By Topic

Software Engineering Conference, 2009. ASWEC '09. Australian

Date 14-17 April 2009

Filter Results

Displaying Results 1 - 25 of 56
  • [Front cover]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (4852 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (9 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (231 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - vii
    Save to Project icon | Request Permissions | PDF file iconPDF (176 KB)  
    Freely Available from IEEE
  • Message from the General Chairs

    Page(s): viii
    Save to Project icon | Request Permissions | PDF file iconPDF (68 KB)  
    Freely Available from IEEE
  • Message from the Research Programme Chair

    Page(s): ix
    Save to Project icon | Request Permissions | PDF file iconPDF (67 KB)  
    Freely Available from IEEE
  • Message from the Industry Programme Chairs

    Page(s): x
    Save to Project icon | Request Permissions | PDF file iconPDF (67 KB)  
    Freely Available from IEEE
  • Steering Committee

    Page(s): xi
    Save to Project icon | Request Permissions | PDF file iconPDF (62 KB)  
    Freely Available from IEEE
  • Organising Committee

    Page(s): xii - xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (69 KB)  
    Freely Available from IEEE
  • Research Programme Committee

    Page(s): xiv - xv
    Save to Project icon | Request Permissions | PDF file iconPDF (81 KB)  
    Freely Available from IEEE
  • Industry Programme Committee

    Page(s): xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (72 KB)  
    Freely Available from IEEE
  • Research Paper Reviewers

    Page(s): xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (55 KB)  
    Freely Available from IEEE
  • Keynote Presentation 1

    Page(s): xviii
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (68 KB)  

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Presentation 2

    Page(s): xix
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (68 KB)  

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Presentation 3

    Page(s): xx
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (64 KB)  

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invited Presentation 1

    Page(s): xxi
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (68 KB)  

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invited Presentation 2

    Page(s): xxii - xxiii
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (84 KB)  

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sponsors

    Page(s): xxiv - xxvi
    Save to Project icon | Request Permissions | PDF file iconPDF (648 KB)  
    Freely Available from IEEE
  • Enforcing Safety and Progress Properties: An Approach to Concurrent Program Derivation

    Page(s): 3 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (258 KB) |  | HTML iconHTML  

    In this paper we develop an approach for deriving concurrent programs. At any stage in its derivation, a program consists of a combination of the code for its processes together with a set of enforced properties. The behaviour of such a combination consists of those behaviours of the code that satisfy the enforced properties. Because enforced properties are temporal formulae, they may be used to enforce both safety and progress properties of the program. While the code by itself is executable, when combined with enforced properties, the program is not yet in an executable form. A derivation starts from a program in which the desired properties of the code are expressed via enforced properties, and the goal is to derive a program with additional code but no enforced properties. We outline a trace-based theory which formalises the meaning of programs with enforced properties, and transformation rules that ensure each modified program is a refinement of the original. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulating Software Evolution with Varying Numbers of Developers and Validation Using OSS

    Page(s): 13 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (305 KB) |  | HTML iconHTML  

    An issue that has confounded the understanding of software development in the past is the role that different numbers of developers play in the construction and subsequent evolution of software. In this paper, we investigate that facet of software using a configurable simulation framework as a basis. The framework uses 'agents' to represent developers and models the costs associated with first comprehending and then applying necessary changes to a fictitious code base. It also considers agent 'memory recall' of their own code as a fundamental part of the framework and the fact that, with higher numbers of developers, maintenance of a higher proportion of other developers' code (rather than their own) is an inevitable, yet realistic aspect. Through exploration of the results and data produced by the simulation, we are able to explore 'desirable' features that are part of simulating software evolution; as a discussion of the issues raised by the framework, we provide a set of class data from four open-source systems by way of comparison and show that trends in those systems are comparable with results generated by the simulation. The paper thus provides evidence that we can use simulation tools to help model evolving systems, whether based on default settings or user-configurable settings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Requirements to Embedded Software - Formalising the Key Steps

    Page(s): 23 - 33
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (6490 KB) |  | HTML iconHTML  

    Failure of a design to satisfy a system's requirements can result in schedule and cost overruns. When using current approaches, ensuring requirements are satisfied is often delayed until late in the development process during a cycle of testing and debugging. This paper introduces a more rigorous approach to design using Behavior Engineering, which has previously been applied primarily to requirements analysis and specification development. To support design with Behavior Engineering we introduce the embedded Behavior Runtime Environment, a virtual machine created to execute a Behavior Engineering design on an embedded system. The result is a model-driven development approach that can create embedded system software that satisfies its requirements, as a result of applying the development process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Change Propagation Analysis Using Domain Information

    Page(s): 34 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1202 KB) |  | HTML iconHTML  

    We propose a novel methodology for analysing change propagation in software using the domain-level behavioural model of a system. We hypothesize that change propagation analysis is feasible based purely on the information visible and understandable to domain experts, trading some accuracy for productivity. Such a method is independent of formal architectural representations and may be practical for applications with heterogeneous subsystems, or missing or undocumented source code. In this paper we introduce the first phase of the methodology: creating and evaluating a connection graph of conceptual relationships between user interface components. We provide results of case studies on two Web-based systems which illustrate how our methodology can be applied, and how discovered conceptual relationships match the architectural dependencies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-Driven Code Generation for Secure Smart Card Applications

    Page(s): 44 - 53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (242 KB) |  | HTML iconHTML  

    SecureMDD is a model-driven approach to develop secure systems with a special focus on smart card applications. Based on a platform-independent UML model of the system under development we generate a platform-specific model, and finally executable code. The Secure MDD approach also allows to generate a formal specification where security properties can be proven formally. In this paper we describe the automatic generation of Java Card code from UML class and activity diagrams in detail. The full code running on the smart card is generated which is not trivial because of the limitations of smart cards and the specialties of Java Card. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Specification Based Testing for Semantic Web Services

    Page(s): 54 - 63
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (418 KB) |  | HTML iconHTML  

    Web services have become popular in the modern infrastructure of the World Wide Web. They aim to provide automatic discovery, selection, and invocation of required applications (services) across the internet. However, the quality assurance aspects of Web services remain a challenge. Recently, the semantic Web has been introduced as an emerging technology which emphasizes presenting the meaning of the Web content to achieve a machine processable automation. In this paper, we explore the synergy of applying specification based software testing techniques to semantic Web services. Our approach investigates the possibility of deriving concrete test cases from the goal specification of a semantic web service in order to determine the correctness of a service implementation. Furthermore, we also propose coverage criteria to evaluate the generated test cases at both the goal and the service description levels. We demonstrate the generation and evaluation of the test cases from a goal specification with the help of a simplified discount example. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting Multi-path UI Development with Vertical Refinement

    Page(s): 64 - 72
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (401 KB) |  | HTML iconHTML  

    As computers and software applications become ubiquitous the systems we build are increasingly required to run on not just a single piece of hardware, but rather be available for different platforms, different types of hardware and offer different modes of interaction depending on the context of use. Within a formal development process when we consider refinement for interactive systems we therefore need to consider not only the transformation of abstract specifications and models into single implementations but also the possibility of multiple implementations with differing interactive requirements. In such cases the changing requirements in general and changes to the user interface in particular make supporting the development by formal refinement challenging. One way to solve this problem is by extending our notion of refinement. In this paper we introduce vertical refinement for system and interface pairs which enables us to deal with such multi-path development. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.