By Topic

Automated Software Engineering, 2003. Proceedings. 18th IEEE International Conference on

Date 6-10 Oct. 2003

Filter Results

Displaying Results 1 - 25 of 56
  • Proceedings 18th IEEE International Conference on Automated Software Engineering

    Publication Year: 2003
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB)

    The following topics are discussed: requirements, interfaces, and groupware; software architectures and distributed systems; model checking; software components; software evolution and maintenance; and automated software engineering. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2003, Page(s):381 - 382
    Request permission for commercial reuse | PDF file iconPDF (158 KB)
    Freely Available from IEEE
  • VUML: a viewpoint oriented UML extension

    Publication Year: 2003, Page(s):373 - 376
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    One of the main challenges of our modern societies is the development of information systems accessible to every citizen with respect to his culture, rights, education etc. A number of such information systems (servers) are now provided on the Web in e-learning, tourism, environment, health, transport, etc. But the development and the maintenance of those systems are not guided by users' profile (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-based verification of Web service compositions

    Publication Year: 2003, Page(s):152 - 161
    Cited by:  Papers (161)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    In this paper, we discuss a model-based approach to verifying Web service compositions for Web service implementations. The approach supports verification against specification models and assigns semantics to the behavior of implementation model so as to confirm expected results for both the designer and implementer. Specifications of the design are modeled in UML (Unified Modeling Language), in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refactoring C with conditional compilation

    Publication Year: 2003, Page(s):323 - 326
    Cited by:  Papers (5)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    Refactoring, an important technique for increasing flexibility of the source code, can be applied with much ease and efficiency by using automated tools. There is currently a lack of refactoring tools for C with full support for preprocessor directives because directives complicate refactorings in many ways. This paper describes refactoring of C programs in the presence of conditional compilation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the automatic evolution of an OS kernel using temporal logic and AOP

    Publication Year: 2003, Page(s):196 - 204
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    Automating software evolution requires both identifying precisely the affected program points and selecting the appropriate modification at each point. This task is particularly complicated when considering a large program, even when the modifications appear to be systematic. We illustrate this situation in the context of evolving the Linux kernel to support Bossa, an event-based framework for pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model-driven approach to non-functional analysis of software architectures

    Publication Year: 2003, Page(s):236 - 239
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    We present an approach to managing formal models using model driven architecture (MDA) technologies that deliver analysis techniques through integration with the design tools and repositories that practitioners use. Expert modeling knowledge is captured in domain-specific languages and meta-model constraints. These are represented using UML (Unified Modeling Language) and collocated with designs a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic generation of content management systems from EER-based specifications

    Publication Year: 2003, Page(s):259 - 262
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    ERW (entity-relationship Web browser) is an innovative open-source system for handling complex databases using a Web browser. Once the details of an enhanced entity-relationship schema have been specified in XML (eXtended Markup Language), ERW generates a complete application that lets the user interact with the database. Then, specification percolation makes it possible to customize heavily the a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Debugging overconstrained declarative models using unsatisfiable cores

    Publication Year: 2003, Page(s):94 - 105
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    Declarative models, in which conjunction and negation are freely used, are susceptible to unintentional overconstraint. Core extraction is a new analysis that mitigates this problem in the context of a checker based on reduction to SAT (systems analysis tools). It exploits a recently developed facility of SAT solvers that provides an "unsatisfiable core" of an unsatisfiable set of clauses, often m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visual specification of concurrent systems

    Publication Year: 2003, Page(s):369 - 372
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    The work on a visual formalism for specification of concurrent systems is presented. It is proposed to match requirements of state-of-the-art component-based design methods. Special emphasis is given to specification of heterogeneous systems in which the different models of computation can be mixed together. We briefly summarize recent research related to the topic and give a sketch of the basic i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture style-based calculi for non-functional properties

    Publication Year: 2003, Page(s):299 - 303
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    Engineers wield various "calculi" to help determine solutions to their problems, calculation tools varying in power from tensile strength tables to the differential calculus. A calculus is normally based on induction over an algebraic structure. Here the author explores how architecture styles can be used to describe such structures. An example calculus based on an "integration" style is presented... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XRay views: understanding the internals of classes

    Publication Year: 2003, Page(s):267 - 270
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    Understanding the internal workings of classes is a key prerequisite to maintaining an object-oriented software system. Unfortunately, classical editing and browsing tools offer mainly linear and textual views of classes and their implementation. These views fail to expose the semantic relationships between the internal parts of a class. We propose X-Ray views - a technique based on concept analys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated environment generation for software model checking

    Publication Year: 2003, Page(s):116 - 127
    Cited by:  Papers (20)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    A key problem in model checking open systems is environment modeling (i.e., representing the behavior of the execution context of the system under analysis). Software systems are fundamentally open since their behavior is dependent on patterns of invocation of system components and values defined outside the system but referenced within the system. Whether reasoning about the behavior of whole pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated software testing using a metaheuristic technique based on Tabu search

