2010 IEEE 34th Annual Computer Software and Applications Conference Workshops最新文献

筛选
英文 中文
Using Coupling Measure Technique and Random Iterative Algorithm for Inter-Class Integration Test Order Problem 基于耦合度量技术和随机迭代算法的类间积分测试顺序问题
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.64
Zhengshan Wang, Bixin Li, Lulu Wang, M. Wang, Xufang Gong
{"title":"Using Coupling Measure Technique and Random Iterative Algorithm for Inter-Class Integration Test Order Problem","authors":"Zhengshan Wang, Bixin Li, Lulu Wang, M. Wang, Xufang Gong","doi":"10.1109/COMPSACW.2010.64","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.64","url":null,"abstract":"Inter-class integration test order (ICITO) problem is to determine the order in which classes are integrated and tested. It is very important in object-oriented software integration testing or regression testing, because different test orders need different test cost to construct corresponding test stubs. However, the current solutions to the ICITO problem lack an effective coupling measure technique to estimate test stub complexity, and lack an effective algorithm to break cycles. Thus, this paper uses an improved coupling measure technique to estimate test stub complexity, and designs a random iterative algorithm to break cycles. Simulation experimental results show that the overall test stub complexity can be reduced by 15.5% and the speed can be increased by 5.8 times, using our improved coupling measure technique and random iterative algorithm.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130177387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Middleware for Personal Smart Spaces 面向个人智能空间的中间件
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.59
Manal Al-Bahlal, J. Al-Muhtadi
{"title":"A Middleware for Personal Smart Spaces","authors":"Manal Al-Bahlal, J. Al-Muhtadi","doi":"10.1109/COMPSACW.2010.59","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.59","url":null,"abstract":"Ad hoc pervasive computing provides an attractive vision for future computing and smart spaces where digital and physical devices interact and share services seamlessly and transparently. In ad hoc pervasive environments, low cost, short-range wireless devices such as PDAs, mobile phones, and portable entertainment devices can provide instance access to information, share, and manage resources seamlessly and transparently. We propose a lightweight middleware for discovering ad hoc devices and bootstrapping a “Personal Smart Space,” which is an ad hoc pervasive environment, where components are discovered and managed seamlessly. The components communicate together without previous knowledge in order to run full-fledge pervasive applications. The middleware handles component failures and application component migration to prevent application interruptions as devices leave and join.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115014951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WS-Sim: A Web Service Simulation Toolset with Realistic Data Support WS-Sim:具有真实数据支持的Web服务模拟工具集
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.29
Wei She, I. Yen, B. Thuraisingham
{"title":"WS-Sim: A Web Service Simulation Toolset with Realistic Data Support","authors":"Wei She, I. Yen, B. Thuraisingham","doi":"10.1109/COMPSACW.2010.29","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.29","url":null,"abstract":"Service-oriented computing has become the most promising paradigm for system integration and interoperation. Many different models and mechanisms have been proposed to achieve security, dependability, real-time, etc. capabilities in service composition and execution. To facilitate the evaluation of these mechanisms, especially their performance impacts, it is generally desirable to have a web service simulation environment. However, many existing simulations are based on specific cases and specialized for evaluating specific mechanisms. In some cases, the simulations are based on randomly generated data to simulate the property of the simulated web services without the support of realistic data from actual web services and/or applications. In this paper, we take the first step towards building a general and more practical web service simulation system, WS-Sim. We explore many existing web services and various applications that can be readily wrapped into services and measure the statistical characteristics of their nonfunctional properties. Based on these measurements, we build a database of simulated web services and their nonfunctional property descriptions. We also develop a toolset to generate simulated web services and deploy them to support various simulation tasks, so as to evaluate the performance of various web service protocols.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115171439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Stakeholders-Driven Requirements Semantics Acquisition for Networked Software Systems 网络软件系统中涉众驱动的需求语义获取
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.76
Bin Wen, Peng Liang, K. He
{"title":"Stakeholders-Driven Requirements Semantics Acquisition for Networked Software Systems","authors":"Bin Wen, Peng Liang, K. He","doi":"10.1109/COMPSACW.2010.76","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.76","url":null,"abstract":"Large-scale and complex system exhibits adaptive feature, and evolutionary emergence of collective behaviors is its fundamental phenomena. Considering service oriented requirements engineering (SORE), this paper explores requirements semantics acquisition technique and analyzes its adaptive feature. The strategy of evolutionary growth to gain domain specific requirements semantics model is proposed. Also, this approach combines with folks and experts intelligence to create requirements semantics. The instantiation of semantics is performed based on this model. The semantic model can facilitate consistency check and reasoning for high-quality requirements. By employing the functions provided by semantic wikis, a stakeholders-driven semantics acquisition platform for pre requirements is designed. Apart from traditional documentary specification, on-demand semantics artifacts will be exported to the subsequent services aggregation and semantics-driven service customization.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130693859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Right Tool for the Right Job: Assessing Model Transformation Quality 正确的工具用于正确的工作:评估模型转换质量
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.22
M. V. Amstel
{"title":"The Right Tool for the Right Job: Assessing Model Transformation Quality","authors":"M. V. Amstel","doi":"10.1109/COMPSACW.2010.22","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.22","url":null,"abstract":"Model-Driven Engineering (MDE) is a software engineering discipline in which models play a central role. One of the key concepts of MDE is model transformations. Because of the crucial role of model transformations in MDE, they have to be treated in a similar way as traditional software artifacts. They have to be used by multiple developers, they have to be maintained according to changing requirements and they should preferably be reused. It is therefore necessary to define and assess their quality. In this paper, we give two definitions for two different views on the quality of model transformations. We will also give some examples of quality assessment techniques for model transformations. The paper concludes with an argument about which type of quality assessment technique is most suitable for either of the views on model transformation quality.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131347558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
