Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Proceedings 2001 Australian Software Engineering Conference

27-28 Aug. 2001

Filter Results

Displaying Results 1 - 25 of 33
  • Proceedings 2001 Australian Software Engineering Conference

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (196 KB)
    Freely Available from IEEE
  • Individual reviewer contribution to the effectiveness of software inspection teams

    Publication Year: 2001, Page(s):160 - 168
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (710 KB) | HTML iconHTML

    Since Michael Fagan first described inspections in 1976, much literature has been written describing the results from investigations, evaluations and use of inspections. Many research papers report on how an inspection team's size affects the efficiency and effectiveness of inspections. This study puts the individual reviewer and the contribution he or she makes to the team's effectiveness in focu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2001, Page(s): 307
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • Extending UML use case modelling to support graphical user interface design

    Publication Year: 2001, Page(s):48 - 57
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB) | HTML iconHTML

    UML supports the construction of several views of a software system. The paper reviews use case modelling in UML from the viewpoint of its suitability as input to the early stages of graphical user interface design. Three use case representations are compared, and an extended tabular representation is proposed which assists with the identification of user interface elements. This is presented via ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the effectiveness of mutation analysis as a black box testing technique

    Publication Year: 2001, Page(s):12 - 20
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB) | HTML iconHTML

    The technique of mutation testing, in which the effectiveness of tests is determined by creating variants of a program in which statements are mutated, is well known.. Whilst of considerable theoretical interest, the technique requires costly tools and is computationally expensive. Very large numbers of `mutants' can be generated for even simple programs. More recently, it has been proposed that t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing usability from formal user-interface designs

    Publication Year: 2001, Page(s):40 - 47
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB) | HTML iconHTML

    The authors demonstrate the usability analysis of Object-Z user-interface designs. Usability can be defined in terms of five salient properties of an interactive system: task efficiency, reuse, user-computer communication, robustness and flexibility Formal user interface designs have been advocated as a basis for determining the usability of an interactive system prior to the expense of system dev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Process improvement in four small software companies

    Publication Year: 2001, Page(s):262 - 272
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1000 KB) | HTML iconHTML

    For many small software companies, full-scale software. process improvement (SPI) initiatives are often out of reach due to prohibitive costs and lack of SPI knowledge. However, to compete in the global market, software developers must improve their productivity, time to market and customer satisfaction. Software Engineering Australia (Qld) sponsored a process improvement program in which 26 of it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formalization of UML statechart diagrams in the π-calculus

    Publication Year: 2001, Page(s):213 - 223
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB) | HTML iconHTML

    This paper presents a systematic approach for the translation of UML statechart diagrams into the π-calculus. The aim of this study is to demonstrate how a semi-formal specification can be transformed to a verifiable specification expressed in the π-calculus such that the behaviour of the system can be formally analyzed. The translation covers the major features of statechart diagrams, inclu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increase software trustability with self-testable classes in Java

    Publication Year: 2001, Page(s):3 - 11
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB) | HTML iconHTML

    The rise of component-based software development poses the problem of components trustability. To know whether a given component can be used within a certain context, there must be a way of telling what the component is supposed to do (its contract) without entering into the details of the how. Based on this idea, we have proposed a general Design-for-Trustability methodology ("DfT"), starting fro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pattern-based reuse of successful designs: usability of safety-critical systems

    Publication Year: 2001, Page(s):31 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB) | HTML iconHTML

    Users of safety-critical systems are expected to effectively control or monitor complex systems, with errors potentially leading to catastrophe. For such systems, safety is of paramount importance and must be designed into the human-machine interface. While many case studies show how inadequate design practice led to poor safety and usability, concrete guidance on good design practices is scarce. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification-based retrieval strategies for module reuse

    Publication Year: 2001, Page(s):235 - 243
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB) | HTML iconHTML

    Formal specifications have been proposed as a basis for accessing reusable components from libraries, and various fine-grained specification-matching approaches have been developed to assist in searching libraries. Typically, however, the granularity of matching has been too fine for reuse to be effective. Compounding the problem is the fact that coarse-grained items usually require adaptation bef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CORONET: an Australian software engineering experience in collaborative research with the European Community

    Publication Year: 2001, Page(s):255 - 261
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB) | HTML iconHTML

    The purpose of the paper is two fold. Firstly, to inform the Australian software engineering community of the European Fifth Framework research structure and the involvement of an Australian partner in a fifth framework project, CORONET. Secondly to describe the CORONET project. CORONET develops a new approach for software engineering training in knowledge networks. CORONET aims to support on-dema... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge mediation in software quality engineering

    Publication Year: 2001, Page(s):153 - 159
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (944 KB) | HTML iconHTML

    The risk of failure of the software development process remains high despite many attempts to improve the quality of software engineering. Contemporary approaches to process assurance, such as the capability maturity model have not prevented systemic failures, nor have project management methodologies provided guarantees of software quality. The paper proposes an approach to software quality assur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An environment for specifying and verifying security properties

