By Topic

2008 32nd Annual IEEE International Computer Software and Applications Conference

July 28 2008-Aug. 1 2008

Filter Results

Displaying Results 1 - 25 of 285
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - xxxi
    Request permission for commercial reuse | PDF file iconPDF (341 KB)
    Freely Available from IEEE
  • Message from the Standing Committee Chair

    Publication Year: 2008, Page(s): xxxii
    Request permission for commercial reuse | PDF file iconPDF (147 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2008, Page(s): xxxiii
    Request permission for commercial reuse | PDF file iconPDF (171 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2008, Page(s): xxxiv
    Request permission for commercial reuse | PDF file iconPDF (138 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2008, Page(s):xxxv - xxxvii
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2008, Page(s):xxxviii - xxxix
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2008, Page(s):xl - xli
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Medical Robotics and Computer-Integrated Surgery

    Publication Year: 2008, Page(s): 1
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (810 KB) | HTML iconHTML

    The impact of computer-integrated surgery (CIS) on medicine in the next 20 years will be as great as that of computer-integrated manufacturing on industrial production over the past 20 years. A novel partnership between human surgeons and machines, made possible by advances in computing and engineering technology, will overcome many of the limitations of traditional surgery. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generation Y: Understanding the Trend and Planning for the Impact

    Publication Year: 2008, Page(s): 2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Our world is always changing but we are about to experience change like never before. We are now more connected than ever, while at the same time distributed across multiple countries, cultures and companies. There is a new generation of students, employees and consumers pushing much of this change called "Generation Y" (or Millennials or Echo Boomers). This is a specific group of individuals born... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Position Statement: How Well Technology Supports Software Evolution

    Publication Year: 2008, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    Software evolution is the process by which programs change due to changing requirements or inherit characteristics from previous programs. Managing software evolution should be central to the development process, otherwise systems become more complex, fragile, and unreliable. Project management across the industry have found that that a large cost and effort in large projects goes towards maintena... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Panel Description: Software Testing for Large Globally Distributed Projects

    Publication Year: 2008, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (58 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Oil-Field Services' Data Acquisition System – A Globally Distributed Development

    Publication Year: 2008, Page(s): 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    Schlumberger's Oilfield Services' (OFS) data acquisition system is an integrated software system for acquiring, processing and delivering data from downhole tools, either during drilling or through wireline (i.e., electrical) cables. The project is largely distributed across six R&D centers in the US, France, Japan and China. Each center has sub-projects that have a clearly defined responsibil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Position Statement: The Impact of Software Assurance on Computing Education

    Publication Year: 2008, Page(s): 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    Our interest in software assurance extends from critical infrastructure to finance to manufacturing, and almost everything in between. Yet, if you look at our computing curricula, you will find almost no attention to this topic at the undergraduate level, and the fact is that many in the field of computing do not go on to receive advanced degrees. Until we recognize this need, as educators, our cu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Panel Description: 40 Years of Software Engineering

    Publication Year: 2008, Page(s): 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    In the fall of 1968, NATO hosted in Garmisch-Partenkirchen,  close to Munich, a conference devoted to the problems of the computer industry that was having a great deal of trouble in producing large and complex programs. The term Software Engineering SE) was not in general use at that time, its adoption for the title of this conference was deliberately provocative. As a result, the con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Position Statement: How Far Have We Come?

    Publication Year: 2008, Page(s): 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    In the late 1960s computers were mainly very big (room size) and expensive, and were mainly used by wealthy organisations for large-scale commercial data processing and scientific calculations, though the first minicomputers were starting to appear in well-funded laboratories. Since then not just one, but rather many, types of software industry have come into existence, in particular those that de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Position Statement: Advances and Challenges of Software Engineering

    Publication Year: 2008, Page(s): 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    In this article the advances in software engineering are i) evolvement of software processes from rigid, sequential and slow processes to iterative and agile processes and standardization of process models, such as CMMI (Capability Maturity Model Integration) and ISO 12207, ii) programming paradigms and software design techniques, such as object-oriented programming and model-driven architecture, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Position Statement: On the Evolution of Adversary Models in Computer Systems and Networks

    Publication Year: 2008, Page(s): 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    Summary form only given. Invariably, new technologies introduce new vulnerabilities which often enable new attacks by increasingly potent adversaries. Yet new systems are more adept at handling well-known attacks by old adversaries than anticipating new ones. Our adversary models seem to be perpetually out of date: often they do not capture adversary attacks and sometimes they address attacks rend... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Position Statement: Ceaselessly-Analyzing Development Environments, One Direction for the Next 40 Years of Software Engineering

    Publication Year: 2008, Page(s): 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (178 KB) | HTML iconHTML

    Software engineering is both difficult and expensive. This is as true today as it was 40 years ago. The end products of software engineering, software artifacts consisting of streams of instructions, are intended to solve some problem, live up to some requirements, implement some design. To improve software engineering, we must continue to improve the process that eventually outputs these instruct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats

    Publication Year: 2008, Page(s):12 - 19
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (626 KB) | HTML iconHTML

    This work introduces probabilistic model checking as a viable tool-assisted approach for systematically quantifying DoS security threats. The proposed analysis is based on a probabilistic attacker model implementing simultaneous N zombie participants, which subvert secure authentication features in communication protocols and electronic commerce systems. DoS threats are expressed as probabilistic ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedding Rule-Based Security Monitors into Java Programs

    Publication Year: 2008, Page(s):20 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    In this paper we study securing mobile code execution by embedding a rule-based security monitor into the mobile code before execution on a platform. A security monitor guards how the mobile code uses resources of the execution platform. We consider that this run-time monitoring approach is more practical than providing a proof of security properties along with the mobile code. Writing execution c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A UML-Based Framework for Design and Analysis of Dependable Software

    Publication Year: 2008, Page(s):28 - 31
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    A formal method for software development often introduces a gap between rigidity of the method and informal nature of system requirements. This paper presents a UML-based framework for design and analysis of dependable software while narrowing such a gap. We model the intended functions of a software application with UML statecharts and security threats, i.e., potential attacks, with sequence diag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.