By Topic

2008 Advanced Software Engineering and Its Applications

13-15 Dec. 2008

Filter Results

Displaying Results 1 - 25 of 66
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (348 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • ASEA 2008

    Publication Year: 2008, Page(s):ix - xii
    Request permission for commercial reuse | PDF file iconPDF (107 KB) | HTML iconHTML
    Freely Available from IEEE
  • Model-Based Test Suite Reduction with Concept Lattice

    Publication Year: 2008, Page(s):3 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Model-based testing refers to deriving a suite of test cases from a model that represents the behavior of a software system. As there may be large, sometimes infinite, number of operational scenarios that could be generated from a given model, an important issue of model-based testing is to determine a minimal set of test cases which provides sufficient test coverage. With formal concept analysis ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Method of Data Quality Evaluation Using Metadata Registry

    Publication Year: 2008, Page(s):9 - 12
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    This paper proposes MDRDP (Metadata Registry based on Data Profiling) to minimize the time and human resource for analyzing and extracting metadata as criteria standard for data profiling. MDRDP is based on MDR (Metadata Registry) which is used for an international standard of standardizing and managing metadata for information sharing in various fields. By MDRDP, we can evaluate data quality with... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Garbage Collection Schemes for Flash-Based Linux Swap System

    Publication Year: 2008, Page(s):13 - 16
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    NAND flash memory based SSDs (solid state disks) have become an alternative storage device for future computer systems. Legacy operating system functionalities like file system and virtual memory system should be carefully re-designed since flash memory cannot be overwritten unless erased in advance. In this paper, we study the performance of garbage collection schemes when flash memory is used as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Determine Software Requirement Construction Sequences Based on Use Cases

    Publication Year: 2008, Page(s):17 - 22
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    The majority of software development projects utilize the use cases technique to define software requirements, which are necessary to determine not only the scope of the software itself, but also the sequence in which this software will be constructed. Currently, there are several proposals to define the construction sequence of software requirements, but most of these proposals lack of ease of us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Information Acquisition Method Based on NetFlow for Network Situation Awareness

    Publication Year: 2008, Page(s):23 - 26
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    Network situation information acquisition plays an important role in the entire process of network situation awareness. In this paper, we presented a multi-level, multi-perspective and multi-granularity traffic information acquisition method to get traffic information. In addition, we presented a multi-layer detection model that combines baseline based detection layer and signature based detection... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution Strategy Based Automated Software Clustering Approach

    Publication Year: 2008, Page(s):27 - 34
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (537 KB) | HTML iconHTML

    In the software development life cycle, maintenance is a key phase that determines long term and effective use of any software. Maintenance can become very lengthy and costly for large software systems when structure of the system is complicated. One of the factors complicating the structure of the software system is subsystem boundaries becoming ambiguous due to system evolution, lack of up to da... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Code Generation of an XForms Client for Service Integration

    Publication Year: 2008, Page(s):35 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    A Web service integrating mobile client applications requires a complex user interface, which usually consists of more than one view. Moreover, it should provide a way to navigate between the views. In this paper, we presented a formal way to analyze a set of views for a given service specification, and a model for the relationship between views and methods. We then provided an algorithm to genera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research about Two-Level Cache Base on SDRAM in RAID Controller

    Publication Year: 2008, Page(s):41 - 44
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    In RAID system, the disk cache for improving RAID system performance is a very important aspect. Two-level cache displays superior performance in comparison to single cache and is effective in temporal and spatial locality. The proposed cache system in this paper consists in two levels. The first level cache is a set associative cache with small block size whereas the second level cache is a fully... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Assessment of the Reliability of a Fault Tolerant Model Using AADL

    Publication Year: 2008, Page(s):45 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (514 KB) | HTML iconHTML

    In order to solve the problem of the assessment of the reliability of the fault tolerant system, the work in this paper is devoted to analyze a subsystem of ATC (air traffic control system), and use AADL (architecture analysis and design language) to build its model. After describing the various software and hardware error states and as well as error propagation from hardware to software, the work... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aspect-Oriented Analysis for Embedded Real-Time Systems