    Publication Year: 2001, Page(s):203 - 212
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB) | HTML iconHTML

    In this article we present an environment in which a variety of protocols can be analysed. The input accepted by the tool is a description of the protocol in a language similar to CAPSL. We extend CAPSL with a generalised form of control (e.g., parallelism and choice), explicit support for mutable state and expressing a variety of dependencies. The language also supports the specification of the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Component adaptation for Web services

    Publication Year: 2001, Page(s):137 - 144
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB) | HTML iconHTML

    Component-oriented programming has provided a promising approach for software reuse. This promise is partially substantiated by the ability of components to be easily substituted, and the provision of an extensive range of interchangeable software components. The trend toward providing services on the Internet has also provided the opportunity to reuse software across the Internet. To promote reus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Animation can show only the presence of errors, never their absence

    Publication Year: 2001, Page(s):76 - 85
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB) | HTML iconHTML

    A formal specification animator executes and interprets traces on a specification. Similar to software testing, animation can only show the presence of errors, never their absence. However, animation is a powerful means of finding errors, and it is important that we adequately exercise a specification when we animate it. The paper outlines a systematic approach to the animation of formal specifica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical software process improvement - the IMPACT project

    Publication Year: 2001, Page(s):182 - 189
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB) | HTML iconHTML

    For many years now software process improvement (SPI) has been recognised as an effective way for companies to improve the quality of the software they produce and the productivity with which they work. Much work has gone into developing and selling improvement paradigms, assessment methods, modelling languages, tools and technologies. The challenge for -small-to-medium software development compan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for an active interface to characterise compositional security contracts of software components

    Publication Year: 2001, Page(s):117 - 126
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB) | HTML iconHTML

    This paper presents a framework for constructing compositional security contracts (CsC) based on the security property exposed by the atomic component. The framework uses interface structure of components in order to determine the CsC of software components. An active interface provides the component a basis for reasoning and assessing a component's suitability to meet certain security requirement... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing Java monitors through deterministic execution

    Publication Year: 2001, Page(s):61 - 67
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB) | HTML iconHTML

    Java is a popular, modern programming language that supports monitors. However, monitor implementations, like other concurrent programs, are hard to test due to the inherent non-determinism. The paper presents a method for testing Java monitors, which extends the work of P. Brinch Hansen (1978) on testing Concurrent Pascal monitors. A monitor is tested by executing a concurrent program in which th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the relationships of faults for Boolean specification based testing

    Publication Year: 2001, Page(s):21 - 28
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB) | HTML iconHTML

    Various methods of generating test cases based on Boolean specifications have previously been proposed. These methods are fault-based in the sense that test cases are aimed at detecting particular types of faults. Empirical results suggest that these methods are good at detecting particular types of faults. However, there is no information on the ability of these test cases in detecting other type... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for subsystem-based configuration management

    Publication Year: 2001, Page(s):275 - 284
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (744 KB) | HTML iconHTML

    Existing software configuration management (CM) tools are limited in the support they provide for configuration and change management of hierarchically structured software systems. This paper describes a framework for CM of subsystems-logically coherent collections of software development artefacts, including code, documentation and test sets. The goal is to provide visibility of changes at interm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Idioms for μ-charts

    Publication Year: 2001, Page(s):224 - 231
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB) | HTML iconHTML

    This paper presents an idiomatic construct for μ-charts which reflects the high-level specification construct of synchronization between activities. This, amongst others, has emerged as a common and useful idea during our use of μ-charts to design and specify commonly-occurring reactive systems. The purpose of this example, apart from any inherent interest in being able to use synchronizatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending the UML for designing Jack agents

    Publication Year: 2001, Page(s):89 - 97
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB) | HTML iconHTML

    Mainstreaming and industrialising agent technologies requires suitable methodological and technological support for the various engineering activities associated with managing the complexity of any software system development. Despite its origins in object oriented software engineering the UML provides a rich and extensible set of modelling constructs that can be applied to agent oriented technolo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualisation of refinements

    Publication Year: 2001, Page(s):244 - 251
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    Animation tools have proven to be effective as a means of visualising formal specifications. Specifications that might otherwise be impenetrable can be communicated to a wide range of people involved in the software development process. The authors argue that animation can also aid understanding of formal program development or refinement. We examine two case studies that demonstrate the effective... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent-based approach to computer assisted code inspections

    Publication Year: 2001, Page(s):147 - 152
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB) | HTML iconHTML

    Formal code inspections have been established as an effective way to decrease the cost of software development. However, implementing formal code inspections successfully is a challenging endeavour. We propose that the use of software tools to support the inspection process can help reduce the cost of code inspections, while increasing the number of defects detected. Intelligent agents provide a s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.