By Topic

Advanced Software Engineering and Its Applications, 2008. ASEA 2008

Date 13-15 Dec. 2008

Filter Results

Displaying Results 1 - 25 of 66
  • [Front cover]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (348 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (28 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (64 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (44 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - viii
    Save to Project icon | Request Permissions | PDF file iconPDF (121 KB)  
    Freely Available from IEEE
  • ASEA 2008

    Page(s): ix - xii
    Save to Project icon | Request Permissions | PDF file iconPDF (107 KB)  
    Freely Available from IEEE
  • Model-Based Test Suite Reduction with Concept Lattice

    Page(s): 3 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (292 KB) |  | HTML iconHTML  

    Model-based testing refers to deriving a suite of test cases from a model that represents the behavior of a software system. As there may be large, sometimes infinite, number of operational scenarios that could be generated from a given model, an important issue of model-based testing is to determine a minimal set of test cases which provides sufficient test coverage. With formal concept analysis (FCA) mechanism, we could analyze the coverage of the test cases and eliminate those redundant ones. This systematic approach can help reduce the test suite whilst still maintain the sufficiency of test coverage. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Method of Data Quality Evaluation Using Metadata Registry

    Page(s): 9 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (282 KB) |  | HTML iconHTML  

    This paper proposes MDRDP (Metadata Registry based on Data Profiling) to minimize the time and human resource for analyzing and extracting metadata as criteria standard for data profiling. MDRDP is based on MDR (Metadata Registry) which is used for an international standard of standardizing and managing metadata for information sharing in various fields. By MDRDP, we can evaluate data quality with authorize metadata using methodology of data profiling. MDR can guarantee the quality of metadata so that results of quality evaluation would improve. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Garbage Collection Schemes for Flash-Based Linux Swap System

    Page(s): 13 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (240 KB) |  | HTML iconHTML  

    NAND flash memory based SSDs (solid state disks) have become an alternative storage device for future computer systems. Legacy operating system functionalities like file system and virtual memory system should be carefully re-designed since flash memory cannot be overwritten unless erased in advance. In this paper, we study the performance of garbage collection schemes when flash memory is used as the Linux swap storage. We have collected swap I/O traces from Linux kernel and performed trace-driven simulation. We found that Linux swap system must be re-designed in order to use flash memory as swap storage. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Determine Software Requirement Construction Sequences Based on Use Cases

    Page(s): 17 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (250 KB) |  | HTML iconHTML  

    The majority of software development projects utilize the use cases technique to define software requirements, which are necessary to determine not only the scope of the software itself, but also the sequence in which this software will be constructed. Currently, there are several proposals to define the construction sequence of software requirements, but most of these proposals lack of ease of use from the developerpsilas perspective. This paper presents an approach to determine software construction sequences based on use cases precedence diagrams, which offers some advantages from the developerpsilas point of view. In order to demonstrate the technique, we also present a controlled experiment performed by people who had at least two years of experience in software projects. The results of this experiment show that our proposed technique, unlike other ad hoc techniques used, enables a more precise definition of the construction sequence. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Information Acquisition Method Based on NetFlow for Network Situation Awareness

    Page(s): 23 - 26
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (226 KB) |  | HTML iconHTML  

    Network situation information acquisition plays an important role in the entire process of network situation awareness. In this paper, we presented a multi-level, multi-perspective and multi-granularity traffic information acquisition method to get traffic information. In addition, we presented a multi-layer detection model that combines baseline based detection layer and signature based detection layer to acquire security incident information. Accordingly, we profiled portpsilas normal behavior for baseline based detection by statistical method and established an incident signature base for signature based detection. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution Strategy Based Automated Software Clustering Approach

    Page(s): 27 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (537 KB) |  | HTML iconHTML  

    In the software development life cycle, maintenance is a key phase that determines long term and effective use of any software. Maintenance can become very lengthy and costly for large software systems when structure of the system is complicated. One of the factors complicating the structure of the software system is subsystem boundaries becoming ambiguous due to system evolution, lack of up to date documentation and high turn over rate of software professionals (leading to non availability of original designers of the software systems). Software module clustering helps software professionals to recover high-level structure of the system by decomposing the system into smaller manageable subsystems, containing interdependent modules. Automated approaches simplify the software clustering process, which otherwise is quite a tedious task for medium and large software systems. We treat software clustering as an optimization problem and propose an automated technique to get near optimal decompositions of relatively independent subsystems, containing interdependent modules. We propose the use of self adaptive Evolution Strategies to search a large solution space consisting of modules and their relationships. We compare our proposed approach with a widely used genetic algorithm based approach on a number of test systems. Our proposed approach shows considerable improvement in terms of quality and effectiveness of the solutions for all tests cases. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Code Generation of an XForms Client for Service Integration

