2004 Australian Software Engineering Conference. Proceedings.

2004

Filter Results

Displaying Results 1 - 25 of 50
  • Enforcing system-wide properties

    Publication Year: 2004, Page(s):158 - 167
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1514 KB) | HTML iconHTML

    Policy enforcement is a mechanism for ensuring that system components follow certain programming practices, comply with specified rules, and meet certain assumptions. Unfortunately, the most common mechanisms used today for policy enforcement are documentation, training, and code reviews. The fundamental problem is that these mechanisms are expensive, time-consuming, and still error-prone. To cope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A process framework for characterising security properties of component-based software systems

    Publication Year: 2004, Page(s):358 - 367
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1386 KB) | HTML iconHTML

    We present a security characterisation process framework for software components and their compositions in order to address the issue of trust in component based software. The process is based on the idea of publishing trust related properties of software components in machine readable as well as understandable form at the component level and incorporating such properties with runtime composition ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing a requirements management toolset: lessons learned

    Publication Year: 2004, Page(s):10 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1352 KB) | HTML iconHTML

    Requirements engineering (RE) is a multifaceted discipline involving various methods, techniques and tools. RE researchers and practitioners are emphasizing the importance of having an integrated RE process. The need for an integrated toolset to support the effective management of such an integrated RE process cannot be over-emphasized. Tools integration has been identified as an important next st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ASPIRE: automated systematic protocol implementation robustness evaluation

    Publication Year: 2004, Page(s):241 - 250
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1480 KB) | HTML iconHTML

    Network protocol implementations are susceptible to problems caused by their lack of ability to handle invalid inputs. We present ASPIRE: automated systematic protocol implementation robustness evaluation, an automated approach to pro-actively test protocol implementations by observing their responses to faulty protocol data units (PDUs) or messages. In contrast to existing approaches, we sample t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A preliminary survey on software testing practices in Australia

    Publication Year: 2004, Page(s):116 - 125
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1350 KB) | HTML iconHTML

    We present the findings of, to the best of our knowledge, the first survey on software testing practices carried out in Australian ICT industry. A total of 65 organizations from various major capital cities in Australia participated in the survey, which was conducted between 2002 and 2003. The survey focused on five major aspects of software testing, namely testing methodologies and techniques, au... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining agent-oriented conceptual modelling with formal methods

    Publication Year: 2004, Page(s):147 - 155
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1522 KB) | HTML iconHTML

    Agent-oriented conceptual modelling notations such as i* have received considerable recent attention as a useful approach to early-phase requirements engineering. Agent-oriented conceptual modelling notations are highly effective in representing requirements from an intentional stance and answering questions such as what goals exist, how key actors depend on each other and what alternatives must b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The process workshop: a tool to define electronic process guides in small software companies

    Publication Year: 2004, Page(s):350 - 357
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3332 KB) | HTML iconHTML

    We discuss the use of electronic process guides in software engineering projects. We then present existing methods for constructing electronic process guides by defining a set of common processes for a company. Several approaches from the software engineering and management literature are presented. We then go on to propose a new method to construct process description in software engineering: usi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating Web applications from use case scenarios

    Publication Year: 2004, Page(s):320 - 328
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1406 KB) | HTML iconHTML

    The major emphasis in developing design tools for Web applications has been that of content. User requirements are often assumed. We would argue that the requirements are as significant for Web applications as they are for any other application. Use case modelling is regarded as an ideal tool for capturing software requirements. We describe a requirements driven approach for generating the source ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Putting the "engineering" into "software engineering"

    Publication Year: 2004, Page(s):2 - 8
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1343 KB) | HTML iconHTML

    Is software development really a form of engineering? Or is it just some kind of elaborate craftsmanship? Are we just fooling ourselves thinking that we are doing engineering? If so, it is certainly not from lack of trying hard over the last 20 years. But may be we tackled the problem from the wrong end: we tried to impose techniques from other engineering disciplines onto software development mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tool support for verification-based software inspection

    Publication Year: 2004, Page(s):232 - 240
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1505 KB) | HTML iconHTML

    For a software component to be reusable, it must be verified as correct and documented with an unambiguous and complete specification of what it does. We present a technique of semiformal verification using tool support. The prototype tool MINDER generates specifications and verification conditions directly from program code at the unit level. As opposed to systems involving theorem proving, this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing testing efficiency with error-prone path identification and genetic algorithms

    Publication Year: 2004, Page(s):106 - 115
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1386 KB) | HTML iconHTML

    We present a method for optimizing software testing efficiency by identifying the most error prone path clusters in a program. We do this by developing variable length genetic algorithms that optimize and select the software path clusters which are weighted with sources of error indexes. Although various methods have been applied to detecting and reducing errors in a whole system, there is little ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge management in software engineering - describing the process

    Publication Year: 2004, Page(s):137 - 146
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1399 KB) | HTML iconHTML

    The management of knowledge and experience are key means by which systematic software development and process improvement occur. Within the domain of software engineering (SE), quality continues to remain an issue of concern. Although remedies such as fourth generation programming languages, structured techniques and object-oriented technology have been promoted, a "silver bullet" has yet to be fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences with software engineering of mobile agent applications

    Publication Year: 2004, Page(s):339 - 348
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1371 KB) | HTML iconHTML

