By Topic

Automated Software Engineering, 2001. (ASE 2001). Proceedings. 16th Annual International Conference on

Date 26-29 Nov. 2001

Filter Results

Displaying Results 1 - 25 of 70
  • Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001) [front matter]

    Publication Year: 2001
    Request Permissions | PDF file iconPDF (265 KB)  
    Freely Available from IEEE
  • Author index

    Publication Year: 2001 , Page(s): 441 - 442
    Request Permissions | PDF file iconPDF (100 KB)  
    Freely Available from IEEE
  • Scalable consistency checking between diagrams - the VIEWINTEGRA approach

    Publication Year: 2001 , Page(s): 387 - 390
    Cited by:  Papers (11)  |  Patents (7)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (521 KB) |  | HTML iconHTML  

    The Unified Modeling Language (UML) supports a wide range of diagrams for modeling software development concerns. UML diagrams are independent but connected; their meta-model describes them under a common roof. Despite the advances of UML, we found that the problem of ensuring consistency between UML diagrams has not been solved. We have developed an approach for automated consistency checking, ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated check of architectural models consistency using SPIN

    Publication Year: 2001 , Page(s): 346 - 349
    Cited by:  Papers (5)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (480 KB) |  | HTML iconHTML  

    In recent years the necessity for handling different aspects of the system separately has introduced the need to represent SA (software architectures) from different viewpoints. In particular, behavioral views are recognized to be one of the most attractive features in the SA description, and in practical contexts, state diagrams and scenarios are the most widely used tools to model this view. Alt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and verification of distributed real-time systems based on CafeOBJ

    Publication Year: 2001 , Page(s): 185 - 192
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (768 KB) |  | HTML iconHTML  

    CafeOBJ is a wide spectrum formal specification language based on multiple logical foundations: mainly initial and hidden algebra. A wide range of systems can be specified in CafeOBJ thanks to its multiple logical foundations. However, distributed real-time systems happen to be excluded from targets of CafeOBJ. The authors propose a method of modeling and verifying such systems based on CafeOBJ, t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Better reasoning about software engineering activities

    Publication Year: 2001 , Page(s): 391 - 394
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (443 KB) |  | HTML iconHTML  

    Software management oracles often contain numerous subjective features. At each subjective point, a range of behaviors is possible. Stochastic simulation samples a subset of the possible behaviors. After many such stochastic simulations, the TAR2 treatment learner can find control actions that have (usually) the same impact despite the subjectivity of the oracle. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automating the performance and reliability analysis of enterprise information systems

    Publication Year: 2001 , Page(s): 350 - 353
    Request Permissions | Click to expandAbstract | PDF file iconPDF (558 KB) |  | HTML iconHTML  

    Good quality models for the analysis of complex enterprise information systems (EIS) are hard to build and require lots of experience and effort, which are not always available. A possible solution to deal with the previous issue is to build automated procedures for quality model generation. Such procedures will encapsulate previous existing knowledge on quality modeling and their use will reduce ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generation of distributed system test-beds from high-level software architecture descriptions

    Publication Year: 2001 , Page(s): 193 - 200
    Cited by:  Papers (7)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1039 KB) |  | HTML iconHTML  

    Most distributed system specifications have performance benchmark requirements. However, determining the likely performance of complex distributed system architectures during development is very challenging. We describe a system where software architects sketch an outline of their proposed system architecture at a high level of abstraction, including indicating client requests, server services, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unfriendly COTS integration - instrumentation and interfaces for improved plugability

    Publication Year: 2001 , Page(s): 223 - 231
    Cited by:  Papers (5)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (900 KB) |  | HTML iconHTML  

    It is becoming increasingly desirable to incorporate commercial-off-the-shelf (COTS) tools as software components into larger software systems. Due to their large user base, COTS tools tend to be cheap, reasonably reliable, and functionally powerful. Reusing them as components has the benefit of significantly reducing development cost and effort. Despite these advantages, developers encounter majo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Connectors synthesis for deadlock-free component based architectures

    Publication Year: 2001 , Page(s): 174 - 181
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (762 KB) |  | HTML iconHTML  

    Nowadays component-based technologies offer straightforward ways of building applications from existing components. Although these technologies might differ in terms of the level of heterogeneity among components they support, e.g. CORBA or COM versus J2EE, they all suffer the problem of dynamic integration. That is, once components are successfully integrated in a uniform context how is it possib... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AGATE, access graph based tools for handling encapsulation

    Publication Year: 2001 , Page(s): 311 - 314
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (543 KB) |  | HTML iconHTML  

    Encapsulation and modularity are supported by various static access control mechanisms that manage implementation hiding and define interfaces adapted to different client profiles. Programming languages use numerous and very different mechanisms, the cumulative application of which is sometimes confusing and hard to predict. Furthermore, understanding and reasoning about access control independent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analysis-revision cycle to evolve requirements specifications

    Publication Year: 2001 , Page(s): 354 - 358
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (564 KB) |  | HTML iconHTML  

    We argue that the evolution of requirements specifications can be supported by a cycle composed of two phases: analysis and revision. We investigate an instance of such a cycle, which combines two techniques of logical abduction and inductive learning to analyze and revise specifications respectively. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generation of functional test sequences from B formal specifications presentation and industrial case-study

    Publication Year: 2001 , Page(s): 377 - 381
    Cited by:  Papers (5)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (568 KB) |  | HTML iconHTML  

