Default Cover Image

2006 13th Asia Pacific Software Engineering Conference (APSEC'06)

Dec. 6 2006 to Dec. 8 2006

Kanpur

Table of Contents

Security-Oriented Service Composition and EvolutionFull-text access may be available. Sign in or learn about subscription options.pp. 71-78
Introduction
Conference ChairsFreely available from IEEE.pp. x
Introduction
Program CommitteeFreely available from IEEE.pp. xi
Introduction
Organizing CommitteeFreely available from IEEE.pp. xiii
Introduction
PrefaceFreely available from IEEE.pp. xiv
SESSION 1A: COMPONENT BASED SOFTWARE ENGINEERING
Secrobat: Secure and Robust Component-based ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 3-10
SESSION 1A: COMPONENT BASED SOFTWARE ENGINEERING
A precise estimation technique for test coverage of components in object-oriented frameworksFull-text access may be available. Sign in or learn about subscription options.pp. 11-18
SESSION 1A: COMPONENT BASED SOFTWARE ENGINEERING
An Approach Based on Modeling Dynamic Behavior of the System to Assess the Impact of COTS UpgradesFull-text access may be available. Sign in or learn about subscription options.pp. 19-26
SESSION 1A: COMPONENT BASED SOFTWARE ENGINEERING
Component composition through architectural patterns for problem framesFull-text access may be available. Sign in or learn about subscription options.pp. 27-36
SESSION 4A: COMPONENT BASED SOFTWARE ENGINEERING
Component-based Development of MILLS: A Case Study in the development of an Inter-library Loan Software SystemFull-text access may be available. Sign in or learn about subscription options.pp. 37-44
SESSION 4A: COMPONENT BASED SOFTWARE ENGINEERING
Adopting Model-Driven Development for Integrated Services and Appliances in Home Network SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 45-52
SESSION 4A: COMPONENT BASED SOFTWARE ENGINEERING
Efficient Component Based Software Engineering using the TCEM Methodology and the TCET ToolFull-text access may be available. Sign in or learn about subscription options.pp. 53-60
SESSION 4A: COMPONENT BASED SOFTWARE ENGINEERING
Toward a Code Search Engine Based on the State-of-Art and PracticeFull-text access may be available. Sign in or learn about subscription options.pp. 61-70
A Method for Detecting and Measuring Architectural Layering Violations in Source CodeFull-text access may be available. Sign in or learn about subscription options.pp. 165-172
SESSION 7A: COMPONENT BASED SOFTWARE ENGINEERING
A Coupling-based Complexity Metric for Remote Component-based Software Systems Toward Maintainability EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 79-86
SESSION 7A: COMPONENT BASED SOFTWARE ENGINEERING
A Formal Framework for Component Pr otocols Behavioural CompatibilityFull-text access may be available. Sign in or learn about subscription options.pp. 87-94
SESSION 7A: COMPONENT BASED SOFTWARE ENGINEERING
A Portable Interceptor Mechanism on SOAP for Continuous AuditFull-text access may be available. Sign in or learn about subscription options.pp. 95-104
SESSION 2A: REQUIREMENTS ENGINEERING
A Practical Estimation Method for Complex REFull-text access may be available. Sign in or learn about subscription options.pp. 105-112
SESSION 2A: REQUIREMENTS ENGINEERING
Software Requirements Retrieval Using Use Case Terms and Structure Similarity ComputationFull-text access may be available. Sign in or learn about subscription options.pp. 113-120
SESSION 2A: REQUIREMENTS ENGINEERING
Goal Oriented Requirement Engineering: A Critical Study of TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 121-130
SESSION 3A: SERVICE ORIENTED ARCHITECTURE
Integrating Stateful Services in WorkflowFull-text access may be available. Sign in or learn about subscription options.pp. 131-138
SESSION 3A: SERVICE ORIENTED ARCHITECTURE
Value-Based Dynamic Composition of Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 139-146
SESSION 3A: SERVICE ORIENTED ARCHITECTURE
A Comparative Study of Interface Design Approaches for Service-Oriented SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 147-156
SESSION 4B: SOFTWARE ARCHITECTURE
Using Operational Architecture to Model Embedded SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 157-164
SESSION 4B: SOFTWARE ARCHITECTURE
Towards a Model-driven Approach to Develop Applications based on Physical Active ObjectsFull-text access may be available. Sign in or learn about subscription options.pp. 173-182
SESSION 3B: FORMALMETHODS
A systematic approach to connecting standalone theorem provers to formal development environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 183-190
SESSION 3B: FORMALMETHODS
Constructing Behavioral State Machine using Interface Protocol SpecificationFull-text access may be available. Sign in or learn about subscription options.pp. 191-198
SESSION 3B: FORMALMETHODS
Timing Verification of UML Activity Diagram Based Code Block Level Models for Real Time Multiprocessor System-on-Chip ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 199-208
SESSION 1B: OBJECT-ORIENTED TECHNOLOGY
Modeling and Customization of Fault Tolerant Architecture using Object-Z/XVCLFull-text access may be available. Sign in or learn about subscription options.pp. 209-216
SESSION 1B: OBJECT-ORIENTED TECHNOLOGY
A Pattern based Model Evolution ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 217-224
SESSION 1B: OBJECT-ORIENTED TECHNOLOGY
Safety Analysis for Dynamic Update of Object Oriented ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 225-232
SESSION 1B: OBJECT-ORIENTED TECHNOLOGY
Strengthening Method Contracts for ObjectsFull-text access may be available. Sign in or learn about subscription options.pp. 233-242
