By Topic

2009 Ninth International Conference on Quality Software

24-25 Aug. 2009

Filter Results

Displaying Results 1 - 25 of 75
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1365 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (192 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2009, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (66 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chair

    Publication Year: 2009, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (69 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2009, Page(s):xii - xiv
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2009
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Keynote 1

    Publication Year: 2009, Page(s): xviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    Summary form only given: On the road to a successful software product, there are key milestones that you should not skip. Each of them is a chance to see if you are on the right path and to correct your direction if you are not. Each milestone is a document that records key design decisions in a way that allows them to be reviewed and analyzed. The meaning of each document must be precisely define... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote 2

    Publication Year: 2009, Page(s): xix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (69 KB)

    Summary form only given. In the 2006 report of the SEI International Process Research Consortium we identified nine driving forces which are shaping the need for research into software process and product. These were the increased push for value-add, business diversification, technology change, systems complexity, product quality, regulation, security and safety, and globalization. Four research t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Approach to Detecting Security Defects in Programs

    Publication Year: 2009, Page(s):1 - 10
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (437 KB) | HTML iconHTML

    Static analysis works well at checking defects that clearly map to source code constructs. Model checking can find defects of deadlocks and routing loops that are not easily detected by static analysis, but faces the problem of state explosion. This paper proposes a hybrid approach to detecting security defects in programs. Fuzzy inference system is used to infer selection among the two detection ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Metrics for Object-Oriented Class Designs

    Publication Year: 2009, Page(s):11 - 20
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (462 KB) | HTML iconHTML

    Measuring quality attributes of object-oriented designs (e.g. maintainability and performance) has been covered by a number of studies. However, these studies have not considered security as much as other quality attributes. Also, most security studies focus at the level of individual program statements. This approach makes it hard and expensive to discover and fix vulnerabilities caused by design... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tag-Based Techniques for Black-Box Test Case Prioritization for Service Testing

    Publication Year: 2009, Page(s):21 - 30
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (590 KB) | HTML iconHTML

    A web service may evolve autonomously, making peer web services in the same service composition uncertain as to whether the evolved behaviors may still be compatible to its originally collaborative agreement. Although peer services may wish to conduct regression testing to verify the original collaboration, the source code of the former service can be inaccessible to them. Traditional code-based r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Selecting Test Data Using Topological Structure of Boolean Expressions

    Publication Year: 2009, Page(s):31 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    Boolean expressions can be used in programs and specifications to describe the complex logic decisions in mission-critical, safety-critical and Web services applications. We define a topological model (T-model) to represent Boolean expressions and characterize the test data. This paper provides proofs of relevant T-model properties, employs the combinatorial design approach, and proposes a family ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Coverage of Program Code by Specification-Based Tests

    Publication Year: 2009, Page(s):41 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    Generating test cases from the specification can be done early in the software development life cycle. A test suite systematically generated from the software specification can be comprehensive in ensuring the intended functions to be exercised. Such a test suite is also instrumental in facilitating early discovery of software defects. On the other hand, an adequate level of code coverage is requi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Indepth Study of Mirror Adaptive Random Testing

    Publication Year: 2009, Page(s):51 - 58
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (475 KB) | HTML iconHTML

    Previous studies showed that adaptive random testing is an effective alternative to random testing method, but requires additional overheads to evenly spread test cases. Mirroring was introduced to reduce the overheads of adaptive random testing. This paper is the follow-up work to a previous study on the integration of mirroring and adaptive random testing, namely the mirror adaptive random testi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Innovative Approach to Randomising Quasi-random Sequences and Its Application into Software Testing

    Publication Year: 2009, Page(s):59 - 64
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    Quasi-random sequences, which can evenly spread points across a hypercube, have been widely used in various areas. Recently, quasi-random testing technique, which makes use of quasi-random sequences to generate test cases, was proposed, and it normally has a higher failure-detection capability than pure random testing. However, there exist only a few distinct quasi-random sequences in the literatu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive Specification and Verification of Behavioural Adaptation Contracts

    Publication Year: 2009, Page(s):65 - 75
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB) | HTML iconHTML

    Adaptation is a crucial issue when building new applications by reusing existing software services which were not initially designed to interoperate with each other. Adaptation contracts describe composition constraints and adaptation requirements among these services. The writing of this specification by a designer is a difficult and error-prone task, especially when service protocol needs to be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Verification-Centric Software Development Process for Java

    Publication Year: 2009, Page(s):76 - 85
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    Design by contract (DBC) is an oft-cited, but rarely followed, programming practice that focuses on writing formal specifications first, and writing code that fulfills those specifications second. The development of static analysis tools over the past several years has made it possible to fully embrace DBC in Java systems by writing, type checking, and consistency checking rich behavioral specific... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling and Verification of Port Based Component Composition

    Publication Year: 2009, Page(s):86 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    This paper presents a port based language to describe components and component composition. This language aims to check component composition in three aspects: signature constraints, behaviour compatibility and run time errors. For the run time errors, we have a result that can check if the system is in deadlock state. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Timed Modeling and Verification of BPEL Processes Using Time Petri Nets

    Publication Year: 2009, Page(s):92 - 97
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (407 KB) | HTML iconHTML

    The execution time, an important criterion to measure the quality of a BPEL process, can be influenced by some slow external partner services (i.e., some long-running services). Therefore, it is desirable to specify response time of services into the SLAs (service level agreements). In this way, service consumers could verify whether the candidate services satisfy the expected time requirements be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web Traversal with a History Stack

    Publication Year: 2009, Page(s):98 - 107
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (386 KB) | HTML iconHTML

    Correct navigational behavior of a web application is essential to its reliability. An effective means to improve our confidence in the correct behavior of a web application is to test it by exploring the possible navigation among the webpages at client side: The tester carries out the testing by consecutively clicking the hyperlinks along with some possible search parameters and checking whether ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.