    The paper presents an original method to generate test sequences. From formal specifications of the system to be tested, an equivalent system of constraints is derived, and then the domain of each state variable of this system is partitioned into subdomains. Using this partition, limit states are computed with a specific solver that uses constraint logic programming with sets. This specific solver... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The synthesis of a Java card tokenisation algorithm

    Publication Year: 2001 , Page(s): 43 - 50
    Request Permissions | Click to expandAbstract | PDF file iconPDF (708 KB) |  | HTML iconHTML  

    We describe the development of a Java bytecode optimisation algorithm by the methodology of program extraction. We develop the algorithm as a collection of proofs and definitions in the Coq proof assistant, and then use Coq's extraction mechanism to automatically generate a program in OCaml. The extraction methodology guarantees that this program is correct. We discuss the feasibility of the metho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-aware browsing of large component repositories

    Publication Year: 2001 , Page(s): 99 - 106
    Cited by:  Papers (5)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (867 KB) |  | HTML iconHTML  

    The paper proposes a novel approach to locating software components from a large component repository: context-aware browsing. Without any explicit input from software developers, this approach automatically locates and presents a list of software components that could possibly be used in the current development situation. This automation of the component location process not only greatly reduces ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adequate reverse engineering

    Publication Year: 2001 , Page(s): 232 - 241
    Cited by:  Papers (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (951 KB) |  | HTML iconHTML  

    Reverse engineering a program constructs a high-level representation suitable for various software development purposes such as documentation or reengineering. Unfortunately however, there are no established guidelines to assess the adequacy of such a representation. We propose two such criteria, completeness and accuracy, and show how they can be determined during the course of reversing the repr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated test-data generation from formal models of software

    Publication Year: 2001
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (214 KB) |  | HTML iconHTML  

    Verification and Validation (V&V) of software for critical embedded control systems often consumes upto 70% of the development resources. Testing is one of the most frequently used V&V technique for verifying such systems. Many regulatory agencies that certify control systems for use require that the software be tested to certain specified levels of coverage. Currently, developing test cases to me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling class operations in B: Application to UML behavioral diagrams

    Publication Year: 2001 , Page(s): 289 - 296
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (698 KB) |  | HTML iconHTML  

    An appropriate approach for translating UML to B formal specifications allows one to use UML and B jointly in a unified, practical and rigorous software development. We formally analyze UML specifications via their corresponding B formal specifications. This point is significant because B support tools like AtelierB are available. We can also use UML specifications as a tool for building B specifi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security specification and verification

    Publication Year: 2001
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (204 KB) |  | HTML iconHTML  

    Formalizing security requirements has received a significant attention since the 70s. However a general method for specifying security requirements is still missing. Especially, little work has been presented on specifying and verifying that a given application is a secure resource consumer The purpose of this work is to set up a methodology for (1) specifying security requirements of service prov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A UML validation toolset based on abstract state machines

    Publication Year: 2001 , Page(s): 315 - 318
    Request Permissions | Click to expandAbstract | PDF file iconPDF (659 KB) |  | HTML iconHTML  

    The Unified Modeling Language has become widely accepted as a standard in software development. Several tools have been produced to support UML model validation. These tools translate a UML model into a validation language such as PROMELA. However they have some shortcomings: there is no proof of correctness (with respect to the UML semantics) for these tools; and there is no tool that supports va... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an evolutionary formal software development

    Publication Year: 2001 , Page(s): 417 - 420
    Request Permissions | Click to expandAbstract | PDF file iconPDF (509 KB) |  | HTML iconHTML  

    Although formal methods have been successfully applied in various industrial applications, their use in software development is still restricted to individual case studies. To overcome this situation we aim at a methodology for an evolutionary formal software development which allows for a stepwise and incremental development process along the line of rapid prototyping. The approach is based on wo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge base approach to consistency management of UML specifications

    Publication Year: 2001 , Page(s): 359 - 363
    Cited by:  Papers (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (557 KB) |  | HTML iconHTML  

    The use of the Unified Modelling Language (UML) during systems development has been growing in scale and complexity, often resulting in inconsistent specifications. We present a knowledge base goal-driven approach for consistency management of UML specifications represented as axioms which define goals. We propose an inference procedure as a flexible pattern-based abduction used to build and morph... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Action Language Verifier

    Publication Year: 2001 , Page(s): 382 - 386
    Cited by:  Papers (7)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (570 KB) |  | HTML iconHTML  

    Action Language is a specification language for reactive software systems. We present the Action Language Verifier which consists of: 1) a compiler that converts Action Language specifications to composite symbolic representations, and 2) an infinite-state symbolic model checker which verifies (or falsifies) CTL properties of Action Language specifications. Our symbolic manipulator (Composite Symb... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identification of high-level concept clones in source code

    Publication Year: 2001 , Page(s): 107 - 114
    Cited by:  Papers (45)  |  Patents (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (875 KB) |  | HTML iconHTML  

    Source code duplication occurs frequently within large software systems. Pieces of source code, functions, and data types are often duplicated in part or in whole, for a variety of reasons. Programmers may simply be reusing a piece of code via copy and paste or they may be "re-inventing the wheel". Previous research on the detection of clones is mainly focused on identifying pieces of code with si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing generative frameworks using XML

    Publication Year: 2001 , Page(s): 368 - 372
    Cited by:  Papers (1)  |  Patents (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (532 KB) |  | HTML iconHTML  

    Generative programming methods provide some significant advantages for the repeated deployment of product line architectures. The paper considers XML as a tool for building and describing applications that use generative programming methods. It describes techniques for the creation of a generative framework, presents a case study and discusses the results of practical application of these methods ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.