    Publication Year: 2008, Page(s):53 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    Aspect-oriented programming technology implements the software systems using crosscutting. Aspect-orientation can be modeled by extending UML, and AOSD model profile can be designed in the meta -model. The profile builds the aspect models from structural model, behavioral model, aspect and aspect weaving. Timing requirements could be separated from the system according the separation of concerns t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey of Consistency Checking Techniques for UML Models

    Publication Year: 2008, Page(s):57 - 62
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    UML is the de-facto industry standard to design object-oriented software. UML provides a set of diagrams to model every aspect of an object-oriented application design in sufficient detail, but lacks any mechanism to rigorously check consistency between the models. Today, most of the effort is applied on creating accurate and consistent UML models rather than implementing the design. Automatic cod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Economic Evaluation of Two Types of IT Projects

    Publication Year: 2008, Page(s):63 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    The economic evaluation models are proposed by using dynamic programming for two types IT projects, purchased project and developing project. Investment decision critical values of IT projects are solved and the relationships between the decision critical values and the factors of the IT project are deeply discussed. The models, which are developed in the paper, are better than others because the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Power of MOF-Based Meta-modeling of Components

    Publication Year: 2008, Page(s):67 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (161 KB) | HTML iconHTML

    To allow comfortable and easy development, component systems have to provide a rather a big set of development supporting tools including at least a tool for composition and repository for storing and retrieving components. In this paper, we evaluate and present advantages of using MOF and meta-modeling during definition of component system and also during development of the supporting tools. Most... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparative Study of the Perception of Computer Security between US and Korea: Focused on Rootkits

    Publication Year: 2008, Page(s):73 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (105 KB) | HTML iconHTML

    The surveys were conducted to compare the knowledge and experience of students of five Korean universities and three US universities with various forms of malware. The study included an empirical assessment of the cross-cultural similarities and differences between students in the two countries. The variables examined include knowledge of computer viruses, spyware, and rootkits as well as percepti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Static UML Model Generator from Analysis of Requirements (SUGAR)

    Publication Year: 2008, Page(s):77 - 84
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    In this paper, we propose a tool, named Static UML Model Generator from Analysis of Requirements (SUGAR), which generates both use-case and class models by emphasizing on natural language requirements. SUGAR aims at integrating both requirement analysis and design phases by identifying use-cases, actors, classes along with its attributes and methods with proper association among classes. This tool... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Software Failure Prediction Based on Fractal

    Publication Year: 2008, Page(s):85 - 90
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    Reliability is one of the most important qualities of software, and failure analysis is an important part of the research of software reliability. Fractals are mathematical or natural objects that are made of parts similar to the whole in certain ways. A fractal has a self-similar structure that occurs at different scales. In this paper the failure data of software are analyzed, the fractals are d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proposal for an Adaptive User Interface Design: A Hybrid Approach: IDSS and BDI Agents, Application to the Boiler Combustion Management System (GLZ)

    Publication Year: 2008, Page(s):91 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    The interaction with humans is one of the critical components of modern Distributed Artificial Intelligence (DAI). Adaptive interfaces are a promising attempt to overcome contemporary problems due to the increasing complexity of human-computer interaction. They are designed to tailor a system's interactive behavior with consideration of both individual needs of human users and altering conditions ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hash Function Based Software Watermarking

    Publication Year: 2008, Page(s):95 - 98
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    Software piracy is the greatest threats to software industry, which will bring serious damages to the interests of software developers or providers. As a prevention technique, software watermarking is a new research area that aims at providing copyright protection for commercial software. This article proposes a hash function based dynamic software watermarking algorithm. By constructing appropria... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Project Profitability Analysis Using Temporal Probabilistic Reasoning

    Publication Year: 2008, Page(s):99 - 102
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB) | HTML iconHTML

    Providing viable estimates, understanding project requirements and doing proper risk management on software projects require extensive application and sophisticated techniques of analysis and interpretation. There is still a lack of informative techniques and feedback mechanisms that help to assess how well and efficiently a specific development methodology is performing. Analyzing project tasks w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.