


default search action
28th COMPSAC 2004: Hong Kong, China - Regular Papers
- 28th International Computer Software and Applications Conference (COMPSAC 2004), Design and Assessment of Trustworthy Software-Based Systems, 27-30 September 2004, Hong Kong, China, Proceedings. IEEE Computer Society 2004, ISBN 0-7695-2209-2

Component-Based Software I
- Eduardo Santana de Almeida, Alexandre Alvaro, Daniel Lucrédio, Antônio Francisco do Prado, Luís Carlos Trevelin:

Distributed Component-Based Software Development: An Incremental Approach. 4-9 - Tino Lourens:

TiViPE - Tino's Visual Programming Environment. 10-15 - David Budgen, Pearl Brereton, Mark Turner:

Codifying a Service Architectural Style. 16-22 - Bhim Prasad Upadhyaya, Zhiming Liu:

Formal Support for Development of JavaBeans? Component Systems. 23-28
Process Management I
- Kevin McKeever, Jonathan Morrison, Eric Peterson:

Assuring Assessment Success. 30-37 - Zhe Shan, Qing Li, Kamalakar Karlapalem:

Enacting Conformance Assessment of Business Processes - An ebXML Based Approach in E-ADOME. 38-43 - Seok Jun Yun, Dick B. Simmons:

Continuous Productivity Assessment and Effort Prediction Based on Bayesian Analysis. 44-49 - M. K. Serour, Brian Henderson-Sellers:

Introducing Agility: A Case Study of Situational Method Engineering Using the OPEN Process Framework. 50
Software Testing I
- Durga Prasad Mohapatra, Rajib Mall, Rajeev Kumar:

An Edge Marking Technique for Dynamic Slicing of Object-Oriented Programs. 60-65 - Yingzhou Zhang, Baowen Xu

, Liang Shi, Bixin Li, Hongji Yang:
Modular Monadic Program Slicing. 66-71 - Toshiaki Shiba, Tatsuhiro Tsuchiya, Tohru Kikuno:

Using Artificial Life Techniques to Generate Test Cases for Combinatorial Testing. 72-77 - Kwok Ping Chan, Tsong Yueh Chen

, Fei-Ching Kuo, Dave Towey:
A Revisit of Adaptive Random Testing by Restrictio. 78-85
Panel on Risk Management and Dependability - What are the Key Factors?
- Lucas Chi Kwong Hui, Kam-Pui Chow, Kevin K. H. Pun, Siu-Ming Yiu, Wai Wan Tsang, C. F. Chong, H. W. Chan:

Risk Management of Corporate Confidential Information in Digital Form. 88-89
Formal Method I
- Peter Henderson, Robert John Walters, Stephen Crouch:

Implementing Hierarchical Features in a Graphically Based Formal Modelling Language. 92-98 - Francisco A. C. Pinheiro:

Situated Modelling of Scenarios. 99-107 - Jianzhou Zhao, Jinian Bian, Weimin Wu:

PFGASAT- A Genetic SAT Solver Combining Partitioning and Fuzzy Strategie. 108-113 - Lijun Shan, Hong Zhu:

Consistency Check in Modelling Multi-Agent Systems. 114-119
Middlware
- Yongjie Zheng, Alvin T. S. Chan:

Stream Composition for Highly Adaptive and Reconfigurable Mobile Middleware. 122-127 - Wei Xu, Jun Wei, Yu Liu, Jing Li:

SOWAC: A Service-Oriented Workflow Access Control Model. 128-134 - Gang Huang, Tiancheng Liu, Hong Mei, Zizhan Zheng, Zhao Liu, Gang Fan:

Towards Autonomic Computing Middleware via Reflection. 135-140 - Jinling Wang, Beihong Jin, Jing Li, Danhua Shao:

A Semantic-Aware Publish/Subscribe System with RDF Patterns. 141-14
Real-Time Systems
- Lei Wang, Zhaohui Wu, Mingde Zhao:

Worst-Case Response Time Analysis for OSEK/VDX Compliant Real-Time Distributed Control Systems. 148-153 - Shu-Chen Cheng, Yueh-Min Huang:

Dynamic Real-Time Scheduling for Multi-Processor Tasks Using Genetic Algorithm. 154-160 - Hai Jin, Hanhua Chen, Jian Chen, Ping Kuang, Li Qi, Deqing Zou:

Real-Time Strategy and Practice in Service Grid. 161-166 - Albert Mo Kim Cheng, Rong Wang:

A New Scheduling Algorithm and a Compensation Strategy for Imprecise Computation. 167-172
Panel on Computer Curricula for Software Engineering
- David Budgen:

Computing Curricula Software Engineering: Position Paper. 174-175 - T. H. Tse

:
Computing Curriculum - Software Engineering: Its Impact on Professional Software Engineering Education. 176-177
Software Reliability
- Ji Wu, Haiyan Yang, Xiao-xia Jia, Chang Liu, Chao Liu, Maozhong Jin:

