Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06)

19-20 June 2006

Filter Results

Displaying Results 1 - 25 of 77
  • Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing - Title Page

    Publication Year: 2006, Page(s):i - iii
    Request permission for reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing - Copyright Page

    Publication Year: 2006, Page(s): iv
    Request permission for reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing - Table of contents

    Publication Year: 2006, Page(s):v - ix
    Request permission for reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • Message from the Conference Co-chairs

    Publication Year: 2006, Page(s): x
    Request permission for reuse | PDF file iconPDF (31 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chair

    Publication Year: 2006, Page(s): xi
    Request permission for reuse | PDF file iconPDF (32 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the SAWN 2006 Workshop Co-chairs

    Publication Year: 2006, Page(s): xii
    Request permission for reuse | PDF file iconPDF (37 KB) | HTML iconHTML
    Freely Available from IEEE
  • SNPD 2006 Program Committee

    Publication Year: 2006, Page(s): xiv
    Request permission for reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • Decision Table Based Analysis of Trading Models

    Publication Year: 2006, Page(s):3 - 8
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    This paper presents a decision table based-methodology to analyze trading models. There are many trading systems available but mostly do not work. Ninety percent of traders lose money including those using professionally developed systems. The same system that works for one trader may not work for the other. Where is the problem? The problem is in execution. The success of a system depends upon th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transition from Requirements to Architecture: A Review and Future Perspective

    Publication Year: 2006, Page(s):9 - 16
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    Elicitation, modeling and analysis of requirements are main challenges during software development. In parallel, software architectures have become a well established area in software engineering research and practice. However, there is still a lack of fundamental process models and guidelines for the transition between the two important phases of requirements engineering and software architecture... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Three-Layer Model for Software Engineering Metrics

    Publication Year: 2006, Page(s):17 - 20
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (127 KB) | HTML iconHTML

    This paper presents a three-layer model that captures the fundamentals of software metrics within a unifying framework. The model readily lends itself for use in both instructional and practitioner environments. The first (lowest) layer of the model consists of the three primitive software engineering metrics: person-months (PM), function-points (FP), and lines of code (LOC). They are presented as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An NFR-Based Framework for Establishing Traceability between Enterprise Architectures and System Architectures

    Publication Year: 2006, Page(s):21 - 28
    Cited by:  Papers (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    Enterprise architectures (EA's) usually capture the information technology architecture of the organization including hardware, software, and networking standardizations, if any, that serves as the basis for all information systems developed within an organization. Usually EA's are closely aligned to the strategic enterprise plan of the organization. Any information system developed within the org... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design Phase Analysis of Software Qualities Using Aspect-Oriented Programming

    Publication Year: 2006, Page(s):29 - 34
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    If we can analyze software qualities during the design phase of development without waiting until the implementation is completed and tested, the total development cost and time will be significantly saved. Therefore in the past many design analysis methods have been proposed but either they are hard-to-learn and use or, in the case of simulation-based analysis, functionality concerns and quality ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improvement of Object Serialization in Java Remote Method Invocation

    Publication Year: 2006, Page(s):35 - 42
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    In Java remote method invocation (RMI) objects are serialized before being sent over the wire. JDK object serialization causes overheads due to verbose data in the serialized object, dynamic type checking, and so on. JavaParty project (Haumacher and Philippsen, 1998) reduces RMI overheads by eliminating redundant data in the serialized object, using explicit marshaling, slim type encoding, etc. Bo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying Dynamic Change Impact Analysis in Component-based Architecture Design

    Publication Year: 2006, Page(s):43 - 48
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Change impact analysis plays an important role in maintenance and evolution of component-based software architecture. Viewing component replacement as a change to composition-based software architecture, this paper proposes a component interaction trace based approach to support dynamic change impact analysis at software architecture level. Given an architectural change, our approach determines th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Addressing Unbounded Parallelism in Verification of Software Components

