Default Cover Image

31st Annual International Computer Software and Applications Conference (COMPSAC 2007)

July 24 2007 to July 27 2007

Beijing, China

ISSN: 0730-3157

ISBN: 0-7695-2870-8

Volume:

Table of Contents

Introduction
Message from the Standing Committee ChairFreely available from IEEE.pp. xiii
Introduction
Message from the Program Co-chairsFreely available from IEEE.pp. xv
Introduction
Conference OrganizationFreely available from IEEE.pp. xvii
Introduction
Program CommitteeFreely available from IEEE.pp. xxi
Introduction
ReviewersFreely available from IEEE.pp. xxiii
Panels
Future Trends: Computing as a Core DisciplineFull-text access may be available. Sign in or learn about subscription options.pp. 3-7
Panels
Challenges and Experiences in Industry-University Research Collaboration and Technology TransitionFull-text access may be available. Sign in or learn about subscription options.pp. 8-9
Panels
"Middleware for Next-Generation Converged Networks and Services: Myths or Reality?"Full-text access may be available. Sign in or learn about subscription options.pp. 10-15
Panels
Ethics in ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 16
Panels
Software Process Improvement for Small OrganizationsFull-text access may be available. Sign in or learn about subscription options.pp. 17
Panels
Plenary Panel Title: Software for the Mobile InterFull-text access may be available. Sign in or learn about subscription options.pp. 18
Panels
Test Automation in PracticeFull-text access may be available. Sign in or learn about subscription options.pp. 19
Security in Communication (Security 1)
A Framework for Enhancing Web Services SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 23-30
Security in Communication (Security 1)
A Scalable Service Scheme for Secure Group Communication in GridFull-text access may be available. Sign in or learn about subscription options.pp. 31-38
Security in Communication (Security 1)
An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 39-48
Modeling Security (Security 2)
An Omnipresent Formal Trust Model (FTM) for Pervasive Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 49-56
Modeling Security (Security 2)
An Authentication based Lightweight Device Discovery (ALDD) Model for Pervasive Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 57-64
Modeling Security (Security 2)
Defining and Detecting Bad Smells of Aspect-Oriented SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 65-70
Vulnerabilities - Detecting and Assessment (Security 3)
Mining User Query Logs to Refine Component DescriptionFull-text access may be available. Sign in or learn about subscription options.pp. 71-78
Vulnerabilities - Detecting and Assessment (Security 3)
A Machine Learning-Based Reliability Assessment Model for Critical Software SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 79-86
Vulnerabilities - Detecting and Assessment (Security 3)
A Static Analysis Framework For Detecting SQL Injection VulnerabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 87-96
Infrastructure, Networking and Security (Security 4)
A model-driven framework for representing and applying design patternsFull-text access may be available. Sign in or learn about subscription options.pp. 97-100
Infrastructure, Networking and Security (Security 4)
Infrastructure Hardening: A Competitive Coevolutionary Methodology Inspired by Neo-Darwinian Arms RacesFull-text access may be available. Sign in or learn about subscription options.pp. 101-104
Infrastructure, Networking and Security (Security 4)
Reliable Self-Clustering P2P Overlay NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 105-108
Infrastructure, Networking and Security (Security 4)
Software Component Re-engineering for their Runtime Structural AdaptationFull-text access may be available. Sign in or learn about subscription options.pp. 109-114
Design and Modeling (Requirements 1)
Structuring 2-way Branches in Binary ExecutablesFull-text access may be available. Sign in or learn about subscription options.pp. 115-118
Design and Modeling (Requirements 1)
FLEXCM - A Component Model for Adaptive Embedded SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 119-126
Design and Modeling (Requirements 1)
Structuring Software Functional Requirements For Automated Design And VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 127-136
Putting Models to Run (Requirements 2)
Understanding and Classifying Requirements for Computer-Aided Healthcare WorkflowsFull-text access may be available. Sign in or learn about subscription options.pp. 137-144
Putting Models to Run (Requirements 2)
Deriving Formal Specifications from Informal RequirementsFull-text access may be available. Sign in or learn about subscription options.pp. 145-152
Putting Models to Run (Requirements 2)
A Model-based Object-oriented Approach to Requirement Engineering (MORE)Full-text access may be available. Sign in or learn about subscription options.pp. 153-156
Putting Models to Run (Requirements 2)
Tool Support to Implementing Business Rules in Database ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 157-162
Event-Based and State-Based Modeling (Requirements 3)
Using UML Activity Diagrams and Event B for Distributed and Parallel ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 163-170
Event-Based and State-Based Modeling (Requirements 3)
Integration of Agent-Oriented Conceptual Models and UML Activity Diagrams Using Effect AnnotationsFull-text access may be available. Sign in or learn about subscription options.pp. 171-178
Event-Based and State-Based Modeling (Requirements 3)
A Data Mining Approach for Software State DefinitionFull-text access may be available. Sign in or learn about subscription options.pp. 179-188
Ontology for Requirements Elicitation (Requirements 4)
