Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003最新文献

筛选
英文 中文
A reengineering process for migrating from an object-oriented legacy system to a component-based system 用于从面向对象的遗留系统迁移到基于组件的系统的再工程过程
Eunjoo Lee, Byungjeong Lee, Woochang Shin, Chisu Wu
{"title":"A reengineering process for migrating from an object-oriented legacy system to a component-based system","authors":"Eunjoo Lee, Byungjeong Lee, Woochang Shin, Chisu Wu","doi":"10.1109/CMPSAC.2003.1245362","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245362","url":null,"abstract":"Computing environments are evolving from mainframe systems to distributed systems. Stand-alone programs that have been developed using object-oriented technology are not suitable for these new environments. However, programs that have been developed using a component-based technology have proven to be more suitable for the new environments due to their granularity and reusability. In this paper, we present a reengineering process for migrating from an object-oriented legacy system to a component-based system. This process consists of two steps: first, to create basic components with the relationship of their constituent classes, second, to refine components using the metrics we propose.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131875341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Policy-based separation of concerns for dynamic code mobility management 基于策略的关注点分离,用于动态代码移动性管理
R. Montanari, G. Tonti, C. Stefanelli
{"title":"Policy-based separation of concerns for dynamic code mobility management","authors":"R. Montanari, G. Tonti, C. Stefanelli","doi":"10.1109/CMPSAC.2003.1245325","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245325","url":null,"abstract":"The convergence between the Internet and telecommunication systems promotes an integrated scenario characterized by different flavors of mobility. Users can connect to the network from ubiquitous points of attachment and wireless portable devices can roam by maintaining continuous connectivity. Novel middleware technologies based on code mobility has the potential to enhance service provisioning to mobile users/devices. However, code mobility adds complexity to the design of applications and calls for new approaches for the programming of code mobility strategies. Separation between mobility and computational concerns is crucial to reduce the complexity of code mobility control and to favor rapid mobile code-based service prototyping, run-time configuration and maintenance. To achieve the needed degree of separation of concerns the paper advocates the adoption of policies and proposes a policy-based framework for dynamic code mobility management. In addition, the paper explores a reflective-based approach to mobility control and compares policy with reflective-based programming solutions to point out the main differences and lessons learned.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116154550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Just what could possibly go wrong in B2B integration? B2B集成中可能出现的问题是什么?
Dean Kuo, A. Fekete, P. Greenfield, Julian Jang, D. Palmer
{"title":"Just what could possibly go wrong in B2B integration?","authors":"Dean Kuo, A. Fekete, P. Greenfield, Julian Jang, D. Palmer","doi":"10.1109/CMPSAC.2003.1245393","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245393","url":null,"abstract":"One important trend in enterprise-scale IT has been the increasing use of business-business integration (B2Bi) technologies to automate business processes that cross organizational boundaries, such as the interactions between partner companies along a supply chain. It is relatively easy to describe a pattern of interaction, or choreography, in the case where everything proceeds smoothly. However, the abnormal cases, such as where a process fails or a message is lost, are much more complicated, and risk introducing data and process inconsistencies into computer-based systems. Current B2Bi technologies do not supply an infrastructure that can provide reliability without considerable sophistication from the architects and developers. As a first step towards guiding architects to the design of B2Bi systems that maintain consistency despite failures, this paper describes a variety of types of failure that can arise in practice, based on a realistic e-procurement scenario. We describe these failures in terms of the different types of state that naturally occur within the distributed system. Understanding the types of failure that need to be handled, or prevented, is essential to an architect or developer who must design and write handlers for all the exceptions that can occur in their workflows.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"8 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123725411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Recovering a business object model from a Web applications 从Web应用程序中恢复业务对象模型
G. D. Lucca, A. R. Fasolino, Porfirio Tramontana, U. D. Carlini
{"title":"Recovering a business object model from a Web applications","authors":"G. D. Lucca, A. R. Fasolino, Porfirio Tramontana, U. D. Carlini","doi":"10.1109/CMPSAC.2003.1245364","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245364","url":null,"abstract":"The growing market request for Web applications is forcing software industries to produce applications under the pressure of a short time-to-market and a strong competition, with the consequence that low quality and poor documented software is often produced. Maintaining, evolving or comprehending these applications are not straightforward tasks, and reverse engineering processes should be defined and validated to support them. In this paper a reverse engineering approach for reconstructing an object-oriented conceptual model of the application domain of a Web application is presented. The proposed approach defines a process that reconstructs the model in three steps. In each step, heuristic criteria exploiting source code analysis are used for the identification of objects and their relationships. Tools for implementing this method have been produced, and experiments for validating it have been carried out with the support of case studies. Experimental results showed the feasibility and the effectiveness of the proposed approach.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124794678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
IBHIS: integration broker for heterogeneous information sources IBHIS:异构信息源的集成代理
I. Kotsiopoulos, J. Keane, M. Turner, P. Layzell, F. Zhu
{"title":"IBHIS: integration broker for heterogeneous information sources","authors":"I. Kotsiopoulos, J. Keane, M. Turner, P. Layzell, F. Zhu","doi":"10.1109/CMPSAC.2003.1245368","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245368","url":null,"abstract":"Effective use of heterogeneous, distributed information in a coherent, integrated fashion has long been a \"holy grail\". The UK Health and Social care domain is an example where a global view is needed to facilitate decision making, whilst having ethical and legal concerns. The IBHIS project aims to provide an integrated broker that enables coherent use of a set of distributed, heterogeneous data sources, whilst ensuring trustworthiness and audit. This paper presents a service-oriented federated architecture for the IBHIS broker.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121152791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Automating checking of models built using a graphically based formal modeling language 自动检查使用基于图形的正式建模语言构建的模型
