514-022
|
Reaching CMMI Level 2: Challenges, Missteps, and Successes
R. Cyran and J. Cusick (USA)
|
Abstract
|
|
514-037
|
A Web-based
Tool to Normalize the Relational Database Schema
S. Nandagopalan and B.S. Adiga (India)
|
Abstract
|
|
514-043
|
Finding
Aspects in Object-Oriented System
S. Hu, Q. Li, P. Chen, H. Chu, Y. Su, and Yuying
Wang (PRC)
|
Abstract
|
|
514-056
|
Some Experience from the Development of a Simulator for a Telecom Cluster (CPPemu)
M. Bergqvist, J. Engblom, M. Patel, and L. Lundegård (Sweden)
|
Abstract
|
|
514-066
|
An Integration of Product-Line Engineering and Model-Driven Development Makes the Full Automation Feasible
S.W. Choi, J.S. Her, S.H. Chang, H.J. La, H.G. Min, and S.D. Kim (Korea)
|
Abstract
|
|
514-073
|
Variational
Bayesian Approach for Exponential Software Reliability Model
H. Okamura, T. Sakoh, and T. Dohi (Japan)
|
Abstract
|
|
514-074
|
A New
Approach to Protect Proteins in 2D Gel Electrophoresis Images
J. Chen, T.-S. Chen, and J.-Y. Pan (Taiwan)
|
Abstract
|
|
514-088
|
A Proposal for using Sub-Domain Partitioning as a Testing Standard
D.A. Gustafson (USA)
|
Abstract
|
|
514-092
|
Metaprogramming Framework for Generating Persistent Java Applications
Z. László (Hungary) and S. Glamseter (Norway)
|
Abstract
|
|
514-096
|
A Tool
for Automatic Transformation between SOFL Class Specifications and UML
Diagrams
S. Liu and S. Kagiyama (Japan)
|
Abstract
|
|
514-109
|
Graphical Test Planning for Distributed Discrete Real-Time Systems
S. Jovalekic (Germany)
|
Abstract
|
|
514-112
|
Software Engineering Challenges in New Media Applications
A. Biswas (USA) and J. Singh (Canada)
|
Abstract
|
|
514-132
|
Tool Supported Modeling of Mobile Systems
C. Kroiß and G. Zhang (Germany)
|
Abstract
|
|
514-146
|
Maintaining Traceability Links between Implementation-Level Restrictions and Source Code for Program Understanding
M. Ohba and K. Gondow (Japan)
|
Abstract
|
|
514-157
|
Consistency Checking between Two Different Dynamic Views of a Software System
W. Shen and W.L. Low (USA)
|
Abstract
|
|
514-159
|
Canica: An IDE for the Java Modeling Language
A.B. Perez, Y. Cheon, and A.Q. Gates (USA)
|
Abstract
|
|
514-162
|
Tool Support for Aspect-Oriented Requirements
I.S. Brito, A. Moreira, and J. Araújo (Portugal)
|
Abstract
|
|
514-166
|
Designing
Monitoring Environments for Verifiability using Abstraction
F. Ucman and M. Subramaniam (USA)
|
Abstract
|
|
514-094
|
Development of a Real Time Expert System for 11kV Distribution Automation
Md.S. Uddin, K.M. Nor (Malaysia), and Md.S. Salam (Bangladesh)
|
Abstract
|
|
514-143
|
A New Optimistic Concurrency Control Algorithm for Valid-Time Relations
A. Makni, R. Bouaziz, and F. Gargouri (Tunisia)
|
Abstract
|
|
514-800
|
Knowledge
Packaging Supporting Risk Management In Software Processes
P. Ardimento, N. Boffoli, M. Cimitile, A. Persico, and A. Tammaro (Italy)
|
Abstract
|
|
514-806
|
Thinking Outside the Box: A Multi-Agent Approach to Complex Games
M. Harré and T. Bossomaier (Australia)
|
Abstract
|
|
514-807
|
An Evolutionary Agent Approach to Dots-and-Boxes
T. Bossomaier, A. Knittel, M. Harré, and A. Snyder (Australia)
|
Abstract
|
|
514-808
|
The
XD Model: Extending XML and DOM to Standards based Coordination
G. Joskowicz, E. Kühn, and M. Murth (Austria)
|
Abstract
|
|
514-032
|
Classifying Incomplete Software Engineering Data using Decision Trees: An Improved Probabilistic Approach
B. Twala, M. Cartwright, and G. Liebchen (UK)
|
Abstract
|
|
514-045
|
Empirical Study of the Usability of Dynamic Information in Reverse Engineering
Q. Li, S. Hu, P. Chen, S. Rugaber, H. Chu, and H. Gao (USA)
|
Abstract
|
|
514-053
|
