Proceedings of Joint 4th International Computer Science Conference and 4th Asia Pacific Software Engineering Conference

5-5 Dec. 1997

Filter Results

Displaying Results 1 - 25 of 70
  • Proceedings of Joint 4th International Computer Science Conference and 4th Asia Pacific Software Engineering Conference

    Publication Year: 1997
    Request permission for reuse | PDF file iconPDF (292 KB)
    Freely Available from IEEE
  • Quality and reuse in industrial software engineering

    Publication Year: 1997, Page(s):3 - 12
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1095 KB)

    The drive for productivity in the software industry is forcing major changes in the ways that software development and maintenance are being done. The technical trends contributing most to improved productivity are the improvement in quality of products and processes; and the reuse of code and other software components, such as design and requirements. The author surveys these technical trends. Ea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality assurance certification: adoption by Australian software developers and its association with capability maturity

    Publication Year: 1997, Page(s):13 - 22
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (997 KB)

    Many Australian developers have committed resources to achieve certification in response to government purchasing policies favouring standards-certified-suppliers, but cynics suggest the 'piece of paper' does little to improve the processes and subsequent product. This study details a research project undertaken to assess the adoption of QA certification by Australian software developers. Primary ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Criticality prediction models using SDL metrics set

    Publication Year: 1997, Page(s):23 - 30
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (727 KB)

    This paper focuses on the experiences gained from defining design metrics for SDL and comparing three prediction models for identifying the most fault-prone entities using the defined metrics. Three sets of design complexity metrics for SDL are defined according to two design phases and SDL entity types. Two neural net based prediction models and a model using the hybrid metrics are implemented an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring class coupling and cohesion: a formal metamodel approach

    Publication Year: 1997, Page(s):31 - 40
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (935 KB)

    Metamodeling, object-orientation and formal methods are three promising ways to cope with the increasing size and complexity of today's software systems. Furthermore, effective control of development projects requires the use of versatile metrics for software size and complexity. We present a generic formal object-oriented metamodel (GM), specifically tailored for modeling object-oriented software... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Possum: an animator for the SUM specification language

    Publication Year: 1997, Page(s):42 - 51
    Cited by:  Papers (21)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (863 KB)

    We present an overview of the Possum specification animation system, an addition to the Cogito methodology and toolset. Possum allows interpretation (or animation) of specifications written in SUM, which is the specification language used in Cogito. We give an account of the functionality of Possum, illustrated by some simple examples, and describe the way in which Possum is used in a typical Cogi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal operational semantics for SOFL

    Publication Year: 1997, Page(s):52 - 61
    Cited by:  Papers (11)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (876 KB)

    SOFL (Structured-Object-Based-Formal Language) is a formal language and method for practical systems development. As a language, it integrates data flow diagrams, VDM-SL, and Petri nets to provide a graphical and textual formal notation for specification construction. Previous publications introducing SOFL are based on its informal semantics. We provide a formal operational semantics which gives a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-plan attribute grammars

    Publication Year: 1997, Page(s):62 - 71
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (905 KB)

    We identify a new class of non-circular attribute grammars, called the multi-plan attribute grammars, for which static evaluation plans can be computed. The class of multi-plan attribute grammars is larger than all currently known classes of non-circular attribute grammars with static evaluation plans. The decision procedure and the procedure for computing evaluation plans take essentially polynom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Denotational semantics for JSD

    Publication Year: 1997, Page(s):72 - 80
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (649 KB)

    This paper discusses the use of denotational semantics in formalizing the notations of structured methods. Using the Jackson System Development (JSD) method as an example, the techniques of denotational semantics are applied to the JSD notations to give them a formal semantics based on lambda calculus and communicating sequential processes (CSP). A JSD design can then be readily translated into CS... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed constraint-based search architecture for bus timetabling and duty assignment

    Publication Year: 1997, Page(s):82 - 88
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (679 KB)

    In order to manage the daily operation of a bus company, different types of scheduling must be performed on a regular basis: bus timetabling, duty assignment, bus assignment, rostering, driver assignment, etc. Due to problem complexity and limitations of available computer technologies, these scheduling activities are often performed by separate software systems. Even within a single type of sched... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovery of cases for case-based reasoning in engineering

    Publication Year: 1997, Page(s):89 - 96
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (753 KB)

    At present, an important assumption about case-based reasoning (CBR) is that cases should be readily available. While it is true in areas such as Law and Medicine where past cases are usually well documented, it does not hold for some engineering applications in which previous cases have not been established properly. We propose to tackle this "case acquisition" problem by using data mining and kn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing uncertainties in data mining

    Publication Year: 1997, Page(s):97 - 105
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    Data mining, which is also referred to as knowledge discovery in databases, has attracted much research interest. Data mining among independently developed databases often involves uncertain information. These uncertainties can be generated during both processes of combining relations and merging tuples. We propose a framework in which uncertainties can be measured. The objective is to determine t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HKBCN-a hybrid intelligent system for knowledge revising

    Publication Year: 1997, Page(s):106 - 114
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (752 KB)

