By Topic

2012 IEEE 36th Annual Computer Software and Applications Conference

16-20 July 2012

Filter Results

Displaying Results 1 - 25 of 123
  • 36th Annual IEEE Computer Software and Applications Conference (COMPSAC 2012) [Cover]

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (445 KB)
    Freely Available from IEEE
  • Proceedings 36th Annual IEEE International Computer Software and Applications Conference COMPSAC 2012 - Volume I: Main Conference [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • Proceedings 36th Annual IEEE International Computer Software and Applications Conference COMPSAC 2012 - Volume I: Main Conference [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - xv
    Request permission for commercial reuse | PDF file iconPDF (166 KB)
    Freely Available from IEEE
  • Message from the Standing Committee Chair

    Publication Year: 2012, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (142 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs - COMPSAC 2012

    Publication Year: 2012, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (182 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2012, Page(s):xx - xxvii
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s):xxviii - xxx
    Request permission for commercial reuse | PDF file iconPDF (117 KB)
    Freely Available from IEEE
  • Effective Statistical Fault Localization Using Program Slices

    Publication Year: 2012, Page(s):1 - 10
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (653 KB) | HTML iconHTML

    Recent techniques for fault localization statistically analyze coverage information of a set of test runs to measure the correlations between program entities and program failures. However, coverage information cannot identify those program entities whose execution affects the output, which weakens the aforementioned correlations. Thus, this paper proposes a novel statistical fault localization ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recovering Traceability Links between Code and Documentation for Enterprise Project Artifacts

    Publication Year: 2012, Page(s):11 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (794 KB) | HTML iconHTML

    Recovering traceability is an important software goal in the reverse engineering process. Conventional methods based on the information retrieval model have recovered traceability links for supporting software engineers. In such methods, the call relations in the source code directly impact the accuracy of traceability links in large projects, e.g. enterprise projects. This paper uses a source cod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Source Code Recommender System to Support Newcomers

    Publication Year: 2012, Page(s):19 - 24
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (489 KB) | HTML iconHTML

    Newcomers in a software development project often need assistance to complete their first tasks. Then a mentor, an experienced member of the team, usually teaches the newcomers what they need to complete their tasks. But, to allocate an experienced member of a team to teach a newcomer during a long time is neither always possible nor desirable, because the mentor could be more helpful doing more i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workload-Aware Online Anomaly Detection in Enterprise Applications with Local Outlier Factor

    Publication Year: 2012, Page(s):25 - 34
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (655 KB) | HTML iconHTML

    Detecting anomalies are essential for improving the reliability of enterprise applications. Current approaches set thresholds for metrics or model correlations between metrics, and anomalies are detected when the thresholds are violated or the correlations are broken. However, we have found that the dynamic workload fluctuating over multiple time scales causes system metrics and their correlations... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Metrics-Based Data Mining Approach for Software Clone Detection

    Publication Year: 2012, Page(s):35 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (537 KB) | HTML iconHTML

    The detection of function clones in software systems is valuable for the code adaptation and error checking maintenance activities. This paper presents an efficient metrics-based data mining clone detection approach. First, metrics are collected for all functions in the software system. A data mining algorithm, fractal clustering, is then utilized to partition the software system into a relatively... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Petri Net-Based Byzantine Fault Diagnosis Method for Service Composition

    Publication Year: 2012, Page(s):42 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1392 KB) | HTML iconHTML

    Service composition is an important means for integrating the individual Web services to create new value added systems that can satisfy complex requirements. However, it is a challenge to enforce fault diagnosis mechanism for those applications due to the uncertainty of service quality in distributive and heterogeneous environment. In this paper, a Byzantine fault diagnosis method for service com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Random Test Case Generation for Combinatorial Testing

    Publication Year: 2012, Page(s):52 - 61
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (522 KB) | HTML iconHTML

