By Topic

Software Engineering Conference, 2009. ASWEC '09. Australian

Date 14-17 April 2009

Filter Results

Displaying Results 1 - 25 of 56
  • [Front cover]

    Publication Year: 2009 , Page(s): C1
    Request Permissions | PDF file iconPDF (4852 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009 , Page(s): i
    Request Permissions | PDF file iconPDF (9 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009 , Page(s): iii
    Request Permissions | PDF file iconPDF (231 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009 , Page(s): v - vii
    Request Permissions | PDF file iconPDF (176 KB)  
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2009 , Page(s): viii
    Request Permissions | PDF file iconPDF (68 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from the Research Programme Chair

    Publication Year: 2009 , Page(s): ix
    Request Permissions | PDF file iconPDF (67 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from the Industry Programme Chairs

    Publication Year: 2009 , Page(s): x
    Request Permissions | PDF file iconPDF (67 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2009 , Page(s): xi
    Request Permissions | PDF file iconPDF (62 KB)  
    Freely Available from IEEE
  • Organising Committee

    Publication Year: 2009 , Page(s): xii - xiii
    Request Permissions | PDF file iconPDF (69 KB)  
    Freely Available from IEEE
  • Research Programme Committee

    Publication Year: 2009 , Page(s): xiv - xv
    Request Permissions | PDF file iconPDF (81 KB)  
    Freely Available from IEEE
  • Industry Programme Committee

    Publication Year: 2009 , Page(s): xvi
    Request Permissions | PDF file iconPDF (72 KB)  
    Freely Available from IEEE
  • Research Paper Reviewers

    Publication Year: 2009 , Page(s): xvii
    Request Permissions | PDF file iconPDF (55 KB)  
    Freely Available from IEEE
  • Keynote Presentation 1

    Publication Year: 2009 , Page(s): xviii
    Request Permissions | Click to expandAbstract | PDF file iconPDF (68 KB) |  | HTML iconHTML  

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Presentation 2

    Publication Year: 2009 , Page(s): xix
    Request Permissions | Click to expandAbstract | PDF file iconPDF (68 KB) |  | HTML iconHTML  

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Presentation 3

    Publication Year: 2009 , Page(s): xx
    Request Permissions | Click to expandAbstract | PDF file iconPDF (64 KB) |  | HTML iconHTML  

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invited Presentation 1

    Publication Year: 2009 , Page(s): xxi
    Request Permissions | Click to expandAbstract | PDF file iconPDF (68 KB) |  | HTML iconHTML  

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invited Presentation 2

    Publication Year: 2009 , Page(s): xxii - xxiii
    Request Permissions | Click to expandAbstract | PDF file iconPDF (84 KB) |  | HTML iconHTML  

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sponsors

    Publication Year: 2009 , Page(s): xxiv - xxvi
    Request Permissions | PDF file iconPDF (648 KB)  
    Freely Available from IEEE
  • Enforcing Safety and Progress Properties: An Approach to Concurrent Program Derivation

    Publication Year: 2009 , Page(s): 3 - 12
    Request Permissions | Click to expandAbstract | PDF file iconPDF (258 KB) |  | HTML iconHTML  

    In this paper we develop an approach for deriving concurrent programs. At any stage in its derivation, a program consists of a combination of the code for its processes together with a set of enforced properties. The behaviour of such a combination consists of those behaviours of the code that satisfy the enforced properties. Because enforced properties are temporal formulae, they may be used to e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulating Software Evolution with Varying Numbers of Developers and Validation Using OSS

    Publication Year: 2009 , Page(s): 13 - 22
    Request Permissions | Click to expandAbstract | PDF file iconPDF (305 KB) |  | HTML iconHTML  

    An issue that has confounded the understanding of software development in the past is the role that different numbers of developers play in the construction and subsequent evolution of software. In this paper, we investigate that facet of software using a configurable simulation framework as a basis. The framework uses 'agents' to represent developers and models the costs associated with first com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Requirements to Embedded Software - Formalising the Key Steps

    Publication Year: 2009 , Page(s): 23 - 33
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (6490 KB) |  | HTML iconHTML  

    Failure of a design to satisfy a system's requirements can result in schedule and cost overruns. When using current approaches, ensuring requirements are satisfied is often delayed until late in the development process during a cycle of testing and debugging. This paper introduces a more rigorous approach to design using Behavior Engineering, which has previously been applied primarily to requirem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Change Propagation Analysis Using Domain Information

    Publication Year: 2009 , Page(s): 34 - 43
    Cited by:  Papers (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1202 KB) |  | HTML iconHTML  

    We propose a novel methodology for analysing change propagation in software using the domain-level behavioural model of a system. We hypothesize that change propagation analysis is feasible based purely on the information visible and understandable to domain experts, trading some accuracy for productivity. Such a method is independent of formal architectural representations and may be practical fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-Driven Code Generation for Secure Smart Card Applications

    Publication Year: 2009 , Page(s): 44 - 53
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (242 KB) |  | HTML iconHTML  

    SecureMDD is a model-driven approach to develop secure systems with a special focus on smart card applications. Based on a platform-independent UML model of the system under development we generate a platform-specific model, and finally executable code. The Secure MDD approach also allows to generate a formal specification where security properties can be proven formally. In this paper we describe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Specification Based Testing for Semantic Web Services

    Publication Year: 2009 , Page(s): 54 - 63
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (418 KB) |  | HTML iconHTML  

    Web services have become popular in the modern infrastructure of the World Wide Web. They aim to provide automatic discovery, selection, and invocation of required applications (services) across the internet. However, the quality assurance aspects of Web services remain a challenge. Recently, the semantic Web has been introduced as an emerging technology which emphasizes presenting the meaning of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting Multi-path UI Development with Vertical Refinement

    Publication Year: 2009 , Page(s): 64 - 72
    Request Permissions | Click to expandAbstract | PDF file iconPDF (401 KB) |  | HTML iconHTML  

    As computers and software applications become ubiquitous the systems we build are increasingly required to run on not just a single piece of hardware, but rather be available for different platforms, different types of hardware and offer different modes of interaction depending on the context of use. Within a formal development process when we consider refinement for interactive systems we therefo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.