Third International Conference on Quality Software, 2003. Proceedings.

7-7 Nov. 2003

Filter Results

Displaying Results 1 - 25 of 63
  • Proceedings. Third International Conference on Quality Software

    Publication Year: 2003
    Request permission for reuse | PDF file iconPDF (164 KB)
    Freely Available from IEEE
  • This page intentionally left blank

    Publication Year: 2003, Page(s): 0_2
    Request permission for reuse | PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • Proceedings Third International Conference On Quality Software

    Publication Year: 2003, Page(s): 0_3
    Request permission for reuse | PDF file iconPDF (204 KB)
    Freely Available from IEEE
  • Copyright page

    Publication Year: 2003, Page(s): 0_4
    Request permission for reuse | PDF file iconPDF (191 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2003, Page(s):0_5 - 0_8
    Request permission for reuse | PDF file iconPDF (196 KB)
    Freely Available from IEEE
  • Message from the general chair

    Publication Year: 2003, Page(s): 0_9
    Request permission for reuse | PDF file iconPDF (169 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the program co-chairs

    Publication Year: 2003, Page(s): 0_10
    Request permission for reuse | PDF file iconPDF (170 KB) | HTML iconHTML
    Freely Available from IEEE
  • Steering committee

    Publication Year: 2003, Page(s):0_11 - 0_12
    Request permission for reuse | PDF file iconPDF (177 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2003, Page(s): 0_13
    Request permission for reuse | PDF file iconPDF (174 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2003, Page(s): 0_14
    Request permission for reuse | PDF file iconPDF (165 KB)
    Freely Available from IEEE
  • Data mining and cyber security

    Publication Year: 2003
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (597 KB) | HTML iconHTML

    Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques. Cyber security is the area that deals with protecting from cyber terrorism. Cyber attacks include access control violations, unauthorized intrusions, and denial of service as well as insider threat. The presentation provi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mirror adaptive random testing

    Publication Year: 2003, Page(s):4 - 11
    Cited by:  Papers (11)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    Adaptive random testing (ART) has recently been introduced to improve the fault-detection effectiveness of random testing (RT) for certain types of failure-causing patterns. However, ART requires extra computations to ensure an even spread of test cases, which may render ART to be less cost-effective than RT. In this paper, we introduce an innovative approach, namely Mirror Adaptive Random Testing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental testing for self-evolving timed systems

    Publication Year: 2003, Page(s):12 - 19
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    Self-evolving software systems in time-critical domains adapt themselves automatically to changes in external situations and internal conditions. This paper presents a black-box method for incrementally generating test cases for self-evolving systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Random program generator for Java JIT compiler test system

    Publication Year: 2003, Page(s):20 - 23
    Cited by:  Papers (30)  |  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    Java has been used widely, from servers to cellular phones. In order to test those Java runtime systems, many test tools have been provided. However these tools are not enough for Java JIT compilers. They should be tested by various executable bytecode sequences. Most test tools don't cover such kinds of a combination test. Therefore we developed a random test program generator and a Java JIT comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic test allocation model for software reliability

    Publication Year: 2003, Page(s):26 - 31
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    In any non trivial software system the reliability of the software cannot be determined exactly. Instead, we must apply statistical methods to create an estimate based on a sample of test cases. Our goal is, given a fixed total number of test cases, to determine how to allocate these test cases among the partitions of the software so as to minimize the variance incurred by the maximum likelihood e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to test software for optimal software reliability assessment

    Publication Year: 2003, Page(s):32 - 39
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    The controlled Markov chains (CMC) approach to software testing models the software under test as a controlled Markov chain and treats it as a controlled object. It treats software testing strategy as the corresponding controller. Our previous work has shown that the CMC approach is applicable to dealing with the software testing problem for optimal software reliability growth. In this paper we sh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical case studies of combining software quality classification models

    Publication Year: 2003, Page(s):40 - 49
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (5333 KB) | HTML iconHTML

    The increased reliance on computer systems in the modern world has created a need for engineering reliability control of computer systems to the highest possible standards. This is especially crucial in high-assurance and mission critical systems. Software quality classification models are one of the important tools in achieving high reliability. They can be used to calibrate software metrics-base... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of the metrics applied to the software evaluation framework 'SEF'

    Publication Year: 2003, Page(s):52 - 58
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    The primary objective of this paper was to present a study on the metrics which can be applied to the software evaluation framework. The paper presents the results of a preliminary study, which focuses on the measurements applied to the framework. It provides a description of the metrics used and an analysis of how they compare to each other in the measurement of the software characteristics. This... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PRISMA: towards quality, aspect oriented and dynamic software architectures

    Publication Year: 2003, Page(s):59 - 66
    Cited by:  Papers (16)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    The development of software systems must be done using platforms that allow the description of quality, complex, distributed, dynamic and reusable architectural models. We present in this paper PRISMA, an architectural modelling approach based on aspects and components that uses a component definition language (components, connectors and systems) to define architectural types at a high abstraction... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Walking the talk: building quality into the software quality management tool

    Publication Year: 2003, Page(s):67 - 74
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    The market for products whose objective is to improve software project management and software quality management is expected to be large and growing. In this paper, we present data from a software project whose mission is to build a commercial enterprise software project and quality management tool. The data we present include: planned and actual schedule, earned value, size, productivity, and de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating small combinatorial test suites to cover input-output relationships

    Publication Year: 2003, Page(s):76 - 82
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    In this paper, we consider a problem that arises in black box testing: generating small test suites (i.e., sets of test cases) where the combinations that have to be covered are specified by input-output parameter relationships of a software system. That is, we only consider combinations of input parameters that affect an output parameter. We also do not assume that the input parameters have the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating, selecting and prioritizing test cases from specifications with tool support

    Publication Year: 2003, Page(s):83 - 90
    Cited by:  Papers (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (483 KB) | HTML iconHTML

    The classification-tree method provides a systematic way for software testers to derive test cases by considering important relevant aspects that are identified from the specification. The method has been used in many real-life applications and shown to be effective. This paper presents several enhancements to the method by annotating the classification tree with additional information to reduce m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A note on test oracles and semantics of algebraic specifications

    Publication Year: 2003, Page(s):91 - 98
    Cited by:  Papers (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Algebraic testing is an automated software testing method based on algebraic formal specifications. It tests if a program correctly implements an algebraic specification by checking if the equations of the specification are satisfied. One of the key techniques of algebraic testing is the use of observation contexts as a test oracle so that the comparison of values of structured data can be realise... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of Japanese software process practices and a potential for improvement using SOFL

    Publication Year: 2003, Page(s):100 - 107
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (4361 KB) | HTML iconHTML

    The goal of this paper is to examine the Japanese experience with the software development process, the challenges they face and how formal engineering methods, in particular SOFL (structured object-oriented formal language), can help overcome these problems. We also recommend additional management tools and documents that can aid organizations in achieving a higher CMM rating through the use of S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating scenarios from use case map specifications

    Publication Year: 2003, Page(s):108 - 115
    Cited by:  Papers (12)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (4906 KB) | HTML iconHTML

    The use case map (UCM) notation is being standardized as part of the user requirements notation (URN), the most recent addition to ITU-T's family of languages. UCM models describe functional requirements and high-level designs with causal paths superimposed on a structure of components. The generation of individual scenarios from UCM specifications enables the validation of requirements and facili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.