By Topic

Computer Software and Applications Conference, 1999. COMPSAC '99. Proceedings. The Twenty-Third Annual International

Date 29-29 Oct. 1999

Filter Results

Displaying Results 1 - 25 of 93
  • Proceedings. Twenty-Third Annual International Computer Software and Applications Conference (Cat. No.99CB37032)

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (1526 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1999, Page(s):476 - 478
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • A protocol and simulation for distributed communicating firewalls

    Publication Year: 1999, Page(s):74 - 79
    Cited by:  Papers (3)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    The concept of distributing firewalls into the Internet was previously presented for the purpose of pushing LAN attacks away from a single firewall (R.N. Smith and S. Bhattacharya, 1997; 1999). The paper presents a protocol for firewalls to communicate information to enable distributed firewalls to isolate LAN attacks. Currently firewalls are used to protect a single LAN or extranet of collaborati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of traffic control system based on stochastic timed Petri net models

    Publication Year: 1999, Page(s):436 - 441
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    We present a new modeling method to evaluate the performance indices of traffic control systems where each intersection has two or four phases. The method is based on the stochastic timed Petri net models of isolated intersections. It considers one direction of traffic along a street each time, and the interactions between traffic of different directions are partially approximated by statistical m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generic approach of static analysis for detecting runtime errors in Java programs

    Publication Year: 1999, Page(s):67 - 72
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    This paper presents a generic approach to statically analyze Java programs in order to detect potential errors (bugs). We discuss a framework that supports our approach and carries out the static analysis of Java code automatically. Our approach can detect potential bugs and report them before the program is executed. For a Java class, invariants related to the category of error under examination ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digiket: decentralized architecture for worldwide electronic market

    Publication Year: 1999, Page(s):430 - 435
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB)

    Proposes a new decentralized architecture for electronic markets, called Digiket (DIGItal marKET), as an alternative to traditional virtual malls. The present Internet commerce consists of relatively small closed markets; so, new frameworks that enable Web-based stores and malls to share their services worldwide are strongly desired. Digiket separates electronic commerce functions (such as content... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The unique reference NCSLOC metric

    Publication Year: 1999, Page(s):316 - 317
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    We propose that by utilizing certain metrics and gathering operating system information it can be determined if a file is a version or duplicate of another file on the system. In a software development environment, knowing what files are versions of other files would be beneficial in many areas. It would help a manager estimate the amount of code that needs to be modified in a reengineering projec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic software architecture slicing

    Publication Year: 1999, Page(s):61 - 66
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    Software architectural design is becoming increasingly important in software engineering, as being manifested through various recent developments in the field such as the component-based software engineering paradigm and the distributed and collaborative computing paradigm. Abstraction is such a mechanism as the key concept underpinning software architecture, namely hiding the immense amount of de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Here, there and everywhere: the future of software engineering education corporate view

    Publication Year: 1999, Page(s): 245
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Signature management in workflow systems

    Publication Year: 1999, Page(s):424 - 429
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    Signatures have been widely used in paper-based workflow systems for different purposes. Currently, there are many studies on computerizing workflow systems. There are also studies on implementing signatures in electronic media, but the diversified purposes of a signature in workflow makes a straightforward implementation of digital signature schemes inadequate to satisfy the needs of an electroni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Patterns in postmortems

    Publication Year: 1999, Page(s):314 - 315
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB)

    In the face of rapidly changing technology and increasing customer demands for newer, faster, better products, companies are looking for ways to improve development processes. Reuse has been proposed as a way to take advantage of current best practices and make them known throughout a company. The paper describes the use of postmortems and patterns, a powerful combination for capturing and sharing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using system dynamics modeling to manage projects

    Publication Year: 1999, Page(s):213 - 217
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    The paper focuses on improving the planning and tracking abilities of software projects through the utilization of system dynamics modeling. A prototyped software project management tool, which incorporates a system dynamics model of the concurrent incremental development process, was developed and is described. The tool enables project personnel to plan and track a project in terms of schedule, b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for top-down cost estimation of software development

    Publication Year: 1999, Page(s):322 - 323
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    The Function Point Method, estimation by analogy, and algorithmic modeling are three of the most commonly applied methods used to estimate the costs and worker hours needed for a software development project. These methods, however, require a deep and wide expertise in particular areas and may still result in unacceptable discrepancies between the estimated costs and the actual costs. The paper pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal software release policy based on cost and reliability with testing efficiency

