Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
COMPSAC
COMPSAC 2010
Generate Citations
2010 IEEE 34th Annual Computer Software and Applications Conference
July 19 2010 to July 23 2010
Seoul, Korea (South)
ISSN: 0730-3157
ISBN: 978-0-7695-4085-6
Table of Contents
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-xii
Papers
Message from the Standing Committee Chair
Freely available from IEEE.
pp. xiii
Papers
Greetings from the General Chair
Freely available from IEEE.
pp. xiv
Papers
Message from the Program Chairs
Freely available from IEEE.
pp. xv
Papers
Organization
Freely available from IEEE.
pp. xvi-xx
Papers
list-reviewer
Freely available from IEEE.
pp. xxi-xxii
Papers
Plenary Panel Description: Challenges and Future Directions of Software Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 1
by
Stephen S. Yau
Papers
Software Development Productivity: Challenges and Future Trends
Full-text access may be available. Sign in or learn about subscription options.
pp. 2-7
by
Vladimir Getov
Papers
Challenges and Future Directions of Software Technology: The Need for Explicit Programming Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 8-9
by
John L. Gustafson
Papers
Challenges and Future Directions of Cyber-Physical System Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-13
by
K. H. (Kane) Kim
Papers
Internetware: Challenges and Future Direction of Software Paradigm for Internet as a Computer
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-16
by
Hong Mei
Papers
Challenges and Future Directions of Software Technology: Secure Software Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-20
by
Bhavani Thuraisingham
,
Kevin W. Hamlen
Papers
Panel Description: Joint COMPSAC/SAINT Panel: Future of the Internet
Full-text access may be available. Sign in or learn about subscription options.
pp. 21
by
Eiji Kawai
,
Elisa Bertino
,
Sue Moon
Papers
Position Statement: Joint COMPSAC/SAINT Panel: Future of the Internet: What Can We Do to Support Super-Broadband Traffic in the Future Network?
Full-text access may be available. Sign in or learn about subscription options.
pp. 22
by
Kohei Shiomoto
Papers
Position Statement: Joint COMPSAC/SAINT Panel: Future of the Internet: Activity Status of New-Generation Network Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 23
by
Hiroaki Harai
Papers
Panel Description: Joint COMPSAC/SAINT Panel: Green IT - From Devices to Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 24
by
Tohru Asami
,
Sahra Sedigh
Papers
Panel Description: Are We Headed towards Smart Solutions?
Full-text access may be available. Sign in or learn about subscription options.
pp. 25
by
Rajesh Subramanyan
Papers
Panel description: Towards new roles and system architecture supporting the full life cycle of smart spaces
Full-text access may be available. Sign in or learn about subscription options.
pp. 26-26
by
Sumi Helal
Papers
Towards Secure Virtual Directories: A Risk Analysis Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-36
by
William R. Claycomb
,
Dongwan Shin
Papers
Using a Hypervisor to Migrate Running Operating Systems to Secure Virtual Machines
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-46
by
Tsutomu Nomoto
,
Yoshihiro Oyama
,
Hideki Eiraku
,
Takahiro Shinagawa
,
Kazuhiko Kato
Papers
A New Concurrent Checkpoint Mechanism for Real-Time and Interactive Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-52
by
Jianwei Liao
,
Yutaka Ishikawa
Papers
An Analysis of Tool-Based Research in Software Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-61
by
Jonas Helming
,
Maximilian Koegel
,
Hoda Naguib
,
Miriam Schmidberger
,
Florian Schneider
,
Bernd Brügge
Papers
A Task-Oriented Navigation Approach to Enhance Architectural Description Comprehension
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-71
by
Wenhui Zhu
,
Yang Tao
,
Gang Huang
,
Yanchun Sun
,
Hong Mei
Papers
