2012 Eighth International Conference on the Quality of Information and Communications Technology

3-6 Sept. 2012

Filter Results

Displaying Results 1 - 25 of 81
  • [Front cover]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (624 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (186 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • Message from Conference Chairs

    Publication Year: 2012, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (159 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Beyond Service Management: The Next Performance Advantage for All Disciplines

    Publication Year: 2012, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    The majority of the worldwide economy is service, and the conversion of processes and functions into services has dominated software and other engineering thinking for the past several years. The technical approaches necessary to use a service approach are only part of the challenge. Service management practices that began in traditional service disciplines are also potential performance enhancers... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality Aspects in CLOUD Computing

    Publication Year: 2012, Page(s):4 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    CLOUD Computing is surrounded by hype and commercial supplier claims. However, there is emerging experience of real benefits and alongside a set of challenges for CLOUD Computing to reach wide acceptance. Major problems concern performance, security, privacy and interoperation - all of which have strong quality aspects. CLOUD Computing faces not only technical challenges but also legal, business (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality-Aware Mashup Composition: Issues, Techniques and Tools

    Publication Year: 2012, Page(s):10 - 19
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1270 KB) | HTML iconHTML

    Web mashups are a new generation of applications based on the composition of ready-to-use, heterogeneous components. In different contexts, ranging from the consumer Web to Enterprise systems, the potential of this new technology is to make users evolve from passive receivers of applications to actors actively involved in the creation of their artifacts, thus accommodating the inherent variability... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Web Quality Models and Questionnaires for Web Applications Understanding and Evaluation

    Publication Year: 2012, Page(s):20 - 29
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    As web applications (WebApps) continue to gain popularity, evaluating new generation WebApps poses challenges regarding use of current quality models and their included (sub-) characteristics. For instance, communicability and sense of community are characteristics often neglected in quality modeling. Considering the recently issued ISO/IEC 25010/25012 standards, we utilize our previously develope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Event Detection for Software Product Quality Monitoring

    Publication Year: 2012, Page(s):30 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (20867 KB) | HTML iconHTML

    Collecting product metrics during development or maintenance of a software system is an increasingly common practice that provides insight and control over the evolution of a product's quality. An important challenge remains in interpreting the vast amount of data as it is being collected and in transforming it into actionable information. We present an approach for discovering significant events ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Runtime Quality Measurement Framework for Cloud Database Service Systems

    Publication Year: 2012, Page(s):38 - 46
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    Cloud database services promise high performance, high availability, and elastic scalability. The system that provides cloud database services must, hence, be designed and managed in a way to achieve these high quality objectives. There are two technology trends that facilitate the design and management of cloud database service systems. First, the development of distributed replicated database so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lessons Learnt in the Implementation of CMMI® Maturity Level 5

    Publication Year: 2012, Page(s):47 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    CMMI® has proven benefits in software process improvement. Typically, organisations that achieve a CMMI level rating improve their performance. However, CMMI implementation is not trivial, in particular for high maturity levels, and not all organisations achieve the expected results. Certain CMMI implementation problems may remain undetected by SCAMPISM since only a sample of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigating the Impact of Personality and Temperament Traits on Pair Programming: A Controlled Experiment Replication

    Publication Year: 2012, Page(s):57 - 65
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    This paper presents the partial results of an extended replicated pair programming experiment, conducted at the Alexander Technological Educational Institute of Thessaloniki, Greece during the two semesters of the year 2009-10. The entire study involved 160 second semester students attending a Software Engineering advanced programming course with pair programming and test-driven development as tea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Metamodel-Based Approach for Customizing and Assessing Agile Methods

    Publication Year: 2012, Page(s):66 - 74
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1205 KB) | HTML iconHTML

    In today's dynamic market environments, producing high quality software rapidly and efficiently is crucial. In order to allow fast and reliable development processes, several agile methodologies have been designed and are now quite popular. Although existing agile methodologies are abundant, companies are increasingly interested in the construction of their own customized methods to fit their spec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-Driven Development for Requirements Engineering: The Case of Goal-Oriented Approaches

    Publication Year: 2012, Page(s):75 - 84
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (457 KB) | HTML iconHTML

    Goal-Oriented Requirements Engineering (GORE) has received increasing attention over the past few years. There are several goal-oriented approaches, each one using different kinds of models. We argue that it would be useful to relate them or even perform transformations among them automatically, in order to understand their similarities and differences, their advantages and disadvantages, allowing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complex Events Specification for Properties Validation

    Publication Year: 2012, Page(s):85 - 94
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (406 KB) | HTML iconHTML

    Run-time validation of non-functional properties becomes very important to evaluate and keep under control dynamic and evolving systems. Event-driven monitoring is a commonly adopted approach for observing and analyzing that these properties are satisfied. As the events to be observed become more and more complex, a powerful events specification language is needed. In this paper we present a compl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Foreword: ICT verification and validation

    Publication Year: 2012, Page(s):95 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (86 KB)

    Summary form only given. Some of the mandatory keywords for ICT software are heterogeneity, openness and continuous evolution. These requirements, that represent per se quite difficult tasks to be satisfied, become even more critical when ICT applications have also to fulfill technical and semantic interoperability, as well as security and trust concerns. In this scenario the Verification and Vali... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating Test and Risk Management

    Publication Year: 2012, Page(s):97 - 102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    In recent years, enterprises have recognised the discipline of Enterprise Risk Management (ERM) as an integral part for leading their business to success and have started to establish dedicated functions as to actively manage risks from different sources such as currency exchange risk, credit risk, etc. Risk management has also proven to be an effective and efficient contribution to the governance... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A GUI Testability Problem: A Case Study in the Railway Signaling Domain

    Publication Year: 2012, Page(s):103 - 107
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    We report the experience of the validation team of a railway signalling company when addressing the problem of testing an equipment configuration tool. The two contrasting issues that add to the complexity of the task are: the tool includes a Graphical User Interface built on standard windowing systems, and the configuration produced by the tool, when loaded on the equipment, has a potential impac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coordinating Exceptions of Java Systems: Implementation and Formal Verification

    Publication Year: 2012, Page(s):108 - 113
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB) | HTML iconHTML

    The exceptional behavior of software has become an important issue in software development since software may collapse if exception-handling is not implemented accordingly. Aiming at this problem, the Coordinated Atomic Action (CAA) model was proposed: it guides users to treat exceptions in a well-organized way, maintaining the whole system stable. However, deriving a system implementation from a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Association Rules to Identify Similarities between Software Datasets

    Publication Year: 2012, Page(s):114 - 119
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    A number of V&V datasets are publicly available. These datasets have software measurements and defectiveness information regarding the software modules. To facilitate V&V, numerous defect prediction studies have used these datasets and have detected defective modules effectively. Software developers and managers can benefit from the existing studies to avoid analogous defects and mistakes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.