Zhengshan Wang, Bixin Li, Lulu Wang, M. Wang, Xufang Gong
{"title":"Using Coupling Measure Technique and Random Iterative Algorithm for Inter-Class Integration Test Order Problem","authors":"Zhengshan Wang, Bixin Li, Lulu Wang, M. Wang, Xufang Gong","doi":"10.1109/COMPSACW.2010.64","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.64","url":null,"abstract":"Inter-class integration test order (ICITO) problem is to determine the order in which classes are integrated and tested. It is very important in object-oriented software integration testing or regression testing, because different test orders need different test cost to construct corresponding test stubs. However, the current solutions to the ICITO problem lack an effective coupling measure technique to estimate test stub complexity, and lack an effective algorithm to break cycles. Thus, this paper uses an improved coupling measure technique to estimate test stub complexity, and designs a random iterative algorithm to break cycles. Simulation experimental results show that the overall test stub complexity can be reduced by 15.5% and the speed can be increased by 5.8 times, using our improved coupling measure technique and random iterative algorithm.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130177387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Middleware for Personal Smart Spaces","authors":"Manal Al-Bahlal, J. Al-Muhtadi","doi":"10.1109/COMPSACW.2010.59","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.59","url":null,"abstract":"Ad hoc pervasive computing provides an attractive vision for future computing and smart spaces where digital and physical devices interact and share services seamlessly and transparently. In ad hoc pervasive environments, low cost, short-range wireless devices such as PDAs, mobile phones, and portable entertainment devices can provide instance access to information, share, and manage resources seamlessly and transparently. We propose a lightweight middleware for discovering ad hoc devices and bootstrapping a “Personal Smart Space,” which is an ad hoc pervasive environment, where components are discovered and managed seamlessly. The components communicate together without previous knowledge in order to run full-fledge pervasive applications. The middleware handles component failures and application component migration to prevent application interruptions as devices leave and join.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115014951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WS-Sim: A Web Service Simulation Toolset with Realistic Data Support","authors":"Wei She, I. Yen, B. Thuraisingham","doi":"10.1109/COMPSACW.2010.29","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.29","url":null,"abstract":"Service-oriented computing has become the most promising paradigm for system integration and interoperation. Many different models and mechanisms have been proposed to achieve security, dependability, real-time, etc. capabilities in service composition and execution. To facilitate the evaluation of these mechanisms, especially their performance impacts, it is generally desirable to have a web service simulation environment. However, many existing simulations are based on specific cases and specialized for evaluating specific mechanisms. In some cases, the simulations are based on randomly generated data to simulate the property of the simulated web services without the support of realistic data from actual web services and/or applications. In this paper, we take the first step towards building a general and more practical web service simulation system, WS-Sim. We explore many existing web services and various applications that can be readily wrapped into services and measure the statistical characteristics of their nonfunctional properties. Based on these measurements, we build a database of simulated web services and their nonfunctional property descriptions. We also develop a toolset to generate simulated web services and deploy them to support various simulation tasks, so as to evaluate the performance of various web service protocols.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115171439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stakeholders-Driven Requirements Semantics Acquisition for Networked Software Systems","authors":"Bin Wen, Peng Liang, K. He","doi":"10.1109/COMPSACW.2010.76","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.76","url":null,"abstract":"Large-scale and complex system exhibits adaptive feature, and evolutionary emergence of collective behaviors is its fundamental phenomena. Considering service oriented requirements engineering (SORE), this paper explores requirements semantics acquisition technique and analyzes its adaptive feature. The strategy of evolutionary growth to gain domain specific requirements semantics model is proposed. Also, this approach combines with folks and experts intelligence to create requirements semantics. The instantiation of semantics is performed based on this model. The semantic model can facilitate consistency check and reasoning for high-quality requirements. By employing the functions provided by semantic wikis, a stakeholders-driven semantics acquisition platform for pre requirements is designed. Apart from traditional documentary specification, on-demand semantics artifacts will be exported to the subsequent services aggregation and semantics-driven service customization.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130693859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Right Tool for the Right Job: Assessing Model Transformation Quality","authors":"M. V. Amstel","doi":"10.1109/COMPSACW.2010.22","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.22","url":null,"abstract":"Model-Driven Engineering (MDE) is a software engineering discipline in which models play a central role. One of the key concepts of MDE is model transformations. Because of the crucial role of model transformations in MDE, they have to be treated in a similar way as traditional software artifacts. They have to be used by multiple developers, they have to be maintained according to changing requirements and they should preferably be reused. It is therefore necessary to define and assess their quality. In this paper, we give two definitions for two different views on the quality of model transformations. We will also give some examples of quality assessment techniques for model transformations. The paper concludes with an argument about which type of quality assessment technique is most suitable for either of the views on model transformation quality.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131347558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Yashiro, M. Bessho, Shinsuke Kobayashi, N. Koshizuka, K. Sakamura