T-Kernel/SS: A Secure Filesystem with Access Control Protection Using Tamper-Resistant Chip T-Kernel/SS:一个使用防篡改芯片的安全文件系统
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.32
T. Yashiro, M. Bessho, Shinsuke Kobayashi, N. Koshizuka, K. Sakamura
{"title":"T-Kernel/SS: A Secure Filesystem with Access Control Protection Using Tamper-Resistant Chip","authors":"T. Yashiro, M. Bessho, Shinsuke Kobayashi, N. Koshizuka, K. Sakamura","doi":"10.1109/COMPSACW.2010.32","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.32","url":null,"abstract":"We propose T-Kernel/SS (Secure Storage), a secure file system with access control protection using tamper-resistant chip. The main feature of our system is to protect access control from policy enforcement violation even when the operating system is replaced or when disks are peeked or tampered physically. Our approach consists in protecting access control by doing sensitive operations on tamper-resistant hardware with access control capabilities. This method is considered a replacement for kernel reference monitor, which cannot enforce access control in situations where secure file systems are designed to protect data confidentiality. As a proof-of-concept, we implemented a secure file system with access control protection. Evaluation results show that our file system can ensure access control in secure file systems which is usable for applications that require this feature.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134096820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Author Identification of Software Source Code with Program Dependence Graphs 用程序依赖图识别软件源代码的作者
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.56
Rong Chen, Lina Hong, Chunyan Lü, Wu Deng
{"title":"Author Identification of Software Source Code with Program Dependence Graphs","authors":"Rong Chen, Lina Hong, Chunyan Lü, Wu Deng","doi":"10.1109/COMPSACW.2010.56","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.56","url":null,"abstract":"With the significant increase of computer and Internet based crimes, it becomes increasingly important to have techniques that can be applied in a legal setting to assist the court in making judgements about malware, theft of code and computer fraud. To better deal with author identification of software, we propose a semantic approach to identifying authorship through the comparison of program data flows. To do so, we compute program dependences, compute program similarity if detecting theft of code is needed, and thus query about not only the syntactic structure of programs but also the data flow within in order to discriminate authors. The experimental result reveals that our technique is more robust even with some intentional code modifications.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130742811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The Case for Content Search of VM Clouds 虚拟机云内容搜索案例
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.97
M. Satyanarayanan, Wolfgang Richter, Glenn Ammons, J. Harkes, Adam Goode
{"title":"The Case for Content Search of VM Clouds","authors":"M. Satyanarayanan, Wolfgang Richter, Glenn Ammons, J. Harkes, Adam Goode","doi":"10.1109/COMPSACW.2010.97","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.97","url":null,"abstract":"The success of cloud computing can lead to large, centralized collections of virtual machine~(VM) images. The ability to interactively search these VM images at a high semantic level emerges as an important capability. This paper examines the opportunities and challenges in creating such a search capability, and presents early evidence of its feasibility.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124835046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Optimizing Software Quality Assurance 优化软件质量保证
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.25
O. Alshathry, H. Janicke
{"title":"Optimizing Software Quality Assurance","authors":"O. Alshathry, H. Janicke","doi":"10.1109/COMPSACW.2010.25","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.25","url":null,"abstract":"A major concern for managers of software projects are the triple constraints of cost, schedule and quality due to the difficulties to quantify accurately the trade-offs between them. Project managers working for accredited companies with a high maturity will typically use software cost estimation models like COCOMO II and predict software quality by the estimated number of defects the product is likely to contain at release. However, most of these models are used separately and the interplay between cost/effort estimation, project scheduling and the resultant quality of the software product is not well understood. In this paper, we propose a regression-based model that allows project managers to estimate the trade-off between the quality, cost and development time of a software product, based on previously collected data.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124275365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Message Oriented Middleware Support for Mobile Ad Hoc Data Sharing 面向消息的中间件支持移动Ad Hoc数据共享
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.60
Hongjun Yu, Rong Chen, Zhenjun Du
{"title":"Message Oriented Middleware Support for Mobile Ad Hoc Data Sharing","authors":"Hongjun Yu, Rong Chen, Zhenjun Du","doi":"10.1109/COMPSACW.2010.60","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.60","url":null,"abstract":"Message oriented middleware (MOM) is an infrastructure of message passing on wired networks that supports integrity of application modules distributed over heterogeneous platforms. MOM service for mobile computing have become of increasing concern, in particular, with the development of wireless network and the popularity of mobile devices. However, re-using traditional MOM has to deal with problems arisen in mobile computing environments, i.e., low bandwidth, low power, mobility and limited computing resources. In this paper, we propose a mobile MOM framework in support of data sharing in a mobile computing environment. In our mobile MOM, XML-coded data are enveloped in messages, passed thought a mobile host dynamically and asynchronously connected with MOMs executed on fixed hosts, then shared among a grouped mobile hosts by using replication and reconciliation over ad-hoc networks. Experimental results show our mobile MOM system enables transparent sharing of XML data across heterogeneous mobile hosts, allowing a level of fault-tolerance using message queues and data integrity using conflict resolution schemes.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125798828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信