E. Teiniker, Stefan Mitterdorfer, L. Johnson, Christian Kreiner, Z. Kovács, R. Weiss
{"title":"A test-driven component development framework based on the CORBA component model","authors":"E. Teiniker, Stefan Mitterdorfer, L. Johnson, Christian Kreiner, Z. Kovács, R. Weiss","doi":"10.1109/CMPSAC.2003.1245371","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245371","url":null,"abstract":"Short product cycles and rapidly changing requirements are increasingly forcing developers to use agile development strategies like extreme programming and test-driven development. At the same time, hierarchical software design strategies such as component based software engineering are becoming necessary to overcome increasing software complexity. In this paper, we present a test-driven component development framework that encapsulates test code in a mirror component for automated testing during development, and as an executable semantic to simplify assessment and to increase trustworthiness of software systems.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125352071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A CC-based security engineering process evaluation model","authors":"Jongsook Lee, Jieun Lee, Seunghee Lee, Byoungju Choi","doi":"10.1109/CMPSAC.2003.1245332","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245332","url":null,"abstract":"Common criteria (CC) provides only the standard for evaluating information security product or system, namely target of evaluation (TOE). On the other hand, SSE-CMM provides the standard for security engineering process evaluation. Based on the CC, TOE's security quality may be assured, but its advantage is that the development process is neglected. SSE-CMM seems to assure the quality of TOE developed in an organization equipped with security engineering process, but the TOE developed in such environment cannot avoid CC-based security assurance evaluation. We propose an effective method of integrating two evaluation methods, CC and SSE-CMM, and develop CC-based assurance evaluation model, CC/spl I.bar/SSE-CMM. CC/spl I.bar/SSE-CMM presents the specific and realistically operable organizational security process maturity assessment and CC evaluation model.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125931069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enterprise application integration using a component-based architecture","authors":"P. Maheshwari","doi":"10.1109/CMPSAC.2003.1245395","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245395","url":null,"abstract":"Enterprise Application Integration (EAI) and Business-to-Business integration (B2B) leverage several key technologies including middleware and message brokers. However, an effective integration solution largely depends on the right combination of technologies that provide the glue between disparate applications. To build a technology infrastructure that can adapt to changes as the integration architecture evolves is crucial. The solution to the integration problem is forcing companies to think in distributed terms. In this paper, we show that a formula for successful deployment of an integrated organization is to have a technology infrastructure, consisting of a standard middleware and application server, that incorporates a distributed object infrastructure as well as platform to develop and integrate component-based applications. In particular, the paper evaluates the suitability of CORBA and EJBs as the enablers of EAI, and also the suitability of XML as a data definition and integration language.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121880911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kyung-Tae Lee, Inbum Jung, C. Choi, W. Choi, Sang-Wook Kim
{"title":"Design and implementation of a cache-conscious index manager for the Tachyon, a main memory DBMS","authors":"Kyung-Tae Lee, Inbum Jung, C. Choi, W. Choi, Sang-Wook Kim","doi":"10.1109/CMPSAC.2003.1245329","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245329","url":null,"abstract":"The main memory DBMS (MMDBMS) efficiently supports various database applications that require high performance since it employs main memory rather than disk as a primary storage. In this paper, we discuss the cache-conscious index manager of the Tachyon, a next generation MMDBMS. The index manager is an essential sub-component of a DBMS used to speed up the retrieval of objects from a large volume of a database in response to a certain search condition. Recently, the gap between the CPU processing and main memory access times is becoming much wider due to rapid advance of CPU technology. By devising data structures and algorithms that utilize the behavior of the cache in CPU, we are able to enhance the overall performance of MMDBMSs considerably. In this paper, we address the practical implementation issues and our solutions for them obtained in developing the cache-conscious index manager of the Tachyon. The main issues touched are (1) consideration of the cache behavior, (2) compact representation of an index entry, (3) support of variable-length keys, (4) support of multiple-attribute keys, (5) support of duplicated keys, and (6) definition of the system catalog for indexes. We also show the effectiveness of our approach through extensive experiments.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114351965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rapid verification of embedded systems using patterns","authors":"W. Tsai, Lian Yu, F. Zhu, R. Paul","doi":"10.1109/CMPSAC.2003.1245381","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245381","url":null,"abstract":"Verification pattern (VP) is a new technique to test embedded systems rapidly, and it has been used to test industrial safety-critical embedded systems successfully. The key concept of this approach is to classify system scenarios into patterns, and use the same code template to test all the scenarios of the same pattern. In this way, testing effort can be greatly reduced. This paper extends VPs so that they can fully interoperate with a formalized scenario model ACDATE. In this way, various static and dynamic analyses can be performed on system scenarios as well as on system patterns. Furthermore, this paper provides a mapping from system scenarios into temporal logic expressions. In this way, a practitioner can specify system constraints in scenarios, and follow the mapping to obtain the temporal logic expressions easily to perform formal model checking. This paper also provides an OO framework to support automated test script development from VPs. In this way, VPs can be used in an integrated process where both semi-formal analyses and formal techniques can be used together to develop mission-critical embedded applications.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126502092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Prasad, M. Weeks, Yanqing Zhang, A. Zelikovsky, S. Belkasim, Rajshekhar Sunderraman, V. Madisetti
