{"title":"A supervised visual wrapper generator for Web-data extraction","authors":"Xiaofeng Meng, Haiyan Wang, Dongdong Hu, Chen Li","doi":"10.1109/CMPSAC.2003.1245412","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245412","url":null,"abstract":"Extracting data from Web pages using wrappers is a fundamental problem arising in a large variety of applications of vast practical interest. In this paper, we propose a novel schema-guided approach to wrapper generation. We provide a user-friendly interface that allows users to define the schema of the data to be extracted, and specifies mappings from a HTML page to the target schema. Based on the mappings, the system can automatically generate an extraction rule to extract data from the page. Our approach to wrapper generation can significantly reduce the work of human beings in this process. And the user never has to deal with the internal extraction rule, or even familiarity with the details of HTML.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123976736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Techniques and tools for automated safety analysis & decision support for redundancy allocation automotive systems","authors":"Y. Papadopoulos, C. Grante","doi":"10.1109/CMPSAC.2003.1245328","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245328","url":null,"abstract":"Recent growth in the area of model-based product development in the automotive industry means that system models in electronic form become increasingly more available as they progressively find more applications in the course of the development process. Such models, Matlab-Simulink models for example, are currently used for simulation, fault injection and source code generation. In our work, the utility of such models is pushed further into a hitherto unexplored area that of safety and reliability analysis. We propose a design process in which techniques for semi-automatic safety and reliability analysis of such models are combined with multi-criteria optimization techniques to assist the gradual development of designs that can meet set reliability and safety targets within pragmatic cost constraints. The proposed process relies on tools to automate some aspects of the design that we believe could be automated and thus simplified without any loss of the creative input in the process by designers.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"479 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123228369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facilitating secure ad hoc service discovery in public environments","authors":"Feng Zhu, M. Mutka, L. Ni","doi":"10.1109/CMPSAC.2003.1245376","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245376","url":null,"abstract":"Securely accessing unfamiliar services in public environments using ad hoc wireless networks is challenging. We present a proxy-based approach that uses other existing network channels to set up a secure and trust relationship between communication parties to facilitate ad hoc wireless communications. Based on a service discovery protocol, our models achieve secure, trusted, anonymous, efficient, and economical communications between unfamiliar parties. Our protocols are formally verified using BAN logic.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121467351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An architecture of wireless Web and dialogue system convergence for multimodal service interaction over converged networks","authors":"Feng Liu, J. J. Li, X. Shan, W. Chou","doi":"10.1109/CMPSAC.2003.1245388","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245388","url":null,"abstract":"This paper presents the software architecture for a new paradigm of wireless Web and dialogue system convergence and its corresponding approach to deliver multimodal multimedia enterprise communication services in the wireless environment. It uses an event-triggered service delivery method that separates service interaction and wireless web-based service delivery. A customized content presentation approach is adopted to transform the content of the service into a format suitable for presentation on the target devices. The system also contains a service delivery monitoring and backup mechanism, which is capable of sending the service content using other communication channels according to the user's preference and the channel conditions. A prototype system was implemented based on the proposed approach, which demonstrates the performance advantage of our method in the enterprise service application.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130047569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scenario architecture - a methodology to build a global view of OO software system","authors":"Y. E. Tsai, H. C. Jiau, K. Ssu","doi":"10.1109/CMPSAC.2003.1245378","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245378","url":null,"abstract":"OO software engineering (OOSE) has been a popular methodology for years; however, there are still some issues remaining unsolved: a generic mechanism for checking consistency of designs is still lacking; software has some problems resulting from process issue; and imperative engineer have a huge gap to adopt OOSE. These three issues intersect in the early analysis phase, therefore we represent a new methodology that provides a complete global view of OO software system that solves issues we identified, and uses requirements document and some analysis documents as foundation. Rules and a case study are also presented to exemplify the result of applying our methodology on both OOSE and imperative software engineering.