Default Cover Image

Proceedings. Third ACIS International Conference on Software Engineering Research, Management and Applications

Aug. 11 2005 to Aug. 13 2005

Mount Pleasant, MI, USA

Table of Contents

Introduction
Message from the Conference Chairs and the Program ChairFreely available from IEEE.pp. x
Session 3C: Data Mining, Knowledge Discovery and Artificial Intelligence
A comparative evaluation of query modeling cost of SQL/MDRFull-text access may be available. Sign in or learn about subscription options.pp. 235,236,237,238,239
Session 5C: Re-Engineering/Reverse Engineering - Component Based Development - Use Cases and Scenarios
A language and platform-independent approach for reverse engineeringFull-text access may be available. Sign in or learn about subscription options.pp. 415,416,417,418,419,420,421,422
Session 4C: Communication Systems and Networks
Self-organizing P2P overlay network applying dynamic landmark mechanism for contents delivery networkFull-text access may be available. Sign in or learn about subscription options.pp. 317,318,319,320,321,322,323,324
Session 1A: Component Based Software Engineering
A Model-driven Environment for Component DeploymentFull-text access may be available. Sign in or learn about subscription options.pp. 6-13
Session 1A: Component Based Software Engineering
Binary Component Adaptation Technique and Supporting ToolFull-text access may be available. Sign in or learn about subscription options.pp. 14-21
Session 1B: Software Testing Technique
A Class Abstraction Technique to Support the Analysis of Java Programs During TestingFull-text access may be available. Sign in or learn about subscription options.pp. 22-29
Session 1B: Software Testing Technique
Generating Aspects-Classes Integration Testing Sequences: A Collaboration Diagram Based StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 30-39
Session 1C: Software Reuse, and Metrics
A Framework for Component Mining of Java Applications via Dynamic SlicingFull-text access may be available. Sign in or learn about subscription options.pp. 40-47
Session 1C: Software Reuse, and Metrics
Software Reuse Metrics for Object-Oriented SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 48-55
Session 2A: Component Based Software Engineering II
A Software Product Evaluation Process for Supporting the Component Based DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 56-63
Session 2A: Component Based Software Engineering II
Information System for Evaluations of COTSFull-text access may be available. Sign in or learn about subscription options.pp. 64-69
Session 2A: Component Based Software Engineering II
Rule-based Component DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 70-74
Session 2A: Component Based Software Engineering II
A component-based approach for integrating mobile agents into the existing Web infrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 75-83
Session 2B: Requirements Engineering
Object-oriented Configuration Management Technology can Improve Software Architectural TraceabilityFull-text access may be available. Sign in or learn about subscription options.pp. 86-93
Session 2B: Requirements Engineering
Integrating Expressiveness of Modern Requirements Modeling ApproachesFull-text access may be available. Sign in or learn about subscription options.pp. 94-103
Session 2B: Requirements Engineering
Eliciting Requirements by Analysing Threats Caused by UsersFull-text access may be available. Sign in or learn about subscription options.pp. 104-111
Session 2B: Requirements Engineering
A UML Profile for Goal-Oriented and Use Case-Driven Representation of NFRs and FRsFull-text access may be available. Sign in or learn about subscription options.pp. 112-121
Session 2C: Parallel and Distributed Computing
A Multi-Agent based Fault Tolerance System for Distributed Multimedia Object Oriented Environment: MAFTSFull-text access may be available. Sign in or learn about subscription options.pp. 122-129
Session 2C: Parallel and Distributed Computing
Asynchronous Parallel Genetic Algorithm for Congestion-Driven Placement TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 130-136
Session 2C: Parallel and Distributed Computing
Tuning System-Dependent Applications with Alternative MPI Calls A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 137-143
Session 2C: Parallel and Distributed Computing
An Adaptive Fault Tolerance for Situation-Aware Ubiquitous ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 144-151
Session 3A: Software Architecture . Design Patterns
MADL: Meta Architecture Description LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 152-159
Session 3A: Software Architecture . Design Patterns
A Design and Test Technique for Embedded SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 160-165
Session 3A: Software Architecture . Design Patterns
Generating UML Models from Domain PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 166-173
Session 3A: Software Architecture . Design Patterns
Analysis of Secure Design Patterns: A Case Study in E-Commerce SystemFull-text access may be available. Sign in or learn about subscription options.pp. 174-183
Session 3B: Modeling with UML - Information Engineering - Case Studies - Other
A Metamodel Based Model Transformation ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 184-191
Session 3B: Modeling with UML - Information Engineering - Case Studies - Other
Event Notification System for Multi-platforFull-text access may be available. Sign in or learn about subscription options.pp. 192-197
Session 3B: Modeling with UML - Information Engineering - Case Studies - Other
An enterprise architecture framework based on a common information technology domain (EAFIT) for improving interoperability among heterogeneous information systemsFull-text access may be available. Sign in or learn about subscription options.pp. 198-205
Session 3B: Modeling with UML - Information Engineering - Case Studies - Other
Multi-Resolution Indexing for XML DatFull-text access may be available. Sign in or learn about subscription options.pp. 206-211
Session 3B: Modeling with UML - Information Engineering - Case Studies - Other