R. Walters
{"title":"Automating checking of models built using a graphically based formal modeling language","authors":"R. Walters","doi":"10.1109/CMPSAC.2003.1245327","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245327","url":null,"abstract":"RDT is a graphical formal modeling language in which the modeler works by constructing diagrams of the processes in their model which they join together to form complete systems. Aside from the benefits which accrue as a side effect of building a formal model of a proposed systems, these diagrammatic models can be useful as a means of communication between the development team and the users. However one of the greatest benefits of a formal model is that it can be subjected to rigorous examination to ensure that it satisfies properties required of the system. This paper describes the transformation used by the RDT toolset to generate Promela code (the input language of the SPIN model-checker) automatically from a model.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124140628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A dynamic information retrieval system for the Web Web动态信息检索系统
Xiangzhu Gao, S. Murugesan, Bruce W. N. Lo
{"title":"A dynamic information retrieval system for the Web","authors":"Xiangzhu Gao, S. Murugesan, Bruce W. N. Lo","doi":"10.1109/CMPSAC.2003.1245413","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245413","url":null,"abstract":"In conventional information retrieval (IR), documents in a collection are indexed before the retrieval process, and the document collection is generally static, organised and homogeneous. But, information on the Web is vast, dynamic, unorganised and heterogeneous. Current search engines and IR systems on the Web are based on the conventional indexing approach and have limitations including the need for frequent update of the index. We propose a non-indexing approach for information retrieval on the Web and show that the IR system based on this approach performs better than popular search engines.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126877195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Web-based support for managing large collections of software artefacts 用于管理大型软件工件集合的基于web的支持
C. Boldyreff, J. Brittle, C. Korhonen, Phyo Kyaw, J. Lavery, D. Nutter, S. Rank
{"title":"Web-based support for managing large collections of software artefacts","authors":"C. Boldyreff, J. Brittle, C. Korhonen, Phyo Kyaw, J. Lavery, D. Nutter, S. Rank","doi":"10.1109/CMPSAC.2003.1245416","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245416","url":null,"abstract":"There has been a long history of CASE tool development, with an underlying software repository at the heart of most systems. Usually such tools, even the more recently web-based systems, are focused on supporting individual projects within an enterprise or across a number of distributed sites. Little support for maintaining large heterogeneous collections of software artefacts across a number of projects has been developed. Within the GENESIS project, this has been a key consideration in the development of the Open Source Component Artefact Repository (OSCAR). Its most recent extensions are explicitly addressing the provision of cross project global views of large software collections as well as historical views of individual artefacts within a collection. The long-term benefits of such support can only be realised if OSCAR is widely adopted and various steps to facilitate this are described.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128083126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PeAgent - a mobile agent system to support secure Internet and Web applications PeAgent -一个移动代理系统,支持安全的Internet和Web应用
Qingkai Ma, Wei Hao, Wei Li, Manghui Tu, I. Yen
{"title":"PeAgent - a mobile agent system to support secure Internet and Web applications","authors":"Qingkai Ma, Wei Hao, Wei Li, Manghui Tu, I. Yen","doi":"10.1109/CMPSAC.2003.1245418","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245418","url":null,"abstract":"Many agent-based systems have been developed over the past decade; however, the security issues are usually not addressed adequately. In order to make the mobile agent paradigm more useful and acceptable for Web and Internet applications, the security considerations should go beyond the protection of basic agent execution environments. In this paper, we present the design of a robust Java-based mobile agent system, PeAgent. The PeAgent system not only incorporates a fine-grain agent privilege control mechanism, but also includes a multi-level protection mechanism that can be used throughout the life-cycle of agents. A two-level domain hierarchy is constructed to organize the large number of Internet nodes in the agent system into manageable units: the global/domain management unit (GMU/DMU). Each unit consists of a certification authority (CA) and a location manager (LM). The certificates issued from GMU and DMU define the access privileges on the PeAgent servers for each agent. A context hierarchy is built up on the PeAgent servers for fine-level resource access control and agent management. Overall, the PeAgent system provides a secure computing environment for widely distributed applications over a network of heterogeneous platforms. It also facilitates the development of secure Web-based applications.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"9 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133205149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A middleware service for secure group communication in mobile ad hoc networks 移动自组织网络中用于安全组通信的中间件服务
S. Yau, Xinyu Zhang
{"title":"A middleware service for secure group communication in mobile ad hoc networks","authors":"S. Yau, Xinyu Zhang","doi":"10.1109/CMPSAC.2003.1245315","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245315","url":null,"abstract":"Secure group communication in mobile ad hoc networks is often dynamic and impromptu, and thus requires efficient and automated secure group management and seamless and combination of secure groups with distributed applications running upon them. Existing approaches to secure group communication cannot satisfy these requirements. In this paper, an automated secure group management approach is presented. Based on this approach, a middleware service for secure group communication is developed to facilitate development and execution of distributed applications using secure group communication in mobile ad hoc networks. This middleware service is implemented in a context sensitive middleware RSCM.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133880398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信