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128938668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mockup-driven fast-prototyping methodology for Web requirements engineering","authors":"Jia Zhang, Carl K. Chang, Jen-Yao Chung","doi":"10.1109/CMPSAC.2003.1245352","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245352","url":null,"abstract":"Web application development differs from the development of traditional software in several significant ways; therefore requirements engineering for Web applications entails new demands accordingly. This paper proposes an extreme Web requirements engineering - mockup-driven fast-prototyping methodology to help elicit and finalize system requirements, as well as facilitate adjustment to quickly changing user requirements typical to Web applications. Supporting the inclusion of customer feedback early in the development process, this strategy minimizes the risk of wasting valuable development efforts because of ambiguous or incomplete specifications. Real-life experiences of the use of the methodology in industry are reported as examples.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117119142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Homeland security's cyber component: a survey of legal issues","authors":"J. Michael, T. Wingfield, Steven E. Roberts","doi":"10.1109/CMPSAC.2003.1245317","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245317","url":null,"abstract":"In this paper we discuss the legal developments related to the cyber aspects of homeland security. Through analysis of statutes, executive orders, and case studies, we highlight the rapid development of a new body of law and its consequences for the government, the private sector, and the public at-large.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128981452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dickson K. W. Chiu, D. Kok, Alex K. C. Lee, S. Cheung
{"title":"Integrating heterogeneous Web services with WebXcript","authors":"Dickson K. W. Chiu, D. Kok, Alex K. C. Lee, S. Cheung","doi":"10.1109/CMPSAC.2003.1245353","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245353","url":null,"abstract":"Despite recent uprising of the Web services technology for programmed interfaces of business-to-business (B2B) e-commerce services (e-services) over the Internet, most sites (e.g., online purchases) can only support Hypertext Markup Language (HTML) for human interactions through Web browsers. Automating client access to these services generally requires developing sophisticated programs to simulate human access by handling HTML pages and forms. However, these HTML interfaces vary across Web sites, and are often subjected to changes. Client maintenance is therefore tedious and expensive. This paper presents a novel approach to automate dialogs with Web-based services, using a high-level script language, called WebXcript. WebXcript provides features for HTML forms based dialogues and XML messaging. The XML syntax of WebXcript further enables convenient user authoring and easy engine development with extensively available XML tools. It supports expected responses and exception handling. We further propose a wrapper architecture to integrate heterogeneous Web services based on WebXcript. We demonstrate the applicability of our approach with examples in integrating distributed information, online ordering, and XML messaging.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122437091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lessons learned from software engineering multi-agent systems","authors":"D. Kung, Hitesh Bhambhani, Sheila Nwokoro, Wesam Okasha, Ravindra Kambalakatta, Praveen Sankuratri","doi":"10.1109/CMPSAC.2003.1245321","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245321","url":null,"abstract":"The popularity of agent-based systems has increased rapidly in recent years. A number of software engineering frameworks/methodologies have been proposed to support multi-agent systems construction. How well are software engineering methodologies in support of multi-agent systems development? What are the strengths and weaknesses of such attempts? In this paper, we report our experience from the application of a software engineering framework for multi-agent systems. The framework is rooted in the belief desire intention (BDI) formalism and an extension of the Unified Modeling Language (UML). Our focus is to present lessons learned by applying this framework to an agent-based intelligent elevator system. We also identify some research issues.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131175183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hierarchical strategy for testing Web-based applications and ensuring their reliability","authors":"J. Tian, Li Ma, Zhao Li, A. G. Koru","doi":"10.1109/CMPSAC.2003.1245420","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245420","url":null,"abstract":"After examining the specific problems of testing and quality assurance for Web-based applications, we propose a strategy by integrating existing testing techniques and reliability analyses in a hierarchical framework. This strategy combines various usage models for statistical testing to perform high level testing and to guide selective testing of critical and frequently used subparts or components using traditional coverage-based structural testing. Reliability analysis and risk identification form an integral part of this strategy to help assure and improve the overall reliability for Web-based applications. Some preliminary results are included to demonstrate the general viability and effectiveness of our approach.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132799103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}