By Topic

Web Site Evolution, 2008. WSE 2008. 10th International Symposium on

Date 3-4 Oct. 2008

Filter Results

Displaying Results 1 - 22 of 22
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (350 KB)  
    Freely Available from IEEE
  • [Title page]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (207 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Save to Project icon | Request Permissions | PDF file iconPDF (82 KB)  
    Freely Available from IEEE
  • Welcome from the Chairs

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (851 KB)  
    Freely Available from IEEE
  • Organization

    Page(s): vii - ix
    Save to Project icon | Request Permissions | PDF file iconPDF (243 KB)  
    Freely Available from IEEE
  • Requirement engineering for Web applications

    Page(s): 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (57 KB)  

    With the rapid development of service computing technology, Web Application Development (WAD) is getting rid of heavy programming labor and replacing it with resource aggregation to reuse available services on the Internet. Thus, designing and programming phases will no longer account for a big ratio in software development lifecycle. Rather, requirements engineering (RE), a phase that comes before design and programming, will play a more important role that determines the success of WAD. In fact requirements engineering should be as complex and well thought out as the design and programming, yet its insufficiencies have led to many projects with poor requirements and blamed as the major reason for many software failures. Therefore, requirements engineering is now moving to the forefront gaining increased significance in software engineering for services oriented web applications. Web applications requirements have new characteristics causing them to change more rapidly. This makes traditional requirements modeling and validation methods insufficient to provide adequate support for web applications. The requirements of the web applications come from not only the general domain analysis and the personalized, diverse users' requirements, but also the availability of the related web services. Web applications requirements are also evolving while they are widely used. Therefore, RE for Web applications (RE4Webapp) is challenged to explore sound engineering approaches for eliciting (identifying), describing, validating and managing requirements of Web applications. Our investigating of RE4Webapp is based on a hierarchical and cooperative requirements engineering framework named RGPS-C, which is a cyclical model consisting of four layers, namely Role, Goal, Process and Service. Based on this model, we will discuss the challenges and principles for RE4Webapp fundamental activities in the cyclical process, including requirement elicitation, analysis, evolution, validation,- - and management. In the cyclical process ofRE4Webapp, requirements validation is a crucial activity to ensure high-quality requirements. Based on RGPS-C model, a framework is provided to examine the factors involved in validating requirements, delineate some issues and problems in validating requirements and puts forth some possible areas for further research in requirements validation as connected to user satisfaction, especially for services oriented web applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic model extraction and statistical analysis of Web applications: Follow-up after 6 years

    Page(s): 3 - 10
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (250 KB) |  | HTML iconHTML  

    In 2002 we proposed a method to reverse engineer a Web application model. The proposed method deals with dynamic Web applications, consisting of server components, typically interacting with a persistent layer, which build the Web pages displayed on the browser dynamically. Dynamic analysis and page merging heuristics were used for model extraction. The proposed model was successfully adopted in the Web analysis and testing research community. However, the features of future Web applications (involving rich client components and asynchronous communication with the server) challenge its future applicability. In this paper, we analyze the key properties of the 2002 model and identify those modeling decisions that remain valid and can be used to guide the extraction of models for future Web applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ten years of Web Site Evolution

    Page(s): 11 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (410 KB) |  | HTML iconHTML  

    From its inception in 1999 to its tenth anniversary in 2008, the Web site evolution (WSE) series of events have provided a forum for researchers and practitioners to present original work on subjects related to the disciplined evolution of large-scale Web sites. This paper summarizes the activities of WSE during the last five years (2003- 2008). The paper also discusses the need for continued enhancements to the education of future ldquorenaissance software engineersrdquo to work effectively in the area. Some of the research challenges for the next few years are also outlined. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • COB2WEB a toolset for migrating to web services

    Page(s): 19 - 25
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (374 KB) |  | HTML iconHTML  

    This paper describes a tool set for constructing web services from existing main frame COBOL programs. The first tool - COBAudit - is intended to identify candidates for web services. The second tool - COBStrip - serves to extract only that portion of the code required to fulfill the service. The third tool - COBWrap - wraps the code extracted from original code and converts it to an executable component. The fourth tool - COBLink - connects the wrapped component to the web by generating a WSDL interface. The tools are currently under test within a project for a German financial service with an insurance system of 25 million lines of COBOL code running under IMS on the IBM mainframe. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transforming a Java application in an equivalent Web-services based application: Toward a tool supported stepwise approach

    Page(s): 27 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1366 KB) |  | HTML iconHTML  

    Migration of legacy applications toward service-oriented systems is a hard task complicated by the lack of appropriate approaches and tools able to drive step by step a developer in the process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining candidate web services from legacy code