Improving Software Performance and Reliability with an Architecture-Based Self-Adaptive Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-81
by
Xu Zhang
,
Chung-Horng Lung
Papers
An Approach for Ensuring Robust Safeguard against Location Privacy Violation
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-91
by
Chowdhury S. Hasan
,
Sheikh I. Ahamed
Papers
Design and Implementation of a Middleware for Development and Provision of Stream-Based Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-100
by
Seungwoo Kang
,
Youngki Lee
,
Sunghwan Ihm
,
Souneil Park
,
Su-Myeon Kim
,
Junehwa Song
Papers
geoXmart - A Marketplace for Geofence-Based Mobile Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-106
by
Ulrich Bareth
,
Axel Küpper
,
Peter Ruppel
Papers
Applying Particle Swarm Optimization to Pairwise Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-116
by
Xiang Chen
,
Qing Gu
,
Jingxian Qi
,
Daoxu Chen
Papers
Using Load Tests to Automatically Compare the Subsystems of a Large Enterprise System
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-126
by
Haroon Malik
,
Bram Adams
,
Ahmed E. Hassan
,
Parminder Flora
,
Gilbert Hamann
Papers
GenRed: A Tool for Generating and Reducing Object-Oriented Test Cases
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-136
by
Hojun Jaygarl
,
Kai-Shin Lu
,
Carl K. Chang
Papers
Representing and Reasoning about Web Access Control Policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-146
by
Gail-Joon Ahn
,
Hongxin Hu
,
Joohyung Lee
,
Yunsong Meng
Papers
A Novel Rubbing Encryption Algorithm and the Implementation of a Web Based One-Time Password Token
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-154
by
Fred Cheng
Papers
IPTV Micropayment System Based on Hash Chain Using RFID-USB Module
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-160
by
Yoon-Su Jeong
,
Ning Sun
,
Sang-Ho Lee
Papers
Security in Context: Analysis and Refinement of Software Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-170
by
Thomas Heyman
,
Riccardo Scandariato
,
Wouter Joosen
Papers
Key Roles of Session State: Not against REST Architectural Style
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-178
by
Takeru Inoue
,
Hiroshi Asakura
,
Hiroshi Sato
,
Noriyuki Takahashi
Papers
An Adaptation Approach for Component-Based Software Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-187
by
Makhlouf Derdour
,
Philippe Roose
,
Marc Dalmau
,
Nacéra Ghoualmi Zine
,
Adel Alti
Papers
Team Factors and Failure Processing Efficiency: An Exploratory Study of Closed and Open Source Software Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-197
by
Michael Grottke
,
Lars M. Karg
,
Arne Beckhaus
Papers
Target Setting for Technical Requirements in Time-Stamped Software Quality Function
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-207
by
Xiaoqing (Frank) Liu
,
Praveen Inuganti
,
Kunio Noguchi
,
Yuji Kyoya
Papers
Towards a General Framework for Evaluating Software Development Methodologies
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-217
by
Shokoofeh Hesari
,
Hoda Mashayekhi
,
Raman Ramsin
Papers
Effective Software Bug Localization Using Spectral Frequency Weighting Function
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-227
by
Hua Jie Lee
,
Lee Naish
,
Kotagiri Ramamohanarao
Papers
Detect Related Bugs from Source Code Using Bug Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-237
by
Deqing Wang
,
Mengxiang Lin
,
Hui Zhang
,
Hongping Hu
Papers
Model of Reliability of the Software with Coxian Distribution of Length of Intervals between the Moments of Detection of Errors
Full-text access may be available. Sign in or learn about subscription options.
pp. 238-243
by
Vladimir P. Bubnov
,
Alexey V. Tyrva
,
Anatoly D. Khomonenko
Papers
Efficient Color Image Compression Using Demosaicing
Full-text access may be available. Sign in or learn about subscription options.