A Case for Pervasive Knowledge Discovery
X. Shen and T. Babin (USA)
|
Abstract
|
|
514-061
|
Continuous Monitoring of Skycube Queries over Sliding Windows in Data Stream Environment
G. Liu, X. Liu, J. Yu, and T. Liu (PRC)
|
Abstract
|
|
514-072
|
Testing Intrusion Detection Systems: An Engineered Approach
M.S. Gad el Rab and A. Abou el Kalam (France)
|
Abstract
|
|
514-077
|
Effective
Performance Analysis and Visualization on Embedded Linux
P.B. Jayaraj, R. Gopalakrishnan, and V. Jain (India)
|
Abstract
|
|
514-079
|
Legacy Software Reverse-Engineering and Comprehension by Interpretations
P. Dugerdil (Switzerland)
|
Abstract
|
|
514-084
|
Static
Verification of Active Rule-Base System
L. Chavarría-Báez and X. Li (Mexico)
|
Abstract
|
|
514-097
|
Laxity
Aware Dynamic Checkpointing Strategy for Real-Time Systems under Multiple
Transient Faults
A. Saeed and M.Y. Javed (Pakistan)
|
Abstract
|
|
514-100
|
Enhanced
Enterprise Web-based Application Security using GeoIP Services
Yong Wang and D. Simmons (USA)
|
Abstract
|
|
514-103
|
Adaptive Runtime Fault Management for Services in Component-based Software Applications
R. Su, M.R.V. Chaudron, and J.J. Lukkien (The Netherlands)
|
Abstract
|
|
514-111
|
A Pipelined
Architecture for Throughput Enhancement in Remote Database Logging Applications
B. Babu, R. Gopalakrishnan, P. Cuijpers, and G.
Meempat (India)
|
Abstract
|
|
514-114
|
An Architecture-based Dependability Modeling Framework using AADL
A.-E. Rugina, K. Kanoun, and M. Kaâniche (France)
|
Abstract
|
|
514-118
|
A Cryptographic
Protocol for an Eyewitness Electronic Voting System
J. Figueroa and S. Gonzalez (Mexico)
|
Abstract
|
|
514-120
|
A Framework
for Accurate Measurements with Low Resolution Clocks
J.R. Herrero and J.J. Navarro (Spain)
|
Abstract
|
|
514-121
|
A Language-based Access Control Approach for Component-based Software Applications
R. Su, J.J. Lukkien, and M.R.V. Chaudron (The Netherlands)
|
Abstract
|
|
514-124
|
DAOi:
A Fully Independent Java Database Access Framework
G.-B. Kim and S.J. Hyun (Korea)
|
Abstract
|
|
514-125
|
The Role of Sequence Diagrams in Use/Misuse Case Decomposition for Secure Systems
J.J. Pauli (USA)
|
Abstract
|
|
514-138
|
A Study on Search Engine Use by Intelligence Analysts
D. Libes, E. Morse, and J. Scholtz (USA)
|
Abstract
|
|
514-160
|
A Qualitative Analysis of Java Obfuscation
M. Karnick, J. MacBride, S. McGinnis, Y. Tang, and R. Ramachandran (USA)
|
Abstract
|
|
514-165
|
An Analysis of the Vulnerability Discovery Process in Web Browsers
S.-W. Woo, O.H. Alhazmi, and Y.K. Malaiya (USA)
|
Abstract
|
|
514-167
|
Security Threat Modeling and Analysis: A Goal-Oriented Approach
E.A. Oladimeji, S. Supakkul, and L. Chung (USA)
|
Abstract
|
|
514-026
|
Integral
Traceability Model for Reusing NFRs in the Software Development Process
A. Fraga and J. Llorens (Spain)
|
Abstract
|
|
514-036
|
Non Visual Widgets as Reusable Components
A. Bouraoui (Tunisia)
|
Abstract
|
|
514-042
|
Simple
Focused DesignTM and Human Computer Interaction Theory
D. Dennie (USA)
|
Abstract
|
|
514-049
|
Predicting Value-Creation in Software Project Complexity
J.K. Balikuddembe and A.E. Potgieter (South Africa)
|
Abstract
|
|
514-050
|
Using Non-Linear Metamodel Hierarchies for the Rapid Development of Domain-Specific MDD Tools
R. Gitzel and M. Schwind (Germany)
|
Abstract
|
|
514-055
|
On the Membership Problem for Multivalued Dependencies in XML
G. Liu, L. Rong, J. Yu, and X. Yu (PRC)
|
Abstract
|
|
514-057
|
Defects Reports in Open Source Software Maintenance Process - OpenOffice.org Case Study
T. Koponen, H. Lintula, and V. Hotti (Finland)
|
Abstract
|
|
514-064
|
Formal
