By Topic

2009 16th Asia-Pacific Software Engineering Conference

Date 1-3 Dec. 2009

Filter Results

Displaying Results 1 - 25 of 77
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (478 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (281 KB)
    Freely Available from IEEE
  • Conference Chair's Message

    Publication Year: 2009, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (77 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Chairs' Message

    Publication Year: 2009, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (81 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organizers

    Publication Year: 2009, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2009, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2009, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2009, Page(s):xix - xxi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB)

    An organization based on product lines evolves a common marketing strategy, and strengthens core competency around strategic business interests and goals. The goal is to produce quality products consistently and predictably by moving toward an asset-supported, component-based product lines development approach. This transition must be planned carefully encompassing not only technical issues but al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the Accuracy of Software Effort Estimation Based on Multiple Least Square Regression Models by Estimation Error-Based Data Partitioning

    Publication Year: 2009, Page(s):3 - 10
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    Accurate software effort estimation is one of the key factors to a successful project by making a better software project plan. To improve the estimation accuracy of software effort, many studies usually aimed at proposing novel effort estimation methods or combining several approaches of the existing effort estimation methods. However, those researches did not consider the distribution of histori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical Understandability Assessment Model for Large-Scale OO System

    Publication Year: 2009, Page(s):11 - 18
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    Understanding software, especially in large-scale, is an important issue for software modification. In large-scale software systems, modularization provides help for understanding them. But, even if a system has a well-modularized design, the modular design can be deteriorated by system change over time. Therefore it is needed to assess and manage modularization in the view of understandability. H... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Relationship between Different Size Measures in the Software Life Cycle

    Publication Year: 2009, Page(s):19 - 26
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    Various measures and methods have been developed to measure the sizes of different software entities produced throughout the software life cycle. Understanding the nature of the relationship between the sizes of these products has become significant due to various reasons. One major reason is the ability to predict the size of the later phase products by using the sizes of early life cycle product... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigating the Effect of Refactoring on Software Testing Effort

    Publication Year: 2009, Page(s):29 - 34
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    Refactoring, the process of improving the design of existing code by changing its internal structure without affecting its external behavior, tends to improve software quality by improving design, improving readability, and reducing bugs. There are many different refactoring methods, each having a particular purpose and effect. Consequently, the effect of refactorings on software quality attribute... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting High-Level Functional Design from Software Requirements

    Publication Year: 2009, Page(s):35 - 42
    Cited by:  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB) | HTML iconHTML

    Practitioners spend significant amounts of time creating high-level design from requirements. Though there exist methodologies to describe and manage requirements and design artifacts, there is not yet an automated way to faithfully translate a requirement into a high-level design. While it is extremely difficult to generate design elements from free-form natural language due to its inherent ambig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying Fragments to be Extracted from Long Methods

    Publication Year: 2009, Page(s):43 - 49
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    Long and complex methods are hard to read or maintain, and thus usually treated as bad smells, known as Long Method. On the contrary, short and well-named methods are much easier to read, maintain, and extend. In order to divide long methods into short ones, refactoring Extract Method was proposed and has been widely used. However, extracting methods manually is time consuming and error prone. Tho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Graph Based Approach to Detecting Causes of Implied Scenarios under the Asynchronous and Synchronous Communication Styles

    Publication Year: 2009, Page(s):53 - 60
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    The implied scenarios are unexpected behaviors in the scenario specifications. Detecting and handling them is essential for the correctness of the scenario specifications. Prior researches focus on detecting those implied scenarios through error traces, and cannot identify where to be considered to handle the implied scenarios. Moreover, most of them do not consider the asynchronous communication ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting Environmental Constraints to Make Reactive System Specifications Realizable

    Publication Year: 2009, Page(s):61 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (761 KB) | HTML iconHTML

    Many fatal accidents of safety critical reactive systems have occurred in unexpected situations which had not been considered during the design and test phases of the systems. To prevent these accidents, reactive systems should be designed to respond appropriately to any requests of any timing from environments. Verifying this property at specification phase reduces the development costs of safety... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring Composite Services with Universal Modal Sequence Diagrams

    Publication Year: 2009, Page(s):69 - 76
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (892 KB) | HTML iconHTML

    Monitoring is a promising technique to detect erroneous behavior of a composite service at run-time, which is to complement static verification and validation techniques. One of the most important aspects of monitoring approach is that the specification of the properties without losing expressive power should be as simple as possible, facilitating the developers to represent the properties of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Critical Barriers for Offshore Software Development Outsourcing Vendors: A Systematic Literature Review

    Publication Year: 2009, Page(s):79 - 86
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    Software development outsourcing is a contract-based relationship between client and vendor organisations in which a client(s) contracts out all or part of its software development activities to a vendor(s), who provides agreed services for remuneration. The objective of this paper is to identify various barriers that have a negative impact on software outsourcing clients in the selection process ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Re-defining the Requirements Engineering Process Improvement Model

    Publication Year: 2009, Page(s):87 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    A specialized Requirements Capability Maturity Model (R-CMM) was created by a group of researchers from UK as an attempt to support the requirements engineering phase of software development. The validation performed to this model shows that it has some potentials to be a useful tool for both practitioners and researchers in the field of process improvement and requirements engineering. However, t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Insights into Domain Knowledge Sharing in Software Development Practice in SMEs

    Publication Year: 2009, Page(s):93 - 100
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    The collaborative development of shared understanding is crucial to the success of software development projects. It is also a challenging and volatile process in practice. Small organizations may be especially vulnerable due to reliance on key individuals and insufficient resource to employ several domain specialists. There is, however, minimal empirical research on sharing domain understanding i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Context Dynamics Matrix (CDM): An Approach to Modeling Context

    Publication Year: 2009, Page(s):101 - 108
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1600 KB) | HTML iconHTML

    Context plays an important role in various analysis techniques across disciplines including software engineering. In software engineering, however, context is typically viewed to be merely representing scope and system boundaries. We present a view of context to be a dynamic element of every stage of (software) development, not limited to analysis and design. We introduce a multi-dimensional view ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.