pp. 244-245
by
Evgeny Gershikov
,
Moshe Porat
Papers
Using Semantics-Enabled Information Retrieval in Requirements Tracing: An Ongoing Experimental Investigation
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-247
by
Anas Mahmoud
,
Nan Niu
Papers
An Empirical Comparison of Fault-Prone Module Detection Approaches: Complexity Metrics and Text Feature Metrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-249
by
Osamu Mizuno
,
Hideaki Hata
Papers
Green Computing Methodology for Next Generation Computing Scientists
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-251
by
Chia-Tien Dan Lo
,
Kai Qian
Papers
A Consistency Model for Identity Information in Distributed Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-261
by
Thorsten Hoellrigl
,
Jochen Dinger
,
Hannes Hartenstein
Papers
AntiBot: Clustering Common Semantic Patterns for Bot Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 262-272
by
Younghee Park
,
Qinghua Zhang
,
Douglas Reeves
,
Vikram Mulukutla
Papers
A Weaker Knowledge Connectivity Condition Sufficient for Fault-Tolerant Consensus with Unknown Participants
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-278
by
Jichiang Tsai
,
Che-Cheng Chang
Papers
Metamodel Recovery from Multi-tiered Domains Using Extended MARS
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-288
by
Qichao Liu
,
Barrett R. Bryant
,
Marjan Mernik
Papers
Reasoning about Human Intention Change for Individualized Runtime Software Service Evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-296
by
Hua Ming
,
Carl K. Chang
,
Katsunori Oyama
,
Hen-I Yang
Papers
An Interactive Change Impact Analysis Based on an Architectural Reflexion Model Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 297-302
by
Tae-hyung Kim
,
Kimun Kim
,
Woomok Kim
Papers
ucR Based Interoperable Spatial Information Model for Realizing Ubiquitous Spatial Infrastructure
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-310
by
Yukihiko Shigesada
,
Shinsuke Kobayashi
,
Noboru Koshizuka
,
Ken Sakamura
Papers
A Personalized Navigation Guide Using a Social-Spatial Ontology
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-316
by
Hyunho Park
,
Gonzalo Huerta-Canepa
,
Dongman Lee
,
Ho NamKoong
,
Byoungoh Kim
,
Soon J. Hyun
Papers
A Usability-Pattern-Based Requirements-Analysis Method to Bridge the Gap between User Tasks and Application Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-326
by
Sang-Hyun Lee
,
In-Young Ko
,
Sungwon Kang
,
Dan-Hyung Lee
Papers
Managing Consistency between Textual Requirements, Abstract Interactions and Essential Use Cases
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-336
by
Massila Kamalrudin
,
John Grundy
,
John Hosking
Papers
Variability Modeling for Product Line Viewpoints Integration
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-346
by
Nan Niu
,
Juha Savolainen
,
Yijun Yu
Papers
Human Desire Inference Process Based on Affective Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-350
by
Jeyoun Dong
,
Hen-I Yang
,
Katsunori Oyama
,
Carl K. Chang
Papers
PAAKL: Password Authentication Using Behavioral Metrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-356
by
Anestis A. Toptsis
,
Joshua Majonis
Papers
Behavior Monitoring in Self-Healing Service-Oriented Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 357-366
by
Harald Psaier
,
Florian Skopik
,
Daniel Schall
,
Schahram Dustdar
Papers
Change Impact Analysis Based on a Taxonomy of Change Types
Full-text access may be available. Sign in or learn about subscription options.
pp. 373-382
by
Xiaobing Sun
,
Bixin Li
,
Chuanqi Tao
,
Wanzhi Wen
,
Sai Zhang
Papers
An Ontology-Based Approach to Reengineering Enterprise Software for Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 383-388
by
Hong Zhou
,
Hongji Yang
,
Andrew Hugill
Papers
Synchronized Architecture Evolution in Software Product Line Using Bidirectional Transformation
Full-text access may be available. Sign in or learn about subscription options.
pp. 389-394
by
Liwei Shen
,
Xin Peng
,
Jiayi Zhu
,
Wenyun Zhao
Papers
An Optimized Checkpointing Based Learning Algorithm for Single Event Upsets
Full-text access may be available. Sign in or learn about subscription options.
pp. 395-400
by
S. Sharanyan
,
Arvind Kumar
Papers
A Scalable and Efficient Path Management Scheme for Internet-Based Sensor Data Delivery Infrastructure
Full-text access may be available. Sign in or learn about subscription options.
pp. 401-406
by
Kyungmin Cho
,
Younghyun Ju
,
Sungjae Jo
,
Yunseok Rhee
,
Junehwa Song
Papers
Exploring Query Optimization in Programming Codes by Reducing Run-Time Execution
Full-text access may be available. Sign in or learn about subscription options.
pp. 407-412
by
Venkata Krishna Suhas Nerella
,
Swetha Surapaneni
,
Sanjay Kumar Madria
,
Thomas Weigert
Papers
Design and Analysis of Cost-Cognizant Test Case Prioritization Using Genetic Algorithm with Test History
Full-text access may be available. Sign in or learn about subscription options.
pp. 413-418
by
Yu-Chi Huang
,
Chin-Yu Huang
,
Jun-Ru Chang
,
Tsan-Yuan Chen
Papers
Minimising the Preparation Cost of Runtime Testing Based on Testability Metrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 419-424
by
Alberto Gonzalez-Sanchez
,
Éric Piel
,
Hans-Gerhard Gross
,
Arjan J. C. van Gemund
Papers
Specifying Time-Sensitive Systems with TLA+
Full-text access may be available. Sign in or learn about subscription options.