    Publication Year: 1999, Page(s):468 - 473
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    We study the optimal software release problem considering cost, reliability and testing efficiency. We first propose a generalized logistic testing effort function that can be used to describe the actual consumption of resources during the software development process. We then address the problem of how to decide when to stop testing and when to release software for use. In addressing the optimal ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An industrial application of an integrated UML and SDL modeling technique

    Publication Year: 1999, Page(s):54 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    The use of rigorous software development techniques provides opportunities for the early detection of defects in software requirements and design. Early detection and correction of defects can, in turn, reduce the time spent on implementing defective software models. A number of rigorous techniques that target specific development phases exist. Industrial use of these techniques requires the devel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software engineering education from a UK academic's perspective

    Publication Year: 1999, Page(s):243 - 244
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    Within the UK, as for the rest of the world, there is an acknowledged shortage of highly skilled software engineers. In UK academia, there is a chronic shortage of able candidates to fill posts at all levels, from research students (through research fellows and lecturers) to professors. It is clear from salaries being offered in industry that it is a “seller's market”. However, since t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lessons learned applying software engineering principles to visual programming language application development

    Publication Year: 1999, Page(s):416 - 421
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB)

    Visual programming languages make software design accessible even to untrained programmers, but basic software engineering practices must still be followed to create a usable product. This paper describes the process by which software was developed to control sophisticated laboratory equipment for a radio frequency interference monitoring system (RFIMS). Development of requirements and specificati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Looking beyond software to understand software design patterns

    Publication Year: 1999, Page(s):312 - 313
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    Examples facilitate learning new concepts. The examples are often more useful when they are familiar and allow one to relate new concepts to familiar ones. The paper describes using examples of software design patterns found outside of software. By using common examples from everyday life, one is not burdened with reading source code to understand a higher design principal View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Failure planning in STESCA

    Publication Year: 1999, Page(s):334 - 335
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    Mission specification for autonomous or robotic vehicles can be fairly straightforward if everything goes well. However, if part of the mission fails for any reason, the vehicle must have some type of backup plan. Unfortunately, this failure planning adds to the complexity of the overall mission. We are developing the spreadsheet approach for mission specification to make failure planning as easy ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation and evaluation of an automatic personal workflow extraction method

    Publication Year: 1999, Page(s):206 - 212
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB)

    We report the implementation and evaluation of a method to automatically extract a workflow during a user's ordinary use of a personal information management system (PIM). Our method accumulates the target event and time of the user's operations such as registrations and references. In order to organize related work events, our method extracts relations between events by calculating the frequency ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A proxy server structure and its cache consistency mechanism at the network bottleneck

    Publication Year: 1999, Page(s):278 - 283
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    The response time, bandwidth usage and server load are three representative performance metrics that are used for proxy cache consistency mechanisms. However, the primary metric affecting the overall performance can be different depending on the situation. At a network bottleneck, such as the inter-continental backbone, the network bandwidth is limited. Also, the response time is a basic performan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating goal-oriented test cases

    Publication Year: 1999, Page(s):110 - 115
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    The paper describes an AI planner assisted approach to generate test cases for system testing based on high level test objectives. Test generation is based on an extended UML model of the system under test and a mapping of high level test objectives into initial and goal conditions of the planner. We illustrate the use of this approach on a series of high level test objectives one might apply to a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OBL: a formal deduction method for object-oriented systems

    Publication Year: 1999, Page(s):450 - 455
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    Object Behavior Logic (OBL) is proposed in order to specify object oriented system behavior. An inference engine is introduced for verifying the consistency of the systems based on the specification in OBL. OBL uses the paradigms of state machine to catch the dynamic aspect of object oriented systems in formal specification, plus the features of object oriented concepts such as inheritance, instan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A useful approach to developing reverse engineering metrics

    Publication Year: 1999, Page(s):320 - 321
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    If software metrics are useful in a forward software engineering environment, they are vital in a reverse engineering environment. We are endeavouring to discover approaches to developing reverse engineering metrics for software engineers who need them for reverse engineering legacy systems. The major contribution of the paper is the presentation of a systematic research base and a hierarchical ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A decision support system for software reliability engineering strategy selection

    Publication Year: 1999, Page(s):376 - 381
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    This decision support system was built to assist project managers to design and tailor the software development process to their specific projects for achieving required software reliability values. The decision support system has two subsystems: a knowledge-based expert system for reliability engineering strategy selection and a process simulator for strategy assessment. We present here the knowl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.