


default search action
13th APSEC 2006: Bangalore, India
- 13th Asia-Pacific Software Engineering Conference (APSEC 2006), 6-8 December 2006, Bangalore, India. IEEE Computer Society 2006, ISBN 0-7695-2685-3

Component Based Software Engineering
- Artem Vorobiev, Jun Han:

Secrobat: Secure and Robust Component-based Architectures. 3-10 - Yuji Sakata, Kazutoshi Yokoyama, Hironori Washizaki

, Yoshiaki Fukazawa:
A precise estimation technique for test coverage of components in object-oriented frameworks. 11-18 - Anjaneyulu Pasala

, Srinivasa Rao, Srinivas Gunturu, Purnendu Sinha:
An Approach Based on Modeling Dynamic Behavior of the System to Assess the Impact of COTS Upgrades. 19-26 - Christine Choppy, Denis Hatebur, Maritta Heisel:

Component composition through architectural patterns for problem frames. 27-36 - Naresh Kumar Agarwal

, Danny C. C. Poo, Teo Keng Yong:
Component-based Development of MILLS: A Case Study in the development of an Inter-library Loan Software System. 37-44 - Hiroshi Igaki, Masahide Nakamura, Ken-ichi Matsumoto, Mikio Aoyama:

Adopting Model-Driven Development for Integrated Services and Appliances in Home Network Systems. 45-52 - Santokh Singh, Cheung Ling Kelly Yu:

Efficient Component Based Software Engineering using the TCEM Methodology and the TCET Tool. 53-60 - Vinicius Cardoso Garcia, Eduardo Santana de Almeida, Liana Barachisio Lisboa, Alexandre Costa Martins, Silvio Romero de Lemos Meira, Daniel Lucrédio, Renata Pontin de Mattos Fortes

:
Toward a Code Search Engine Based on the State-of-Art and Practice. 61-70 - Jun Han, Khaled M. Khan

:
Security-Oriented Service Composition and Evolution. 71-78 - Hironori Washizaki

, Tomoki Nakagawa, Yuhki Saito, Yoshiaki Fukazawa:
A Coupling-based Complexity Metric for Remote Component-based Software Systems Toward Maintainability Estimation. 79-86 - Nabil Hameurlain:

A Formal Framework for Component Pr otocols Behavioural Compatibility. 87-94 - Chen-Liang Fang, Deron Liang, Fengyi Lin, Chien-Cheng Lin, William Cheng-Chung Chu:

A Portable Interceptor Mechanism on SOAP for Continuous Audit. 95-104
Requirements Engineering
- Bhavani Palyagar, Frank Moisiadis:

A Practical Estimation Method for Complex RE. 105-112 - Akadej Udomchaiporn, Nakornthip Prompoon, Pizzanu Kanongchaiyos:

Software Requirements Retrieval Using Use Case Terms and Structure Similarity Computation. 113-120 - Shahzad Anwer, Naveed Ikram:

Goal Oriented Requirement Engineering: A Critical Study of Techniques. 121-130
Service Oriented Architecture
- Zakir Laliwala, Vikram Sorathia

, Sanjay Chaudhary
, Prateek Jain:
Integrating Stateful Services in Workflow. 131-138 - Kazuto Nakamura, Mikio Aoyama:

Value-Based Dynamic Composition of Web Services. 139-146 - Hui Ming Teo, Wan M. N. Wan-Kadir:

A Comparative Study of Interface Design Approaches for Service-Oriented Software. 147-156
Software Architecture
- Sang-Uk Jeon, Jang-Eui Hong

, Doo-Hwan Bae:
Using Operational Architecture to Model Embedded Software. 157-164 - Santonu Sarkar

, Girish Maskeri Rama, Shubha Ramachandran:
A Method for Detecting and Measuring Architectural Layering Violations in Source Code. 165-172 - Luciano Baresi

, Paolo Beretta, Roberto Fraccapani, Carlo Ghezzi, Filippo Pacifici:
Towards a Model-driven Approach to Develop Applications based on Physical Active Objects. 173-182
Formal Methods
- David Hemer:

A systematic approach to connecting standalone theorem provers to formal development environments. 183-190 - Osamu Shigo, Atsushi Okawa, Daiki Kato:

Constructing Behavioral State Machine using Interface Protocol Specification. 191-198 - Dipankar Das, Rajeev Kumar, P. P. Chakrabarti:

Timing Verification of UML Activity Diagram Based Code Block Level Models for Real Time Multiprocessor System-on-Chip Applications. 199-208
Object-Oriented Technology
- Ling Yuan, Jin Song Dong, Jing Sun

:
Modeling and Customization of Fault Tolerant Architecture using Object-Z/XVCL. 209-216 - Soon-Kyeong Kim, David A. Carrington:

A Pattern based Model Evolution Approach. 217-224 - Yogesh Murarka, Umesh Bellur

, Rushikesh K. Joshi:
Safety Analysis for Dynamic Update of Object Oriented Programs. 225-232 - Atul Gupta

, Amit Raj:
Strengthening Method Contracts for Objects. 233-242
Testing & Program Checking
- Eunkyoung Jee, Seungjae Jeon, Hojung Bang, Sung Deok Cha, Junbeom Yoo, Gee-Yong Park, Kee-Choon Kwon:

Testing of Timer Function Blocks in FBD. 243-250 - Srihari Sukumaran:

Generating interoperability tests for networked media devices. 251-258 - Renée C. Bryce, Ajitha Rajan, Mats Per Erik Heimdahl:

Interaction Testing in Model-Based Development: Effect on Model-Coverage. 259-268
Testing & Quality Management
- Hui Liu, Zhiyi Ma, Lu Zhang, Weizhong Shao:

Detecting Duplications in Sequence Diagrams Based on Suffix Trees. 269-276 - Dan Hao

, Lu Zhang, Hong Mei, Jiasu Sun:
Towards Interactive Fault Localization Using Test Information. 277-284 - Kesav V. Nori, N. Swaminathan:

A framework for software product engineering. 285-292
Maintenance / Reverse Engineering
- Stan Jarzabek:

Genericity - a "Missing in Action" Key to Software Simplification and Reuse. 293-300 - Pankaj Bhatt, Gautam Shroff, K. Williams, Arun Kumar Misra:

An Empirical Study of Factors and their Relationships in Outsourced Software Maintenance. 301-308 - Katsuhisa Maruyama:

An Accurate and Convenient Undo Mechanism for Refactorings. 309-316 - Niklas Pettersson, Welf Löwe:

Efficient and Accurate Software Pattern Detection. 317-326
Empirical Software Engineering
- Reishi Yokomori, Masami Noro, Katsuro Inoue:

Evaluation of Source Code Updates in Software Development Based on Component Rank. 327-334 - Judy Tantivongsathaporn, Daniel Stearns:

An Experience With Design by Contract. 335-341 - Homan Ma, Robert Amor

, Ewan D. Tempero:
Usage Patterns of the Java Standard API. 342-352
Empirical Software Engineering
- Noriko Hanakawa, Mike Barker:

A case study of an empirical approach to component requirements in developing a plagiarism detection tool. 353-360 - Thirumalesh Bhat, Nachiappan Nagappan:

Building Scalable Failure-proneness Models Using Complexity Metrics for Large Scale Software Systems. 361-366 - José Antonio Pow-Sang

, Enrique Jolay-Vasquez:
An Approach of a Technique for Effort Estimation of Iterations in Software Projects. 367-376
Software Process Improvement
- Nagesh Mukundarao:

Cycle Time Reduction. 377-384 - K. Alagarsamy, Selwyn Justus

, K. Iyakutti:
A Theoretical Perspective on Knowledge Based Organizational Learning. 393-400 - Ming Huo, He Zhang, D. Ross Jeffery:

A Systematic Approach to Process Enactment Analysis as Input to Software Process Improvement or Tailoring. 401-410
Product Line Engg./OO
- Yoshiyuki Shinkawa:

Inter-Model Consistency in UML Based on CPN Formalism. 411-418 - Vinay Kulkarni, Sreedhar Reddy:

Introducing MDA in a large IT consultancy organization. 419-426 - Suk Kyung Shin, Jin Sun Her, Soo Dong Kim:

Applying Formal Approach to Core Asset Instantiation in Product Line Engineering. 427-434 - Umesh Bellur

, V. Vallieswaran:
A Versioning Scheme for Consistent Evolution of OO Applications. 435-444
Maintenance/Knowledge-Based Approach
- Tariq Mahmood, Edmund Kazmierczak:

A Knowledge-based Approach for Safety Analysis Using System Interactions. 445-452 - Kimiharu Okura, Keita Goto, Noriko Hanakawa, Shinji Kawaguchi, Hajimu Iida:

Project Replayer with Email Analysis - Revealing Contexts in Software Development. 453-460 - K. Vinay Kumar Reddy, D. Janakiram:

Cohesion Analysis in Linux Kernel. 461-466 - Zhen Ming Jiang, Ahmed E. Hassan, Richard C. Holt:

Visualizing Clone Cohesion and Coupling. 467-476
SE Education
- Shen-Tzay Huang, Yi-Pei Cho, Yu-Jen Lin:

Implementation and Evaluation of Teaching an Introductory Software Engineering Course Framed in Cognitive Apprenticeship. 477-484 - Kirti Garg, Vasudeva Varma

, K. N. Giridhar, Abhishek K. Mishra:
Security: Bridging the Academia-Industry Gap Using a Case Study. 485-492

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