{"title":"Toward an easy programming environment for implementing mobile applications: a fleet application case study using SyD middleware","authors":"S. Prasad, M. Weeks, Yanqing Zhang, A. Zelikovsky, S. Belkasim, Rajshekhar Sunderraman, V. Madisetti","doi":"10.1109/CMPSAC.2003.1245419","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245419","url":null,"abstract":"This paper describes the advantages of SyD (System on Mobile Devices), a middleware technology for mobile devices and e-services, in terms of technology and programming. Features of SyD are illustrated here through our prototype application, a complex communication system for a trucking fleet that operates an automated package delivery system. The fleet system has been implemented in three ways, with SOAP, with JDBC, and with SyD. Our implementation experience shows that SyD greatly simplifies coding by allowing heterogeneous devices, peer-to-peer communications, group transactions based on triggering events, and mobility support through proxies and directory service.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"73 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128972868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Device state recovery in non-volatile main memory systems","authors":"Ren Ohmura, N. Yamasaki, Y. Anzai","doi":"10.1109/CMPSAC.2003.1245316","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245316","url":null,"abstract":"This paper proposes a scheme to recover the state of peripheral devices in non-volatile main memory systems so that the system resumes its execution after an unpredictable power failure. Our scheme is software-based approach and accomplishes the recoverable system without complex hardware equipments. First, the requirements for maintaining consistency are discussed based on the concepts of distributed message-passing systems. Next, the application to a device driver is illustrated using an example. Experiments with UART and network devices showed that the system restarted properly after a power failure, and that system performance was barely decreased.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123045809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient defect estimation method for software defect curves","authors":"Chenggang Bai, K. Cai, T. Y. Chen","doi":"10.1109/CMPSAC.2003.1245391","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245391","url":null,"abstract":"Software defect curves describe the behavior of the estimate of the number of remaining software defects as software testing proceeds. They are of two possible patterns: single-trapezoidal-like curves or multiple-trapezoidal-like curves. In this paper we present some necessary and/or sufficient conditions for software defect curves of the Goel-Okumoto NHPP model. These conditions can be used to predict the effect of the detection and removal of a software defect on the variations of the estimates of the number of remaining defects. A field software reliability dataset is used to justify the trapezoidal shape of software defect curves and our theoretical analyses. The results presented in this paper may provide useful feedback information for assessing software testing progress and have potentials in the emerging area of software cybernetics that explores the interplay between software and control.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132983923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security issues for the semantic Web","authors":"B. Thuraisingham","doi":"10.1109/CMPSAC.2003.1245408","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245408","url":null,"abstract":"This paper first describes the developments in semantic Web and then provides an overview of secure semantic Web. In particular XML security, RDF security, and secure information integration and trust on the semantic Seb are discussed. Finally directions for research on secure semantic Web are provided.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132034634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An integrated approach to scatternet traffic management in Bluetooth ad hoc networks","authors":"L. L. Shek, Yu-Kwong Kwok","doi":"10.1109/CMPSAC.2003.1245374","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245374","url":null,"abstract":"Scatternet management remains to be one of the most crucial research issues for Bluetooth networks, despite that Bluetooth devices have proliferated in the commercial market. In this paper, we describe our proposed integrated scheme for effective scatternet management. Our proposed scheme contains four main mechanisms to address the different facets of the problem, namely compensation-based time-slot assignment (CTSA), traffic differentiation queueing (TDQ), adaptive master-slave switching (AMSS), and an enhanced AODV algorithm for ad hoc routing. We have built a comprehensive Bluetooth simulator and performed extensive simulations to evaluate the proposed IARTSS. We find that our proposed scheme can perform well under a wide variety of practical circumstances, and provides efficient and high performance intra-piconet and inter-piconet communications.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131991448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}