{"title":"SAT based Verification Tool for Labeled Transition System","authors":"S. Park, Gihwon Kwon","doi":"10.1109/SERA.2007.117","DOIUrl":"https://doi.org/10.1109/SERA.2007.117","url":null,"abstract":"Multi-threaded Java programming such as an internet server program is difficult, because it is hard to detect subtle errors within multi-threading. LTSA is a too/for modeling and analyzing for catching some kinds of thread bugs, but still there remains scalability problem to deal with bigger applications. In this paper, we introduce a SAT based verification tool for Labeled Transition System and we explain LTS semantics and their CNF encoding. To verify large model, we focus our attention on efficient encoding for given model. In our tool, the property to be checked is expressed by either LTS or LTL formula based on Fluent. In order to solve a problem, LTSs and property are represented with CNF formulae, the input format to SAT-solver.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126866360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PostB: The Post-condition Extension onto the B-Method","authors":"Shuaiqiang Wang, Ying Li, Guodong Huang","doi":"10.1109/SERA.2007.107","DOIUrl":"https://doi.org/10.1109/SERA.2007.107","url":null,"abstract":"In the traditional B-method, operations are designed only by pre-conditions and a series of substitutions, and it works well. However, with the appearance and development of the modeling by the integration of semi-formal methods (especially UML) and formal methods, the condition changes. Without the formal notations interrelated to the post-condition, B-method cannot be embedded into UML models conveniently and flexibly in order to exert all its powers to describe systems exactly. This conditions indeed limit the adoption of B, and it is really necessary to extend the correlative definitions and properties. Therefore, this paper proposes the PostB, the extension referred to the formal notations of the post-condition to the B method, as well as the extended set-theorem models and proof obligations referred to it.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116508136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Changryul Jung, B. Sudhakar, Sungkeun Lee, Jin-Gwang Koh
{"title":"Implementation of ebXML Message Transaction supported on a Security and Reliability for Effective e-Business","authors":"Changryul Jung, B. Sudhakar, Sungkeun Lee, Jin-Gwang Koh","doi":"10.1109/SERA.2007.95","DOIUrl":"https://doi.org/10.1109/SERA.2007.95","url":null,"abstract":"In this paper, we propose the development strategy of message transaction system in electronic business to business system with consideration of security. B2B must be designed to transfer electronic data between business and business in completely secured and reliable form. For the purpose of secured and reliable transaction of electronic data, we propose the complete framework . Also, we provide message system for communication and transaction for E-business, and provide message test set through the development strategy for interoperability of message. The message test set is a data class modeling of ebXML MSH(message service handler) which supports message test set to ebXML message transaction of e-business. Finally, we implemented the message processing system through SMTP Mail transaction into ebMSH for the ebXML Message Test-Set for message service transaction after database relationship.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114855514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TODD: Test-Oriented Development and Debugging","authors":"Oliver Dagenais, D. Deugo","doi":"10.1109/SERA.2007.127","DOIUrl":"https://doi.org/10.1109/SERA.2007.127","url":null,"abstract":"The benefits of test-driven development (TDD) can be appealing to many seeking to reduce the amount of time spent on a software project, but not all projects can implement the TDD methodology fully. A technique similar to TDD - test oriented development - is introduced and a prototype software implementation in the form of an eclipse plug-in is presented to support the adoption of this more pragmatic approach by developers to help them write high quality software.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129953720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Developments on Recurrent Neural Networks Training","authors":"Suwat Pattamavorakun, Suwarin Pattamavorakun","doi":"10.1109/SERA.2007.102","DOIUrl":"https://doi.org/10.1109/SERA.2007.102","url":null,"abstract":"A new algorithm is proposed for improving the convergence of recurrent neural networks. This algorithm is obtained by combining the methods of weight update of Atiya-Parlos algorithm (the algorithm find the direction of weight change by approximation), and Y-N algorithm technique (the algorithm estimate fictitious target signals of hidden nodes to update hidden weight separately from output weights), and then by adding the error self-recurrent (ESR) network to improve the error functions (to speed up the convergence and not sensitive to initial weight by calculating the errors from output unit and then these errors are fed back for determining weight updates of output unit nodes). The results showed that both fully RNN and partially RNNs on some selected and the proposed algorithm could forecast the daily flow data quite satisfactorily.