    Page(s): 37 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (312 KB) |  | HTML iconHTML  

    Mining services from existing software system is a relevant challenge to enable the development of service-oriented systems. Very often, although a service realizing a feature needed to develop a service-oriented system is not available, such a feature might have been implemented in existing software systems. This paper proposes an approach for the identification of services in existing legacy code. The approach combines the use of textual similarity between a free-text query and the text extracted from the legacy code with a structural matching between a goal, expressed as a WSDL document, and XML-based interfaces of features reverse engineered from the source code. A performance assessment has been performed on two open source projects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model driven approach toward business process test case generation

    Page(s): 41 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (247 KB) |  | HTML iconHTML  

    Web service based business process has become the backbone of enterprise information system, and it is evolving all the time. Therefore, the process has to be tested thoroughly and repeatedly whenever it is changed. This paper proposes a model driven approach toward generating executable test case from the given business process. The approach is composite of three stages: defining a process under test based on the business process model, transforming from process under test to abstract test cases and from abstract test cases to executable test cases. To implement the approach, a business process model based on the BPEL specification and UML2.0 activity diagram and a test case model based on U2TP framework and TTCN-3 key concepts are defined to have the ability to define the business process and the abstract test case. In order to validate the approach, a loan request process is used to show how the approach work and how the test cases are generated. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Consistent Web site updating based on bidirectional transformation

    Page(s): 45 - 54
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1590 KB) |  | HTML iconHTML  

    A transformation-based Web site can keep the content of a Web site consistent by furnishing a single database and a set of transformation programs, each of which generates a Web page. However, when someone notices an error or stale content on a Web page in this style of Web site construction, the Web site maintainer must access a possibly huge database to update the corresponding content. This paper proposes a new approach to Web site construction based on bidirectional transformation, together with a practical updating system, Vu-X. Because of the bidirectionality of the transformations, users can directly modify a generated Web page rather than accessing the database and the modification is automatically reflected in the database. The Vu-X system is also implemented as a Web server so that users can edit it in WYSIWYG style on their Web browsers. Since the Vu-X system employs a bidirectional transformation language Bi-X to describe bidirectional transformations, we can obtain both transformations only by specifying a transformation in one direction. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Semantic clustering to enhance the navigation structure of Web sites

    Page(s): 55 - 64
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (558 KB) |  | HTML iconHTML  

    This paper presents an automatic approach based on semantic clustering to enhance the navigation structure of Web sites. The approach extends the navigation structure of a Web site by introducing a set of links that enable the navigation from each page of the site to other pages showing similar or related content. The approach uses Latent Semantic Indexing to compute a dissimilarity measure between the pages of the site and a Graph-Theoretic clustering algorithm to group pages having similar or related content. The additional links connecting each page of the site to the others within the same cluster are dynamically injected into each page by using AJAX code. A prototype of a supporting tool and the results from a case study conducted to assess the feasibility of the approach are also presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A seamless and reliable distributed network file system utilizing webspace

    Page(s): 65 - 68
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (227 KB) |  | HTML iconHTML  

    A distributed file system integrates the storage devices on the network and stores files on remote file servers so that clients can access them through Internet anytime and anywhere. However, to ensure the reliability and security of critical data, the maintenance cost is usually high. Some researches propose solutions to use Webspace as storage. These are efficient for individual users or small enterprises. However, these solutions have three drawbacks: 1) they support only single specific Webspace, 2) they can not ensure data confidentiality, and 3) they can not ensure data reliability. This paper introduces a distributed file system, the general file system (GFS), which integrates the advantage of distributed file system and the convenience of Webspace. GFS also integrates several heterogeneous spaces and promises the reliability and security. Besides, for users, it is easy to operate GFS through the interface provided by the virtual file system. At the end, the experiments result shows that GFS outperform than other solutions using Webspace. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web-based system evolution in model driven architecture

    Page(s): 69 - 72
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (977 KB) |  | HTML iconHTML  

    The complexity and size of commercial Web-based systems present a grand challenge to the traditional methodology of software evolution. The booming development of Web related technologies complicates the situation. This research presents a unified solution to Web-based system evolution, which consists of three components: Web-based systems understanding, Web-based systems representation and evolvable Web application framework. A comprehensive case study will be given to evaluate the proposed solution in different aspects. Conclusion is drawn based on analysis, which verifies the feasibility of the proposed solution. Further research areas are also discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution of legal statements on the web

    Page(s): 73 - 82
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (316 KB) |  | HTML iconHTML  

