By Topic

Seventh International Conference on Quality Software (QSIC 2007)

Date 11-12 Oct. 2007

Filter Results

Displaying Results 1 - 25 of 71
  • Seventh International Conference on Quality Software - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (252 KB)
    Freely Available from IEEE
  • Seventh International Conference on Quality Software - Title page

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Seventh International Conference on Quality Software - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • Seventh International Conference on Quality Software - Table of contents

    Publication Year: 2007, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • Welcome Message from the General Chair

    Publication Year: 2007, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (49 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Co-Chairs

    Publication Year: 2007, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (46 KB) | HTML iconHTML
    Freely Available from IEEE
  • QSIC 2007 Conference Committees

    Publication Year: 2007, Page(s):xv - xvii
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2007, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • Keynote Speeches

    Publication Year: 2007, Page(s): xix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (35 KB) | HTML iconHTML

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distinguished Plenary Panel

    Publication Year: 2007, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • First International Workshop on Software Test Evaluation (STEV 2007) Committees

    Publication Year: 2007, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Software Quality: Past, Present, and Future

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (53 KB) | HTML iconHTML

    Computing power that once required a large room and a host of careful attendants is now embedded in wristwatches, cell phones and pacemakers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proposition for E-DoD: An Overall Plan for Network-Centric Operation

    Publication Year: 2007, Page(s): 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (51 KB) | HTML iconHTML

    DoD currently has a crisis of software economics. As software becomes complex, our ability to design,develop, produce, distribute, and maintain software isbeing increasingly challenged. This crisis shows every sign of deepening in the future. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Computing and Quality Software

    Publication Year: 2007, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (54 KB) | HTML iconHTML

    The field Semantic Computing applies technolo- gies in natural language processing, data and knowledge engineering, software engineering, computer systems and networks, signal processing and pattern recogni- tion, and any combination of the above to extract, access, transform and synthesize the semantics as well as the contents of multimedia, texts, services and structured data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing Adaptive Software with Multiple QoS Requirements

    Publication Year: 2007, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (51 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing Non-Functional Requirements with Aspects: An Industrial Case Study

    Publication Year: 2007, Page(s):5 - 14
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (598 KB) | HTML iconHTML

    Testing is regarded as one of the most resource consuming tasks of an average software project. A common goal of testing related activities is to make sure that requirements are satisfied by the implementation. Although existing tools are often effective in functional testing, emerging nonfunctional requirements set new demands. Aspect-oriented techniques offer a promising approach for capturing s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Test Case Prioritization Based on Varying Testing Requirement Priorities and Test Case Costs

    Publication Year: 2007, Page(s):15 - 24
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    Test case prioritization is an effective and practical technique in regression testing. It schedules test cases in order of precedence that increases their ability to meet some performance goals, such as code coverage, rate of fault detection. In previous work, the test case prioritization techniques and metrics usually assumed that testing requirement priorities and test case costs are uniform. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Model-Checkers for Software Testing

    Publication Year: 2007, Page(s):25 - 31
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (137 KB) | HTML iconHTML

    In recent years, automated test-case generation with model-checkers has seen increasing attention in the research community. The use of model-checkers for testing offers full automation, a choice of different methods to derive test-suites, and is efficient under certain preconditions. Model-checkers, however, were not originally intended for this task. Therefore, there are several drawbacks that a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Test-Driven Component Integration with UML 2.0 Testing and Monitoring Profile

    Publication Year: 2007, Page(s):32 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    Test-driven development (TDD) is a software development methodology for achieving high reliability. However, the practice of TDD at the integration level is rare. In this paper, we propose a test-driven component integration approach with the support of UML 2.0 Testing and Monitoring Profile (U2TMP) that is also proposed in this paper. In our approach, automated integration-level test cases are sp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A QoS-Enabled WorkManager Model for Web Application Servers

    Publication Year: 2007, Page(s):40 - 49
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (527 KB) | HTML iconHTML

    The overload of Web application servers (WAS) is a typical and critical problem encountered in nowaday Web commerce. This problem imposes greater demands on WAS to provide QoS support under overload conditions. However, even with a practical solution, the implementation of a flexible QoS model to enable finegrained QoS control in WAS is still a challenging task. In this paper we propose a QoS-enab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Automatic Measurement of Probabilistic Processes

    Publication Year: 2007, Page(s):50 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB) | HTML iconHTML

    In this paper we propose a metric for finite processes in a probabilistic extension of CSP. The kernel of the metric corresponds to trace equivalence and most of the operators in the process algebra is shown to satisfy non-expansiveness property with respect to this metric. We also provide an algorithm to calculate the distance between two processes to a prescribed discount factor in polynomial ti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Pattern-Based Constraint Description Approach for Web Services

    Publication Year: 2007, Page(s):60 - 69
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    Current WSDL-based description specifies only the operation signatures and locations of Web services. It is widely recognized that a richer description is needed. WS-security, WS-reliable, WSOL, and service interaction protocols are all typical efforts toward this direction. Based on the cognition that a complete description of service is impossible, this paper proposes a pattern based constraint ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Requirements Elicitation via Weaving Scenarios Based on Security Evaluation Criteria

    Publication Year: 2007, Page(s):70 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    Software is required to comply with the laws and standards of software security. However, stakeholders with less concern regarding security can neither describe the behaviour of the system with regard to security nor validate the system's behaviour when the security function conflicts with usability. Scenarios or use- case specifications are common in requirements elicitation and are useful to ana... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model Checking Security Pattern Compositions

    Publication Year: 2007, Page(s):80 - 89
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (405 KB) | HTML iconHTML

    Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system design may apply many security patterns to solve different problems. Although each security pattern describes a good design guideline, the compositions of these security patterns may not be consistent and encounter proble... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-Time Component Composition Using Hierarchical Timed Automata

    Publication Year: 2007, Page(s):90 - 99
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (429 KB) | HTML iconHTML

    In component-based software development, it is important to use formal models to describe component composition. However, the existing component composition models generally ignore real-time issues. We present a formal integration model based on Hierarchical Timed Automata (HTA) for real-time software system. We present formal definition of components and different component composition techniques... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.