By Topic

Web Site Evolution, 2008. WSE 2008. 10th International Symposium on

Date 3-4 Oct. 2008

Filter Results

Displaying Results 1 - 22 of 22
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (350 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (207 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Welcome from the Chairs

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (851 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organization

    Publication Year: 2008, Page(s):vii - ix
    Request permission for commercial reuse | PDF file iconPDF (243 KB)
    Freely Available from IEEE
  • Requirement engineering for Web applications

    Publication Year: 2008, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (57 KB)

    With the rapid development of service computing technology, Web Application Development (WAD) is getting rid of heavy programming labor and replacing it with resource aggregation to reuse available services on the Internet. Thus, designing and programming phases will no longer account for a big ratio in software development lifecycle. Rather, requirements engineering (RE), a phase that comes befor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic model extraction and statistical analysis of Web applications: Follow-up after 6 years

    Publication Year: 2008, Page(s):3 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    In 2002 we proposed a method to reverse engineer a Web application model. The proposed method deals with dynamic Web applications, consisting of server components, typically interacting with a persistent layer, which build the Web pages displayed on the browser dynamically. Dynamic analysis and page merging heuristics were used for model extraction. The proposed model was successfully adopted in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ten years of Web Site Evolution

    Publication Year: 2008, Page(s):11 - 17
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (410 KB) | HTML iconHTML

    From its inception in 1999 to its tenth anniversary in 2008, the Web site evolution (WSE) series of events have provided a forum for researchers and practitioners to present original work on subjects related to the disciplined evolution of large-scale Web sites. This paper summarizes the activities of WSE during the last five years (2003- 2008). The paper also discusses the need for continued enha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • COB2WEB a toolset for migrating to web services

    Publication Year: 2008, Page(s):19 - 25
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    This paper describes a tool set for constructing web services from existing main frame COBOL programs. The first tool - COBAudit - is intended to identify candidates for web services. The second tool - COBStrip - serves to extract only that portion of the code required to fulfill the service. The third tool - COBWrap - wraps the code extracted from original code and converts it to an executable co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transforming a Java application in an equivalent Web-services based application: Toward a tool supported stepwise approach

    Publication Year: 2008, Page(s):27 - 36
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1366 KB) | HTML iconHTML

    Migration of legacy applications toward service-oriented systems is a hard task complicated by the lack of appropriate approaches and tools able to drive step by step a developer in the process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining candidate web services from legacy code

    Publication Year: 2008, Page(s):37 - 40
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Mining services from existing software system is a relevant challenge to enable the development of service-oriented systems. Very often, although a service realizing a feature needed to develop a service-oriented system is not available, such a feature might have been implemented in existing software systems. This paper proposes an approach for the identification of services in existing legacy cod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model driven approach toward business process test case generation

    Publication Year: 2008, Page(s):41 - 44
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    Web service based business process has become the backbone of enterprise information system, and it is evolving all the time. Therefore, the process has to be tested thoroughly and repeatedly whenever it is changed. This paper proposes a model driven approach toward generating executable test case from the given business process. The approach is composite of three stages: defining a process under ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Consistent Web site updating based on bidirectional transformation

    Publication Year: 2008, Page(s):45 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1590 KB) | HTML iconHTML

    A transformation-based Web site can keep the content of a Web site consistent by furnishing a single database and a set of transformation programs, each of which generates a Web page. However, when someone notices an error or stale content on a Web page in this style of Web site construction, the Web site maintainer must access a possibly huge database to update the corresponding content. This pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Semantic clustering to enhance the navigation structure of Web sites

    Publication Year: 2008, Page(s):55 - 64
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (558 KB) | HTML iconHTML

    This paper presents an automatic approach based on semantic clustering to enhance the navigation structure of Web sites. The approach extends the navigation structure of a Web site by introducing a set of links that enable the navigation from each page of the site to other pages showing similar or related content. The approach uses Latent Semantic Indexing to compute a dissimilarity measure betwee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A seamless and reliable distributed network file system utilizing webspace

    Publication Year: 2008, Page(s):65 - 68
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    A distributed file system integrates the storage devices on the network and stores files on remote file servers so that clients can access them through Internet anytime and anywhere. However, to ensure the reliability and security of critical data, the maintenance cost is usually high. Some researches propose solutions to use Webspace as storage. These are efficient for individual users or small e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web-based system evolution in model driven architecture

    Publication Year: 2008, Page(s):69 - 72
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (977 KB) | HTML iconHTML

    The complexity and size of commercial Web-based systems present a grand challenge to the traditional methodology of software evolution. The booming development of Web related technologies complicates the situation. This research presents a unified solution to Web-based system evolution, which consists of three components: Web-based systems understanding, Web-based systems representation and evolva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution of legal statements on the web

    Publication Year: 2008, Page(s):73 - 82
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    In this paper we propose to study the evolution of legal statements that can be found in Web sites. Legal statements are an important part of each Web site because they can be seen as a contract between the owner of the site and its users. For example, a sitepsilas privacy policy explains what kind of data is collected from users by the operator and how it is processed. Operators use terms of use ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research challenges in management and compliance of policies on the web

    Publication Year: 2008, Page(s):83 - 92
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    In this paper we argue that policies are an increasing concern for organizations that are operating a web site. Examples of policies that are relevant in the domain of the web address issues such as privacy of personal data, accessibility for the disabled, user conduct, e-commerce, and intellectual property. Web site policies-and the overarching concept of web site governance-are cross-cutting con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative study of maintainability of web applications on J2EE, .NET and Ruby on Rails

    Publication Year: 2008, Page(s):93 - 99
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (811 KB) | HTML iconHTML

    With Web services predicted to become distributed computing architecture in near future, maintainability of the Web applications (WAs) will rank high on selection criteria while choosing a platform for development of a WA. The goal of this paper is to evaluate maintainability of small-scale WAs built on J2EE, .NET and Ruby On Rails (RoR). The maintainability criteria considered comprised of modifi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering of Web Applications to abstract user-centered conceptual models

    Publication Year: 2008, Page(s):101 - 110
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    The ubiquitous Web applications (UWA) Hyperbase model is a user-centered conceptual model representing the contents of a Web application, their organization in terms of entities and components, and the semantic associations between entities from which navigation paths are derived. Such a model may provide useful support for the software engineer during maintenance and evolution tasks. This paper p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach for estimating code changes in e-commerce applications

    Publication Year: 2008, Page(s):111 - 120
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (507 KB) | HTML iconHTML

    E-commerce applications automate various business processes within an organization. To maintain a competitive edge, business analysts frequently modify business processes. Determining the effort for modifying a business process is not a trivial task, since the changes to the business process will result in changes to the source code for which the business analyst has limited knowledge. In this pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Usability analysis and visualization of Web 2.0 applications

    Publication Year: 2008, Page(s):121 - 124
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    Nowadays companies and home users use Web sites offering services ranging from Web sites up to complex Web applications. Often the ergonomics of these applications remains unconsidered and they turn out to be hard to use. In order to examine the usability from within the Web applications, information about the usage of the application is collected. The techniques that have been used in the past fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.