pp. 425-430
by
Hehua Zhang
,
Ming Gu
,
Xiaoyu Song
Papers
Transformation Rules for Synthesis of UML Activity Diagram from Scenario-Based Specification
Full-text access may be available. Sign in or learn about subscription options.
pp. 431-436
by
Sungwon Kang
,
Hyunho Kim
,
Jongmoon Baik
,
Hojin Choi
,
Changsup Keum
Papers
A Game Perspective of Refinement of Component Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 437-442
by
Zizhen Wang
,
Hanpin Wang
,
Yongzhi Cao
,
Wanling Qu
,
Wei Jin
,
Meixia Zhu
Papers
An Automatic Configuration Approach to Improve Real-Time Application Throughput While Attaining Determinism
Full-text access may be available. Sign in or learn about subscription options.
pp. 443-452
by
Xiaowei Zhang
,
Donggang Cao
,
Yunpeng Gao
,
Xiangqun Chen
,
Hong Mei
Papers
SAT: Switchable Address Translation for Flash Memory Storages
Full-text access may be available. Sign in or learn about subscription options.
pp. 453-461
by
Yeonseung Ryu
Papers
Supporting Design Enhancement by Pattern-Based Transformation
Full-text access may be available. Sign in or learn about subscription options.
pp. 462-467
by
Nien-Lin Hsueh
,
Peng-Hua Chu
,
Pao-Ann Hsiung
,
Min-Ju Chuang
,
William Chu
,
Chih-Hung Chang
,
Chorng-Shiuh Koong
,
Chih-Hsiong Shih
Papers
A Petri Net-Based Method for Data Validation of Web Services Composition
Full-text access may be available. Sign in or learn about subscription options.
pp. 468-476
by
Chunxiang Xu
,
Wanling Qu
,
Hanpin Wang
,
Zizhen Wang
,
Xiaojuan Ban
Papers
Process Patterns for Web Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 477-486
by
Reza Babanezhad
,
Yusef Mehrdad Bibalan
,
Raman Ramsin
Papers
Modeling BPEL and BPEL4People with a Timed Interruptable pi-Calculus
Full-text access may be available. Sign in or learn about subscription options.
pp. 487-492
by
Wei Jin
,
Hanpin Wang
,
Yongzhi Cao
,
Zizhen Wang
,
Xiaojuan Ban
Papers
QoS-Based Dynamic Web Service Composition with Ant Colony Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 493-502
by
Wei Zhang
,
Carl K. Chang
,
Taiming Feng
,
Hsin-yi Jiang
Papers
Filtering of Inconsistent Software Project Data for Analogy-Based Effort Estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 503-508
by
Tuan Khanh Le-Do
,
Kyung-A Yoon
,
Yeong-Seok Seo
,
Doo-Hwan Bae
Papers
An Efficient Source Allocation Approach for QoS Support in P2PTV Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 509-514
by
Yaw-Chung Chen
,
Shang-Shu Li
,
Kuan-Teng Chen
Papers
Timing Analyzing for Systems with Task Execution Dependencies
Full-text access may be available. Sign in or learn about subscription options.
pp. 515-524
by
Yue Lu
,
Thomas Nolte
,
Iain Bate
,
Christer Norström
Papers
Systematic Composition and Verification of Abstract Components
Full-text access may be available. Sign in or learn about subscription options.
pp. 525-530
by
Yunja Choi
Papers
A Study on the Applicability of Modified Genetic Algorithms for the Parameter Estimation of Software Reliability Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 531-540
by
Chao-Jung Hsu
,
Chin-Yu Huang
Papers
A Model-Based Design Tool of Automotive Software Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 541-542
by
Jeong-Si Kim
,
Chaedeok Lim
,
Tae-Man Han
Papers
A Method for Detecting Defects in Source Codes Using Model Checking Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 543-544
by
Yoshitaka Aoki
,
Saeko Matsuura
Papers
Reconnection of the Pre-assigning Peers in the Seamless Video Streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 545-546
by
Ilhom Karimov
,
Nuriddin Rayimov
,
Liu Jing
,
Jungwook Song
,
Sungchol Cho
,
Sunyoung Han
,
Chinchol Kim
Papers
A Know-How Recommendation System for a Software Engineering Project Course by Using the Content Filtering Technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 547-548
by
Rika Kawai
,
Atsuo Hazeyama
Papers
Author Index
Freely available from IEEE.
pp. 549-552
Papers
[Publisher's information]
Freely available from IEEE.
pp. 554
Showing 92 out of 92