Towards a Multiple Ontology Framework for Requirements Elicitation and ReuseFull-text access may be available. Sign in or learn about subscription options.pp. 189-195
Ontology for Requirements Elicitation (Requirements 4)
SREM: A Service Requirements Elicitation Mechanism based on OntologyFull-text access may be available. Sign in or learn about subscription options.pp. 196-203
Ontology for Requirements Elicitation (Requirements 4)
Ontology Learning by Clustering Based on Fuzzy Formal Concept AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 204-210
Analysis & Modeling (Requirements 5)
A Method of Requirement Inconsistency AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 211-214
Analysis & Modeling (Requirements 5)
Analysis of Conflicts among Non-Functional Requirements Using Integrated Analysis of Functional and Non-Functional RequirementsFull-text access may be available. Sign in or learn about subscription options.pp. 215-218
Analysis & Modeling (Requirements 5)
A metamodel for the notation of graphical modeling languagesFull-text access may be available. Sign in or learn about subscription options.pp. 219-224
Internet and Web-Based Systems (Life Cycle 1)
A Satisfaction Driven Approach for the Composition of Interactive Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 225-232
Internet and Web-Based Systems (Life Cycle 1)
Knowledge Hiding in Data Mining by Transaction Adding and RemovingFull-text access may be available. Sign in or learn about subscription options.pp. 233-240
Component-Based Software and Architecture (Life Cycle 2)
Iterative Planning in the Context of Automated Code SynthesisFull-text access may be available. Sign in or learn about subscription options.pp. 251-259
Component-Based Software and Architecture (Life Cycle 2)
Automating Dynamic Reconfiguration for Non-Stop Dataflow SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 260-267
Component-Based Software and Architecture (Life Cycle 2)
An Architectural Framework for the Design and Analysis of Autonomous Adaptive SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 268-278
Embedded systems (Life Cycle 3)
Flexible Application Software Generation for Heterogeneous Multi-Processor System-on-ChipFull-text access may be available. Sign in or learn about subscription options.pp. 279-286
Embedded systems (Life Cycle 3)
A Semantic Anchoring Infrastructure for the Design of Embedded SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 287-294
Embedded systems (Life Cycle 3)
Concurrency Control Modularization with Aspect-Oriented ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 295-300
Process and Maintenance (Life Cycle 4)
Tracking Projects through A Three-Dimensional Software Development ModelFull-text access may be available. Sign in or learn about subscription options.pp. 301-308
Process and Maintenance (Life Cycle 4)
Traceability Link Evolution Management with Incremental Latent Semantic IndexingFull-text access may be available. Sign in or learn about subscription options.pp. 309-316
Process and Maintenance (Life Cycle 4)
Identifying Software Decompositions by Applying Transaction Clustering on Source CodeFull-text access may be available. Sign in or learn about subscription options.pp. 317-326
Quality of Service and Performance (QoS 1)
Performance Prediction of Service-Oriented Applications based on an Enterprise Service BusFull-text access may be available. Sign in or learn about subscription options.pp. 327-334
Quality of Service and Performance (QoS 1)
An Online Monitoring Approach for Web servicesFull-text access may be available. Sign in or learn about subscription options.pp. 335-342
Quality of Service and Performance (QoS 1)
SQS: A Secure and QoS Guaranteed Solution for Mobile ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 343-352
Quality of Service and Service Composition (QoS 2)
An Interaction Instance Oriented Approach for Web Application Integration in PortalsFull-text access may be available. Sign in or learn about subscription options.pp. 353-360
Quality of Service and Service Composition (QoS 2)
QoS-aware Service Composition Based on Tree-Coded Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 361-367
Quality of Service and Service Composition (QoS 2)
Dynamic Reconfigurable Testing of Service-Oriented ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 368-378
Modeling and Validation for Quality of Service (QoS 3)
Validity Checking On Grid Service CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 379-382
Modeling and Validation for Quality of Service (QoS 3)
A Fast Replica Selection Algorithm for Data GridFull-text access may be available. Sign in or learn about subscription options.pp. 383-387
Modeling and Validation for Quality of Service (QoS 3)
Improving the Accuracy of UML Class Model RecoveryFull-text access may be available. Sign in or learn about subscription options.pp. 387-90
Modeling and Validation for Quality of Service (QoS 3)
Connectors conveying Software Architecture EvolutionFull-text access may be available. Sign in or learn about subscription options.pp. 391-396
Validation and Assessment (Quality 1)
Piping Classification to Metamorphic Testing: An Empirical Study towards Better Effectiveness for the Identification of Failures in Mesh Simplification ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 397-404
Validation and Assessment (Quality 1)
Risk Assessment in Early Software Design Based on the Software Function-Failure Design MethodFull-text access may be available. Sign in or learn about subscription options.pp. 405-412
Validation and Assessment (Quality 1)
SRAE: An Integrated Framework for Aiding in the Verification and Validation of Legacy Artifacts in NASA Flight Control SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 413-422
