Default Cover Image

2010 IEEE 34th Annual Computer Software and Applications Conference

July 19 2010 to July 23 2010

Seoul, Korea (South)

ISSN: 0730-3157

ISBN: 978-0-7695-4085-6

Table of Contents

Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xii
Papers
Message from the Standing Committee ChairFreely available from IEEE.pp. xiii
Papers
Greetings from the General ChairFreely available from IEEE.pp. xiv
Papers
Message from the Program ChairsFreely available from IEEE.pp. xv
Papers
OrganizationFreely available from IEEE.pp. xvi-xx
Papers
list-reviewerFreely available from IEEE.pp. xxi-xxii
Papers
Plenary Panel Description: Challenges and Future Directions of Software TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 1
Papers
Software Development Productivity: Challenges and Future TrendsFull-text access may be available. Sign in or learn about subscription options.pp. 2-7
Papers
Challenges and Future Directions of Software Technology: The Need for Explicit Programming EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 8-9
Papers
Challenges and Future Directions of Cyber-Physical System SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 10-13
Papers
Internetware: Challenges and Future Direction of Software Paradigm for Internet as a ComputerFull-text access may be available. Sign in or learn about subscription options.pp. 14-16
Papers
Challenges and Future Directions of Software Technology: Secure Software DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 17-20
Papers
Panel Description: Joint COMPSAC/SAINT Panel: Future of the InternetFull-text access may be available. Sign in or learn about subscription options.pp. 21
Papers
Position Statement: Joint COMPSAC/SAINT Panel: Future of the Internet: Activity Status of New-Generation Network DesignFull-text access may be available. Sign in or learn about subscription options.pp. 23
Papers
Panel Description: Joint COMPSAC/SAINT Panel: Green IT - From Devices to ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 24
Papers
Panel Description: Are We Headed towards Smart Solutions?Full-text access may be available. Sign in or learn about subscription options.pp. 25
Papers
Panel description: Towards new roles and system architecture supporting the full life cycle of smart spacesFull-text access may be available. Sign in or learn about subscription options.pp. 26-26
Papers
Towards Secure Virtual Directories: A Risk Analysis FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 27-36
Papers
Using a Hypervisor to Migrate Running Operating Systems to Secure Virtual MachinesFull-text access may be available. Sign in or learn about subscription options.pp. 37-46
Papers
A New Concurrent Checkpoint Mechanism for Real-Time and Interactive ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 47-52
Papers
An Analysis of Tool-Based Research in Software EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 53-61
Papers
A Task-Oriented Navigation Approach to Enhance Architectural Description ComprehensionFull-text access may be available. Sign in or learn about subscription options.pp. 62-71
Papers
Improving Software Performance and Reliability with an Architecture-Based Self-Adaptive FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 72-81
Papers
An Approach for Ensuring Robust Safeguard against Location Privacy ViolationFull-text access may be available. Sign in or learn about subscription options.pp. 82-91
Papers
geoXmart - A Marketplace for Geofence-Based Mobile ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 101-106
Papers
Applying Particle Swarm Optimization to Pairwise TestingFull-text access may be available. Sign in or learn about subscription options.pp. 107-116
Papers
Using Load Tests to Automatically Compare the Subsystems of a Large Enterprise SystemFull-text access may be available. Sign in or learn about subscription options.pp. 117-126
Papers
GenRed: A Tool for Generating and Reducing Object-Oriented Test CasesFull-text access may be available. Sign in or learn about subscription options.pp. 127-136
Papers
Representing and Reasoning about Web Access Control PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 137-146
Papers
A Novel Rubbing Encryption Algorithm and the Implementation of a Web Based One-Time Password TokenFull-text access may be available. Sign in or learn about subscription options.pp. 147-154
Papers
IPTV Micropayment System Based on Hash Chain Using RFID-USB ModuleFull-text access may be available. Sign in or learn about subscription options.pp. 155-160
Papers
Security in Context: Analysis and Refinement of Software ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 161-170
Papers
Key Roles of Session State: Not against REST Architectural StyleFull-text access may be available. Sign in or learn about subscription options.pp. 171-178
Papers
An Adaptation Approach for Component-Based Software ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 179-187
Papers
Team Factors and Failure Processing Efficiency: An Exploratory Study of Closed and Open Source Software DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 188-197
Papers
Target Setting for Technical Requirements in Time-Stamped Software Quality FunctionFull-text access may be available. Sign in or learn about subscription options.pp. 198-207
Papers
Towards a General Framework for Evaluating Software Development MethodologiesFull-text access may be available. Sign in or learn about subscription options.pp. 208-217
Papers
Effective Software Bug Localization Using Spectral Frequency Weighting FunctionFull-text access may be available. Sign in or learn about subscription options.pp. 218-227
Papers
Detect Related Bugs from Source Code Using Bug InformationFull-text access may be available. Sign in or learn about subscription options.pp. 228-237
Papers
Efficient Color Image Compression Using DemosaicingFull-text access may be available. Sign in or learn about subscription options.pp. 244-245
Papers
Using Semantics-Enabled Information Retrieval in Requirements Tracing: An Ongoing Experimental InvestigationFull-text access may be available. Sign in or learn about subscription options.pp. 246-247
Papers
