Scheduled Maintenance on March 25th, 2017:
Single article purchases and IEEE account management will be unavailable from 4:00 AM until 6:30 PM (ET). We apologize for the inconvenience.
By Topic

2011 18th Asia-Pacific Software Engineering Conference

5-8 Dec. 2011

Filter Results

Displaying Results 1 - 25 of 61
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (150 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (212 KB)
    Freely Available from IEEE
  • Message from the Conference Co-Chairs

    Publication Year: 2011, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (95 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Co-Chairs

    Publication Year: 2011, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (100 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2011, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2011, Page(s):xiii - xv
    Request permission for commercial reuse | PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2011, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • A Simultaneous Project Scheduling and Resource Binding Method Based on the Load-Capacity Model

    Publication Year: 2011, Page(s):1 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    To evaluate the feasibility of a new software development project in a situation in which two or more projects are being implemented concurrently, it is necessary to consider not only software development workload but also residual capacity of the organization. Therefore, the authors proposed the Load-Capacity Model for verifying feasibility at an early stage of the software development project. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Scheduling of Software Projects Using Reinforcement Learning

    Publication Year: 2011, Page(s):9 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    We compute optimal scheduling policies for software development projects. We use reinforcement learning as the optimization technique. Our approach is based on a formal, stochastic scheduling model that explicitly captures the strong feedback between the tasks in software development ("ripple effects"). For sample projects, we compute the optimal policy, simulate the project, and analyze the task ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing Teamwork Performance in Software Engineering Education: A Case in a Software Engineering Undergraduate Course

    Publication Year: 2011, Page(s):17 - 24
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    Teamwork skills are important and even essential for software engineering professionals. Although there are rich research results on teamwork skill development and assessment in other engineering disciplines, more research is required on effective approaches in software engineering education as teamwork plays a more fundamental role with some special requirements. This paper presents a novel asses... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proving Non-interference on Reachability Properties: A Refinement Approach

    Publication Year: 2011, Page(s):25 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    This paper proposes an approach to prove interference freedom for a reach ability property of the form AG (ψ =>; EF Φ) in a B specification. Such properties frequently occur in security policies and information systems. Reach ability is proved by constructing using stepwise algorithmic refinement an abstract program that refines AG (ψ =>; EF Φ). We propose proof o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Memory Leak Detection Based on Memory State Transition Graph

    Publication Year: 2011, Page(s):33 - 40
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    Memory leak is a common type of defect that is hard to detect manually. Existing memory leak detection tools suffer from lack of precise interprocedural alias and path conditions. To address this problem, we present a static interprocedural analysis algorithm, which captures memory actions and path conditions precisely, to detect memory leak in C programs. Our algorithm uses path-sensitive symboli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Techniques for Analysing PDF Malware

    Publication Year: 2011, Page(s):41 - 48
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (981 KB) | HTML iconHTML

    Today, PDF is one of the widely used applications for sharing documents. Some of the important factors for the popular use of the PDF application are due to its platform independency and rich digital offerings such as ability to include multimedia files, direct URL access and HTTP communication. However its wider acceptance among the user community has also attracted the attackers to develop and s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Derivation and Formal Verification of a Mode Logic for Layered Control Systems

    Publication Year: 2011, Page(s):49 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (491 KB) | HTML iconHTML

    Modes are widely used to structure the behaviour of control systems. For many such systems, derivation and verification of a mode logic is challenging due to a large number of modes and complex mode transitions. In this paper we propose an approach to deriving, formalising and verifying consistency of a mode logic for fault tolerant control systems. We demonstrate how to use Failure Modes and Effe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stepwise Validation of Formal Specifications

    Publication Year: 2011, Page(s):57 - 64
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    This paper explores the possibility to incorporate validation in the stepwise development process of formal specifications. Formal methods based on refinement break the intractable proof of the correctness of implementation into a sequence of many smaller proofs. Likewise, the validation of the specification could be broken into smaller steps associated to refinements with the technique of animati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Use Cases Modeling for Scalable Model-Checking

    Publication Year: 2011, Page(s):65 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1112 KB) | HTML iconHTML

    Formal methods are effective techniques for automating software verifications to satisfy quality and reliability. However, the application of these techniques within industrial settings remains limited due to the complexity of produced models. Context-aware verification can circumvent this complexity by reducing the scope of the verification to some specific environmental conditions. We previously... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A "Vibration" Method for Automatically Generating Test Cases Based on Formal Specifications

    Publication Year: 2011, Page(s):73 - 80
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB) | HTML iconHTML

    Several approaches to test case generation based on formal specifications have been put forward, but how to automatically generate test cases to ensure that all of the representative program paths of the corresponding program are traversed still remains an open problem. In this paper, we describe a new technique called "Vibration" method to tackle this problem. The method focuses on a heuristic pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Verification of Software Designs in Hierarchical State Transition Matrix with SMT-based Bounded Model Checking

    Publication Year: 2011, Page(s):81 - 88
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Hierarchical State Transition Matrix (HSTM) is a table-based modeling language for developing designs of software systems. Although widely used and adopted by (particularly Japanese) software industry, there is still lack of mechanized formal verification supports for conducting rigorous and automatic analysis to improve reliability of HSTM designs. In this paper, we first present a formalization ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intrusive Test Automation with Failed Test Case Clustering

    Publication Year: 2011, Page(s):89 - 96
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB) | HTML iconHTML

    Regression testing is an indispensable process in software development, which ensures stable features have not been adversely broken by new changes. When GUI plays an important role in an application, a popular choice to automate the tests is applying GUI Capture/Replay tools. Unfortunately, in many applications which render images as output, the correctness of a replay run can no longer be straig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Automated Analysis of Errors for BPM Processes Modeled Using an In-house Infosys Tool

    Publication Year: 2011, Page(s):97 - 105
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (537 KB) | HTML iconHTML

    We chalk out a procedure for automatically analyzing BPM processes modeled using an in-house Infosys requirements modeling tool, called InFlux. By this analysis, we are able to check the processes for syntactical errors as well as errors due lack of soundness. In the first step of the analysis these processes are checked for syntactical errors using simple graph-search techniques. If these process... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture-Centric Model-Driven Web Engineering

    Publication Year: 2011, Page(s):106 - 113
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (719 KB) | HTML iconHTML

    To be adopted by architects, modelling approaches must provide a means to leverage the software patterns and architectural styles that are relevant to development practice, instead of those proscribed by black-box CASE tools. Architecture-Centric Model-Driven Software Development (AC-MDSD) is a modelling approach that provides architectural control of the generated application. However, AC-MDSD pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Executable and Translatable UML -- How Difficult Can it Be?

    Publication Year: 2011, Page(s):114 - 121
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (405 KB) | HTML iconHTML

    Executable and Translatable UML enables Model-Driven Architecture by specifying Platform-Independent Models that can be automatically transformed into Platform-Specific Models through model compilation. Previous research shows that the transformations result in both efficient code and consistency between the models. However, there are neither results for the effort of introducing the technology in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.