    Publication Year: 2006, Page(s):49 - 56
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    To use verification tools for reliability analysis of a software component, it is desirable to specify the behavior of the component by a finite-state model. This is often impossible at design time if the component practices unbounded parallelism. In that case, the behavior of the component widely depends on the environment the component is instantiated in. Unfortunately, covering all possible env... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transforming Linear Terms of Algebraic Specifications Into Extended Pomsets

    Publication Year: 2006, Page(s):57 - 64
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    A combination of algebraic and object-oriented specification techniques may take advantage of both approaches for system development. This paper presents a formal method how to transform linear terms of an algebraic specification into an object-oriented description based on pomsets. For this purpose, we introduce an extension of pomsets by distinguishing the variables of a pomset. We show that the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Stream Transformers to Moore State Transition Machines with Input and Output

    Publication Year: 2006, Page(s):65 - 72
    Cited by:  Papers (13)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    A black box specification of a deterministic software or hardware component refers to the function mapping input histories to output histories. An important refinement step amounts to designing a state transition machine which correctly implements the specified behaviour. We present a formal method for implementing stream transformers by Moore state transition machines. First we construct a canoni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing Test Cost and Improving Documentation In TDD (Test Driven Development)

    Publication Year: 2006, Page(s):73 - 76
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    In the fast pace business world of today where competition and technology are at their zenith, software development companies need to improve their quality standards in addition to cost reduction in operations. To achieve these challenging objectives various developments are on the verge. In recent past agile methodologies have emerged as one of the most efficient implementations in the world of s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Extension to Robustness Slicing Algorithm Based on Dynamic Array

    Publication Year: 2006, Page(s):77 - 84
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    Since it was introduced in 1979, program slicing has been used widely in many aspects of software engineering, such as code debugging, program comprehension, software maintenance and reverse engineering etc. Since 1995, many people have studied and developed some methods and tools to help programmers use program, slicing technique in software testing, and some valuable results have been obtained b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Text Classification by Combining Different Distance Functions withWeights

    Publication Year: 2006, Page(s):85 - 90
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    Since data is becoming greatly large in the networks, the machine classification of the text data, is not easy under these computing circumstances. Though the k-nearest neighbor (kNN) classification is a simple and effective classification approach, the improving performance of the classifier is still attractive to cope with the high accuracy processing. In this paper, the kNN is improved by apply... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology-Based Knowledge Extraction-A Case Study of Software Development

    Publication Year: 2006, Page(s):91 - 96
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (501 KB) | HTML iconHTML

    It is very important to construct a common library from the software development process in a standard analysis pattern. Reusing analysis knowledge in the same domain and the common library can help to build up high-quality applications in limited developing time. System analysis patterns enable a software application to model a specific problem by representing some domain classes and their relati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Flocking Approach for Information Stream Clustering Analysis

    Publication Year: 2006, Page(s):97 - 102
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    Intelligence analysts are currently overwhelmed with the amount of information streams generated everyday. There is a lack of comprehensive tool that can real-time analyze the information streams. Document clustering analysis plays an important role in improving the accuracy of information retrieval. However, most clustering technologies can only be applied for analyzing the static document collec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying Critical Dependencies Using General Bayesian Network: An Application to Aviation Operation

    Publication Year: 2006, Page(s):103 - 108
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    This paper proposes the general Bayesian network as a tool for identifying critical dependencies among complex human beliefs, especially for the case of airline service industry. When we consider an overall efficacy of the flight operation, to understand underlying beliefs between pilots and controllers is critical. However, even for the experts in organizational behavior, it is difficult to ident... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Intrusion Detection Through Genetic Feature Selection

    Publication Year: 2006, Page(s):109 - 114
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (4613 KB) | HTML iconHTML

    This paper presents the novel feature selection method that maximizes class separability between normal and attack patterns of computer network connections. Recent years have witnessed increased interest in using a genetic algorithm to improve the performance of a classifier. In this paper we focus on selecting a robust feature subset based on the genetic optimization procedure in order to improve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.