Application of Maximum Entropy Principle to Software Failure Prediction. 180-185 - Chin-Yu Huang, Chu-Ti Lin, Sy-Yen Kuo, Michael R. Lyu, Chuan-Ching Sue:

Software Reliability Growth Models Incorporating Fault Dependency with Various Debugging Time Lags. 186-191 - Allen P. Nikora, John C. Munson:

The Effects of Fault Counting Methods on Fault Model Quality. 192-201 - Marco Vieira, Henrique Madeira:

Portable Faultloads Based on Operator Faults for DBMS Dependability Benchmarking. 202-209
Security I
- Zhenwei Yu, Jeffrey J. P. Tsai:

A Multi-Class SLIPPER System for Intrusion Detection. 212-217 - Lu Ma, Jeffrey J. P. Tsai, Tadao Murata:

A Secure Mobile Agent System Model Based on Extended Elementary Object System. 218-223 - Changjie Wang, Ho-fung Leung:

A Secure and Fully Private Borda Voting Protocol with Universal Verifiability. 224-229 - Christian Payne:

Enhanced Security Models for Operating Systems: A Cryptographic Approach. 230-235
Panel on Research Directions in Software Process Improvement
- David N. Card:

Research Directions in Software Process Improvement. 238 - Miguel A. Serrano:

State of the Art and Future of Research in Software Process Improvement. 239
Keynote Address 2
- Jean-Claude Laprie:

Dependable Computing: Concepts, Challenges, Directions. 242
Component-Based Software II
- Valerie Maxville, Jocelyn Armarego, Chiou Peng Lam:

Intelligent Component Selection. 244-249 - Loe M. G. Feijs, Jun Hu

:
Component-Wise Mapping of Media-Needs to a Distributed Presentation Environment. 250-257 - Fan Ye, Tim Kelly:

Component Failure Mitigation According to Failure Type. 258-264 - Cristina Cerschi Seceleanu, Tiberiu Seceleanu

:
Modular Design of Reactive Systems. 265-271
Process Management II
- Victor K. Y. Chan:

Software Effort Prediction Models Using Maximum Likelihood Methods Require Multivariate Normality of the Software Metrics Data Sample: Can Such a Sample Be Made Multivariate Normal? 274-279 - Shaohua Liu, Dan Ye, Jun Wei, Gang Xu, Yonglin Xia, Yu Liu:

POP beyond SODA, Reaching the New Horizon of Service Cooperation. 280-285 - Kazuma Aizawa, Haruhiko Kaiya, Kenji Kaijiri:

FC Method: A Practical Approach to Improve Quality and Efficiency of Software Processes for Embedded System Revision. 286-292 - Haifeng Shen, Chengzheng Sun:

A Complete Textual Merging Algorithm for Software Configuration Management Systems. 293-298
Software Testing II
- Hu Li, Maozhong Jin, Chao Liu, Zhongyi Gao:

Test Criteria for Context-Free Grammars. 300-305 - Robert Nilsson, Jeff Offutt, Sten F. Andler:

Mutation-Based Testing Criteria for Timeliness. 306-311 - Yu Lei, Richard H. Carver:

Reachability Testing of Semaphore-Based Programs. 312-317 - Eric Ying Kwong Chan, Pak-Lok Poon

, Yuen-Tak Yu:
On the Testing of Particular Input Conditions. 318-325
Panel on Computer Supported Cooperative Work in Software Engineering
- J. Jenny Li, Tangqiu Li, Zongkai Lin, Aditya P. Mathur, Karama Kanoun:

Computer Supported Cooperative Work in Software Engineering. 328
Formal Method II
- Taolue Chen, Tingting Han, Jian Lu:

Towards a Model Logic for p-Calculus. 330-335 - Lihua Xu, Marcio S. Dias, Debra J. Richardson:

Generating Regression Tests via Model Checking. 336-341 - Amit M. Paradkar, Tim Klinger:

Automated Consistency and Completeness Checking of Testing Models for Interactive Systems. 342-348 - Yongjian Li, Rui Xue:

Design of a CIL Connector to SPIN. 349-354
Software Architecture
- Michel Jaring, Jan Bosch:

A Taxonomy and Hierarchy of Variability Dependencies in Software Product Family Engineering. 356-361 - Hoong Chuin Lau

, Wee Chong Wan, Min Kwang Lim, Steven Halim:
A Development Framework for Rapid Meta-Heuristics Hybridization. 362-367 - Weihang Wu, Tim Kelly:

Safety Tactics for Software Architecture Design. 368-375 - Jia Zhang, Carl K. Chang, Jeffrey M. Voas:

A Uniform Meta-Model for Mediating Formal Electronic Conferences. 376-383
Security II
- Qianhong Wu, Changjie Wang, Xiaofeng Chen, Yumin Wang:

