Proceedings Second Asia-Pacific Conference on Quality Software

10-11 Dec. 2001

Filter Results

Displaying Results 1 - 25 of 53
  • Proceedings Second Asia-Pacific Conference on Quality Software

    Publication Year: 2001
    Request permission for reuse | PDF file iconPDF (279 KB)
    Freely Available from IEEE
  • Analysis and implementation method of program to detect inappropriate information leak

    Publication Year: 2001, Page(s):5 - 12
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (513 KB) | HTML iconHTML

    For a program which handles secret information, it is very important to prevent inappropriate information leaks from a program with secret data. D.E. Denning (1976) proposed a mechanism to certify the security of program by statically analyzing information flow, and S. Kuninobu et al. (2000) proposed a more practical analysis framework including recursive procedure handling, although no implementa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing executable slices for concurrent logic programs

    Publication Year: 2001, Page(s):13 - 22
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (841 KB) | HTML iconHTML

    Program slicing has many applications in software engineering activities. However, until recently, no slicing algorithm has been presented that can compute executable slices for concurrent logic programs. We present a dependence-graph based approach to computing executable slices for concurrent logic programs. The dependence-based representation used in the paper is called the Argument Dependence ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exception analysis for multithreaded Java programs

    Publication Year: 2001, Page(s):23 - 30
    Cited by:  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (637 KB) | HTML iconHTML

    This paper presents a static analysis that estimates uncaught exceptions in multithreaded Java programs. In Java, throwing exceptions across threads is deprecated because of the safely problem. Instead of restricting programmers' freedom, we extend the Java language to support multithreaded exception handling and propose a tool to detect uncaught exceptions in the input programs. Our analysis cons... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analysis of software correctness prediction methods

    Publication Year: 2001, Page(s):33 - 39
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (559 KB) | HTML iconHTML

    Reliability is one of the most important aspects of software systems of any kind. Software development is a complex and complicated process in which software faults are inserted into the code by mistakes during the development process or maintenance. It has been shown that the pattern of the faults insertion phenomena is related to measurable attributes of the software. We introduce some methods f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast algorithm to compute maximum likelihood estimates for the hypergeometric software reliability model

    Publication Year: 2001, Page(s):40 - 49
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (849 KB) | HTML iconHTML

    We present a fast and exact algorithm to compute maximum likelihood estimates for the number of faults initially contained in a software, using the hypergeometric software reliability model. The algorithm is based on a rigorous mathematical analysis of the growth behavior of the likelihood function for the model. We also clarify the stochastic process underlying the model and prove a recursion for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ordinal-time reliability model applied to "Big-Bang" suite-based testing

    Publication Year: 2001, Page(s):50 - 56
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (580 KB) | HTML iconHTML

    System testing is often performed by means of a comprehensive test suite that spans the functional requirements of a software product ("Big Bang" testing). This suite is then run repeatedly after each modification or fix until a satisfactory pass rate is achieved. Such testing does not lend itself to treatment with traditional reliability models which, in keeping with their origins in hardware, as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental quality network

    Publication Year: 2001, Page(s):59 - 64
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (447 KB) | HTML iconHTML

    The effects of the late detection of a defect in a software life cycle could be modeled in the planning of software projects through a model we have called Incremental Quality Network (IQN). Late detection of defects is a common problem in software projects, and many improvements have been accomplished in detection techniques. But defects still occur, mainly because of the uncertainties in softwar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategic drivers of software quality: beyond external and internal software quality

    Publication Year: 2001, Page(s):65 - 72
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (723 KB) | HTML iconHTML

    Software quality is often considered in terms of the contractual requirements between the supplier and acquirer as described in ISO/IEC 12207 and focuses on software life cycle processes. However, beyond these processes acquirer organisations need to address other issues like complying with new legislation, securing return on investment, and achieving competitive support from their new software in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using a coding standard to improve program quality

    Publication Year: 2001, Page(s):73 - 78
    Cited by:  Papers (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (508 KB) | HTML iconHTML

    Program quality represents the most significant part of software quality control that assures all characteristics of software products to satisfy the user's explicit and implicit needs. Though software processes have to be improved to enhance software quality. We address the problems of software products at the source code level, and deal with those problems by using a coding standard. We describe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object-oriented program behavior analysis based on control patterns

    Publication Year: 2001, Page(s):81 - 87
    Cited by:  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (627 KB) | HTML iconHTML

    Code-patterns are statically recurring structures specific to a programming language. It can be parallel to aid in designing software systems for solving particular problems. Contrary to compilation assistance of code-patterns, control-patterns are dynamically recurring structures invoked during program execution time. It can be used for benchmarking OO-programs and underlying architecture like Ja... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A path-based approach to the detection of infinite looping

    Publication Year: 2001, Page(s):88 - 94
    Cited by:  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (496 KB) | HTML iconHTML

    Infinite looping is a common type of program error This paper studies the detection of infinite loops in imperative programs. A sufficient condition is given, which is based on program paths. For a simple loop, if we can establish the infeasibility of certain paths within the loop body, we can conclude that the loop does not terminate. Several examples are given to show the effectiveness of the ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assurance of conceptual data model quality based on early measures

    Publication Year: 2001, Page(s):97 - 103
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (623 KB) | HTML iconHTML

