Kazuya Odagiri, Rihito Yaegashi, M. Tadauchi, N. Ishii
{"title":"Efficient User Support with DACS Scheme","authors":"Kazuya Odagiri, Rihito Yaegashi, M. Tadauchi, N. Ishii","doi":"10.1109/SERA.2007.82","DOIUrl":"https://doi.org/10.1109/SERA.2007.82","url":null,"abstract":"When operation and management in the university network are performed, various problems occur. As one of those problems, user support problems in the network are often shown. As an example, support at the time of changing setups of a client computer by a user, is described. In this case, it take trouble very much for a system administrator because it is often necessary to support individual users, respectively. As another example, it is necessary to take some measure for annoying communication to other users. In this case, much time and effort are spent to specify where the client with annoying communication is under the management by DHCP service. To simplify user supports such as those cases, a new user support by DACS (destination addressing control system) scheme, which is an efficient scheme for the network operation and management in university network, is examined.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114168200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Simulation Testing Platform of Ad Hoc Network","authors":"Huang Xuyong, Miao Shihong, L. Pei","doi":"10.1109/SERA.2007.29","DOIUrl":"https://doi.org/10.1109/SERA.2007.29","url":null,"abstract":"For the requirement of QoS (reliability, delay etc) in power system, performance of ad hoc networks should be testified by experiments. Till recently, performances of ad hoc network are mostly tested by simulation software, such as NS, OPNET etc. But a lot of practical factors can't be taken into account in simulation software. For example, obstacles, electromagnetic interferences, and so on. Utilized NDIS (network driver interface specification) intermediate driver and Passthru architecture, a simulation testing platform of wireless ad hoc networks is presented. The characteristic and the application prospects of the platform are introduced finally.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114666342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis the priority of security requirement items for the process improvement by ISO/IEC 15504 and ISO/IEC 15408","authors":"Eun-Ser Lee, Haeng-Kon Kim, Sun-myoung Hwang","doi":"10.1109/SERA.2007.54","DOIUrl":"https://doi.org/10.1109/SERA.2007.54","url":null,"abstract":"A software process can be characterized as the ISO/IEC 15504. A common process framework is established by defining a small number of framework activities that are applicable to all software projects, regardless of their size or complexity. There are many risk items of the project development that cause the process maturity level occurring in the quality problems during process management and project progress. This paper designs the opportunity tree that management of security requirement the current domain and their problems solution as well. And this paper reference ISO/IEC 15504 and ISO/IEC 15408 as the international standard. In this paper, we propose a security requirement handing based approach considering security when developing system.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114204442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rigorous Vertical Software System Testing In IDE","authors":"Kwang-Ik Seo, Eun-Man Choi","doi":"10.1109/SERA.2007.114","DOIUrl":"https://doi.org/10.1109/SERA.2007.114","url":null,"abstract":"As the size of software is getting huge, a cost for development is also increasing in a test stage as well as a development stage. To reduce the increasing cost, we need various engineering approaches in every development stage of software development life cycle. This paper researches a vertical test method which connects a system test level and a integration test level in a test stage by using UML. We study traceability between system test cases, integration test cases, and source code and a method to curtail expenses during communications between developers and test engineers.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124467567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communication of Business's and Software Engineers","authors":"D. Dupuis, R. Lee, Haeng-Kon Kim","doi":"10.1109/SERA.2007.64","DOIUrl":"https://doi.org/10.1109/SERA.2007.64","url":null,"abstract":"Communications for the purpose of creating useful software are imperative. Techniques need to be in place to facilitate the flow of correct information from the requestor, and the creator. Without this the software will be of little use and discarded before it should be. In this paper we will present a systematic way to creating a question and answer flow of information. Details of the difference are between using the question and answer system and not will be reported in various ways. Our results will show the increase in efficiency of software creation by having fewer changes later in the project and improved usefulness to the end user.