    Page(s): 35 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (311 KB) |  | HTML iconHTML  

    A Web service integrating mobile client applications requires a complex user interface, which usually consists of more than one view. Moreover, it should provide a way to navigate between the views. In this paper, we presented a formal way to analyze a set of views for a given service specification, and a model for the relationship between views and methods. We then provided an algorithm to generate codes for service method calls and navigation between views. Therefore, with an optional user configuration input, we could almost instantly generate XForms codes from the Web service specifications. Finally, we developed a proof-of-concept implementation of an XForms-based service architecture, to show that the generated code works well as an interface for Web service integrations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research about Two-Level Cache Base on SDRAM in RAID Controller

    Page(s): 41 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (280 KB) |  | HTML iconHTML  

    In RAID system, the disk cache for improving RAID system performance is a very important aspect. Two-level cache displays superior performance in comparison to single cache and is effective in temporal and spatial locality. The proposed cache system in this paper consists in two levels. The first level cache is a set associative cache with small block size whereas the second level cache is a fully associative cache with large block size. In this paper, a RAID disk cache model is presented that is located on a disk controller, which can improve disk input and output time especially in a large capacity disk cache and maintain consistency effectively. The aim is to show, in terms of hit ratio and service time, that the two-level cache structure presented in this paper is in fact much improved. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Assessment of the Reliability of a Fault Tolerant Model Using AADL

    Page(s): 45 - 52
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (514 KB) |  | HTML iconHTML  

    In order to solve the problem of the assessment of the reliability of the fault tolerant system, the work in this paper is devoted to analyze a subsystem of ATC (air traffic control system), and use AADL (architecture analysis and design language) to build its model. After describing the various software and hardware error states and as well as error propagation from hardware to software, the work builds the AADL error model and convert it to GSPN (general stochastic Petri net). Using current Petri Net technology to assess the reliability of the fault tolerant system which is based on ATC as the background, this paper receives good result of the experiment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aspect-Oriented Analysis for Embedded Real-Time Systems

    Page(s): 53 - 56
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (274 KB) |  | HTML iconHTML  

    Aspect-oriented programming technology implements the software systems using crosscutting. Aspect-orientation can be modeled by extending UML, and AOSD model profile can be designed in the meta -model. The profile builds the aspect models from structural model, behavioral model, aspect and aspect weaving. Timing requirements could be separated from the system according the separation of concerns techniques, expressed as a time-aspect independence of the system, the real-time systems could be modeled from the static structure, dynamic behaviors and weaving of the time-aspect. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey of Consistency Checking Techniques for UML Models

    Page(s): 57 - 62
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (245 KB) |  | HTML iconHTML  

    UML is the de-facto industry standard to design object-oriented software. UML provides a set of diagrams to model every aspect of an object-oriented application design in sufficient detail, but lacks any mechanism to rigorously check consistency between the models. Today, most of the effort is applied on creating accurate and consistent UML models rather than implementing the design. Automatic code generation from UML models has emerged as a promising area in recent years. The accuracy of generated code in some ways depends on UML models consistency. In this paper, we present a survey of UML consistency checking techniques. To analyze existing techniques, we identify some analysis parameters and construct an analysis table. The analysis table helps us to evaluate existing consistency checking techniques. We conclude that most of the approaches validates intra and inter level consistencies between UML models by using monitoring strategy. UML class, sequence, and statechart diagrams are used in most of the existing consistency checking techniques. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Economic Evaluation of Two Types of IT Projects

    Page(s): 63 - 66
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (257 KB) |  | HTML iconHTML  

    The economic evaluation models are proposed by using dynamic programming for two types IT projects, purchased project and developing project. Investment decision critical values of IT projects are solved and the relationships between the decision critical values and the factors of the IT project are deeply discussed. The models, which are developed in the paper, are better than others because the assumptions of option pricing models are given up. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Power of MOF-Based Meta-modeling of Components

    Page(s): 67 - 72
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (161 KB) |  | HTML iconHTML  

    To allow comfortable and easy development, component systems have to provide a rather a big set of development supporting tools including at least a tool for composition and repository for storing and retrieving components. In this paper, we evaluate and present advantages of using MOF and meta-modeling during definition of component system and also during development of the supporting tools. Most of the presented arguments are based on a broad practical experience with designing the component systems SOFA and SOFA 2; the former designed in the classical ad hoc manual way, while the latter via meta-modeling. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparative Study of the Perception of Computer Security between US and Korea: Focused on Rootkits

    Page(s): 73 - 76
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (105 KB) |  | HTML iconHTML  

