Scheduled System Maintenance
On Saturday, December 10, single article sales and account management will be unavailable from 5:00 AM-7:30 PM ET.
We apologize for the inconvenience.
By Topic

Proceedings First Asia-Pacific Conference on Quality Software

30-31 Oct. 2000

Filter Results

Displaying Results 1 - 25 of 36
  • Proceedings First Asia-Pacific Conference on Quality Software

    Publication Year: 2000, Page(s):iii - viii
    Request permission for commercial reuse | PDF file iconPDF (181 KB)
    Freely Available from IEEE
  • Proceedings 2000 International Workshop on Autonomous Decentralized System (Cat. No.00EX449)

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (727 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s): 335
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Quality improvement-the Six Sigma way

    Publication Year: 2000, Page(s):248 - 257
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    Six Sigma provides an effective mechanism to focus on customer requirements, through the improvement of process quality. In the Global Engineering Development Center of Tata Consultancy Services (TCS-GEDC) at Chennai, India, Six Sigma projects are being carried out with the objective of improving on-time delivery, product quality and in-process quality. This paper describes the application of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software acquisition management experience learnt in a multi discipline and multi contract project environment

    Publication Year: 2000, Page(s):239 - 247
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    This paper summarizes software acquisition management lessons learnt from a complex multidisciplinary and multi-contract environment. It also identifies a number of new measures for improvement in a current project. These new measures are then analyzed against the key process areas of the Software Acquisition Capability Maturity Model(R) (SA-CMM(R)) for their applicability an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieving quality software development for distributed environments

    Publication Year: 2000, Page(s):169 - 178
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    With the rapid advances of computer networking and wireless technologies, the applications of information technology have been drastically broadened. However, there are also more challenges in developing quality software for these applications. In this paper, recent advances to meet these challenges are discussed. In particular, among these advances, component-based software development, middlewar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to modify and test expired window logic

    Publication Year: 2000, Page(s):99 - 108
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    The windowing technique has been a popular method to address the Y2K problem. In fact, about 80% of the systems used this technique. Unfortunately, the windowing technique is a temporary solution and windows will expire some time later. This paper proposes several approaches to address the expired window problem including modification and testing techniques. In software modification, ripple effect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Abductive approach to prototyping data flow diagrams

    Publication Year: 2000, Page(s):306 - 311
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    In this paper, we propose to develop prototypes of data flow diagrams using a logical framework, which is based on an extension of logic programming to perform abductive reasoning (abductive logic programming). Based on the framework, we discuss how to represent a data flow diagram in a declarative manner as a set of logical sentences and outline a proof procedure. Given the declarative representa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TDL: a language for transition diagrams in the derivation of LOTOS specifications

    Publication Year: 2000, Page(s):226 - 235
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    Introduces a formalism which allows LOTOS specifications to be given in the form of transition diagrams (TDs). We argue that being able to use TDs as a design notation for LOTOS specifications would increase the quality of the software produced via a formal method, and ultimately this enhances LOTOS's acceptance by industry. The basis of our argument is that TDs are well-known and can be readily s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification analysis and test data generation by solving Boolean combinations of numeric constraints

    Publication Year: 2000, Page(s):267 - 274
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    In the analysis of state-based requirement specifications and in software test data generation, one often has to determine the satisfiability of Boolean combinations of numeric constraints. Theoretically this problem is undecidable, and practically many problem instances are very difficult. In this paper an extension to a Boolean constraint solver is described. The new tool can deal with variables... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object oriented design function points

    Publication Year: 2000, Page(s):121 - 126
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    Estimating different characteristics viz., size, cost, etc. of software during different phases of software development is required to manage the resources effectively. Function points measure can be used as an input to estimate these characteristics of software. The Traditional Function Point Counting Procedure (TFPCP) can not be used to measure the functionality of an Object Oriented (OO) system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BS 7925-2: the software component testing standard

    Publication Year: 2000, Page(s):139 - 148
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    This paper covers both the development of BS 7925-2 and compliance with the finished standard. The process used to produce BS 7925-2 is described by presenting a history of its development, showing how initial chaotic development evolved with experience into a systematic process. This process was found to bear a strong resemblance to the software engineering process, and borrowed techniques from i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing for imperfect integration of legacy software components

    Publication Year: 2000, Page(s):156 - 165
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB)

    In the manufacturing domain, few new distributed systems are built ground-up; most contain wrapped legacy components. While the legacy components themselves are already well-tested, imperfect integration can introduce subtle faults that are outside the prime target area of generic integration and system tests. One might postulate that focused testing for integration faults could improve the yield ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing of large number multiplication functions in cryptographic systems