SESSION 5A: TESTING & PROGRAM CHECKING
Testing of Timer Function Blocks in FBDFull-text access may be available. Sign in or learn about subscription options.pp. 243-250
SESSION 5A: TESTING & PROGRAM CHECKING
Generating interoperability tests for networked media devicesFull-text access may be available. Sign in or learn about subscription options.pp. 251-258
SESSION 5A: TESTING & PROGRAM CHECKING
Interaction Testing in Model-Based Development: Effect on Model-CoverageFull-text access may be available. Sign in or learn about subscription options.pp. 259-268
SESSION 6A: TESTING & QUALITY MGMT
Detecting Duplications in Sequence Diagrams Based on Suffix TreesFull-text access may be available. Sign in or learn about subscription options.pp. 269-276
An Approach of a Technique for Effort Estimation of Iterations in Software ProjectsFull-text access may be available. Sign in or learn about subscription options.pp. 367-376
SESSION 6A: TESTING & QUALITY MGMT
Towards Interactive Fault Localization Using Test InformationFull-text access may be available. Sign in or learn about subscription options.pp. 277-284
SESSION 6A: TESTING & QUALITY MGMT
A framework for software product engineeringFull-text access may be available. Sign in or learn about subscription options.pp. 285-292
SESSION 1C: MAINTENANCE/REVERSE ENGG.
Genericity - a "Missing in Action" Key to Software Simplification and ReuseFull-text access may be available. Sign in or learn about subscription options.pp. 293-300
SESSION 1C: MAINTENANCE/REVERSE ENGG.
An Empirical Study of Factors and their Relationships in Outsourced Software MaintenanceFull-text access may be available. Sign in or learn about subscription options.pp. 301-308
SESSION 1C: MAINTENANCE/REVERSE ENGG.
An Accurate and Convenient Undo Mechanism for RefactoringsFull-text access may be available. Sign in or learn about subscription options.pp. 309-316
SESSION 1C: MAINTENANCE/REVERSE ENGG.
Efficient and Accurate Software Pattern DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 317-326
SESSION 5B: EMPIRICAL SOFTWARE ENGINEERING
Evaluation of Source Code Updates in Software Development Based on Component RankFull-text access may be available. Sign in or learn about subscription options.pp. 327-334
SESSION 5B: EMPIRICAL SOFTWARE ENGINEERING
An Experience With Design by ContractFull-text access may be available. Sign in or learn about subscription options.pp. 335-341
A Versioning Scheme for Consistent Evolution of OO ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 435-444
SESSION 5B: EMPIRICAL SOFTWARE ENGINEERING
Usage Patterns of the Java Standard APIFull-text access may be available. Sign in or learn about subscription options.pp. 342-352
SESSION 6B: EMPIRICAL SOFTWARE ENGINEERING
A case study of an empirical approach to component requirements in developing a plagiarism detection toolFull-text access may be available. Sign in or learn about subscription options.pp. 353-360
SESSION 6B: EMPIRICAL SOFTWARE ENGINEERING
Building Scalable Failure-proneness Models Using Complexity Metrics for Large Scale Software SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 361-366
SESSION 4C: SOFTWARE PROCESS IMPROVEMENT
Cycle Time ReductionFull-text access may be available. Sign in or learn about subscription options.pp. 377-384
SESSION 4C: SOFTWARE PROCESS IMPROVEMENT
A Process Model Design and Tool Development for Supplier Agreement Management of CMMI: Capability Level 2Full-text access may be available. Sign in or learn about subscription options.pp. 385-392
SESSION 4C: SOFTWARE PROCESS IMPROVEMENT
A Theoretical Perspective on Knowledge Based Organizational LearningFull-text access may be available. Sign in or learn about subscription options.pp. 393-400
SESSION 4C: SOFTWARE PROCESS IMPROVEMENT
A Systematic Approach to Process Enactment Analysis as Input to Software Process Improvement or TailoringFull-text access may be available. Sign in or learn about subscription options.pp. 401-410
SESSION 7B: PRODUCT LINE ENGG/OO
Inter-Model Consistency in UML Based on CPN FormalismFull-text access may be available. Sign in or learn about subscription options.pp. 411-418
SESSION 7B: PRODUCT LINE ENGG/OO
Introducing MDA in a large IT consultancy organizationFull-text access may be available. Sign in or learn about subscription options.pp. 419-426
SESSION 7B: PRODUCT LINE ENGG/OO
Applying Formal Approach to Core Asset Instantiation in Product Line EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 427-434
SESSION 7C: MAINTENANCE/KNOWLEDGE-BASED APPROACH
A Knowledge-based Approach for Safety Analysis Using System InteractionsFull-text access may be available. Sign in or learn about subscription options.pp. 445-452
SESSION 7C: MAINTENANCE/KNOWLEDGE-BASED APPROACH
Project Replayer with Email Analysis - Revealing Contexts in Software DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 453-460
Cohesion Analysis in Linux KernelFull-text access may be available. Sign in or learn about subscription options.pp. 461-466
SESSION 7C: MAINTENANCE/KNOWLEDGE-BASED APPROACH
Visualizing Clone Cohesion and CouplingFull-text access may be available. Sign in or learn about subscription options.pp. 467-476
SESSION 2B: SE EDUCATION
Implementation and Evaluation of Teaching an Introductory Software Engineering Course Framed in Cognitive ApprenticeshipFull-text access may be available. Sign in or learn about subscription options.pp. 477-484
SESSION 2B: SE EDUCATION
Security: Bridging the Academia-Industry Gap Using a Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 485-492
Author Index
Author IndexFreely available from IEEE.pp. 493
Showing 66 out of 66