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123984853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-Organizing Clusters for Routing Algorithm by Diffusing an Interest in Wireless Sensor Networks","authors":"Sangjoon Jung","doi":"10.1109/SERA.2007.118","DOIUrl":"https://doi.org/10.1109/SERA.2007.118","url":null,"abstract":"Traditional clustering methods have been investigated to enhance network manageability and to provide routing or multicasting scalability, since single-tier networks cause a specified node or router node to overload with too much data aggregation. We introduce a clustering strategy and self-organizing scheme for cluster-based wireless sensor networks, while maintaining the merits of a clustering approach. This scheme is a clustering method to configure cluster by diffusing an interest from a sink node. When a sink node diffuses an interest, every node decides which node is elected as a cluster head or intermediary node by sending and receiving messages. The first node receiving an interest is elected to become a cluster head and sends an advertisement message to the other nodes. Then another node receiving the advertisement message reports an acknowledgement message to the cluster head. The cluster head gathers information about cluster members and then organizes a cluster. The second node receiving first an advertisement message from the cluster head is elected as an intermediary node. When the node diffuses the interest, it is elected to be an intermediary node. The third node receiving an interest from the intermediary node can be elected to be another cluster head. The mechanism should continue to organize clusters until covering the whole network. Based on diffusing an interest, every node can participate in clusters and reports to a cluster head when receiving or sensing tasks.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130002903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web Service Security model Using CBD Architecture","authors":"Eun-Ju Park, Haeng-Kon Kim, R. Lee","doi":"10.1109/SERA.2007.135","DOIUrl":"https://doi.org/10.1109/SERA.2007.135","url":null,"abstract":"A Web services is programmable application logic accessible using standard Internet protocols. Web services combine the best aspects of component based development and the Web. like components, Web services represent black-box functionality that can be reused without knowing about how the service is implemented. Unlike current component technologies, Web services are not accessed via object-model-specific protocol. In this paper, we suggest the architecture development modeling and the Web integration architecture to develop Web service-security that is embodied in supplier on service oriented architecture (SOA). We also describe the various possibilities with which the components may be integrated well with applications have been explored and well-exposed using Web services. This paper focuses on integrating component based architecture modeling and Web services to enable the development and usage of facade and backside components through the Web by dynamically creating Web services-security for the functionalities of the components.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129439906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Internet Query Language based on Intuitionistic Linear Logic","authors":"Keehang Kwon, Jaewoo Kim, Jang-Wu Jo","doi":"10.1109/SERA.2007.50","DOIUrl":"https://doi.org/10.1109/SERA.2007.50","url":null,"abstract":"We propose an Internet query language based on intuitionistic linear logic. This language extends regular expressions with linear implications and additive (classical) conjunctions. To be precise, it allows goals of the form D -o G and G1&G2 where D is a text and G is a goal. The first goal is intended to be solved by adding D to the current text and then solving G. This goal is flexible in controlling the current text dynamically. The second goal is intended to be solved by solving both G1 and G2 from the current text. This goal is particularly useful for internet search.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124629551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UPnP based Service Discovery and Service Violation Handling for Distributed Fault Management in WBEM-based Network Management","authors":"S. Tursunova, Young-Tak Kim","doi":"10.1109/SERA.2007.131","DOIUrl":"https://doi.org/10.1109/SERA.2007.131","url":null,"abstract":"Fast fault recovery depends on immediate detection of occurred fault. In some case, it is rather difficult to determine the cause of a fault in order to provide fast fault restoration/isolation. Also, service level fault, such as service level agreement (SLA) violation may not be due to physical device failure. This paper explores in detail the aspects of service level fault detection. We present the design and implementation of service level fault detection mechanism with SLA in WBEM-based inter AS traffic engineering (TE). We changed existing service location protocol (SLP) based service discovery mechanism to universal plug and play (UPnP) based one, and extended existing providers with new UPnP Provider which has not been supported by OpenPegasus WBEM. We also designed DMTF MOF (managed object format) for service discovery for SLA management in order to handle service violation. UPnP event notification mechanism, service violation handling, and C++ based provider implementation on OpenPegasus WBEM for inter-AS TE is explained in detail.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121028102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation and Application of MVFs in Coverage for Coverage-Based NHPP SRGM Frameworks","authors":"T. Fujiwara, Joong-Yang Park, Jae-Heung Park","doi":"10.1109/SERA.2007.85","DOIUrl":"https://doi.org/10.1109/SERA.2007.85","url":null,"abstract":"Many non-homogeneous Poisson process software reliability growth models are characterized by their mean value functions. Mean value functions of coverage-based models are usually obtained as composite functions of the coverage growth function and the function relating the number of detected faults to the coverage. This paper performs empirical evaluation of the relationships between the number of detected faults and the coverage embedded in the coverage- based software reliability growth models. It is also illustrated that integration of well-performing coverage growth functions and relationships between the number of detected faults and the coverage produces well-performing mean value functions.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130808777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}