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128432264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"XML Auto-Transformation System for Ubiquitous Port using RFID Technology","authors":"Jaehong Ahn, Kyeongrim Ahn, Kyoungrog Yi, Jin-Wook Chung","doi":"10.1109/SERA.2007.136","DOIUrl":"https://doi.org/10.1109/SERA.2007.136","url":null,"abstract":"Ubiquitous business means to improve the business service and to create new business model under the environment which computing object is applied to real life and we can freely connect to network. As the related technology develops, the need of u-Business is rising in e-Business. Business formalities which are electronically processed through EDI or bar code, such as stock management, terminal gate management, container management, changes to the formalities using RFID. These formalities receive the sent input data through RDIF chip and antenna from RFID middleware, and transfer that data to server. In this paper, we propose the XML agent that transfers the input data to server and transfers the sent data from server to RFID middleware. The basic data form used at the proposed system is XML and the proposed system supports the converting functionality. The Converting functionality is to translate the received text to XML or XML to text. To provide the converting functionality, it is possible to migrate with various RFID antennas and middleware regardless of vendor. It also is able to migrate with the various information models as providing interface with server.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117130721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Rank-based Image Transformation Scheme using Entropy Coding in Gray-Level Images","authors":"Eun-Cheon Lim, Choon-Bo Shim, Kang-Soo You","doi":"10.1109/SERA.2007.44","DOIUrl":"https://doi.org/10.1109/SERA.2007.44","url":null,"abstract":"In this paper, we propose a rank-based image transformation scheme which is a pre-processing method for enabling more efficient compression of gray-level images by entropy encoder. For this, before we do entropy encoding on a stream of gray-level values in an image, the proposed method counts co-occurrence frequencies for neighboring pixel values. Then, it replaces each gray value with particularly ordered numbers based on the co-occurrence frequencies. Finally, the ordered number are transmitted to an entropy encoder. The pre-processing step enhances the statistical characteristic of the image transformation and thus improves the performance of entropy coding considerably. The result from our simulation using 8 bits gray-scale images shows that the proposed method can reduce bit rate by up to 37.85% compared with existing plain entropy coders.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122921131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Empirical Assessment of the Perception of Computer Security between US and Korea : Focused on Rootkits","authors":"H. Hwang","doi":"10.1109/SERA.2007.46","DOIUrl":"https://doi.org/10.1109/SERA.2007.46","url":null,"abstract":"The surveys were conducted from 400 students of five Korea and three U.S. universities to compare their knowledge and experience with various forms of malware.They provide an empirical assessment of the cross-cultural similarities and differences between students in the two countries. The variables examined include knowledge of computer viruses, spyware, and rootkits as well as perceptions of the damage that can result from various computer malware.While the two groups are similar with respect to their relative familiarity of rootkits compared with that of spyware and viruses, and in terms of how they perceive the malware knowledge of their peers, they exhibit significant differences in self-reported perceptions of rootkit familiarity. U.S. students report higher levels for all tested malware types, including the fictional \"Trilobyte\" virus. These comparisons reveal that little is known about rootkits today. However, there is hope for an accelerated rootkit awareness because of the rapid assimilation of Spyware knowledge in recent years.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121029158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human Interaction Web Model","authors":"M. Shafi, A. M. Zaidi, Abdur Rehman","doi":"10.1109/SERA.2007.90","DOIUrl":"https://doi.org/10.1109/SERA.2007.90","url":null,"abstract":"In today's customer-centric marketplace, live customer support has quickly become an essential tool that personalizes the Internet shopping experience and ensures customers a positive outcome. This paper proposes a new working model for provision of live online support services called the human interaction Web model (HIWM). The model is designed in such a way to ensure global deployment by the websites and at the same time encourage users to avail live support services while they are online. HIWM design proposes to make live support functionality independent of the Website by incorporating it within future version of the browsers and using it through proposed HIWM protocols. These proposed protocols will directly communicate with the Website support infrastructure i.e. call center. User interface for the proposed model is incorporated in the standard browser navigation tool bar which will be used for every Website on which the user avails live support services.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131684543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dead Code Elimination in CTOC","authors":"Ki-Tae Kim, Je-Min Kim, Weon-Hee Yoo","doi":"10.1109/SERA.2007.69","DOIUrl":"https://doi.org/10.1109/SERA.2007.69","url":null,"abstract":"Although the Java bytecode has numerous advantages, there are also shortcomings such as slow execution speed and difficulty in analysis. Therefore, in order for the Java class file to be effectively executed under the execution environment such as the network, it is necessary to convert it into optimized code. We implements CTOC. In order to statically determine the value and type, CTOC uses the SSA Form which separates the variable according to assignment. Also, it uses a tree form for statements. But, due to insertion of the Phi-function in the process of conversion into the SSA Form, the number of nodes increased. This paper shows the dead code elimination to obtain a more optimized code in SSA Form. We add new live field in each node and achieve dead code elimination in tree structures.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115928495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}