    Random testing (RT), a fundamental software testing technique, has been widely used in practice. Adaptive random testing (ART), an enhancement of RT, performs better than original RT in terms of fault detection capability. However, not much work has been done on effectiveness analysis of ART in the combinatorial test spaces. In this paper, we propose a novel family of ART-based algorithms for gene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Capacity Evaluation of Multi-modal Network Notification Service

    Publication Year: 2012, Page(s):62 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (523 KB) | HTML iconHTML

    A notification service alerts a large number of recipients to attend to important or emergency events. Prompt notification using multiple modes is critical to handle a disaster. This paper proposes an "escalation hierarchy" method as an enhancement to the combinatorial testing approach to provide capacity evaluation of a notification service involving interaction of multiple factors. Our trial of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preemptive Regression Test Scheduling Strategies: A New Testing Approach to Thriving on the Volatile Service Environments

    Publication Year: 2012, Page(s):72 - 81
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (724 KB) | HTML iconHTML

    A workflow-based web service may use ultra-late binding to invoke external web services to concretize its implementation at run time. Nonetheless, such external services or the availability of recently used external services may evolve without prior notification, dynamically triggering the workflow-based service to bind to new replacement external services to continue the current execution. Any in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trustworthiness of Open Source, Open Data, Open Systems and Open Standards

    Publication Year: 2012, Page(s): 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB) | HTML iconHTML

    A compelling direction of improving trustworthiness of software-based systems is to open their ingredients: Open source software, open data sets, open system interfaces like open technical standards allow constructing major or up to all elements of a software-based systems. That gives means to use the wisdom of the crowd to assess and evaluate the quality, security and trustworthiness of software ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • (Open) Data Quality

    Publication Year: 2012, Page(s):83 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB) | HTML iconHTML

    Requirements on the quality of open data depend on the exact context of a software and has to be set specifically for the different kinds of data in software-based systems. Quality of open data characteristics according to ISTQB include aspects of : currency; relevance; consistency; reliability; correctness; and completeness. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigating Human Factors through Amassing Large-Scale OSS Repositories

    Publication Year: 2012, Page(s):85 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    Human factor has been ignored in many of the existing research, which leads to a superficial understanding of the problems facing practitioners. Large-Scale open source software repositories open an opportunity to do digital archeology of software. Researchers and practitioners could investigate human factors with large quantities of data, which may lead to new insights into current software pract... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting trust via open information spaces

    Publication Year: 2012, Page(s):87 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (133 KB) | HTML iconHTML

    It is argued that creating better system transparency leads to an increased understanding of a system, which gives users better indicators for placing their trust. This way of thinking is behind the author's interest for open systems. By opening up the source, the interfaces, the standardisation or the operational data, one gains the ability to better understand, and therefore to potentially trust... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating Software Product Lines: A Study of Reuse versus Stability

    Publication Year: 2012, Page(s):89 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1353 KB) | HTML iconHTML

    To achieve large-scale reuse and accelerate time-to-market, integration of multiple software product lines (SPLs) is becoming a trend. The integration of independently-developed SPLs enables the derivation of new products on demand in a particular domain. The basic goal is to foster the reuse of previously-implemented features across a family of independently-developed SPLs. The programming techni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences of a Product Line Migration Project

    Publication Year: 2012, Page(s):99 - 104
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (545 KB) | HTML iconHTML

    Product lines are a specialized type of software architecture with a very good reuse potential and an improved quality for software systems based on the customized mass production concept. Many software companies own several projects and have extensive experiences with single product developments. Here, any further automation of the software development process and enhancements in the quality of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Kutulu: A Domain-Specific Language for Feature-Driven Product Derivation

    Publication Year: 2012, Page(s):105 - 110
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB) | HTML iconHTML

    Software Product Line Engineering (SPLE) defines processes to facilitate the development of a family of products in a pre-defined market more effectively. Its success depends on implementation of these processes utilizing best practices with proper tool support. This paper describes how to enhance domain design and variation management processes of SPLE with a domain-specific language (DSL), namel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.