{"title":"T-Kernel/SS: A Secure Filesystem with Access Control Protection Using Tamper-Resistant Chip","authors":"T. Yashiro, M. Bessho, Shinsuke Kobayashi, N. Koshizuka, K. Sakamura","doi":"10.1109/COMPSACW.2010.32","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.32","url":null,"abstract":"We propose T-Kernel/SS (Secure Storage), a secure file system with access control protection using tamper-resistant chip. The main feature of our system is to protect access control from policy enforcement violation even when the operating system is replaced or when disks are peeked or tampered physically. Our approach consists in protecting access control by doing sensitive operations on tamper-resistant hardware with access control capabilities. This method is considered a replacement for kernel reference monitor, which cannot enforce access control in situations where secure file systems are designed to protect data confidentiality. As a proof-of-concept, we implemented a secure file system with access control protection. Evaluation results show that our file system can ensure access control in secure file systems which is usable for applications that require this feature.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134096820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Author Identification of Software Source Code with Program Dependence Graphs","authors":"Rong Chen, Lina Hong, Chunyan Lü, Wu Deng","doi":"10.1109/COMPSACW.2010.56","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.56","url":null,"abstract":"With the significant increase of computer and Internet based crimes, it becomes increasingly important to have techniques that can be applied in a legal setting to assist the court in making judgements about malware, theft of code and computer fraud. To better deal with author identification of software, we propose a semantic approach to identifying authorship through the comparison of program data flows. To do so, we compute program dependences, compute program similarity if detecting theft of code is needed, and thus query about not only the syntactic structure of programs but also the data flow within in order to discriminate authors. The experimental result reveals that our technique is more robust even with some intentional code modifications.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130742811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Satyanarayanan, Wolfgang Richter, Glenn Ammons, J. Harkes, Adam Goode
{"title":"The Case for Content Search of VM Clouds","authors":"M. Satyanarayanan, Wolfgang Richter, Glenn Ammons, J. Harkes, Adam Goode","doi":"10.1109/COMPSACW.2010.97","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.97","url":null,"abstract":"The success of cloud computing can lead to large, centralized collections of virtual machine~(VM) images. The ability to interactively search these VM images at a high semantic level emerges as an important capability. This paper examines the opportunities and challenges in creating such a search capability, and presents early evidence of its feasibility.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124835046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing Software Quality Assurance","authors":"O. Alshathry, H. Janicke","doi":"10.1109/COMPSACW.2010.25","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.25","url":null,"abstract":"A major concern for managers of software projects are the triple constraints of cost, schedule and quality due to the difficulties to quantify accurately the trade-offs between them. Project managers working for accredited companies with a high maturity will typically use software cost estimation models like COCOMO II and predict software quality by the estimated number of defects the product is likely to contain at release. However, most of these models are used separately and the interplay between cost/effort estimation, project scheduling and the resultant quality of the software product is not well understood. In this paper, we propose a regression-based model that allows project managers to estimate the trade-off between the quality, cost and development time of a software product, based on previously collected data.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124275365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message Oriented Middleware Support for Mobile Ad Hoc Data Sharing","authors":"Hongjun Yu, Rong Chen, Zhenjun Du","doi":"10.1109/COMPSACW.2010.60","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.60","url":null,"abstract":"Message oriented middleware (MOM) is an infrastructure of message passing on wired networks that supports integrity of application modules distributed over heterogeneous platforms. MOM service for mobile computing have become of increasing concern, in particular, with the development of wireless network and the popularity of mobile devices. However, re-using traditional MOM has to deal with problems arisen in mobile computing environments, i.e., low bandwidth, low power, mobility and limited computing resources. In this paper, we propose a mobile MOM framework in support of data sharing in a mobile computing environment. In our mobile MOM, XML-coded data are enveloped in messages, passed thought a mobile host dynamically and asynchronously connected with MOMs executed on fixed hosts, then shared among a grouped mobile hosts by using replication and reconciliation over ad-hoc networks. Experimental results show our mobile MOM system enables transparent sharing of XML data across heterogeneous mobile hosts, allowing a level of fault-tolerance using message queues and data integrity using conflict resolution schemes.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125798828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}