By Topic

2009 WRI World Congress on Software Engineering

19-21 May 2009

Go

Filter Results

Displaying Results 1 - 25 of 122
  • [Front cover - Vol 4]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (442 KB)
    Freely Available from IEEE
  • [Title Page i - Volume 4]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 4]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (188 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 4]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Table of contents - Volume 4

    Publication Year: 2009, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Preface - Volume 4

    Publication Year: 2009, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (153 KB) | HTML iconHTML
    Freely Available from IEEE
  • Keynote Address Biography of Tharam S. Dillon - Volume 4

    Publication Year: 2009, Page(s): xiv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (146 KB)

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Address Biography of Qiang Shen - Volume 4

    Publication Year: 2009, Page(s): xv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (126 KB)

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conference Committee - Volume 4

    Publication Year: 2009, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (170 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s):xvii - xxi
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • Ineffectiveness of Use of Software Science Metrics as Predictors of Defects in Object Oriented Software

    Publication Year: 2009, Page(s):3 - 7
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    Software science metrics (SSM) have been widely used as predictors of software defects. The usage of SSM is an effect of correlation of size and complexity metrics with number of defects. The SSM have been proposed keeping in view the procedural paradigm and structural nature of the programs. There has been a shift in software development paradigm from procedural to object oriented (OO) and SSM ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Goal-Driven Measurement Model for Software Testing Process

    Publication Year: 2009, Page(s):8 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB) | HTML iconHTML

    In order to enhance the software quality, control and improve software testing process, the software testing process needs to be effectively measured. This paper presents a goal-driven measurement model for software testing process (MM4STP). Based on MM4STP, software organizations can deduce the appropriate measurement process according to the process's goals they determine. At the same time, they... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DBViewer: A Tool for Visualizing and Measuring Dependency Relations between Tables in Database

    Publication Year: 2009, Page(s):13 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    With the extensive use of the database and increasing complexity of its logic, how to visualize and measure the dependency relations between tables becomes a challenging task. However, ER graph can only tackle the situation of the partial view of whole database. For this reason, we proposed the methods for constructing a visualization and measurement tool for database-oriented software in this pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Description and Selection Model Based on Constraint QoS for Web Service

    Publication Year: 2009, Page(s):18 - 23
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (538 KB) | HTML iconHTML

    Along with the rapid growth of the Web service, the research of non-functional properties of Web service(QoS) becomes a hotspot. The work in this paper is based on an extended service model. It puts forward a metric policy of comprehensive QoS, and the matching algorithm including two aspects: non-QoS constraint and QoS constraint. The experimental results prove that the algorithm is reliable and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development and Application of Defraud Preventing Software for Highway Toll Collection

    Publication Year: 2009, Page(s):24 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (490 KB) | HTML iconHTML

    Anti-fraud analysis under the circumstance of networked toll system is crucially important. This paper analyzed how to detect fraud when traffic is congested, the vehicle is disagree, blacklist special incidents happened; and analyzed service process about overtime vehicles, brave barrier vehicles, and bad IC card vehicle; introduced 3 mining methods to mining out nested plate vehicle and other de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Software Change Propagation Using Simulation

    Publication Year: 2009, Page(s):28 - 33
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    Software changes are inevitable in the process of software evolution. And software change propagation intensely increases the difficulty of software maintenance. The approach of simulated analysis is introduced to the research on software change propagation. The software change propagation model construction and related software metric indicators are presented. And the software change propagation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration Enterprise Process Metrics Model and Information Model Based on Semantics

    Publication Year: 2009, Page(s):34 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (469 KB) | HTML iconHTML

    The key to practice enterprise process measure is to integrate metrics model with information model, and collect metrics data from information system. The semantics structure of basic metric is analyzed, and guide lines are given to describe the semantics of metric for collecting metric data automatically. Based on domain ontology, a structure called semantic tree is defined to describe the semant... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intuitive Visualization and Objective Metric Evaluation for Software Programming Based Advanced Image Segmentation

    Publication Year: 2009, Page(s):38 - 42
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (880 KB) | HTML iconHTML

    This study is to investigate image segmentation approaches using software programming from diverse perspectives. The outcomes will be evaluated with intuitive visualization qualitatively and objective metrics quantitatively. Watershed segmentation is applied for pattern recognition. The watershed transform locates watershed ridges and catchment basins in an image, assuming that bright pixels are h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring User Satisfaction of Networked Software Based on User Behavior

    Publication Year: 2009, Page(s):43 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (607 KB) | HTML iconHTML

    End user satisfaction of software or information system is an important research topic. However, existing research has been focused on questionnaire and indicators selection. An important issue has not been paid enough attention so far is that the traditional method is hardly suitable in Web 2.0, which user using pattern and software runtime environment have changed. In this paper, we present a ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Program Evaluation and Review Technique Based on Moment Generating Function and its Application in Software Engineering

    Publication Year: 2009, Page(s):49 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (545 KB) | HTML iconHTML

    In software projects, program evaluation and review technique (PERT) is frequently used to estimate the schedule of the uncertain projects. However, classic PERT does not allow the existence of loop in PERT graph, and assuming that all the activities time subject to the probability distribution. All these restrict the use of PERT. Firstly, by mapping PERT network to the Petri nets based model, thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality Tree of QFD: A New Method to Ensure Software Quality

    Publication Year: 2009, Page(s):53 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    We bring a new method--QTQ (Quality Tree of QFD) to solve the problem, that software quality can not effectively ensure. QTQ is based on UML profile, it integrates ideal solution and QFD. Its main point is: According to the concept of ideal solution, establish DTRQ (Distribution Tree of Requirement Quality), when analyze requirements of customer. Use DTRQ to guide design. On the basis of design, b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Testing-Based Software Credibility Measurement and Assessment

    Publication Year: 2009, Page(s):59 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (457 KB) | HTML iconHTML

    It's one of the important approaches to measure and assess software credibility by testing in trustworthy software study. From the perspective of effective management and credibility analysis supporting the test process, this article describes a basic framework for its management and discusses the assessment techniques and methods of credible test process and software product. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Review of Component Coupling Metrics for Component-Based Development

    Publication Year: 2009, Page(s):65 - 69
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    The use of component-based software engineering (CBSE) is growing in popularity among the software engineering community and it has been successfully applied in many engineering domains. Component quality evaluations by adequate metrics are needed for large scale project. However, the software quality evaluation should also be performed on component assembly since the overall quality of the CBSE i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis on Weather Forecast Software Project Management at Provincial Level

    Publication Year: 2009, Page(s):73 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    The concrete characteristics and special needs of provincial weather forecast system which took Doppler radar data as key source, combined with multi-kind data, based on operational network and forecast environment were discussed. Result shows that multi-type source, huge amount of data, short running cycle, and high flexibility to enhance are basic features of weather forecast system. The keys to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of the Potential SaaS Platform Provider in China

    Publication Year: 2009, Page(s):78 - 80
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (463 KB) | HTML iconHTML

    This paper mainly studies the potential SaaS platform provider that may develop quickly in China. As the software vendors promoting SaaS in the market, Chinese telecommunication operators pay attentions to SaaS during their transformation from traditional telecommunication service provider to information service provider. China Telecom is one of them. China Telecom, especially after the reorganiza... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.