Quantification (Quality 2)
Architecture-Based Software Reliability: Why Only a Few Parameters Matter?Full-text access may be available. Sign in or learn about subscription options.pp. 423-430
Quantification (Quality 2)
On Identifying Bug Patterns in Aspect-Oriented ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 431-438
Quantification (Quality 2)
Measuring and Assessing Software Reliability Growth through Simulation-Based ApproachesFull-text access may be available. Sign in or learn about subscription options.pp. 439-448
Coverage and Prioritization for Testing (Quality 3)
Effective Fault Localization using Code CoverageFull-text access may be available. Sign in or learn about subscription options.pp. 449-456
Coverage and Prioritization for Testing (Quality 3)
A Study of Enhanced MC/DC Coverage Criterion for Software TestingFull-text access may be available. Sign in or learn about subscription options.pp. 457-464
Coverage and Prioritization for Testing (Quality 3)
Test Case Prioritization for Black Box TestingFull-text access may be available. Sign in or learn about subscription options.pp. 465-474
Specification and Verification (Quality 4)
Formal Verification of Protocol Properties of Sequential Java ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 475-482
Specification and Verification (Quality 4)
Unified Property Specification for Hardware/Software Co-VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 483-490
Specification and Verification (Quality 4)
Model Checking Aspect-Oriented Design SpecificationFull-text access may be available. Sign in or learn about subscription options.pp. 491-500
Analysis and Testing (Quality 5)
Parameter and Return-value Analysis of Binary ExecutablesFull-text access may be available. Sign in or learn about subscription options.pp. 501-508
Analysis and Testing (Quality 5)
Test Case Generation for Collaborative Real-time Editing ToolsFull-text access may be available. Sign in or learn about subscription options.pp. 509-516
Analysis and Testing (Quality 5)
Contract-Based Testing for Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 517-526
Quality, Diversity and Services (Quality 6)
Architectural Adaptation Addressing the Criteria of Multiple Quality Attributes in Mission-Critical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 527-530
Quality, Diversity and Services (Quality 6)
A Quality Verification Model for Design PatternFull-text access may be available. Sign in or learn about subscription options.pp. 531-534
Quality, Diversity and Services (Quality 6)
Bivariate Software Fault-Detection ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 535-538
Quality, Diversity and Services (Quality 6)
Construction of an Agile Software Product-Enhancement Process by Using an Agile Software Solution Framework (ASSF) and Situational Method EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 539-542
Quality, Diversity and Services (Quality 6)
Model Oriented Evolutionary RedocumentationFull-text access may be available. Sign in or learn about subscription options.pp. 543-548
Process Models (Industrial Track 1)
State of Modernization Practice in Four Swedish OrganizationsFull-text access may be available. Sign in or learn about subscription options.pp. 549-556
Process Models (Industrial Track 1)
ePVM - An Embeddable Process Virtual MachineFull-text access may be available. Sign in or learn about subscription options.pp. 557-564
Process Models (Industrial Track 1)
State-based Process Description Model in Chinese E-government Affair SystemFull-text access may be available. Sign in or learn about subscription options.pp. 565-568
Process Models (Industrial Track 1)
Analyzing and Re-structuring Product Line DependenciesFull-text access may be available. Sign in or learn about subscription options.pp. 569-574
Data, Repositories, Design Methods (Industrial Track 2)
Towards a Design Methodology for Multiprocessor PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 575-578
Data, Repositories, Design Methods (Industrial Track 2)
Specification, Design and Implementation of a Reuse RepositoryFull-text access may be available. Sign in or learn about subscription options.pp. 579-582
Data, Repositories, Design Methods (Industrial Track 2)
DataWarp: Empowering Applications to Make Progress in the Face of Contradictory or Inconsistent DataFull-text access may be available. Sign in or learn about subscription options.pp. 583-590
Data, Repositories, Design Methods (Industrial Track 2)
VOEditor: a Visual Environment for Ontology Construction and Collaborative Querying of Semantic Web ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 591-600
Networking and Distribution (Industrial Track 3)
Mobile Game Development: Object-Orientation or NotFull-text access may be available. Sign in or learn about subscription options.pp. 601-608
Networking and Distribution (Industrial Track 3)
A Dynamic-Reconfigurable Architecture for Protocol Stacks of Networked SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 609-612
Networking and Distribution (Industrial Track 3)
A Study on Distributed Resource Information Service in Grid SystemFull-text access may be available. Sign in or learn about subscription options.pp. 613-618
Session 1: Software Engineering Methods and Tools
Services Oriented Architecture: integration requirementsFull-text access may be available. Sign in or learn about subscription options.pp. 619-620
Session 1: Software Engineering Methods and Tools
Comparing Fault-based Testing Strategies of General Boolean SpecificationsFull-text access may be available. Sign in or learn about subscription options.pp. 621-622
Session 1: Software Engineering Methods and Tools
Patterns Topology for Performance EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 623-624
Showing 100 out of 119