By Topic

2010 36th EUROMICRO Conference on Software Engineering and Advanced Applications

1-3 Sept. 2010

Filter Results

Displaying Results 1 - 25 of 71
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (176 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2010, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (80 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chair

    Publication Year: 2010, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (101 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organising Committee

    Publication Year: 2010, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Program Committee and Reviewers

    Publication Year: 2010, Page(s):xiii - xvi
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2010, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Systematic XACML Request Generation for Testing Purposes

    Publication Year: 2010, Page(s):3 - 11
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    A widely adopted security mechanism is the specification of access control policies by means of the XACML language. In this paper, we propose a framework, called X-CREATE, for the systematic generation of test inputs (XACML requests). Differently from existing tools, XCREATE exploits the XACML Context Schema. In particular, the tool applies a XML-based methodology (XPT) to systematically produce a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using the UML Testing Profile for Enterprise Service Choreographies

    Publication Year: 2010, Page(s):12 - 19
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1021 KB) | HTML iconHTML

    In this paper we present an approach of using model-driven technologies for testing of service component interactions. We report on an industrial experiment with a novel combination of existing UML standards, i.e., the UML Testing Profile (U2TP), in conjunction with proprietary domain specific languages (DSLs). Many model-based testing (MBT) approaches use the UML 2 standard, but very few of them ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing the Architectural Support of Usability

    Publication Year: 2010, Page(s):20 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    Since usability requirements can have an impact on software architecture, they should be considered in the software architecture design. We present the method "Software ArchitecTure analysis of Usability Requirements realizatioN'' (SATURN) during which architects and analysts conduct well-established usability requirements engineering methods (usage context specification, walkthrough, brainstormin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Performance Cockpit Approach: A Framework For Systematic Performance Evaluations

    Publication Year: 2010, Page(s):31 - 38
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    Evaluating the performance (timing behavior, throughput, and resource utilization) of a software system becomes more and more challenging as today's enterprise applications are built on a large basis of existing software (e.g. middleware, legacy applications, and third party services). As the performance of a system is affected by multiple factors on each layer of the system, performance analysts ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy Reliability Model for Component-Based Software Systems

    Publication Year: 2010, Page(s):39 - 46
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    Component-based software engineering has been projected off-late as an appropriate paradigm for embedded systems development. However this becomes feasible only if the dependability attributes, such as reliability, of embedded systems can be properly estimated and guaranteed using appropriate models. Another recent trend is the prevalence of architectural modelling of software systems due to the a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology-Based Model Driven Engineering for Safety Verification

    Publication Year: 2010, Page(s):47 - 54
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (638 KB) | HTML iconHTML

    Safety assessment of dependable systems is a complex verification task that is desirable to be explicitly incorporated into the development cycle during the very early stages of a project. The main reason is that the cost to correct a safety error at the late stages of system development is excessively high. Towards this aim, we introduce an ontology-based model-driven engineering process for auto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Component Model for On-board Software Applications

    Publication Year: 2010, Page(s):57 - 64
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    Component-based development has become more common news than exotic novelty in mainstream industry. Its adoption has accrued high facilitation potential for software reuse and better organization of the product. Surprisingly however, component-oriented approaches have fared far worse in the domain of high-integrity real-time systems. One of the fundamental reasons of this difficulty stems from the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Design of Ground Control Station for Unmanned Aerial Vehicle: Borrowing from Design Patterns

    Publication Year: 2010, Page(s):65 - 73
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1825 KB) | HTML iconHTML

    Reusable software architectures and supporting components are the focus of an increasing number of software organizations attempting to reduce software costs. One essential attribute of reusable software architecture is that it effectively isolates the logical, or static, aspects of the application from any product specific variations in the physical architecture, or execution environment. A prima... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deployment Modelling and Synthesis in a Component Model for Distributed Embedded Systems

    Publication Year: 2010, Page(s):74 - 82
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    We present an approach to combine model-driven and component-based software engineering of distributed embedded systems. Specifically, we describe how deployment modelling is performed in two steps, and present an incremental synthesis of runnable representations of model entities on various abstraction levels. Our approach allows for flexible reuse opportunities, in that entities at different lev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constructing Component-Based Systems Directly from Requirements Using Incremental Composition

    Publication Year: 2010, Page(s):85 - 93
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    In software engineering, system construction normally starts from a requirements specification that has been engineered from raw requirements in a natural language. Such a specification is derived from intermediate requirements models such as use case models. These models at best only approximate the raw requirements. In this paper we propose a component-based approach that maps raw requirements d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Component Protocol Generation and Verification of Components

    Publication Year: 2010, Page(s):94 - 101
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (393 KB) | HTML iconHTML

    In several works a method was suggested to overcome the lack of signature-based composition currently enabled in component-based and service-oriented architectures (SOA). Several approaches allow to encode non-functional properties of a single component in a contract (component protocol) where the remote calls to a component are taken into consideration. Component protocols ensures that bugs or un... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Taxonomy of Software Composition Mechanisms

    Publication Year: 2010, Page(s):102 - 110
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    Software composition aims to provide mechanisms for systematic construction based on well-defined software units. Various software composition mechanisms have been defined in the literature for different kinds of software units. In component-based development, it is desirable to have software units and composition mechanisms that support automated, systematic construction. In this paper, we first ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating Behavioral Descriptions into a Component Model for Embedded Systems

    Publication Year: 2010, Page(s):113 - 118
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    When component-based development is applied to distributed embedded systems, which are often safety-critical and subject to real-time constraints, it is of significant importance that reliable predictions of functional and extra functional properties can be derived at design-time. Preferably, analysis should be performed in early development phases, where the cost of modifying the design is lower.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adapting Component Behaviours Using Interface Automata

    Publication Year: 2010, Page(s):119 - 122
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    One of the principal goal of Component-Based Software Engineering (CBSE) is to allow the reuse of components in diverse situations without affecting their codes. To reach this goal, it is necessary to propose approaches to adapt a component with its environment when behavioural mismatches occur during their interactions. In this paper, we present a formal approach based on interface automata to ad... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of Heterogeneous Context Resources in Ubiquitous Environments

    Publication Year: 2010, Page(s):123 - 126
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    Ubiquitous environments provide families of context-aware applications that are capable of exploiting the user mobility as well as the device variability. Typically, these applications retrieve context information from local and remote providers and react accordingly to the detected variations. However, this must be done by considering the heterogeneity of devices and protocols found in ubiquitous... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.