Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

The 2nd International Conference on Software Engineering and Data Mining

23-25 June 2010

Filter Results

Displaying Results 1 - 25 of 141
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    IEEE is not the copyright holder of this material | PDF file iconPDF (209 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2010, Page(s): 1
    IEEE is not the copyright holder of this material | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):i - xvi
    IEEE is not the copyright holder of this material | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Co-operative Studies Supporting System for software engineering

    Publication Year: 2010, Page(s):1 - 4
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    With the development of the Co-operative education in China, the Co-operative Studies Supporting System (CSSS) for Software Engineering becomes a task of high priority. We analyze the requirements of integrated study and work term of Co-operative education in software engineering, give a new Integrate Developing Model based on Capability Maturity Model (IPD-CMM) supporting by Team Software Process... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new concurrent test framework for distributed Hardware-in-the-Loop simulation test system

    Publication Year: 2010, Page(s):5 - 10
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    In most Hardware-in-the-loop (HIL) simulation test systems, task scheduling algorithms (TSA) are used to support concurrent test to save test time and cost. However, prevailing TSA do not consider about the concurrent operation potential of hardware devices, thus pure TSA become no longer powerful enough to exploit the system concurrency when the system integrates more and more complex devices. Ce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model based software component verification

    Publication Year: 2010, Page(s):11 - 16
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (109 KB) | HTML iconHTML

    Developing software components requires a high focus on software quality. A novel approach was proposed from the component producer perspective to improve it in this paper. First, atomic service, service extension and extension rule were defined respectively. Secondly, an effective component model was defined, in terms of service, to describe all services which a component can provide. Thirdly, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on interoperation access control based on OBAC and dynamic trust management

    Publication Year: 2010, Page(s):17 - 22
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (139 KB) | HTML iconHTML

    The access control mechanism is the one key issue in realizing safety interoperation between distributed information systems. However, the existing multi-domains interoperation access control based on RBAC can not satisfy the safety needs of information system interoperability, in which the sort of users and information are diverse and update frequently. Therefore, the interoperation access contro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on generating detector algorithm in fault detection

    Publication Year: 2010, Page(s):23 - 26
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (88 KB) | HTML iconHTML

    The essence of fault diagnosis is pattern recognition to characters of fault. The non-dimensional parameter immune detector as the recognition fault detector is constructed with some non-dimensional parameter being more hypersensitive to fault combined with negative selection mechanism of artificial immune system. And two parts of immune vaccine and immune learning produce the excellence detector ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • State-of-Charge estimation for power Li-ion battery pack using Vmin-EKF

    Publication Year: 2010, Page(s):27 - 31
    Cited by:  Papers (1)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    An accurate estimation of State-of-Charge (SOC) for power battery pack is very important in the applications of electrical vehicles. Single cell model is not suitable for battery pack of m u Iti cells. Considering the imbalance characteristic of serial connected battery pack, a Vmin model is proposed. The minimal cell load voltage of the battery pack (Vmin) is used as the mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A decision support system for classification and recognition of earthquakes and explosions

    Publication Year: 2010, Page(s):32 - 35
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    This paper introduces current advances and some rudimental results of our ongoing research project. To discriminate between earthquakes and explosions, temporal and spectral features extracted from seismic waves, plus some seismological parameters (such as epicenter depth, location, magnitude) are crux for rapid and correct recognizing event sources (earthquakes or explosions). Seismological param... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and behavior checking of component based architecture

    Publication Year: 2010, Page(s):36 - 41
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (164 KB) | HTML iconHTML

    In this paper, we study component-based software architectures and report the following results. I) By defining port operations, we may use port activities to describe process migration. The proposed formalism(port algebra) can be used to describe running time system architecture. 2) In processing checking, the formalism can keep architecture structure unchanged while progresses migrate, which ena... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A noisy channel model for web service

    Publication Year: 2010, Page(s):42 - 46
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (123 KB) | HTML iconHTML

    In this paper, we propose a language I-BPEL to model web services in the environment with channel noise and system instabilities. Each channel is assigned an interval value to indicate the value of noise. We introduce an operational semantics which attached with interval values to indicate the quality of the web service. Based on the syntax and semantics, we define the notion of simulation and inv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A feasible and cost effective two-factor authentication for online transactions

    Publication Year: 2010, Page(s):47 - 51
    Cited by:  Papers (1)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    Authentication is the process of verifying a user's identity when the user is requesting services from any secure IT system. By far, the most popular authentication is a basic username-password based method that is commonly considered to be a weak technique of authentication. A more secure method is the multi-factor authentication that verifies not only the username/password pair, but also require... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A two-step iris recognition algorithm

    Publication Year: 2010, Page(s):52 - 56
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (102 KB) | HTML iconHTML

