defects and prepare to solve them by using domain expert knowledge an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis the priority of security requirement items for the process improvement by ISO/IEC 15504 and ISO/IEC 15408

    Publication Year: 2007 , Page(s): 25 - 30
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (372 KB) |  | HTML iconHTML  

    A software process can be characterized as the ISO/IEC 15504. A common process framework is established by defining a small number of framework activities that are applicable to all software projects, regardless of their size or complexity. There are many risk items of the project development that cause the process maturity level occurring in the quality problems during process management and proj... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-stage Process Analysis Using the Process-based Performance Measurement Framework and Process Simulation

    Publication Year: 2007 , Page(s): 31 - 37
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (813 KB) |  | HTML iconHTML  

    In the diagnosis phase of business process management (BPM), the operational processes are analyzed to identify problems and to find things that can be improved. And in the process design phase of BPM, to-be process is newly designed and analyzed. Proposed in this paper is a two-stage process analysis for process (re)design using the process-based performance measurement framework (PPMF) and proce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Construction of a Real-time Urban Inundation Analysis System based on UIS using SWMM

    Publication Year: 2007 , Page(s): 38 - 46
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (789 KB) |  | HTML iconHTML  

    Inundation disasters have directly affected human's lives such as traffic confusion and loss of life. Many current researches of urban flooding analysis have been focused on model development and representation methods based on geographical information systems (GIS). We try to develop an integrated inundation analysis system using urban information systems (UIS), storm water management model (SWMM... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An On-board Switch Scheme Based on DiffServ

    Publication Year: 2007 , Page(s): 47 - 53
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (323 KB) |  | HTML iconHTML  

    Two contradictory requirements of the on-board switch scheme are the Quality of Service (QoS) performance and the complexity limitation. Therefore, in order to achieve a better trade-off between the performance and the resource utilization, a new onboard switch scheme based on Differentiated Service (DiffServ) is proposed. Under the scheme, a QoS mapping module adopting the concept of the (m,k) mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Energy-Efficient Clustering Using a Round-Robin Method in a Wireless Sensor Network

    Publication Year: 2007 , Page(s): 54 - 60
    Cited by:  Papers (12)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (222 KB) |  | HTML iconHTML  

    The routing algorithm used in the wireless sensor network features the clustering method to reduce the amount of data transmission from the energy efficiency perspective. However, the clustering method results in high energy consumption at the cluster head node. Dynamic clustering is a method used to resolve such a problem by distributing energy consumption through the re-selection of the cluster ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UPnP based Service Discovery and Service Violation Handling for Distributed Fault Management in WBEM-based Network Management

    Publication Year: 2007 , Page(s): 61 - 67
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (477 KB) |  | HTML iconHTML  

    Fast fault recovery depends on immediate detection of occurred fault. In some case, it is rather difficult to determine the cause of a fault in order to provide fast fault restoration/isolation. Also, service level fault, such as service level agreement (SLA) violation may not be due to physical device failure. This paper explores in detail the aspects of service level fault detection. We present ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Energy Consumption Scheme Considering Coverage and Connectivity Problem in Wireless Sensor Networks

    Publication Year: 2007 , Page(s): 68 - 72
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (288 KB) |  | HTML iconHTML  

    Many studies have been done to solve the coverage and connectivity problem of the sensor networks with the one-hop neighbor location information. In this paper we propose a simple scheme for the coverage and connectivity problem without any location information. We evaluate the performance of the proposed scheme with analytical models and simulations. The simulation results verify the proposed sch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Performance Analysis of MANET Multicast Routing Algorithms with Multiple Sources

    Publication Year: 2007 , Page(s): 73 - 82
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (572 KB) |  | HTML iconHTML  

    Since network resource of mobile ad hoc network (MANET) is limited due to the contention-based wireless communication channel at the medium access layer and energy of mobile nodes is constrained due to the energy-limited batteries, the scalability issue is one of main research topics in developing MANET routing algorithms. Therefore, this paper analyzes the message complexities of group shared tre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Semantic-Features-Calculation Based Model Mapping Approach for Web Information Systems

    Publication Year: 2007 , Page(s): 83 - 90
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (285 KB) |  | HTML iconHTML  

    The transformation from platform independent models to platform specific models is a key technology in OMG's MDA. The mapping relations between different models are the foundation and basis for the transformation. By abstractly analyzing the characteristic of syntax and semantics of modeling languages, a semantic-features-calculation based model mapping approach for the development of Web informat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Quality Chain Modeling Methodology for Ternary Web Services Quality View

    Publication Year: 2007 , Page(s): 91 - 97
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1311 KB) |  | HTML iconHTML  

    WSQM TC, an OASIS technical committee for web service quality model, published the Web services quality model (WSQM) which models and explains the quality factor, quality action, and quality associates for Web services. WSQM focuses on the classification and definition of quality factors and activities of associates conceptually. As the coverage of Web services expands and implementation cases of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Internet Query Language based on Intuitionistic Linear Logic

    Publication Year: 2007 , Page(s): 98 - 100
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (129 KB) |  | HTML iconHTML  

    We propose an Internet query language based on intuitionistic linear logic. This language extends regular expressions with linear implications and additive (classical) conjunctions. To be precise, it allows goals of the form D -o G and G1&G2 where D is a text and G is a goal. The first goal is intended to be solved by adding D to the current text and then solving G. This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OWL-T: An Ontology-based Task Template Language for Modeling Business Processes

    Publication Year: 2007 , Page(s): 101 - 108
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (328 KB) |  | HTML iconHTML  

    With the growth of business demands, it becomes crucial to compose existing services in order to create new value added applications. Some languages like BPEL, WSCI enable creating complex composite services but they only allow static, manual composition. Basing on semantic technologies, many researchers have proposed (semi-)automatic methods for service composition, which often rely on a close wo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.