    Mobile agents are a class of software agents that have the ability to move from host to host and are particularly relevant for mobile and distributed applications. The development of several mobile agent implementation environments has necessitated conceptual modelling techniques for mobile agent applications. We present mGaia, our extension of the Gaia agent oriented software engineering (AOSE) m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for classifying and comparing software architecture evaluation methods

    Publication Year: 2004, Page(s):309 - 318
    Cited by:  Papers (52)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1353 KB) | HTML iconHTML

    Software architecture evaluation has been proposed as a means to achieve quality attributes such as maintainability and reliability in a system. The objective of the evaluation is to assess whether or not the architecture lead to the desired quality attributes. Recently, there have been a number of evaluation methods proposed. There is, however, little consensus on the technical and nontechnical i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The impact of training-by-examples on inspection performance using two laboratory experiments

    Publication Year: 2004, Page(s):279 - 288
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1360 KB) | HTML iconHTML

    Software inspection is often seen as a technique to produce quality software. It has been claimed that expertise is a key determinant in inspection performance particularly in individual detection and group meetings [Sauer, C., et al.,(2000)]. Uncertainty among reviewers during group meetings due to lack of expertise is seen as a weakness in inspection performance. One aspect of achieving expertis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An exploratory study of code and document interactions during task-directed program comprehension

    Publication Year: 2004, Page(s):221 - 230
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1352 KB) | HTML iconHTML

    This exploratory study investigates the program comprehension strategies employed during enhancement and corrective maintenance from the perspective of the programmer activities of examining both program and task documentation and analysing and potentially modifying program code. Twenty-nine experienced C programmers independently undertook one of two maintenance tasks on the same C program and th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Uniform descriptions for model based testing

    Publication Year: 2004, Page(s):96 - 105
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1420 KB) | HTML iconHTML

    A framework which uses linear time temporal logic and model checking techniques to describe the semantics a variety of test specifications is developed. These include a semantics for action words, which are a practical approach to model based testing, and coverage requirements. Features of tools that support the development of tests using this approach are also presented. While model-checking idea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal semantics of UML sequence diagram

    Publication Year: 2004, Page(s):168 - 177
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1392 KB) | HTML iconHTML

    We present a formal semantics of UML sequence diagram. In abstract syntax form, a well-formed sequence diagram corresponds to an ordered hierarchical structure tree. The static semantics of a sequence diagram is to check whether it is consistent with the class diagram declaration as well as with its well-formed tree structure. Meanwhile, the dynamic semantics is defined in terms of the state trans... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low-rigour, rapid software process assessments for small software development firms

    Publication Year: 2004, Page(s):368 - 377
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1360 KB) | HTML iconHTML

    Rigorous software process improvement (SPI) assessments are considered by many small software development firms to be too expensive. We present the results from a program in which low-rigour, one-day SPI assessments were offered at no cost to 22 small software development firms. Analysis shows an association between capability levels achieved and staff experience and education level. Also, the pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent-oriented software analysis

    Publication Year: 2004, Page(s):20 - 27
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1329 KB) | HTML iconHTML

    Agent-oriented software engineering (AOSE) has become an active area of research in recent years. We look at the use of agent-oriented concepts for software analysis. Using agent-oriented analysis may offer benefits even if the system is implemented without an agent-based language or framework (e.g. using an object-oriented detailed design and language). We examine the software analysis components... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Snapshot query-based debugging

    Publication Year: 2004, Page(s):251 - 259
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1465 KB) | HTML iconHTML

    Object-oriented programs, when executed, produce a complex webs of objects and references between them, generally referred to as object graphs. These object graphs are difficult to design correctly and even more difficult to debug if incorrect. Unfortunately, very subtle bugs in object-oriented programs are directly caused by object graph topologies. Snapshot query-based debuggers let programmers ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The long-term effects of an EPG/ER in a small software organisation

    Publication Year: 2004, Page(s):128 - 136
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1616 KB) | HTML iconHTML

    We present an assessment of the usage of an improved electronic process guide/experience repository (EPG/ER) tool about a year after its installation in a small-to-medium software development company (SME). The current study, conducted over 21 weeks, reveals the long-term effects of EPG/ER usage in the company. The findings not only validate results from previously published preliminary evaluation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linking UML models of design and requirement

    Publication Year: 2004, Page(s):329 - 338
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1408 KB) | HTML iconHTML

    Both a UML model of requirement and a UML model of a design are defined as a pair of class diagram and a family of sequence diagrams. We then give an unified semantics for models of requirements and designs. We define the consistency between a design class diagram and the interaction diagrams and show how the removal of inconsistency can be treated as a model refinement. We then formally define th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards platform-independent real-time systems

    Publication Year: 2004, Page(s):192 - 200
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1382 KB) | HTML iconHTML

    Real-time software systems are rarely developed once and left to run. They are subject to changes of requirements as the applications they support expand, and they commonly outlive the platforms they were designed to run on. A successful real-time system is duplicated and adapted to a variety of applications - it becomes a product line. Current methods for real-time software development are common... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using software architectures and design patterns for developing distributed applications

    Publication Year: 2004, Page(s):290 - 299
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1446 KB) | HTML iconHTML

    Although there are a large number of software development methodologies for standalone software, little effort is being paid into investigating specialised methodologies that target the development of distributed applications (DAs) in the era of Internet and Web-based applications. Rather than focusing on business models, developers usually spend considerable effort in implementing connectivity be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.