    Starting from the goal to overcome the limitation of the single type algorithm of iris recognition. In this paper, a two-step iris recognition algorithm is proposed based on feature extraction on corner and Gabor transform. First of all, it uses the corner feature of iris texture to recognize for achieving the purpose of removal of alien and confirm the vast majority of similar samples rapidly; if... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Temporal logics and model checking algorithms for ZIAs

    Publication Year: 2010, Page(s):57 - 62
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (119 KB) | HTML iconHTML

    In this paper, we first propose a specification approach combining interface automata and Z language. This approach can be used to describe temporal properties and data properties of software components. A branching time logic for ZIAs is presented. We then give an algorithm for model checking this logic on ZIAs with finite domain. Furthermore, we present a mu-calculus logic for ZIAs, and give a m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software architecture for the ECU of automated manual transmission

    Publication Year: 2010, Page(s):63 - 68
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (146 KB) | HTML iconHTML

    To improve the cost-efficiency during the processes of software development and maintenance for the Electronic Control Unit (ECU) of automated manual transmissions (AMT), a software architecture as well as its supporting environments for the ECU of AMT was put forward based on the requirements analysis of AMT system. The software architecture has a structure with five layers and two bases, which c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated design of production strategy and reuse scenario for product line development

    Publication Year: 2010, Page(s):69 - 74
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (146 KB) | HTML iconHTML

    One of the core problems of product line development is the coordination efforts of product builder and core-asset developer. More specifically, it is the integration of production strategy decision and core asset implemention scenario selection. In this paper, we have developed the CoFAQ (Cost Optimization under Functional And Quality goal satisfaction constraints) framework which provides a syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience Model Driven Architecture methodology in developing the prototype of a community support system

    Publication Year: 2010, Page(s):75 - 80
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (164 KB) | HTML iconHTML

    Model Driven Architecture (MDA) methodology is considered as the next generation development methodology and approach though it is not applied widely in software enterprise yet. In order to testify the efficiency of MDA methodology in the real software project environment, we conducted a comparison experiment in developing a prototype for a community support system between the approach of MDA and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ERP software requirement elicitation with reference models

    Publication Year: 2010, Page(s):81 - 85
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    COTS (Commercial off-the-shelf) ERP systems provide a lot of reusable software packages, which accelerate the implementation process to some extent. However they also put enterprises into a dilemma: whether to adapt as-is business processes or to customize software packages. In order to help the enterprises get out of the dilemma, a holistic methodology is proposed to automatically elicit software... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending SQL to support QoS and semantic data gathering in WSN

    Publication Year: 2010, Page(s):86 - 90
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (108 KB) | HTML iconHTML

    At high level, a sensor network can be modelled with a database view. Under such a view, declarative queries are the preferred way of interacting with sensor networks for data and information collection tasks. The most popular database query language is SQL that is based on a SELECT-FROM-WHERE theme. However comparing to traditional databases, sensor network database has its unique features like d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A modeling approach for development of an automotive AMT ECU software with UML-RT

    Publication Year: 2010, Page(s):91 - 96
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    Over the past decades, the amount of automotive ECUs (Electronic Control Units) is increasing at a breathtaking pace. Accordingly, the size and complexity of ECU software also increased, and these give rise to various challenges to automotive software engineers. They need a new approach and tools to meet these challenges. Model-Based development is a choice. This paper presents a model-based desig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of software security detection system based on system call sequences

    Publication Year: 2010, Page(s):97 - 100
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (133 KB) | HTML iconHTML

    The sequences of system calls can indicate the running behavior feature of application software, so it can be used in software security detection. In this paper, by researching and analyzing system call sequences in the process of software execution, a software security detection system based on system call sequences is designed. Basic system call sequences are mined by association rules, and then... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic awareness of network security situation based on stochastic game theory

    Publication Year: 2010, Page(s):101 - 105
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    Stochastic game theory is proposed to apply in the research on network security situational awareness (NSSA), which is a research focus in network security field at present. A novel dynamic awareness method of network security situation (NSS) based on analyses of network service states is proposed in this paper. Realizing situation awareness is a dynamic process, and the diverse states of network ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal software testing case research based on self-learning control algorithm

    Publication Year: 2010, Page(s):106 - 110
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (107 KB) | HTML iconHTML

    This paper demonstrates an approach to optimizing software testing cases by rapidly fixing software deficiency with given software parameter uncertainty during a regressive testing process. Taking the software testing process into a time-varied system control problem, a state transform matrix model is presented. Because regressive testing is an iterative process, the two-dimensional variable-facto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An iterative, metric space based software clone detection approach

    Publication Year: 2010, Page(s):111 - 116
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (365 KB)

    Metric space is a set with definition of distance between elements within this set. This paper introduces metric space into code clone detection, and uses the distance within a metric space to measure the similarity level of code. It proposes an iterative process of building up a metric space to detect clones in software system. Based on metric space which is derived from software metric, the clon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.