    Publication Year: 2000, Page(s):89 - 98
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    Integer multiplication is one of the fundamental functions in cryptographic systems. Although much research has already been done on the testing of multiplication functions, most does not meet the need of cryptographic systems, where very large numbers are involved. Others provide only probabilistic algorithms. In this paper we propose an efficient deterministic algorithm for verifying large numbe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software quality prediction using mixture models with EM algorithm

    Publication Year: 2000, Page(s):69 - 78
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB)

    The use of the statistical technique of mixture model analysis as a tool for early prediction of fault-prone program modules is investigated. The expectation-maximum likelihood (EM) algorithm is engaged to build the model. By only employing software size and complexity metrics, this technique can be used to develop a model for predicting software quality even without the prior knowledge of the num... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object driven performance testing of Web applications

    Publication Year: 2000, Page(s):17 - 26
    Cited by:  Papers (14)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB)

    Performance of many Web sites depends on the load on the site at peak time under varying conditions. Performance testing is normally conducted in reasonably simulated environment with the help of performance testing tools. However, performance of a Web site depends on various parameters and each parameter must be tested under varying stress levels. It is not possible to draw a common denominator f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model and prototype tool to manage software risks

    Publication Year: 2000, Page(s):297 - 305
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1396 KB)

    Software industry is facing many types of risks that make software development projects miss their planned schedule, time and quality. Hence, the urge to manage such risks if one wants to avoid the above problems. However, available software risk management tools present many weaknesses and above all, they are few. This paper is a contribution to increase the number of tools in the library of soft... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal mechanism for assessing polymorphism in object-oriented systems

    Publication Year: 2000, Page(s):53 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    Although quality is not easy to evaluate since it is a complex concept compound by different aspects, several properties that make a good object-oriented design have been recognized and widely accepted by the software engineering community. We agree that both the traditional and the new object-oriented properties should be analyzed in assessing the quality of object-oriented design. However, we be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refinement and modular verification with observers

    Publication Year: 2000, Page(s):216 - 225
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    The formal verification of properties in reactive real-time systems is crucial, as these systems are often safety-critical ones. Refinement is a relevant operation in synchronous languages. In this paper, we argue that, in the synchronous approach to the design and implementation of reactive real-time systems, modular verification (from the point of view of the refining program) is best achieved w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software project measurement criteria

    Publication Year: 2000, Page(s):258 - 264
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    The consensus of opinion of a sample of Mass Transit Railway Corporation (MTRC) management and engineering staff is that projects containing software products have proved difficult to deliver to programme and within budget. This fact is further exasperated when a particular supplier does not subscribe to a “mature” software development process (SDP), thereby failing to either sustain c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to teach practical software quality assurance. An experience report

    Publication Year: 2000, Page(s):181 - 187
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    The product/process duality of software quality is highlighted and problems of providing computing students, whether on undergraduate or postgraduate courses, with experiences analogous to those found in industry are outlined. Details are presented of the MSc in Computer-Based Information Systems, a “conversion” course offered world-wide by the University of Sunderland. The Systems Eng... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An object-oriented web test model for testing Web applications

    Publication Year: 2000, Page(s):111 - 120
    Cited by:  Papers (9)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    In recent years, Web applications have grown rapidly. As Web applications become complex, there is a growing concern about their quality and reliability. In this paper we present a methodology that uses an object-oriented Web Test Model (WTM) to support Web application testing. The test model captures both structural and behavioral test artifacts of Web applications and represents the artifacts fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-Business testing: user perceptions and performance issues

    Publication Year: 2000, Page(s):315 - 323
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB)

    Customer expectations are very high in e-business. Above all when they make first contact with your organization. The first impression is key, the user interface, the performance the right response, right away. Get ready for interfacing with your customers at first click or call-you only have one chance to attract each customer with good usability and fast, reliable responses. One click, one chanc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • White on black: a white-box-oriented approach for selecting black box-generated test cases

    Publication Year: 2000, Page(s):275 - 284
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    Many useful test case construction methods that are based on important aspects of the specification have been proposed in the literature. A comprehensive test suite thus obtained is often very large and yet is non-redundant with respect to the aspects identified from the specification. This paper addresses the problem of selecting a subset of test cases from such a test suite. We propose the use o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality metrics of object oriented design for software development and re-development

    Publication Year: 2000, Page(s):127 - 135
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    The quality of software has an important bearing on the financial and safety aspects in our daily life. Assessing quality of software at the design level will provide ease and higher accuracy for users. However, there is a great gap between the rapid adoption of Object Oriented (OO) techniques and the slow speed of developing corresponding object oriented metric measures, especially object oriente... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.