Approach to Instantiating Core Assets in Product Line Engineering
S.K. Shin, J.S. Her, and S.D. Kim (Korea)
|
Abstract
|
|
514-065
|
Usability
Prediction: A Fuzzy Approach
M.K. Donyaee, J. Rilling, and A. Seffah (Canada)
|
Abstract
|
|
514-067
|
An Architecture for Context-Aware Mobile Applications
C. Simons and G. Wirtz (Germany)
|
Abstract
|
|
514-075
|
Towards Improved Software Engineering in Small and Medium-Sized Software Companies Through Focused Training
H.-M. Sihvonen and P. Savolainen (Finland)
|
Abstract
|
|
514-078
|
Simulation-based Internal Variable Range Coverage Metric and Test Generation Model
X. Cheng and M.S. Hsiao (USA)
|
Abstract
|
|
514-080
|
Metamodel of Requirements' Types Classifications for Improving the Software Development Process (SDP): An Ontological Approach
O. Hurtado, A. Fraga, J. Llorens, and I. Hernanz (Spain)
|
Abstract
|
|
514-081
|
An Empirical Comparison of Techniques for Extracting Concept Abbreviations from Identifiers
H. Feild, D. Binkley, and D. Lawrie (USA)
|
Abstract
|
|
514-086
|
An HCI Pattern Language
R.O. Badr and H.M. Hosny (Egypt)
|
Abstract
|
|
514-090
|
Design and Implementation of the Matilda Distributed UML Virtual Machine
H. Wada, J. Suzuki, M.M.B. Eadara, A. Malinowski and K. Oba (USA)
|
Abstract
|
|
514-095
|
Profile based Video Browsing for E-learning
S.C. Premaratne, D.D. Karunaratna, and K.P. Hewagamage (Sri Lanka)
|
Abstract
|
|
514-106
|
Dynamic Reconfiguration with QoS Management
Z. Zhao and W. Li (Australia)
|
Abstract
|
|
514-122
|
An MDA Approach to Model Comparison based on Semantics
J. Abd-Ali and K. El Guemhioui (Canada)
|
Abstract
|
|
514-126
|
An Approach for Selecting Software Development Methodologies
G. Touil and M. Ahmed-Nacer (Algeria)
|
Abstract
|
|
514-127
|
A Pattern-Driven
Software Performance Model
O.M. Khaled and H.M. Hosny (Egypt)
|
Abstract
|
|
514-135
|
A Model-based
Approach to Information Retrieval Systems Development
J. Ferreira, A. Silva, and J. Delgado (Portugal)
|
Abstract
|
|
514-137
|
Building
a Pattern Language using an Ontological Approach
H.M. Hosny and R.O. Badr (Egypt)
|
Abstract
|
|
514-147
|
A Test Path Generation Approach for Component Testing based on UML State Diagram
Y. Ma, J. Lu, and R. Zhao (PRC)
|
Abstract
|
|
514-150
|
Physical Domain Modeling for the Development of Dependable Embedded Systems
D.J. Domis, C. Schäfer, and M. Trapp (Germany)
|
Abstract
|
|
514-154
|
Ontology-based
Error Detection in Software Design: A Case Study
A.M. Hoss, D.L. Carver, and J.W. Burris (USA)
|
Abstract
|
|
514-041
|
Project
Management through Policy Monitoring
J. Tassé (Canada)
|
Abstract
|
|
514-083
|
Solving Business Analytic Problems in Java and C using Neural Networks
E.R. Jones (USA)
|
Abstract
|
|
514-119
|
Compositional Schedulability Analysis of Workflow using Timing Constraint Petri Nets
P. Li, Q. Gu, K. Cao, D. Chen (PRC), and J. Zhu (USA)
|
Abstract
|
|
514-144
|
Characters and User Interface Components Recognition from Desktop Digital Images
B.G. Vasudevan, R. Balakrishnan, and S. Agrawal (India)
|
Abstract
|
|
514-145
|
Supporting the Maintenance of Distributed Component-based Systems through the Creation of New Architecture Views
X. Fang (Japan)
|
Abstract
|
|
514-148
|
A Conceptual Model for Supporting Advanced Personalisation in M-Services Applications
E. Jembere, M.O. Adigun, S.S. Xulu, and O.J. Emuoyibofarhe (South Africa)
|
Abstract
|
|
514-164
|
Requirements Analysis in Ubiquitous Computing - Insights from End-User Surveys
Y. Du (Canada)
|
Abstract
|
|
514-801
|
Estimating Direct Return on Investment of Independent Verification and Validation using COCOMO-II
J.B. Dabney, G. Barber, and D. Ohi (USA)
|
Abstract
|
|