By Topic

2012 Third World Congress on Software Engineering

6-8 Nov. 2012

Filter Results

Displaying Results 1 - 25 of 52
  • [Cover art]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (916 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2012, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (105 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committee

    Publication Year: 2012, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Keynote speakers [3 abstracts]

    Publication Year: 2012, Page(s):xii - xvi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (162 KB)

    Provides an abstract for each of the three e presentations and a brief professional biography of each presenter. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reviewers

    Publication Year: 2012, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Network Model Construction and Cascading Effect Analysis for Software Systems

    Publication Year: 2012, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    As the functional requirements of software keep growing, the structure and scale of software systems become more and more complicated. In order to analyze the topology and quality of complex software systems, the theory of complex networks has been introduced to model and solve software engineering problems. This paper regards functions in the source code of the software as nodes, function-calls i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Agent-based Logic Description Language for Dynamic Evolution

    Publication Year: 2012, Page(s):15 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (174 KB) | HTML iconHTML

    Application of Agent technology to software evolution is considered to be a possible approach to make software be adaptable to environment change. The dynamic characteristic of environment causes difficulty to predict and control the act of Agent in software. Well-defined evolution logic is helpful to describe and limit individual behavior of Agent and coordination among Agents. In this paper, in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of Concept Similarity Algorithm between Steel Ontologies

    Publication Year: 2012, Page(s):19 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (139 KB) | HTML iconHTML

    Concepts similarity calculation is the basis for ontology mapping. Vocabulary, meaning of the word, property and instance of concepts are the important facts when calculating concepts similarity. All the facts above are combined and a composite method is proposed to calculate concepts similarity in this paper. In order to keep the effectiveness and comprehensiveness of the method, we combine conce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query Expansion Based on Mongolian Semantics

    Publication Year: 2012, Page(s):25 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    Accurately and effectively measuring the similarity between terms is one way to enhance the performance of information retrieval systems. At present, the extended data source which is used for Mongolian semantic query expansion is still not perfect. A new query expansion method based on Mongolian semantics is proposed for expressing the user's intention more precisely. This query expansion method ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structural Join Oriented XML Data Compression

    Publication Year: 2012, Page(s):29 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    Aiming at the problem of failing to support effective structural join on compressed data of existing XML Data compressors, this paper proposes a new Compressor Structural Join Oriented XML Data Compressor which makes structural join possible by giving all elements and attribute names in document a unique region encoding. This paper also provides a definition of the Same Sub Tree(SST) and an algori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Activity Page Based Functional Test Automation for Android Application

    Publication Year: 2012, Page(s):37 - 40
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (549 KB)

    Current status of mobile application testing is commonly used artificial test. In order to reduce the test costs and improve the availability and system stability of the android mobile applications, through an activity page based model to optimize the page crawling algorithm to generate a test case sequence, combined with some open source tools and frameworks, this paper proposed a low cost practi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assertion-Directed Test Case Generation

    Publication Year: 2012, Page(s):41 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    How to effectively generate test cases is the key to software testing. In our previous research, we applied the program dynamic invariant as feedback to guide test case generation, and that can reduce the redundancy and improve the coverage effectively. However, the repeated extraction of program dynamic invariants significantly increased the burden of test case generation. To address this issue, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coverage Criteria Guided Web Application Interactions Testing

    Publication Year: 2012, Page(s):46 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (201 KB) | HTML iconHTML

    Web applications are widely used in people's everyday life and are inherent interactive applications since their emergence. The structures of web applications are complex. Furthermore, the interaction features exacerbate their complexity. How to ensure their reliability and quality presents a challenge to software testers. In this paper, according to the features of web applications, we have forma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model Checking Based Conformance Testing for Web Applications

    Publication Year: 2012, Page(s):51 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    Usually, conformance testing is done in a way that testers having a running application and its specification, test whether the implementation of the application conforms to its specification. Only when deploying the web application on the server, users can access it through the client software called web browsers. The features of web browsers influence the functionalities of web applications. So,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Roles-based Access Control Modeling and Testing for Web Applications

    Publication Year: 2012, Page(s):57 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    Web applications are widely used in people's everyday life. They have permeated financial sectors, banking sectors, e-business and online shopping. Usually, different users have different permissions on these applications. Additionally, role-based access control (RBAC) mechanisms have been wildly integrated into web applications. The security and correctness of web applications are the most fundam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Model Checking and FMEA Analysis with Deterministic Scheduling of Transition-Labeled Finite-State Machines

    Publication Year: 2012, Page(s):65 - 72
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    A very successful tool for model-driven engineering of embedded systems is finite-state machines whose transitions are labeled with expressions of a common-sense logic. The deployment of models to different platforms and different programming languages makes it more imperative to confirm that the models are correct. However, systems are usually composed of concurrent behaviours, which complicates ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Representations of Algebraic Dcpo's by Information Systems and Abstract Bases

    Publication Year: 2012, Page(s):73 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (137 KB) | HTML iconHTML

    In this paper, notions of general algebraic information systems and dense abstract bases are introduced. Their relationships with algebraic dcpo's are investigated. It is shown that they both represent exactly the algebraic dcpo's. Technically, the corresponding categories of these three structures are equivalent with each other. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical Graph Models and Information Visualizaion

    Publication Year: 2012, Page(s):79 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (121 KB) | HTML iconHTML

    Graphs are the most common abstract structure encountered in computer science. Many modern systems, particular for graphics workstations, include structural information visualization. In this paper, we consider practical and general graph formalism called hierarchical graphs and present the Higres and Visual Graph systems aimed at supporting of information visualization on the base of hierarchical... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Subspace Culling for Continuous Collision Detection

    Publication Year: 2012, Page(s):83 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    This paper presents a novel efficient culling method for continuous collision detection (CCD) problem performed by dimension reduction in subspace. The basic idea is to use a fast one-dimension (1D) reduced filter and a fast two-dimension (2D) reduced filter that remove large amount of false positives and elementary tests between the primitives. The culling method could be combined with other tech... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User Satisfaction of Adaptation in Service-based Business Processes Execution

    Publication Year: 2012, Page(s):89 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    This paper proposes an approach to evaluate user satisfaction of adaptation in service-based business processes execution. First, Withdrawal business spanning graph is introduced to achieve adaptation of service-based business processes at run-time. Second, a set of well-defined Quality of Service (QoS) criteria is used to evaluate user satisfaction. Finally, three simulation examples of adaptatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Build Up Secure Internet Identity Management

    Publication Year: 2012, Page(s):97 - 100
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (129 KB) | HTML iconHTML

    In the current internet, it is hard to manage users' identities because of all kinds of security threats. To solve this problem, several elements to build secure internet identity management are introduced: global unified digital identity, cloud computing, and identity as a service and so on. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.