An Empirical Comparison of Fault-Prone Module Detection Approaches: Complexity Metrics and Text Feature MetricsFull-text access may be available. Sign in or learn about subscription options.pp. 248-249
Papers
Green Computing Methodology for Next Generation Computing ScientistsFull-text access may be available. Sign in or learn about subscription options.pp. 250-251
Papers
A Consistency Model for Identity Information in Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 252-261
Papers
AntiBot: Clustering Common Semantic Patterns for Bot DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 262-272
Papers
A Weaker Knowledge Connectivity Condition Sufficient for Fault-Tolerant Consensus with Unknown ParticipantsFull-text access may be available. Sign in or learn about subscription options.pp. 273-278
Papers
Metamodel Recovery from Multi-tiered Domains Using Extended MARSFull-text access may be available. Sign in or learn about subscription options.pp. 279-288
Papers
Reasoning about Human Intention Change for Individualized Runtime Software Service EvolutionFull-text access may be available. Sign in or learn about subscription options.pp. 289-296
Papers
An Interactive Change Impact Analysis Based on an Architectural Reflexion Model ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 297-302
Papers
A Personalized Navigation Guide Using a Social-Spatial OntologyFull-text access may be available. Sign in or learn about subscription options.pp. 311-316
Papers
Managing Consistency between Textual Requirements, Abstract Interactions and Essential Use CasesFull-text access may be available. Sign in or learn about subscription options.pp. 327-336
Papers
Variability Modeling for Product Line Viewpoints IntegrationFull-text access may be available. Sign in or learn about subscription options.pp. 337-346
Papers
Human Desire Inference Process Based on Affective ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 347-350
Papers
PAAKL: Password Authentication Using Behavioral MetricsFull-text access may be available. Sign in or learn about subscription options.pp. 351-356
Papers
Behavior Monitoring in Self-Healing Service-Oriented SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 357-366
Papers
Change Impact Analysis Based on a Taxonomy of Change TypesFull-text access may be available. Sign in or learn about subscription options.pp. 373-382
Papers
An Ontology-Based Approach to Reengineering Enterprise Software for Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 383-388
Papers
Synchronized Architecture Evolution in Software Product Line Using Bidirectional TransformationFull-text access may be available. Sign in or learn about subscription options.pp. 389-394
Papers
An Optimized Checkpointing Based Learning Algorithm for Single Event UpsetsFull-text access may be available. Sign in or learn about subscription options.pp. 395-400
Papers
A Scalable and Efficient Path Management Scheme for Internet-Based Sensor Data Delivery InfrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 401-406
Papers
Exploring Query Optimization in Programming Codes by Reducing Run-Time ExecutionFull-text access may be available. Sign in or learn about subscription options.pp. 407-412
Papers
Design and Analysis of Cost-Cognizant Test Case Prioritization Using Genetic Algorithm with Test HistoryFull-text access may be available. Sign in or learn about subscription options.pp. 413-418
Papers
Minimising the Preparation Cost of Runtime Testing Based on Testability MetricsFull-text access may be available. Sign in or learn about subscription options.pp. 419-424
Papers
Specifying Time-Sensitive Systems with TLA+Full-text access may be available. Sign in or learn about subscription options.pp. 425-430
Papers
Transformation Rules for Synthesis of UML Activity Diagram from Scenario-Based SpecificationFull-text access may be available. Sign in or learn about subscription options.pp. 431-436
Papers
A Game Perspective of Refinement of Component ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 437-442
Papers
SAT: Switchable Address Translation for Flash Memory StoragesFull-text access may be available. Sign in or learn about subscription options.pp. 453-461
Papers
A Petri Net-Based Method for Data Validation of Web Services CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 468-476
Papers
Process Patterns for Web EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 477-486
Papers
Modeling BPEL and BPEL4People with a Timed Interruptable pi-CalculusFull-text access may be available. Sign in or learn about subscription options.pp. 487-492
Papers
QoS-Based Dynamic Web Service Composition with Ant Colony OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 493-502
Papers
Filtering of Inconsistent Software Project Data for Analogy-Based Effort EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 503-508
Papers
An Efficient Source Allocation Approach for QoS Support in P2PTV SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 509-514
Papers
Timing Analyzing for Systems with Task Execution DependenciesFull-text access may be available. Sign in or learn about subscription options.pp. 515-524
Papers
Systematic Composition and Verification of Abstract ComponentsFull-text access may be available. Sign in or learn about subscription options.pp. 525-530
Papers
A Study on the Applicability of Modified Genetic Algorithms for the Parameter Estimation of Software Reliability ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 531-540
Papers
A Model-Based Design Tool of Automotive Software ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 541-542
Papers
A Method for Detecting Defects in Source Codes Using Model Checking TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 543-544
Papers
Reconnection of the Pre-assigning Peers in the Seamless Video StreamingFull-text access may be available. Sign in or learn about subscription options.pp. 545-546
Papers
A Know-How Recommendation System for a Software Engineering Project Course by Using the Content Filtering TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 547-548
Papers
Author IndexFreely available from IEEE.pp. 549-552
Papers
[Publisher's information]Freely available from IEEE.pp. 554
Showing 92 out of 92