    In this paper we propose to study the evolution of legal statements that can be found in Web sites. Legal statements are an important part of each Web site because they can be seen as a contract between the owner of the site and its users. For example, a sitepsilas privacy policy explains what kind of data is collected from users by the operator and how it is processed. Operators use terms of use to put restrictions on the conduct of users. In this paper we describe our proposal for a research agenda and methodology that analyzes the evolution of legal statements on the Web. The research agenda argues that studying the content of legal statements and how they change over time allows to analyze and understand the evolution of the Web from different viewpoints. Specifically, changing legal statements allow to identify emerging legal developments, to expose shifting business objectives, and to track the balance of power between operators and users. Our suggested methodology proposes to obtain historical snapshots of Web sites available in the Internet Archive, to group them into different classes, and to analyze the content of the legal document as well as to compute metrics such as size and readability scores. The obtained data can then be used to formulate hypotheses about the evolution of certain characteristics of the Web. We discuss a pilot study that instantiates our methodology. This study is based on five snapshots of 15 different Web sites, and it shows that the methodology is feasible and can generate meaningful results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research challenges in management and compliance of policies on the web

    Page(s): 83 - 92
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (275 KB) |  | HTML iconHTML  

    In this paper we argue that policies are an increasing concern for organizations that are operating a web site. Examples of policies that are relevant in the domain of the web address issues such as privacy of personal data, accessibility for the disabled, user conduct, e-commerce, and intellectual property. Web site policies-and the overarching concept of web site governance-are cross-cutting concerns that have to be addressed and implemented at different levels (e.g., policy documents, legal statements, business processes, contracts, auditing, and software systems). For web sites, policies are also reflected in the legal statements that the web site posts, and in the behavior and features that the web site offers to its users. Both policies and software tend to evolve independently, but at the same time they both have to be kept in sync. This is a practical challenge for operators of web sites that is poorly addressed right now and is, we believe, a promising avenue for future research. In this paper, we discuss various challenges that policy poses for web sites with an emphasis on privacy and data protection and identify open issues for future research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative study of maintainability of web applications on J2EE, .NET and Ruby on Rails

    Page(s): 93 - 99
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (811 KB) |  | HTML iconHTML  

    With Web services predicted to become distributed computing architecture in near future, maintainability of the Web applications (WAs) will rank high on selection criteria while choosing a platform for development of a WA. The goal of this paper is to evaluate maintainability of small-scale WAs built on J2EE, .NET and Ruby On Rails (RoR). The maintainability criteria considered comprised of modifiability, testability, understandability and portability. We found that the RoR implementation fared better on modifiability, testability, and understandability, while J2EE implementation was the most portable. The results led us to comment on the maintainability of small WAs with respect to underlying architecture and development environments the three platforms provide. We believe that results are expected to vary for medium and large-size WAs. The work included here is part of an effort to build a decision framework for platform selection for WAs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering of Web Applications to abstract user-centered conceptual models

    Page(s): 101 - 110
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (445 KB) |  | HTML iconHTML  

    The ubiquitous Web applications (UWA) Hyperbase model is a user-centered conceptual model representing the contents of a Web application, their organization in terms of entities and components, and the semantic associations between entities from which navigation paths are derived. Such a model may provide useful support for the software engineer during maintenance and evolution tasks. This paper presents a strategy for the semi-automatic abstraction of UWA Hyperbase models from existing Web applications. The results from a case study, involving four applications from real world, carried out to assess the effectiveness of the strategy are also presented and discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach for estimating code changes in e-commerce applications

    Page(s): 111 - 120
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (507 KB) |  | HTML iconHTML  

    E-commerce applications automate various business processes within an organization. To maintain a competitive edge, business analysts frequently modify business processes. Determining the effort for modifying a business process is not a trivial task, since the changes to the business process will result in changes to the source code for which the business analyst has limited knowledge. In this paper, we propose an approach for tracing the propagation of a change from the business process level to the code. We derive a change impact metric which estimates the code to be modified as a result of a business process change. A case study, using a large e-commerce application from the OFBiz open source project, demonstrates the effectiveness of our proposed change impact metric. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Usability analysis and visualization of Web 2.0 applications

    Page(s): 121 - 124
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (225 KB) |  | HTML iconHTML  

    Nowadays companies and home users use Web sites offering services ranging from Web sites up to complex Web applications. Often the ergonomics of these applications remains unconsidered and they turn out to be hard to use. In order to examine the usability from within the Web applications, information about the usage of the application is collected. The techniques that have been used in the past for Web 1.0 are no longer adequate. Ajax programs (Web 2.0) are more flexible and require other techniques. This paper shows techniques for collection, analysis, processing and visualization of data for Web 2.0 applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.