Publicly Verifiable Auctions with Minimal Leakage. 384-389 - Long Qin, Si Duanfeng, Han Xinhui, Zou Wei:

A Hybrid Security Framework of Mobile Code. 390-395 - Tzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian:

A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy. 396-397
Panel on Embedded Software Systems
- Dongman Lee:

Active Surroundings: A Group-Aware Middleware for Embedded Application System. 404-405 - Stephen S. Yau:

Embedded Software in Real-Time Pervasive Computing Environments. 406-407
Requirement & Design
- Xiaoqing Frank Liu, Chandra Sekhar Veera, Yan Sun, Kunio Noguchi, Yuji Kyoya:

Priority Assessment of Software Requirements from Multiple Perspectives. 410-415 - Jungyoon Kim, Doo-Hwan Bae:

An Approach to Feature Based Modelling by Dependency Alignment for the Maintenance of the Trustworthy System. 416-423 - Guanling Lee, Chien-Yu Chang, Arbee L. P. Chen:

Hiding Sensitive Patterns in Association Rules Mining. 424-429 - Wenpo Yang, Guanling Lee:

Efficient Partial Multiple Periodic Patterns Mining without Redundant Rules. 430-435
Pervasive/Ubiquitous Computing
- Kimio Kuramitsu

, Hideyuki Tokuda:
Materializing Ubiquitous Computing Environments. 438-443 - Antonio Corradi, Rebecca Montanari, Daniela Tibaldi:

Context-Based Access Control for Ubiquitous Service Provisioning. 444-451 - Stephen S. Yau, Dazhi Huang, Haishan Gong, Siddharth Seth:

Development and Runtime Support for Situation-Aware Application Software in Ubiquitous Computing Environments. 452-457 - T. H. Tse, Stephen S. Yau, W. K. Chan, Heng Lu, Tsong Yueh Chen:

Testing Context-Sensitive Middleware-Based Software Applications. 458-466
Internet Web System
- Cássia Trojahn dos Santos, Fernando Santos Osório

:
AdapTIVE: An Intelligent Virtual Environment and Its Application in E-Commerce. 468-473 - Wei Li, W. K. Daniel Pun, Minjie Zhang:

Identifying and Breaking Necessary Constraints to Web-Based Metacomputing. 474-479 - Tsung-Yuan Liu, Yuh-Jzer Joung:

Multi-Dimension Browse. 480-485 - Theophilos A. Limniotes, George A. Papadopoulos, Farhad Arbab:

Coordinating Web Services Using Channel Based Communication. 486-491 - Giuseppe A. Di Lucca, Anna Rita Fasolino, Porfirio Tramontana

, Ugo de Carlini:
Supporting Concept Assignment in the Comprehension of Web Applications. 492-497
Keynote Address 3
- Huimin Lin:

Formal Methods for Trustworthy Mobile Computing. 500
Software Re-Engineering
- Tomaz Kosar, Marjan Mernik, Viljem Zumer:

JART: Grammar-Based Approach to Refactoring. 502-507 - Qiming Teng, Xiangqun Chen, Xia Zhao, Wei Zhu, Lu Zhang:

Extraction and Visualization of Architectural Structure Based on Cross References among Object Files. 508-513 - Feng Chen, Hongji Yang, He Guo, Baowen Xu

:
Agentification for Web Services. 514-519 - Ming Huo, June M. Verner, Liming Zhu

, Muhammad Ali Babar:
Software Quality and Agile Method. 520-525
Quality Assurance
- Guillaume Lussier, Hélène Waeselynck, Karim Guennoun:

Proof-Guided Testing: An Experimental Study. 528-533 - Ch. Ali Asad, Muhammad Irfan Ullah, Muhammad Jaffar-Ur Rehman:

An Approach for Software Reliability Model Selection. 534-539 - Chih-Hung Chang, William C. Chu, Chih-Wei Lu, Don-Lin Yang:

An Integrated Software Development Environment with XML Internal Representation. 540-545 - Xiaoqing Bai, Chiou Peng Lam, Huaizhong Li:

An Approach to Generate the Thin-Threads from the UML Diagrams. 546-552
Embedded Systems
- Wei-Tek Tsai, Weiwei Song, Raymond A. Paul, Zhibin Cao, Hai Huang:

Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed Computing. 554-559 - Kon Papazis, Naveen K. Chilamkurti, Ben Soh:

A New Receiver-Based Layered-Rate Estimator Algorithm for Fair Bandwidth Distribution. 560-565 - Baojiang Cui, Jun Liu, Gang Wang, Jing Liu:

Study on Performance of IP-SWAN Based on Distributed NS-RAID. 566-571 - Zhaohui Wu, Lei Wang, Kougen Zheng:

A Reliable OS Kernel for Smart Sensors. 572-577

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