    Publication Year: 2003, Page(s):310 - 313
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    The use of techniques for automating the generation of software test cases is very important as it can reduce the time and cost of this process. The latest methods for automatic generation of tests use metaheuristic search techniques, i.e. genetic algorithms and simulated annealing. There is a great deal of research into the use of genetic algorithms to obtain a specific coverage in software testi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automating component adaptation for reuse

    Publication Year: 2003, Page(s):142 - 151
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    Reuse is a sound and practical design technique in many engineering disciplines. Although successful instances of software reuse are becoming more common, the cost of reuse tends to outweigh the potential benefits. The costs of software reuse include establishing and maintaining a library of reusable components, searching for applicable components to be reused, as well as adapting components towar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach for tracing and understanding asynchronous architectures

    Publication Year: 2003, Page(s):318 - 322
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    Applications built in a strongly decoupled, event-based interaction style have many commendable characteristics, including ease of dynamic configuration, accommodation of platform heterogeneity, and ease of distribution over a network. It is not always easy to humanly grasp the dynamic behavior of such applications, since many threads are active and events are asynchronously (and profusely) transm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of inconsistency in graph-based viewpoints: a category-theoretical approach

    Publication Year: 2003, Page(s):12 - 21
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (602 KB) | HTML iconHTML

    Eliciting the requirements for a proposed system typically involves different stakeholders with different expertise, responsibilities, and perspectives. Viewpoints-based approaches have been proposed as a way to manage incomplete and inconsistent models gathered from multiple sources. In this paper, we propose a category-theoretical framework for the analysis of fuzzy viewpoints. Informally, a fuz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault localization with nearest neighbor queries

    Publication Year: 2003, Page(s):30 - 39
    Cited by:  Papers (152)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    We present a method for performing fault localization using similar program spectra. Our method assumes the existence of a faulty run and a larger number of correct runs. It then selects according to a distance criterion the correct run that most resembles the faulty run, compares the spectra corresponding to these two runs, and produces a report of "suspicious" parts of the program. Our method is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing database transaction concurrency

    Publication Year: 2003, Page(s):184 - 193
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    Database application programs are often designed to be executed concurrently by many users. By grouping related database queries into transactions, DBMS (database management system) can guarantee that each transaction satisfies the well-known ACID properties: atomicity, consistency, isolation, and durability. However, if a database application is decomposed into transactions in an incorrect manner... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatically inferring concern code from program investigation activities

    Publication Year: 2003, Page(s):225 - 234
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    When performing a program evolution task, developers typically spend a significant amount of effort investigating and reinvestigating source code. To reduce this effort, we propose a technique to automatically infer the essence of program investigation activities as a set of concern descriptions. The concern descriptions produced by our technique list methods and fields of importance in the contex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automation for exception freedom proofs

    Publication Year: 2003, Page(s):343 - 346
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Run-time errors are typically seen as unacceptable within safety and security critical software. The SPARK approach to the development of high integrity software addresses the problem of run-time errors through the use of formal verification. Proofs are constructed to show that each run-time check will never raise an error, thus proving freedom from run-time exceptions. Here we build upon the succ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semi-automatic fault localization and behavior verification for physical system simulation models

    Publication Year: 2003, Page(s):253 - 258
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    Mathematical modeling and simulation of complex physical systems are emerging as key technologies in engineering. Modern approaches to physical system simulation allow users to specify simulation models with the help of equation-based languages. Due to the high-level declarative abstraction of these languages program errors are extremely hard to find. This paper presents an algorithmic semi-automa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification and synthesis of hybrid automata for physics-based animation

    Publication Year: 2003, Page(s):80 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    Physics-based animation programs can often be modeled in terms of hybrid automata. A hybrid automaton includes both discrete and continuous dynamical variables. The discrete variables define the automaton's modes of behavior. The continuous variables are governed by mode-dependent differential equations. This paper describes a system for specifying and automatically synthesizing physics-based anim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Graph rewriting and transformation (GReAT): a solution for the model integrated computing (MIC) bottleneck

    Publication Year: 2003, Page(s):364 - 368
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    Graph grammars and transformations (GGT) have been a field of theoretical study for over two decades. However, it has produced only a handful of practical implementations. GGT needs a widely used practical application to exploit its potential. On the other hand model integrated computing (MIC) has grown from the practical standpoint and is widely used and recognized in both industry and practice t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An incremental approach to task-specific information delivery in SE processes

    Publication Year: 2003, Page(s):295 - 298
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    In this paper, we present a system to proactively provide software process participants with information items that are available and relevant in the context of their current tasks. Knowledge on which items to offer is obtained in two ways. First, situation-specific information needs that arise for participants are captured, together with the information sources that are accessed to satisfy them. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.