    Connectionist networks are interesting computational models that have been proved to be useful for a range of applications. Knowledge in connectionist networks is encoded in distributed internal weights. Learning algorithms based on numerical optimisation techniques can adapt these weights for a specific task (e.g., pattern classification). One of the major criticisms against the connectionist app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A methodology for object-oriented constraint programming

    Publication Year: 1997, Page(s):116 - 122
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (594 KB)

    Object-oriented constraint programming (OOCP) combines two orthogonal but complementary programming paradigms into one-object-oriented programming (OOP) and logic constraint programming (LCP). Most practitioners of OOCP would agree that the design of a constraint-based model is the most time consuming and difficult part of OOCP. There is currently no systematic approach or methodology to follow wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The development of an object-oriented, discrete-event simulation language using Java

    Publication Year: 1997, Page(s):123 - 130
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (792 KB)

    Simulation modelling is an ideal domain for the application of object-oriented methods, both in the modelling of problem domain entities and in the implementation of simulators. The paper describes a prototype development of an object-oriented animated, general purpose discrete-event simulation language which builds on the well established entity modelling notations of JSD and harnesses the object... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards constructing a class evolution model

    Publication Year: 1997, Page(s):131 - 138
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (684 KB)

    Software tends to change itself according to user requirements changes. In the object-oriented technology, it is important to find a way how classes evolve to cope with new user requirements or to obtain reusability. The authors propose that developers need to know the class evolution processes and to forecast their future evolution according to the system, growth. Class specifications and class s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modular reasoning in Object-Z

    Publication Year: 1997, Page(s):140 - 149
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1041 KB)

    One of the tasks of a formal specification validation activity is to prove that systems described by the specification exhibit certain properties. For specifications describing large and complex systems, this can be difficult. Modular reasoning is an approach to this task in which one views a system as a number of smaller; simpler components, and where one attempts to carry out most of the reasoni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finite symbolic reachability graphs for high-level Petri nets

    Publication Year: 1997, Page(s):150 - 159
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (881 KB)

    The construction of reachability graphs (RG) is one of the most useful techniques to analyse the properties of concurrent systems modelled by Petri nets. Such a graph describes all the possible behaviours of the system, and its construction is straightforward. When high-level Petri nets are under consideration, the size of the graph most often is infinite or large. The reason for this combinatory ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A tool-suite for reachability analysis of concurrent object-oriented programs

    Publication Year: 1997, Page(s):160 - 169
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (826 KB)

    The object-oriented paradigm provides support for modular and reusable design and is attractive for the construction of large and complex concurrent systems. Reachability analysis is an important and well-known tool for static (pre-run-time) analysis of concurrent programs. However its direct application to concurrent object-oriented programs has many problems, such as incomplete analysis for reus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mapping Ada source code into an abstract program space

    Publication Year: 1997, Page(s):171 - 180
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1216 KB)

    A space for an abstract design view of software systems is simply and objectively characterised in terms of orthogonal dimensions. This characterisation also provides a basis for visualising abstract designs using "layering". Staged recovery from concrete programs into the abstract space exposes the advantages of the abstract view: determination of presentation iconography, disentanglement from po... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Client location tracking with k-step prediction and cache policy in ubiquitous information service network

    Publication Year: 1997, Page(s):181 - 190
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (911 KB)

    The paper presents a feasible and efficient methodology that improves client mobility management under an ubiquitous information service network. The authors base the system on the open integrated service network architecture and propose a hybrid infrastructure with facilities of both a centralized network management center (NMC) and a distributed home base node (HBN). They use LSDMk for choosing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architecture and a framework for IP applications

    Publication Year: 1997, Page(s):191 - 199
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (799 KB)

    Developing IP applications is important but troublesome in practice since reusable components are usually system-call-level service routines. It is becoming more and more indispensable in this network generation. Under the concept that an IP application consists of distributed objects communicating with one another, the authors define an architecture and design a framework for IP applications. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using extended event traces to describe communication in software architectures

    Publication Year: 1997, Page(s):203 - 212
    Cited by:  Papers (6)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (785 KB)

    A crucial aspect of the architecture of a software system is its decomposition into components and the specification of component interactions. In this report we use a variant of extended event traces as a graphical technique for the description of such component interactions. It allows us to define interaction patterns that occur frequently within an architecture, in the form of diagrams. The dia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design by contract for Python

    Publication Year: 1997, Page(s):213 - 219
    Cited by:  Papers (11)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (661 KB)

    The idea of design by contract (DEC), realized in the statically typed object-oriented programming language Eiffel, can be viewed as a systematic approach to specifying and implementing object-oriented software systems. We believe that a statically typed programming language is not suitable in the analysis and design phase of a prototyping-oriented software life cycle. For this purpose, dynamicall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reverse engineering method and experiences for industrial COBOL system

    Publication Year: 1997, Page(s):220 - 228
    Cited by:  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (888 KB)

    One of the most important things in restructuring current system is to clarify business specification which are implemented in the current system. Reverse engineering technology, which extracts reusable business specification from a system, is very effective for this purpose. We have developed DORE (Data Oriented Re-Engineering), a re-engineering methodology for system restructuring, and tools tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.