Proceedings Seventh Asia-Pacific Software Engeering Conference. APSEC 2000

5-8 Dec. 2000

Filter Results

Displaying Results 1 - 25 of 63
  • Proceedings Seventh Asia-Pacific Software Engeering Conference. APSEC 2000

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (279 KB)
    Freely Available from IEEE
  • Co-development of real-time systems and their simulation environments

    Publication Year: 2000, Page(s):8 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (837 KB)

    A real-time system consists of control software, the hardware controlled by the software, and the environment that physically interacts with the controlled hardware. Simulating control software with simplistic assumptions of the environment characteristics is not sufficient for meaningful real-value simulation. The hybrid systems development methods with their simulation environment are a good sol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reasoning about real-time programs using idle-invariant assertions

    Publication Year: 2000, Page(s):16 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (767 KB)

    We develop a set of laws for reasoning about real-time programs using assertions (preconditions and postconditions) in the style of Hoare. In the real-time context assertions may refer to the current time and to the value of external inputs, which are not under the direct control of the program and hence not guaranteed to be stable with respect to the passage of time (even if the program does not ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pareto-based soft real-time task scheduling in multiprocessor systems

    Publication Year: 2000, Page(s):24 - 28
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (531 KB)

    We develop a new method to map (i.e. allocate and schedule) real-time applications into certain multiprocessor systems. Its objectives are: the minimization of the number of processors used; and the minimization of the deadline missing time. Given a parallel program with real time constraints and a multiprocessor system, our method finds schedules of the program in the system which satisfy all the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transatlantic project courses in a university environment

    Publication Year: 2000, Page(s):30 - 37
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (911 KB)

    Communication and collaboration is difficult in geographically distributed settings. As a result of globalization, mergers and acquisitions, and scarce skills, software development projects are increasingly more distributed. Hence, teaching software engineering students how to cope with distribution becomes a critical issue. This paper describes our experience with teaching three distributed softw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting collaboration in distributed software engineering teams

    Publication Year: 2000, Page(s):38 - 45
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (810 KB)

    Software engineering is no longer the preserve of individuals but is essentially a team-based activity involving a wide variety of stakeholders and thus making the need for communication and co-operation an inherent characteristic. Changes in support technology, economic factors and globalisation of the software process is resulting in the geographical separation of personnel. Where such distribut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bloodshot eyes: workload issues in computer science project courses

    Publication Year: 2000, Page(s):46 - 52
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (944 KB)

    Workload issues in computer science project courses are addressed. We briefly discuss why high workloads occur in project courses and the reasons they are a problem. We then describe some course changes we made to reduce the workload in a software engineering project course, without compromising course quality. The techniques include: adopting an iterative and incremental process, reducing the req... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The LAST project: development of a formal method for IS-specification and of a CASE-tool for IS-design

    Publication Year: 2000, Page(s):54 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB)

    This paper describes the basic methodology of a formal method (LAST) that uses elements of linear algebra and set theory for IS-specification. It also reports on an R&D project whose aim is to develop LAST and to make it fully operational. To this end, a CASE-tool consisting of a LAST user interface, and a translator LAST-UML will be developed and tested. The necessary description of LAST-UML ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A process logic for distributed system synthesis

    Publication Year: 2000, Page(s):62 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB)

    We define a process algebra DS@ to formally describe distributed systems and a process logic SP@ to formally describe their specifications. Then, we present a method to synthesize a distributed system (described in DS@) from given specifications (described in SP@). The main contribution is to show how to check the satisfiability of process logic in which concurrent behavior is distinct from interl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unifying theories of healthiness condition

    Publication Year: 2000, Page(s):70 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (891 KB)

    A theory of programming starts with a complete Boolean algebra of specifications, and defines healthiness conditions which exclude infeasibility of implementation. These are expressed as algebraic laws useful for transformation and optimisation of designs. Programming notations and languages must be restricted to those preserving all the healthiness conditions. We have explored a wide range of pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verification of a wireless ATM medium-access protocol

    Publication Year: 2000, Page(s):84 - 91
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (849 KB)

    We report on a model checking case study of an industrial medium access protocol for wireless ATM. Since the protocol is too large to be verified by any of the existing checkers as a whole, the verification exploits the layered and modular structure of the protocol's SDL specification and proceeds in a bottom-up, compositional way. The compositional arguments are used in combination with abstracti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring facilities in languages supporting development of concurrent self-measurement programs

    Publication Year: 2000, Page(s):92 - 99
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB)

    Large-scale and highly reliable concurrent systems are more and more required and it is indispensable for them to keep on measuring and monitoring in order to ensure their reliability. Some systematic method for developing self-measurement concurrent systems has been needed. Self-measurement programs may be difficult to be developed and maintained in a conventional environment for development. Thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of inspectors' defect estimation accuracy for a requirements document after individual inspection

    Publication Year: 2000, Page(s):100 - 109
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (882 KB)

