By Topic

Proceedings 2001 Australian Software Engineering Conference

27-28 Aug. 2001

Filter Results

Displaying Results 1 - 25 of 33
  • Proceedings 2001 Australian Software Engineering Conference

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (196 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s): 307
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • Extending the UML for designing Jack agents

    Publication Year: 2001, Page(s):89 - 97
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB) | HTML iconHTML

    Mainstreaming and industrialising agent technologies requires suitable methodological and technological support for the various engineering activities associated with managing the complexity of any software system development. Despite its origins in object oriented software engineering the UML provides a rich and extensible set of modelling constructs that can be applied to agent oriented technolo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing Java monitors through deterministic execution

    Publication Year: 2001, Page(s):61 - 67
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB) | HTML iconHTML

    Java is a popular, modern programming language that supports monitors. However, monitor implementations, like other concurrent programs, are hard to test due to the inherent non-determinism. The paper presents a method for testing Java monitors, which extends the work of P. Brinch Hansen (1978) on testing Concurrent Pascal monitors. A monitor is tested by executing a concurrent program in which th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical software process improvement - the IMPACT project

    Publication Year: 2001, Page(s):182 - 189
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB) | HTML iconHTML

    For many years now software process improvement (SPI) has been recognised as an effective way for companies to improve the quality of the software they produce and the productivity with which they work. Much work has gone into developing and selling improvement paradigms, assessment methods, modelling languages, tools and technologies. The challenge for -small-to-medium software development compan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increase software trustability with self-testable classes in Java

    Publication Year: 2001, Page(s):3 - 11
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB) | HTML iconHTML

    The rise of component-based software development poses the problem of components trustability. To know whether a given component can be used within a certain context, there must be a way of telling what the component is supposed to do (its contract) without entering into the details of the how. Based on this idea, we have proposed a general Design-for-Trustability methodology ("DfT"), starting fro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Animation can show only the presence of errors, never their absence

    Publication Year: 2001, Page(s):76 - 85
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB) | HTML iconHTML

    A formal specification animator executes and interprets traces on a specification. Similar to software testing, animation can only show the presence of errors, never their absence. However, animation is a powerful means of finding errors, and it is important that we adequately exercise a specification when we animate it. The paper outlines a systematic approach to the animation of formal specifica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending UML use case modelling to support graphical user interface design

    Publication Year: 2001, Page(s):48 - 57
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB) | HTML iconHTML

    UML supports the construction of several views of a software system. The paper reviews use case modelling in UML from the viewpoint of its suitability as input to the early stages of graphical user interface design. Three use case representations are compared, and an extended tabular representation is proposed which assists with the identification of user interface elements. This is presented via ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for an active interface to characterise compositional security contracts of software components

    Publication Year: 2001, Page(s):117 - 126
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB) | HTML iconHTML

    This paper presents a framework for constructing compositional security contracts (CsC) based on the security property exposed by the atomic component. The framework uses interface structure of components in order to determine the CsC of software components. An active interface provides the component a basis for reasoning and assessing a component's suitability to meet certain security requirement... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pattern-based reuse of successful designs: usability of safety-critical systems

    Publication Year: 2001, Page(s):31 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB) | HTML iconHTML

    Users of safety-critical systems are expected to effectively control or monitor complex systems, with errors potentially leading to catastrophe. For such systems, safety is of paramount importance and must be designed into the human-machine interface. While many case studies show how inadequate design practice led to poor safety and usability, concrete guidance on good design practices is scarce. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent-based approach to computer assisted code inspections

    Publication Year: 2001, Page(s):147 - 152
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB) | HTML iconHTML

    Formal code inspections have been established as an effective way to decrease the cost of software development. However, implementing formal code inspections successfully is a challenging endeavour. We propose that the use of software tools to support the inspection process can help reduce the cost of code inspections, while increasing the number of defects detected. Intelligent agents provide a s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration vs. development: an engineering approach to building Web applications

    Publication Year: 2001, Page(s):171 - 181
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (912 KB) | HTML iconHTML

    The Web as a paradigm of computing has introduced fundamentally new possibilities for creating, driving and achieving differentiation in the business domain. These in turn have resulted in a greater emphasis on reducing the time to market and increased application complexity. Innovative practices such as iterative development and the use of software components for application development have had ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification-based retrieval strategies for module reuse

    Publication Year: 2001, Page(s):235 - 243
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB) | HTML iconHTML

    Formal specifications have been proposed as a basis for accessing reusable components from libraries, and various fine-grained specification-matching approaches have been developed to assist in searching libraries. Typically, however, the granularity of matching has been too fine for reuse to be effective. Compounding the problem is the fact that coarse-grained items usually require adaptation bef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interpreting Mayall's 'Principles in Design'