    The surveys were conducted to compare the knowledge and experience of students of five Korean universities and three US universities with various forms of malware. The study included an empirical assessment of the cross-cultural similarities and differences between students in the two countries. The variables examined include knowledge of computer viruses, spyware, and rootkits as well as perceptions of the damage that can result from various computer malware. While the two groups are similar with respect to their relative familiarity of rootkits compared with that of spyware and viruses, and in terms of how they perceive the malware knowledge of their peers, significant differences were present in self-reported perceptions of rootkit familiarity. U.S. students showed higher levels for all tested malware types, including the fictional ldquoTrilobyterdquo virus. However, it is expected to experience an accelerated rootkit awareness because of the rapid assimilation of spyware knowledge in recent years. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Static UML Model Generator from Analysis of Requirements (SUGAR)

    Page(s): 77 - 84
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (441 KB) |  | HTML iconHTML  

    In this paper, we propose a tool, named Static UML Model Generator from Analysis of Requirements (SUGAR), which generates both use-case and class models by emphasizing on natural language requirements. SUGAR aims at integrating both requirement analysis and design phases by identifying use-cases, actors, classes along with its attributes and methods with proper association among classes. This tool extends the idea of previously existing tools and implemented with the help of efficient natural language processing tools of Stanford NLP Group, WordNet and JavaRAP using the modified approach of Rational Unified Process with better accuracy. SUGAR has added new features and also able to incorporate solution for those problems existed in previous tools by developing both analysis and design class models. SUGAR generates all static UML models in Java in conjunction with Rational Rose and provides all functionalities of the system even though the developer is having less domain knowledge. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Software Failure Prediction Based on Fractal

    Page(s): 85 - 90
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (269 KB) |  | HTML iconHTML  

    Reliability is one of the most important qualities of software, and failure analysis is an important part of the research of software reliability. Fractals are mathematical or natural objects that are made of parts similar to the whole in certain ways. A fractal has a self-similar structure that occurs at different scales. In this paper the failure data of software are analyzed, the fractals are discovered in the data, and the method of software failure prediction based on fractals is proposed. Analyzing the empirical failure data (three data sets including two of Musa's) validates the validity of the model. It should be noticed that the analyses and research methods in this paper are differ from the conventional methods in the past, and a new idea for the research of the software failure mechanism is presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proposal for an Adaptive User Interface Design: A Hybrid Approach: IDSS and BDI Agents, Application to the Boiler Combustion Management System (GLZ)

    Page(s): 91 - 94
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (230 KB) |  | HTML iconHTML  

    The interaction with humans is one of the critical components of modern Distributed Artificial Intelligence (DAI). Adaptive interfaces are a promising attempt to overcome contemporary problems due to the increasing complexity of human-computer interaction. They are designed to tailor a system's interactive behavior with consideration of both individual needs of human users and altering conditions within an application environment. Utilizing these advancements, we present an approach for the design of complex adaptive interface. This latter uses Intelligent Agents based on a Belief, Desire, and Intention (BDI) architecture to achieve problem resolution in a typical boiler combustion management system (GLZ). In our approach, MAS is used in order to coordinate an adaptive interface with a distributed decision and distributed information architecture. Agents can assist the users by executing actions such as anticipating the needed information, using the internet to collect data, and assisting the operator in analysis and treatment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hash Function Based Software Watermarking

    Page(s): 95 - 98
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (242 KB) |  | HTML iconHTML  

    Software piracy is the greatest threats to software industry, which will bring serious damages to the interests of software developers or providers. As a prevention technique, software watermarking is a new research area that aims at providing copyright protection for commercial software. This article proposes a hash function based dynamic software watermarking algorithm. By constructing appropriate hash function, watermark piece is embedded into it. Given the satisfied parameters, hash function will calculate out the corresponding watermark. To strengthen the logical relation with the program itself, some of the programpsilas constants are replaced by specific level hash function, tampering of watermark will lead to the applicationpsilas undefined behavior. Distinguishing from other watermarking techniques, this kind of watermark is not hidden inside the program code or its runtime state, but is calculated out dynamically. Analysis shows that this algorithm will be able to withstand a variety form of attacks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Project Profitability Analysis Using Temporal Probabilistic Reasoning

    Page(s): 99 - 102
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (148 KB) |  | HTML iconHTML  

    Providing viable estimates, understanding project requirements and doing proper risk management on software projects require extensive application and sophisticated techniques of analysis and interpretation. There is still a lack of informative techniques and feedback mechanisms that help to assess how well and efficiently a specific development methodology is performing. Analyzing project tasks would enhance how well individual tasks are estimated, how well they are defined, and whether items are completed on-time and on-budget. In this work, we propose a temporal probabilistic model that addresses feedback control mechanisms in project planning using the complex adaptive systems software engineering framework (CASSE). We have tested our approach in industry with a software development company in South Africa on two commercial project evaluations. Our preliminary results show that the temporal probabilistic model of the framework demonstrably enhances practitionerspsila understanding in managing software projects profitably - hence increasing business sustainability and management. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.