Fourth International Conference onQuality Software, 2004. QSIC 2004. Proceedings.

8-9 Sept. 2004

Filter Results

Displaying Results 1 - 25 of 44
  • Proceedings. Fourth International Conference on Quality Software

    Publication Year: 2004
    Request permission for reuse | PDF file iconPDF (352 KB)
    Freely Available from IEEE
  • Proceedings Fourth International Conference on Quality Software

    Publication Year: 2004, Page(s): 0_2
    Request permission for reuse | PDF file iconPDF (171 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2004, Page(s): 0_3
    Request permission for reuse | PDF file iconPDF (164 KB)
    Freely Available from IEEE
  • Proceedings Fourth International Conference on Quality Software

    Publication Year: 2004, Page(s): 0_4
    Request permission for reuse | PDF file iconPDF (194 KB)
    Freely Available from IEEE
  • Copyright page

    Publication Year: 2004, Page(s): 0_5
    Request permission for reuse | PDF file iconPDF (183 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s):0_6 - 0_8
    Request permission for reuse | PDF file iconPDF (190 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2004, Page(s): 0_9
    Request permission for reuse | PDF file iconPDF (169 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Co-Chairs

    Publication Year: 2004, Page(s): 0_10
    Request permission for reuse | PDF file iconPDF (171 KB) | HTML iconHTML
    Freely Available from IEEE
  • Steering committee

    Publication Year: 2004, Page(s):0_11 - 0_12
    Request permission for reuse | PDF file iconPDF (180 KB)
    Freely Available from IEEE
  • Organizing committee

    Publication Year: 2004, Page(s): 0_13
    Request permission for reuse | PDF file iconPDF (166 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2004, Page(s): 0_14
    Request permission for reuse | PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • Smart play-out extended: time and forbidden elements

    Publication Year: 2004, Page(s):2 - 10
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    Smart play-out is a powerful technique for executing live sequence charts (LSCs). It uses verification techniques to help run a program, rather than to prove properties thereof. We extend smart play-out to cover a larger set of the LSC language features and to deal more efficiently with larger models. The extensions cover two key features of the rich version of LSCs, namely, time and forbidden ele... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conceptual modeling: a key to quality information systems

    Publication Year: 2004
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    Summary form only given. Computational devices, communication systems and storage devices are becoming commodities. Moore's law is still valid, and price/performance for the equipment decreases by the month. Computers are so deeply engrained in the fabric of our societies that they seem to have disappeared as distinct devices. Software, humans and all kinds of intelligent artifacts are interwoven ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing several coverage criteria for detecting faults in logical decisions

    Publication Year: 2004, Page(s):14 - 21
    Cited by:  Papers (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    Many testing coverage criteria, including decision coverage and condition coverage, are well-known to be inadequate for software characterised by complex logical decisions, such as those in safety-critical software. In the past decade, more sophisticated testing criteria have been advocated. In particular, compliance of MC/DC has been mandated in the aviation industry for the approval of airborne ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic generation of Markov chain usage models from real-time software UML models

    Publication Year: 2004, Page(s):22 - 31
    Cited by:  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (5895 KB) | HTML iconHTML

    The paper concerns automatic generation of usage models from real-time software UML models. Firstly, we define the reasonably constrained real-time software UML artifacts, which include use case diagrams, timed sequence diagrams and the execution probability of each sequence diagram in its associated use case. Secondly, the paper presents a method that derives the software usage model from the con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards the application of classification techniques to test and identify faults in multimedia systems

    Publication Year: 2004, Page(s):32 - 40
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    The advances in computer and graphic technologies have led to the popular use of multimedia for information exchange. However, multimedia systems are difficult to test. A major reason is that these systems generally exhibit fuzziness in their temporal behaviors. The fuzziness is caused by the existence of non-deterministic factors in their runtime environments, such as system load and network traf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A mechanically proved development combining B abstract systems and Spin

    Publication Year: 2004, Page(s):42 - 49
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (363 KB) | HTML iconHTML

    We present a complete study involving in the one hand refinement and an associated theorem proving tool and, on the other hand liveness verification with an associated tool. The event B method is used in the first part whereas Spin is used in the second one. The Spin validation tool is used to simulate and check B abstract systems. This entire development is mechanically proved with respect to saf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Equational approach to formal verification of SET

    Publication Year: 2004, Page(s):50 - 59
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    We have formally verified that a payment protocol, which is an abstract SET payment protocol but retains the essential part of the SET payment protocol, has several desired properties. Among the properties are that, if the payment gateway authorizes a payment, then both cardholder and merchant concerned always agree on the payment, and at this time, the two principals also agree on the transaction... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A first step towards formal verification of security policy properties for RBAC

    Publication Year: 2004, Page(s):60 - 67
    Cited by:  Papers (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    Considering the current expansion of IT-infrastructure, the security of the data inside this infrastructure becomes increasingly important. Therefore, assuring certain security properties of IT-systems by formal methods is desirable. So far in security, formal methods have mostly been used to prove properties of security protocols. However, access control is an indispensable part of security insid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating several path-based partial dynamic analysis methods for selecting black-box generated test cases

    Publication Year: 2004, Page(s):70 - 78
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    Many systematic methods help to produce a comprehensive repository of test cases that contain no redundancy from the specification point of view. When the repository cannot be tested in its entirety owing to resource constraints, there is a need to select a smaller subset of test cases that are effective with respect to a given implementation. One way of doing so is to select only one from each pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive random testing through dynamic partitioning

    Publication Year: 2004, Page(s):79 - 86
    Cited by:  Papers (26)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    Adaptive random testing (ART) describes a family of algorithms for generating random test cases that have been experimentally demonstrated to have greater fault-detection capacity than simple random testing. We outline and demonstrate two new ART algorithms, and demonstrate experimentally that they offer similar performance advantages, with considerably lower overhead than other ART algorithms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symbolic execution of program paths involving pointer structure variables

    Publication Year: 2004, Page(s):87 - 92
    Cited by:  Papers (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    Many white-box testing methods are based on the analysis of program paths. For these methods, an important problem is to determine the feasibility of a given path, and find appropriate input data to execute the path if it is feasible. The symbolic execution of program paths is studied. An approach is presented, which translates a path involving pointer and structure variables to a path involving s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a functional size measure for object-oriented systems from requirements specifications

    Publication Year: 2004, Page(s):94 - 101
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    This work describes a measurement protocol to map the concepts used in the OO-method requirements model onto the concepts used by the COSMIC full function points (COSMIC-FFP) functional size measurement method. This protocol describes a set of measurement operations for modeling and sizing object-oriented software systems from requirements specifications obtained in the context of the OO-method. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Machine-learning techniques for software product quality assessment

    Publication Year: 2004, Page(s):102 - 109
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Integration of metrics computation in most popular computer-aided software engineering (CASE) tools is a marked tendency. Software metrics provide quantitative means to control the software development and the quality of software products. The ISO/IEC international standard (14598) on software product quality states, "Internal metrics are of little value unless there is evidence that they are rela... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessment of the requirements management process using a two-stage questionnaire

    Publication Year: 2004, Page(s):110 - 116
    Cited by:  Papers (10)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    This research advocates the idea that although requirements management process is not carried out in many organizations, there are some people within the organization that perform some requirements management practices. However, these practices are usually not documented and as consequence are not spread across the organization. This paper proposes an assessment methodology based on a two-stage qu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.