By Topic

2015 Asia-Pacific Software Engineering Conference (APSEC)

1-4 Dec. 2015

Filter Results

Displaying Results 1 - 25 of 68
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (849 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (12 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • Message from the General Chair and the Conference Chair

    Publication Year: 2015, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (107 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Committee Chairs

    Publication Year: 2015, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (80 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2015, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2015, Page(s):xiv - xvii
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2015, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Evolving Critical Systems

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (70 KB) | HTML iconHTML

    Summary form only given. Increasingly software can be considered to be critical, due to the business or other functionality which it supports. Upgrades or changes to such software are expensive and risky, primarily because the software has not been designed and built for ease of change. Expertise, tools and methodologies which support the design and implementation of software systems that evolve w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trends in Automation and Control Systems Needing Efficient Software Engineering

    Publication Year: 2015, Page(s): 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (71 KB) | HTML iconHTML

    Real-time control systems software running in a chemical, refinery, steel plant or in electric power grid is complex. The system has to run reliability for several years without interruptions with availability close to 100%, deterministic response time in milliseconds, sometimes in microseconds, and be secure against increasing cyber threats. Increasing connectivity, evolving concepts like Industr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building an Open Identity Platform for India

    Publication Year: 2015, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (75 KB) | HTML iconHTML

    Summary form only given. Aadhaar, India's Unique Identity Project, has become the largest biometric identity system in the world, already covering more than 920 million people. Building such a massive system required significant design thinking, aligning to the core strategy, and building a technology platform that is scalable to meet the project's objective. Entire technology architecture behind ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building Enterprise-Grade Internet of Things Applications

    Publication Year: 2015, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (101 KB) | HTML iconHTML
    Freely Available from IEEE
  • Software Defined Storage Technology

    Publication Year: 2015, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (76 KB) | HTML iconHTML
    Freely Available from IEEE
  • Evaluation and Measurement of Software Testing Process Quality Applicable to Software Testing Laboratory

    Publication Year: 2015, Page(s):8 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Software testing laboratory is a professional software evaluation organization of university or state institution. Through the analysis and study of the characteristics of software testing process, we intend to customize a model of software testing process quality measurement which is applicable to the software testing laboratory. The model describes seven characteristics namely compliance of proc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CSP Bounded Model Checking of Preprocessed CTL Extended with Events Using Answer Set Programming

    Publication Year: 2015, Page(s):16 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (459 KB) | HTML iconHTML

    Model checking is a mainstream method for formal verification of communicating sequential processes (CSP). Existing CSP Model Checkers are incapable of verifying multiple properties concurrently in one run of a model checker. In addition, the properties to be verified are described with CSP in most model checkers, which is good for refinement checking, but leads to limited description power and we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PowerPoint Add-in Tool Support for Informal and Semi-Formal Specification Animation

    Publication Year: 2015, Page(s):24 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (820 KB) | HTML iconHTML

    Informal and semi-formal specifications are commonly adopted for requirements engineering (RE), especially for customer-oriented system development projects, but their validity with respect to the user's requirements is usually difficult to perform. The common reason for the difficulty is that the specifications are often misinterpreted by the stakeholders due to the ambiguity of the natural langu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High Productivity Programmers Use Effective Task Processes in Unit-Testing

    Publication Year: 2015, Page(s):32 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    Software productivity is influenced by how efficiently programmers execute tasks assigned to them. For executing a task, programmers execute several steps. How the execution of these steps is organized by a programmer is referred to as task process. While overall software process has been well studied, the impact of task processes has not been studied much. In this work, we study the impact of tas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating Hierarchical Reference Process Model Using Fragments Clustering

    Publication Year: 2015, Page(s):40 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    Process models are becoming more and more widespread in contemporary organizations. For the purpose of reducing cost and improve model quality, the ability to rapidly tailor a reference process to satisfy the changing of business requirements is necessary for organizations. In this context, how to provide a suitable reference process model for a specific domain becomes a challenging question. This... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Versioning Distributed Transactions for Dynamic Component Reconfiguration

    Publication Year: 2015, Page(s):48 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    Dynamic reconfiguration enables components of a distributed system to be updated without restarting the whole system. One major challenge of this technology lies in how to preserve the system consistency while minimizing the disruption. Ma et al. proposed an approach to meet the challenge by managing runtime dependencies among components. However, this approach puts heavy burden on network communi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TBIL: A Tagging-Based Approach to Identity Linkage Across Software Communities

    Publication Year: 2015, Page(s):56 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    Nowadays, developers can be involved in several software developer communities like StackOverflow and Github. Meanwhile, accounts from different communities are usually less connected. Linking these accounts, which is called identity linkage, is a prerequisite of many interesting studies such as investigating activities of one developer in two or more communities. Many researches have been perform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From LTL Formulae to Büchi Automata: A Direct Translation Using On-the-Fly De-Generalization

    Publication Year: 2015, Page(s):64 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    In this paper, we present a conversion algorithm to translate a linear temporal logic (LTL) formula to a Büchi automaton (BA) directly. A label, acceptance degree (AD), is presented to record acceptance conditions satisfied in each state or transition of an automaton. The AD for an automaton is a set of {U, F, R, G}-subformula of the given LTL formula. According to ADs attached to states a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Selection of System Functional Scenarios for Formal Specification Animation

    Publication Year: 2015, Page(s):72 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    Functional scenario-based specification animation is a practical and effective technique for validating formal specifications but faces a scenario explosion problem. In this paper, we tackle this problem by proposing a new approach to selecting only consistent and meaningful functional scenarios in order to reduce the number of scenarios for animation. We define the concept of consistency for func... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting Annotations to Test Break-off Branches

    Publication Year: 2015, Page(s):80 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (602 KB) | HTML iconHTML

    Programs often contain branches to break off from their main execution. These branches contribute to the total cost of testing, because they also need to be tested. The paper presents a new approach to improve the testing of such branches by annotating them. Our tool automatically generates test-sequences. Then, invariants in the form of pre-and post-condition over the executions passing each anno... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.