By Topic

Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.

28-30 Sept. 2004

Go

Filter Results

Displaying Results 1 - 25 of 67
  • Mining dynamic interdimension association rules for local-scale weather prediction

    Publication Year: 2004, Page(s):146 - 149 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    Mining dynamic interdimension association rules for local-scale weather prediction is to discover abnormal weather phenomena changing so that the professional weather forecaster can use these rules to predict some severe weather situations, such as hail storm, thunder storm and so on. A weather analysis is composed of individual analyses of the several meteorological variables. When some of meteor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining complex relationships in the SDSS SkyServer spatial database

    Publication Year: 2004, Page(s):142 - 145 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    We describe the process of mining complex relationships in spatial databases using the maximal participation index (maxPI), which has a property of discovering low support and high confidence rules. Complex relationships are defined as those involving two or more of: multifeature co-location, self-co-location, one-to many relationships, self-exclusion and multifeature exclusion. We report our resu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web service and geographical information integration

    Publication Year: 2004, Page(s):130 - 133 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    This work initializes the idea from the basic concept of Web service with regard to the concurrent framework as well as the factual standards for its implementation. The concrete design and implementation of an integration and interoperation platform that aims to solve heterogeneity and online service for geographical information is presented. This platform concentrates on implementation to shield... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lessons learned from the practice of mobile health application development

    Publication Year: 2004, Page(s):58 - 59 vol.2
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    This fast abstract briefly discusses lessons learned in terms of how to overcome limitations of PDA devices, effectively capture requirements for mobile health application development and effectively reengineer a desktop application on PDA. The limitation of PDA devices includes: (1) small screen size, which limits text-based data entry, reporting and browsing; (2) limited storage space and slow p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using FMEA for early robustness analysis of Web-based systems

    Publication Year: 2004, Page(s):28 - 29 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    Time pressure and quality issues are two main challenges facing today's Web development professionals. To achieve quick development of high-quality systems, a lot of methods and techniques have been proposed. A widely recognized strategy in current practice is to emphasize early quality assurance techniques, as the late detection of defects are well known to be expensive and time-consuming. We tak... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the complexity of finding emerging patterns

    Publication Year: 2004, Page(s):126 - 129 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    Emerging patterns have been studied as a useful type of pattern for the diagnosis and understanding of diseases based on the analysis of gene expression profiles. They are useful for capturing interactions among genes (or other biological entities), for capturing signature patterns for disease subtypes, and deriving potential disease treatment plans, etc. We study the complexity of finding emergin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimation of software defects fix effort using neural networks

    Publication Year: 2004, Page(s):20 - 21 vol.2
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    Software defects fix effort is an important software development process metric that plays a critical role in software quality assurance. People usually like to apply parametric effort estimation techniques using historical lines of code and function points data to estimate effort of defects fixes. However, these techniques are neither efficient nor effective for a new different kind of project's ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach to representing continuously moving regions

    Publication Year: 2004, Page(s):70 - 73 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    Spatiotemporal databases have received increasing interests, and a lot of data models have been proposed. One of the key issues in spatiotemporal databases is the representation of spatiotemporal changes. The typical example is to represent moving regions. But most of previous work concentrated on representing discretely moving regions. Continuously moving regions are much difficult to be modeled,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient distributed intrusion detection scheme

    Publication Year: 2004, Page(s):39 - 40 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    In general, intrusion detection systems are accurate and comfortable instruments for securing computer and network resources. But one of the great unsolved problems of deploying such systems in real-life environments is the low efficiency, especially in the context of applying the host-based attack identification paradigm. In this paper, a new approach for overcoming the efficiency problem is pres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of a hybrid automotive wireless harness

    Publication Year: 2004, Page(s):56 - 57 vol.2
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1358 KB) | HTML iconHTML

    Bluetooth-compliant wireless signals are used to replace electrical signal wires in the interconnection of automobile components and modules. A hybrid concept, consisting of wired ''clusters'' of automobile components and wireless inter-cluster connections, is used. Initial implementation used switches and lamps to simulate automotive sensors and transducers. Current prototype uses dash panel and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent-based framework for testing Web applications

    Publication Year: 2004, Page(s):174 - 177 vol.2
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    Software testing in general and Web applications testing in particular are knowledge-driven, labor intensive activities, which are best performed by intelligent, autonomous agents. The proposed framework is based on the Belief-Desire-Intention (BDI) model of rational agents and the Unified Modeling Language (UML). We describe how Web applications testing can be modeled and reasoned using the frame... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A view-based control flow metric

    Publication Year: 2004, Page(s):26 - 27 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    We present a new metric for control flow path sets based on a control flow abstraction technique and evaluate the concept in a study of a large set of artificially generated programs, using a special model of fault detection ability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data flow analysis and testing of Java Server Pages