    Project managers need timely feedback on the quality of development products to monitor and control project progress. Inspection is an effective method to identify defects and to measure product quality. Objective and subjective models can be used to estimate the total number of defects in a product based on defect data from inspection. This paper reports on a controlled experiment to evaluate the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The concept of path-closed subsets and its use in software functional design

    Publication Year: 2000, Page(s):112 - 119
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (785 KB)

    This is the first part of a three-part series in which we present a new approach to software functional design, starting from the dataflow diagram D of an algorithm. We introduce the notion of a path-closed set for characterizing the subsets of D that can be considered as function blocks for the software. We also define an equivalence relation and a partial order on the data-items in D, which toge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pragmatic data modelling and design for end users

    Publication Year: 2000, Page(s):120 - 126
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (754 KB)

    Many people are dependent on desktop end user tools such as spreadsheets and databases to manage their data. While they may have the technical skills to set up data repositories, many end users lack the analysis skills to design data models which reflect their often deceptively complex requirements. We advocate that a comprehensive data model should always be developed, with expert help, so that t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements engineering and strategic decision exploration: an area for interdisciplinary research

    Publication Year: 2000, Page(s):127 - 131
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (527 KB)

    Advances in strategic decision exploration and requirements engineering have brought about areas of overlap between them. We explore the areas of overlap as a mechanism for transferring ideas and approaches between the two disciplines. We exemplify the argument by showing how the "live models" approach can be applied to both contexts, based on the results of a pilot interdisciplinary project. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of the impact of reading technique and inspector capability on individual inspection performance

    Publication Year: 2000, Page(s):136 - 145
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (916 KB)

    Inspection of software documents is an effective quality assurance measure to detect defects in the early stages of software development. It can provide timely feedback on product quality to both developers and managers. This paper reports on a controlled experiment that investigated the influence of reading techniques and inspector capability on individual effectiveness to find given sets of defe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deriving test cases using class vectors

    Publication Year: 2000, Page(s):146 - 153
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (631 KB)

    A classification trees is one method of generating test cases from specifications. It partitions the input domain into a number of classifications. A classification tree is created to depict the relationship among the classifications. Test cases are then derived from this tree. However, classification trees have a number of shortcomings. Their expressive power is limited by the tree structure. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Checking compositions of UML sequence diagrams for timing inconsistency

    Publication Year: 2000, Page(s):154 - 161
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (657 KB)

    For real-time systems, UML sequence diagrams describe interactions among objects, which show scenarios of the system behaviour. A simple UML sequence diagram describes exactly one scenario. For describing multiple scenarios and specifying real-time systems, we need to consider the compositions of UML sequence diagrams. In this paper, we introduce high-level graphs to describe compositions of UML s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Consistency checks for UML

    Publication Year: 2000, Page(s):162 - 169
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (658 KB)

    In this article, we present an approach to defining UML diagrams in terms of state predicates and using the theorem prover PVS (Prototype Verification System) to verify consistency between various diagrams. We focus on the dynamic aspects of the various diagrams. Our approach can easily handle partially specified systems as the behaviour is described in terms of the history of the computation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The support tool for highly reliable component-based software development

    Publication Year: 2000, Page(s):172 - 179
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (745 KB)

    We discuss a support tool for highly reliable component-based software development. The tool assures the high reliability of the output by verifying refinement and by generating connectors. The advantages of the tool are automated refinement verification and automated connector generation. As a software architecture for component-based software, we select the tree architecture, in which components... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal specification of Catalysis frameworks

    Publication Year: 2000, Page(s):180 - 187
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB)

    Frameworks are increasingly being recognised as very useful components in the emerging paradigm of component-based software development (CBD). They are widely accepted as better units of reuse than objects. The CBD methodology Catalysis, for instance, uses frameworks. However, at present, Catalysis frameworks are described only informally, which means we cannot reason formally about frameworks, in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed component architecture for a large telecommunication application

    Publication Year: 2000, Page(s):188 - 195
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1010 KB)

    The telecommunication domain contains many performance-demanding applications. These applications must also be flexible in order to meet new and changing requirements in a fast and cost-effective way. We have studied one such application-the Ericsson Billing Gateway. In order to reduce the cost for introducing new functionality, we broke up the application into distributable components. At the sam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accessing software component documentation during design: an observational study

    Publication Year: 2000, Page(s):196 - 203
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (694 KB)

    Although developing systems with reusable software components offers considerable scope to speed the delivery of a system, their use also requires us to revise our ideas about the design process. We report on a series of laboratory-based studies in which we observed the processes by which simple component-based designs were developed, paying particular attention to when the documentation for parti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework of requirements tracing using UML

    Publication Year: 2000, Page(s):206 - 213
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB)

    Requirements tracing supports software development work by tracing the changes made to the models. There are two functions in requirements tracing: change tracking and influence analysis. Change tracking is the function of searching the models and model elements in the production sequence. Furthermore, one correction of an element in a model often leads to new corrections to other elements. Influe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.