    Publication Year: 2001, Page(s):297 - 305
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB) | HTML iconHTML

    Design-a foundation of software engineering-has its own base of theory originating in architecture and spanning diverse disciplines. The paths of software and design theory separated when software design aligned with the engineering and production metaphors in the interests of manageability and formalism. The two disciplines have continued independent discourses, despite some important similaritie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of virtual world systems

    Publication Year: 2001, Page(s):98 - 107
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB) | HTML iconHTML

    A virtual world system is an artificial environment, created inside a computer, which mimics some aspect of the real world. These systems are multiuser allowing many people to be present and to interact simultaneously in the virtual world. The performance of virtual world systems is important because the quality of the user's experience depends on the responsiveness of the system. This paper looks... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying static analysis to large-scale, multi-threaded Java programs

    Publication Year: 2001, Page(s):68 - 75
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    Static analysis is a tremendous help when trying to find faults in complex software. Writing multi-threaded programs is difficult, because the thread scheduling increases the program state space exponentially, and an incorrect thread synchronization produces faults that are hard to find. Program checkers have become sophisticated enough to find faults in real, large-scale software. In particular, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A pilot study in effort estimation for the generalization of object-oriented components for reuse

    Publication Year: 2001, Page(s):190 - 199
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB) | HTML iconHTML

    Generalizing components for future reuse is advocated as a worthwhile investment of time and resources. Some studies have attempted to quantify the additional costs of generalization of object-oriented components for reuse, with varying success. In this pilot study, we not only analyze one small data set for values of generalization effort but, more importantly, we develop an algorithmic approach ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the effectiveness of mutation analysis as a black box testing technique

    Publication Year: 2001, Page(s):12 - 20
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB) | HTML iconHTML

    The technique of mutation testing, in which the effectiveness of tests is determined by creating variants of a program in which statements are mutated, is well known.. Whilst of considerable theoretical interest, the technique requires costly tools and is computationally expensive. Very large numbers of `mutants' can be generated for even simple programs. More recently, it has been proposed that t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing software components with the UML, Enterprise Java Beans and aspects

    Publication Year: 2001, Page(s):127 - 136
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB) | HTML iconHTML

    Component-based systems have become increasingly popular approaches to developing complex systems, offering well formed abstractions, strong potential for reuse, dynamic plug-and-play and sometimes end-user application enhancement. Unfortunately the design, implementation and deployment of components is very challenging, particularly achieving appropriate division of responsibility among component... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing usability from formal user-interface designs

    Publication Year: 2001, Page(s):40 - 47
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB) | HTML iconHTML

    The authors demonstrate the usability analysis of Object-Z user-interface designs. Usability can be defined in terms of five salient properties of an interactive system: task efficiency, reuse, user-computer communication, robustness and flexibility Formal user interface designs have been advocated as a basis for determining the usability of an interactive system prior to the expense of system dev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge mediation in software quality engineering

    Publication Year: 2001, Page(s):153 - 159
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (944 KB) | HTML iconHTML

    The risk of failure of the software development process remains high despite many attempts to improve the quality of software engineering. Contemporary approaches to process assurance, such as the capability maturity model have not prevented systemic failures, nor have project management methodologies provided guarantees of software quality. The paper proposes an approach to software quality assur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualisation of refinements

    Publication Year: 2001, Page(s):244 - 251
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    Animation tools have proven to be effective as a means of visualising formal specifications. Specifications that might otherwise be impenetrable can be communicated to a wide range of people involved in the software development process. The authors argue that animation can also aid understanding of formal program development or refinement. We examine two case studies that demonstrate the effective... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Capturing implicit software engineering knowledge

    Publication Year: 2001, Page(s):108 - 114
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB) | HTML iconHTML

    It is commonly accepted that all forms of software engineering knowledge should be captured and stored in a repository. This knowledge enables us to learn from past development experience and promotes reuse. Unfortunately there is not much work in the software engineering literature that emphasizes the importance of capturing implicit knowledge for the repository. This paper begins with a critical... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An environment for specifying and verifying security properties

    Publication Year: 2001, Page(s):203 - 212
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB) | HTML iconHTML

    In this article we present an environment in which a variety of protocols can be analysed. The input accepted by the tool is a description of the protocol in a language similar to CAPSL. We extend CAPSL with a generalised form of control (e.g., parallelism and choice), explicit support for mutable state and expressing a variety of dependencies. The language also supports the specification of the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the relationships of faults for Boolean specification based testing

    Publication Year: 2001, Page(s):21 - 28
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB) | HTML iconHTML

    Various methods of generating test cases based on Boolean specifications have previously been proposed. These methods are fault-based in the sense that test cases are aimed at detecting particular types of faults. Empirical results suggest that these methods are good at detecting particular types of faults. However, there is no information on the ability of these test cases in detecting other type... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.