By Topic

Software Engineering Research, Management and Applications, 2008. SERA '08. Sixth International Conference on

Date 20-22 Aug. 2008

Filter Results

Displaying Results 1 - 25 of 48
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (178 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Message from Conference Chairs

    Publication Year: 2008, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (115 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chairs

    Publication Year: 2008, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (107 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organizing Committee

    Publication Year: 2008, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • International Program Committee

    Publication Year: 2008, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • Keynote Address One

    Publication Year: 2008, Page(s):xiv - xvi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Address Two

    Publication Year: 2008, Page(s):xvii - xviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring the Social Ability of Software Agents

    Publication Year: 2008, Page(s):3 - 10
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    To evaluate the global quality of a software agent it is necessary to define appropriate quality characteristics and to determine a set of measures for these features. A comprehensive set of measures has not yet been developed for agent-oriented software. However, some software measures have been adopted from other software paradigms, especially from the object-oriented paradigm because they have ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Message Streaming Network Components Architecture and In-Network Programming Model

    Publication Year: 2008, Page(s):11 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    Many network devices implement capabilities to manipulate traffic depending on the application. Examples include a firewall or a load balancer. These are based on Layer 2-4 packet-based classifications such as port or protocol, or signature recognition. Although configurable or extensible via scripting, they are not generally programmable. We present an architecture extending classification to pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Deployment of Distributed Software Components with Fault Tolerance Guarantees

    Publication Year: 2008, Page(s):21 - 27
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    In this paper, an MILP-based methodology is presented that allows to optimize the deployment of a set of software components over a set of computing resources, with respect to fault tolerance and response times. The MILP model takes into account the reliability and performance parameters of hardware nodes and links, and optimizes a (configurable) trade-off between reliability and performance by re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on Design for Testability in Component-Based Embedded Software

    Publication Year: 2008, Page(s):31 - 38
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    Effective implementation of test automation requires taking testing into account in the system design. In short, this is called design for testability (DFT). In this paper a study on DFT in component-based embedded software is presented, based on the interviews and technical documentation from two large-scale companies in the European telecom industry. The way test automation is addressed and the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Analysis of Missed Structure Field Handling Bugs

    Publication Year: 2008, Page(s):41 - 48
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    Despite the importance and prevalence of structures (or records) in programming, no study till now has deeply analyzed the bugs made in their usage. This paper makes a first step to fill that gap by systematically and deeply analyzing a subset of structure usage bugs. The subset, referred to as MSFH bugs, are errors of omission associated with structure fields when they are handled in a grouped co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and Validation of Executable Requirements Using Live Activity Diagrams

    Publication Year: 2008, Page(s):51 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    A seamless model-based methodology for requirements specification becomes increasingly the key to successful software systems engineering. The enhanced activity diagrams of UML 2 offer a promising intuitive modeling approach for requirements capturing. On this basis, we propose a formal syntax and operational semantics and extend activity diagrams to LADs (Live Activity Diagrams) by liveness-enric... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Model-Driven Development of Mobile Business Processes

    Publication Year: 2008, Page(s):59 - 66
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (467 KB) | HTML iconHTML

    Web services are becoming an integral part of service and workflow systems even within mobile devices. A mobile business process is a special case of a business process where most of the human interaction is performed using mobile devices. Mobile business processes should be adaptable to different mobile devices and to support user interaction with different client applications. Requirements comin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel Implementation of DPCM Decoding for SMP Systems

    Publication Year: 2008, Page(s):69 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    DPCM (differential pulse code modulation) coding is widely used in many applications including lossless JPEG compression. DPCM decoding is inherently a 1-indexed or 2-indexed recurrence relation. Thus, although it is hard to parallelize efficiently, some (N log N)or (log2 N) algorithms have been studied for an N times N image with N times N or N processors. Recently commodity microproce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compliance of CMMI Process Area  with Specification Based Development

    Publication Year: 2008, Page(s):77 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    The development of reliable systems is still a major challenge for software industry. Construction of such a system requires both process and product based quality assurance. Many process improvement models have been suggested in industry and found appropriate for achieving high quality products. Examples of such process improvement models are CMM/CMMI, Agile, SPICE, the ISO 9000 family etc. Howev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Use of Object Orientation to Define Process Models

    Publication Year: 2008, Page(s):85 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    Software development processes are distinct and not standardized because software users have distinct interests and software companies differ in culture, business and technical procedures, and quality parameters. This scenario exposes the need to define process models to be used as standard but that can be tailored according to project and software company characteristics. In the proposal of this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Formalization and Verification of Unified Business Process Model Based on Pi Calculus

    Publication Year: 2008, Page(s):93 - 101
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    Nowadays, workflow modeling and analysis has become the focus of study with growing demands on business process management (BPM). In this paper, after defining basic elements (task, user, resource and constraint) of business process, then we propose a formal modeling method of unified business process based on the process algebra language-Pi calculus, integrating tasks, users and resources. Beside... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptation of Refactoring Strategies to Multiple Axes of Modularity: Characteristics and Criteria

    Publication Year: 2008, Page(s):105 - 114
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    In object-oriented programming, the adoption of modules as mixins provides a second axis of modularity. Furthermore, support for aspect-oriented programming introduces a third such axis. In this paper we define criteria under which a feature should be placed in a given unit of modularity and investigate the degree to which the presence of multiple dimensions of modularity affects existing refactor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparative Review of Processes for Research Development on Applied Computing

    Publication Year: 2008, Page(s):117 - 124
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (577 KB) | HTML iconHTML

    The increasing volume of research projects on applied computing is a motivation for analyzing processes which are used to develop such projects. There are significative differences between research projects on applied computing and industrial software projects, for example, in research domain there is the interest in prototype development instead of product development. As a consequence,definition... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Theoretical Agile Process Framework for Web Applications Development in Small Software Firms

    Publication Year: 2008, Page(s):125 - 132
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (435 KB) | HTML iconHTML

    As Web based-applications become increasingly important to all aspects of life, there is a need to encourage practitioners to adopt best practices so as to improve the quality of the processes in use, and therefore achieve targets related to time, budget and quality. The Web development industry worldwide is dominated by a myriad of small firms. This presents a challenge in terms of determining th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.