    The increasing demand for quality information systems (IS), has become quality the most pressing challenge facing IS development organisations. In the IS development field it is generally accepted that the quality of an IS is highly dependent on decisions made early in its development. Given the relevant role that data itself plays in an IS, conceptual data models are a key artifact of the IS desi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use of software quality metrics in the materiel release process experience report

    Publication Year: 2001, Page(s):104 - 109
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (447 KB) | HTML iconHTML

    The US Army's Tank-Automotive Research Development and Engineering Center's Next Generation Software Engineering Life Cycle Support Activity (NextGen) is responsible for determining the suitability of software for release to the field. Determining the software is suitable for materiel release includes ensuring the software is safe, operationally suitable, and logistically supportable. The-Next Gen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why software engineering is riskier than ever

    Publication Year: 2001, Page(s):113 - 119
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (639 KB) | HTML iconHTML

    The ultimate aim of software engineering methods and tools is to reduce risks associated with the development of software products. Accepted risk management procedures recognize that software development is inherently risky, however fail to take into account the changing nature of both software products and the organizations undertaking their development. SE research has traditionally focused on t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On prediction of cost and duration for risky software projects based on risk questionnaire

    Publication Year: 2001, Page(s):120 - 128
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (746 KB) | HTML iconHTML

    The paper proposes a new approach that can discriminate risky software development projects from smoothly or satisfactorily going projects and give an explanation for the risk. We have already developed a logistic regression model which predicts whether a project becomes risky or not (O. Mizuno et al., 2000). However, the model returned the decision with a calculated probability only. Additionally... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Partial validation of a design specification with respect to requirements

    Publication Year: 2001, Page(s):131 - 140
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (737 KB) | HTML iconHTML

    The paper presents a method for partial validation of system design specifications. In the method presented, the requirements are given as a set of views described with MSC and referred to as a set of MSC/sub R/. The design specification can be given in any formal language. Our method allows for the verification, against each MSC/sub R/, of each simulation of the design specification collected int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constructing hardware/software interface using protocol converters

    Publication Year: 2001, Page(s):141 - 148
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (612 KB) | HTML iconHTML

    Hardware/software partition is a critical phase in hardware/software co-design. The paper proposes a hybrid partitioning framework, in which we design a set of protocol converters to construct the interface component between the hardware and software components, and reuse the formerly well-built partitioning rules by introducing protocol converters and rewriting them for this hybrid framework. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DLOTOS: a LOTOS extension for clock synchronization in distributed systems

    Publication Year: 2001, Page(s):149 - 153
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (373 KB) | HTML iconHTML

    The paper introduces a solution to the clock synchronization and timing problem in a distributed system. We present a grammar extension to LOTOS called DLOTOS and give an example of implementing discrete clocks. The resulting extension supports distributed processing and Internet computing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal test profile in the context of software cybernetics

    Publication Year: 2001, Page(s):157 - 166
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (577 KB) | HTML iconHTML

    Software cybernetics explores the interplay between software theory/engineering and control theory/engineering Following the idea of software cybernetics, the controlled Markov chains (CMC) approach to software testing treats software testing as a control problem. The software under test serves as a controlled object, and the (optimal) testing strategy determined by the theory of controlled Markov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testable use cases in the Abstract State Machine Language

    Publication Year: 2001, Page(s):167 - 172
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (509 KB) | HTML iconHTML

    Use cases are a method for describing interactions between humans and/or systems. However, despite their popularity there is no agreed formal syntax and semantics of use cases. The Abstract State Machine Language (ASML) is an executable specification language developed at Microsoft Research. We define an encoding of use cases in ASML and demonstrate the advantages by describing techniques to gener... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience report on conformance tests for CORBA ORBs

    Publication Year: 2001, Page(s):173 - 181
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (887 KB) | HTML iconHTML

    Middleware platforms are in widespread use for distributed systems. Their quality is key to the stability and interoperabilily in multi-vendor heterogeneous environments. It is the aim of the EC IST project CORVAL2 to enhance the techniques used to validate the conformance of OMG's CORBA technology. The paper investigates testability aspects of CORBA ORBs and considers CORBA based systems both fro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Railway power SCADA system commissioning "case example"

    Publication Year: 2001, Page(s):185 - 193
    Cited by:  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (882 KB) | HTML iconHTML

    The Mass Transit Railway Corporation Ltd., installed and commissioned their first computer based Power Remote Control System in the late 1980s. The system was successfully replaced in February 2000. The paper describes the methodology adopted to prepare and facilitate the transition of the replacement computer based control system into operational service and a system review following one year of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stakeholder discovery and classification based on systems science principles

    Publication Year: 2001, Page(s):194 - 198
    Cited by:  Papers (13)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (498 KB) | HTML iconHTML

    It is the goal of the research work presented to elaborate on improvements to software development methods so that quality attributes can be handled more systematically. By quality attributes, we mean the large group of typically systemic properties of a software system, such as availability, security, etc., but also reusability, maintainability and many more. We define quality attributes as stake... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality and people in the development of situationally specific methods

    Publication Year: 2001, Page(s):199 - 203
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    It is argued that personality testing and group dynamic principles could improve the success of development teams in developing systems by providing a mechanism for repeatable and valid identification, rating and selection of stakeholders in the method engineering process. The method presented, MEWSIC, aims to formalise the development of situational methods so that the link to quality assurance p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.