    Publication Year: 2004, Page(s):114 - 119 vol.2
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3760 KB) | HTML iconHTML

    Web applications often rely on server-side scripts to handle HTTP requests, to generate dynamic contents, and to interact with other components. The server-side scripts usually mix with HTML statements and are difficult to understand and test. In particular, these scripts do not have any compiling check and could be error-prone. Thus, it becomes critical to test the server-side scripts for ensurin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online testing of Web-based applications

    Publication Year: 2004, Page(s):166 - 169 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2676 KB) | HTML iconHTML

    Testing of Web-based applications is difficult. Online testing of Web-based applications is more difficult. We argue the motivation of online testing, especially those of Web-based applications. We explain what online testing is, what it concerns, and the difference between online testing and offline testing. We introduce some key problems, such as how to reduce the interference to the normal serv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An XML-based framework for language neutral program representation and generic analysis

    Publication Year: 2004, Page(s):10 - 11 vol.2
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    We propose XML applications for language neutral representation of programs at different levels of abstractions. We present an XML-based program representation framework in order to facilitate the development of generic program analysis tools. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robustness study of an embedded operating system for industrial applications

    Publication Year: 2004, Page(s):64 - 65 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    Critical industrial applications or fault tolerant applications need for operating systems (OS), which guarantee a correct and safe behaviour in spite of the appearance of errors. In order to validate the behaviour of an operating system, software fault injection techniques can be used. These techniques could be used to corrupt the information of some of the operating system calls to see how the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • N-gram-based detection of new malicious code

    Publication Year: 2004, Page(s):41 - 42 vol.2
    Cited by:  Papers (38)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    The current commercial anti-virus software detects a virus only after the virus has appeared and caused damage. Motivated by the standard signature-based technique for detecting viruses, and a recent successful text classification method, we explore the idea of automatically detecting new malicious code using the collected dataset of the benign and malicious code. We obtained accuracy of 100% in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An intelligent component retrieval system using conversational CBR

    Publication Year: 2004, Page(s):47 - 48 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    One difficulty in component retrieval comes from users' incapability to well define their queries. In this paper, we propose a conversational component retrieval model (CCRM) to alleviate this difficulty. In CCRM, a knowledge-intensive conversational case-based reasoning method is adopted to infer potential knowledge from current known knowledge, calculate the context-based semantic similarities b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Code-coverage guided prioritized test generation

    Publication Year: 2004, Page(s):178 - 181 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    With Internet applications spreading like wildfire, software testing is challenged with new topics related to the distributed nature of Web applications. We apply code based testing techniques to the testing of Web applications, specifically Java programs. Source code based automatic test generation is difficult because most previous methods use constraint satisfaction models as a solution, which ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A grid service-based engineering computation architecture

    Publication Year: 2004, Page(s):6 - 7 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    Grid computing is becoming a new computing infrastructure for large-scale scientific computation and cooperative work. The Globus toolkit is the most popular grid environment and de facto grid standard, and it has adopted OGSA architecture to provide applications with grid service level. This study focuses on the requirement for scientists in engineering computation field and narrows the gap betwe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an authentication middleware to support ubiquitous Web access

    Publication Year: 2004, Page(s):36 - 38 vol.2
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    This extended abstract reports our on-going work on the design and development of a flexible multifactor authentication middleware to support secure, finegrained and ubiquitous data access through Web services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new e-shopping system using high performance custom computers

    Publication Year: 2004, Page(s):54 - 55 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    The current e-shopping systems only provide the pictures and price lists of all items for shoppers to browse and make the purchase request through Internet. This kind of shopping is very boring and the shoppers cannot enjoy it. In this project, we propose a new concept of e-shopping that provides customers the perception of physical shopping. The e-shop will be constructed directly from and coexis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software test process control: status and future directions

    Publication Year: 2004, Page(s):160 - 163 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    The modeling of the software test process using a state variable approach and the use of control theory concepts to regulate the process and calibrate the model has proven to be a valuable alternative for software process control. A description of the current status of the technique along with recent model improvements is presented. The architecture of a Web-based tool to hide the complexity of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A spatial SQL extension for continuous field querying

    Publication Year: 2004, Page(s):78 - 81 vol.2
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    In the last decade, a growing interest has been devoted to the management of data referring to geographic scenarios. However, the attention of recent research has been focused on discrete data disregarding continuous data, because of their intrinsic complexity. We introduce an extension of a spatial SQL, which provides users with the capability to pose queries about both discrete and continuous da... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing the planning and executing of software independent verification and validation (IV&V) in mature organizations

    Publication Year: 2004, Page(s):24 - 25 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    To an organization involved in the construction of mission critical software, the safety and reliability of critical systems including their software is of utmost importance. The use of an independent group to provide verification and validation (IV&V) is intended to improve the quality of the software products. We seek to optimize the planning and execution of IV&V activities upon organizations t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.