Development of Teaching Material on the Web for Programming Course and its EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 212-219
Session 3C: Data Mining, Knowledge Discovery and Artificial Intelligence
Intrusion Detection based on Clustering a Data StreamFull-text access may be available. Sign in or learn about subscription options.pp. 220-227
Session 3C: Data Mining, Knowledge Discovery and Artificial Intelligence
Intelligent Code Analyzer for Online Course Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 228-234
Session 3C: Data Mining, Knowledge Discovery and Artificial Intelligence
Combining Classification Improvements by Ensemble ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 240-247
Using re-factoring to reduce the pain of component evolutionFull-text access may be available. Sign in or learn about subscription options.pp. 248-248
Session 4A: Data Mining, Knowledge Discovery and Artificial Intelligence - Agent Technology
Enhancing the Behavior of the Ant Algorithms to Solving Network Planning ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 250-255
Session 4A: Data Mining, Knowledge Discovery and Artificial Intelligence - Agent Technology
Proactive Self-Healing System based on Multi-Agent TechnologiesFull-text access may be available. Sign in or learn about subscription options.pp. 256-263
Session 4A: Data Mining, Knowledge Discovery and Artificial Intelligence - Agent Technology
Next Generation Agent Development Supporting Tool: Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 264-273
Session 4B: Formal Methods and Tools - Middleware Design Techniques
A Method to Transform Object-Oriented Design into Component-Based Design using Object-ZFull-text access may be available. Sign in or learn about subscription options.pp. 274-281
Session 4B: Formal Methods and Tools - Middleware Design Techniques
Formal Verification of Structured Analysis and Design in HOSFull-text access may be available. Sign in or learn about subscription options.pp. 282-287
Session 4B: Formal Methods and Tools - Middleware Design Techniques
Designing Combinational Circuits with List HomomorphismsFull-text access may be available. Sign in or learn about subscription options.pp. 288-297
Session 4B: Formal Methods and Tools - Middleware Design Techniques
A Transparent and Evolvable Licensing Object ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 298-307
Session 4C: Communication Systems and Networks
The Multicast MPLS Tree Construction Protocol: Evaluation, Simulation and ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 308-316
Session 4C: Communication Systems and Networks
Inter-AS Session & Connection Management for QoS-guaranteed DiffServ ProvisioningFull-text access may be available. Sign in or learn about subscription options.pp. 325-330
Session 4C: Communication Systems and Networks
A Performance Comparison of On-Demand Routing Protocols for Application Data in Mobile Ad hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 331-339
Session 5A: Software Reuse - Design Patterns - Metrics
Traceability Map: Foundations to Automate for Product Line EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 340-347
Session 5A: Software Reuse - Design Patterns - Metrics
A Quantitative Supplement to the Definition of Software QualityFull-text access may be available. Sign in or learn about subscription options.pp. 348-352
Session 5A: Software Reuse - Design Patterns - Metrics
Frameworks on New XML/EDI System for B2B Shipping Companies in KoreaFull-text access may be available. Sign in or learn about subscription options.pp. 353-359
Session 5B: Software Process Models - Cost Estimation Models
Design of Opportunity Tree Framework for Effective Process Improvement based on Quantitative Project PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 360-367
Session 5B: Software Process Models - Cost Estimation Models
Design of SPICE Experience Factory Model Accumulation and Utilization of Process Assessment ExperienceFull-text access may be available. Sign in or learn about subscription options.pp. 368-374
Session 5B: Software Process Models - Cost Estimation Models
Requirements for CBD Products and Process QualityFull-text access may be available. Sign in or learn about subscription options.pp. 375-382
Session 5B: Software Process Models - Cost Estimation Models
A Software Cost Estimation Model for a Product Line Engineering Approach: Supporting tool and UML ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 383-391
Session 5C: Re-Engineering/Reverse Engineering - Component Based Development - Use Cases and Scenarios
A Cognitive Model for Program ComprehensionFull-text access may be available. Sign in or learn about subscription options.pp. 392-398
Session 5C: Re-Engineering/Reverse Engineering - Component Based Development - Use Cases and Scenarios
A Component Optimization Design Method based on Variation Point DecompositionFull-text access may be available. Sign in or learn about subscription options.pp. 399-406
Session 5C: Re-Engineering/Reverse Engineering - Component Based Development - Use Cases and Scenarios
Bridging the Gap between Analysis and Design Using Dependency DiagramsFull-text access may be available. Sign in or learn about subscription options.pp. 407-414
Session 6A: Web Engineering and Web Based Applications - Mobile/Wireless Computing
Client-Class based Admission Control Algorithm in Web Server Using Cluster AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 424-430
Session 6A: Web Engineering and Web Based Applications - Mobile/Wireless Computing
A Framework for Dynamically Converting Components to Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 431-437
Session 6A: Web Engineering and Web Based Applications - Mobile/Wireless Computing
Component Specification for Enterprise Software Development on Web Services EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 438-445
Session 6A: Web Engineering and Web Based Applications - Mobile/Wireless Computing
Average response times in a Bluetooth piconet for 1-RRIFIFO, Enhanced 1-RR and CB-EDFFull-text access may be available. Sign in or learn about subscription options.pp. 446-457
Showing 59 out of 59