Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

2012 19th Asia-Pacific Software Engineering Conference

4-7 Dec. 2012

Go

Filter Results

Displaying Results 1 - 25 of 138
  • [Front cover]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - xv
    Request permission for commercial reuse | PDF file iconPDF (237 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2012, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (26 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2012, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (29 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Emerging Research Track Chair

    Publication Year: 2012, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (25 KB) | HTML iconHTML
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2012, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s):xx - xxi
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012, Page(s):xxii - xxiv
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Emerging Research Track Program Committee

    Publication Year: 2012, Page(s): xxv
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2012, Page(s):xxvi - xxvii
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • Keynotes [3 abstracts]

    Publication Year: 2012, Page(s):xxviii - xxx
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (59 KB)

    Provides an abstract for each of the three keynote presentations and a brief professional biography of each presenter. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Context-Based Integrity Framework

    Publication Year: 2012, Page(s):1 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    Although there is significant research and development into information security areas such as confidentiality and availability, scope remains for attention to the third fundamental security property: integrity. The Biba and Clark-Wilson models are still the most recognised for managing integrity of data in systems. After identifying several desirable extensions to the original ideas in these mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of Safety Verification with Conformance Testing in Real-Time Reactive System

    Publication Year: 2012, Page(s):10 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (373 KB) | HTML iconHTML

    In the paper, we propose a method that can be applied to verify implementation in real-time reactive system. Different from other software model checking approaches, our method is based on testing. This approach allows the verification of safety property to be conducted directly on real code instead of models extracted from final implementation. Verifying that kind of models is a hard work and can... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modular Heap Abstraction-Based Memory Leak Detection for Heap-Manipulating Programs

    Publication Year: 2012, Page(s):20 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1901 KB) | HTML iconHTML

    Heap-manipulating programs allow flexible manipulations over dynamically allocated, shared, and mutable heap cells via pointers that point to not only linked data structures but also their pointer fields. Therefore, memory leak detection for these programs requires precise field-sensitive pointer alias information, which make the problem more challenging. In this paper, we present a field and cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A CSP-theoretic Framework of Checking Conformance of Business Processes

    Publication Year: 2012, Page(s):30 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (517 KB) | HTML iconHTML

    In this paper, we tackle the problem of conformance checking which verifies if the event logs (observed) match/fit the reference (arbitrary) process. We use concepts from Communicating Sequential Processes (CSP), which facilitates automated analysis using PAT toolkit. By this technique one can identify all the logs which cannot be properly replayed on the process. We illustrate our approach with a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying Recommendation Systems for Composing Dynamic Services for Mobile Devices

    Publication Year: 2012, Page(s):40 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    In the context of mobile devices, services from several devices can be composed. Such compassable services may include data and device resources, such as microphones or cameras. The services can be composed to create collaborative composite services, such as video streaming. The mobility of the devices makes the service compositions inherently dynamic. Further, the set of possible service composit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an Adaptive Service Degradation Approach for Handling Server Overload

    Publication Year: 2012, Page(s):52 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    While people get used to surfing web, managing the overload of web applications has become a critical problem for application providers. Targeting overload issue of complex, dynamic web applications, this paper presents an adaptive service degradation approach. Our approach attempts to automatically locate the bottleneck inside the applications and generate proper degradation plans in real time. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Preference and Honesty Aware Trust Model for Web Services

    Publication Year: 2012, Page(s):61 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (527 KB) | HTML iconHTML

    Trust is one of the most critical factors for a service requestor when selecting the best one from a large pool of services. However, existing web service trust models either do not focus on satisfying customer's preference for different quality of service (QoS) attributes, or do not pay enough attention to the impact of malicious ratings on trust evaluation. To address these gaps, a dynamic trust... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust-Based Service Composition and Optimization

    Publication Year: 2012, Page(s):67 - 72
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    As an important method for creating value-added services by composing existing services, Web service composition technology has attracted an increasing attention in recent years. Most current service composition and optimization methods utilize quality of service (QoS) attributes to decide which concrete services to invoke. However, trust which is of critical importance to service composition proc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Trust Impact Analysis Model for Composite Service Evolution

    Publication Year: 2012, Page(s):73 - 78
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    Changes to a composite service need to be well analyzed in order to ensure the trust of it. The analysis can be driven by identifying the impact caused by the changes on the trust of other component services as well as the composite service. In this paper, we propose a trust impact analysis model to analyze the impact of two kinds of evolution operations performed on a composite service: binding c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and Verification of Context-Aware Systems

    Publication Year: 2012, Page(s):79 - 84
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    Verifying adaptive behavior is a critical challenge in the development of context-aware systems due to their complexity and uncertainty. This paper presents our novel model-based approach that provides a modeling framework to (1) specify the structural and behavioral aspects of a context-aware system, (2) define invariants of the system that need to be satisfied regardless of the adaptations, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Case for Using Simulation to Validate Event-B Specifications

    Publication Year: 2012, Page(s):85 - 90
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (407 KB) | HTML iconHTML

    This paper addresses the validation of formal specifications in Event-B through the execution of the specification. Current tools for Event-B, animators and translators, can execute only a restricted set of specifications. So, we propose a third technique, simulation, in which users and tools co-operate to produce an executable instance of the model. After a short presentation of Event-B and our s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.