2008 Advanced Software Engineering and Its Applications最新文献

筛选
英文 中文
Progress and Quality Modeling of Requirements Analysis Based on Chaos 基于混沌的需求分析过程与质量建模
2008 Advanced Software Engineering and Its Applications Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.22
Junwei Ge, Yiqiu Fang
{"title":"Progress and Quality Modeling of Requirements Analysis Based on Chaos","authors":"Junwei Ge, Yiqiu Fang","doi":"10.1109/ASEA.2008.22","DOIUrl":"https://doi.org/10.1109/ASEA.2008.22","url":null,"abstract":"It is important and difficult for us to know the progress and quality of requirements analysis. We introduce chaos and software requirements complexity to the description of requirements decomposing, and get a method which can help us to evaluate the progress and quality. The model shows that requirements decomposing procedure has its own regular pattern which we can describe in a equation and track in a trajectory. The requirements analysis process of a software system can be taken as normal if its trajectory coincide with the model. We may be able to predict the time we need to finish all requirements decomposition in advance based on the model. We apply the method in the requirements analysis of homephone service management system, and the initial results show that the method is useful in the evaluation of requirements decomposition.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116249757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Garbage Collection Schemes for Flash-Based Linux Swap System 基于flash的Linux交换系统垃圾收集方案研究
2008 Advanced Software Engineering and Its Applications Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.55
Sohyang Ko, Seonsoo Jun, Kiyong Kim, Yeonseung Ryu
{"title":"Study on Garbage Collection Schemes for Flash-Based Linux Swap System","authors":"Sohyang Ko, Seonsoo Jun, Kiyong Kim, Yeonseung Ryu","doi":"10.1109/ASEA.2008.55","DOIUrl":"https://doi.org/10.1109/ASEA.2008.55","url":null,"abstract":"NAND flash memory based SSDs (solid state disks) have become an alternative storage device for future computer systems. Legacy operating system functionalities like file system and virtual memory system should be carefully re-designed since flash memory cannot be overwritten unless erased in advance. In this paper, we study the performance of garbage collection schemes when flash memory is used as the Linux swap storage. We have collected swap I/O traces from Linux kernel and performed trace-driven simulation. We found that Linux swap system must be re-designed in order to use flash memory as swap storage.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122083664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Factors Contribute to High Costs of Software Projects 导致软件项目高成本的因素
2008 Advanced Software Engineering and Its Applications Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.38
Jie Liu, Xiaobin Li
{"title":"Factors Contribute to High Costs of Software Projects","authors":"Jie Liu, Xiaobin Li","doi":"10.1109/ASEA.2008.38","DOIUrl":"https://doi.org/10.1109/ASEA.2008.38","url":null,"abstract":"In the software industry, an unsuccessful software development project bears the characteristics that it would have fewer features, be late, and be over budget. We participated in a project that suffered all the three characteristics. Looking back, we realized that we have made many wrong decisions. This paper, serving as a case study, discusses these mistakes, especially the major ones that contributed to the failure. The hope is that readers can benefit from the lessons we have learned in their future software development projects and have a better chance to make right decisions in similar situations.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124747409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Dynamic Impact Analysis Approach for Object-Oriented Programs 面向对象程序的动态影响分析方法
2008 Advanced Software Engineering and Its Applications Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.62
Lulu Huang, Yeong-Tae Song
{"title":"A Dynamic Impact Analysis Approach for Object-Oriented Programs","authors":"Lulu Huang, Yeong-Tae Song","doi":"10.1109/ASEA.2008.62","DOIUrl":"https://doi.org/10.1109/ASEA.2008.62","url":null,"abstract":"Dynamic impact analysis produces more precise results than static impact analysis [1]. However, existing dynamic impact analysis techniques [2,3,4] do not consider the differences of object-oriented (OO) programs from procedural programs. We introduced a dynamic impact analysis approach [5] for OO programs that considers the unique features of OO programs compared to procedural ones and the dependency relationships of OO runtime program entities. In this paper, we present the further improved approach with the ability to identify runtime OO inheritance relationships. Furthermore, we present the implementation of our approach - a tool named Javatrade dynamic impact analyzer (JDIA) that can perform dynamic impact analysis for Java programs residing in a local or a remote Java virtual machine (JVM). Empirical studies of JDIA are presented to show that our approach produces more precise results than the existing dynamic impact analysis techniques by performing dependency analysis.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115044822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Development of the Retargetable Tool Suite for Embedded Software 嵌入式软件可重定向工具套件的开发
2008 Advanced Software Engineering and Its Applications Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.10
K. Kwangman
{"title":"Development of the Retargetable Tool Suite for Embedded Software","authors":"K. Kwangman","doi":"10.1109/ASEA.2008.10","DOIUrl":"https://doi.org/10.1109/ASEA.2008.10","url":null,"abstract":"In order to construct the most suitable embedded software development environment, we design and implements the Retargetable Tool Suite for Embedded Software (RTS-ES) composed of target code generator, low power/energy optimizer, system simulator and debugger through the proposed Embedded Processor Description Language (EPDL).","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132767549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Three Dimensional Node Deployment for Sensor Network 传感器网络的三维节点部署
2008 Advanced Software Engineering and Its Applications Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.63
I. Choi, Jin Seok Park, Kyeong-hyo Lee, Byeong-Kyun Oh
{"title":"The Three Dimensional Node Deployment for Sensor Network","authors":"I. Choi, Jin Seok Park, Kyeong-hyo Lee, Byeong-Kyun Oh","doi":"10.1109/ASEA.2008.63","DOIUrl":"https://doi.org/10.1109/ASEA.2008.63","url":null,"abstract":"A low-power sensor node in WSN requires minimum consumption of energy. It is essential to establish key to reduce the effect when the sensor node is revealed. This paper propose the protocol of pairwise key establishment between sensor node. The proposed method increases the availability by clustering the network in three dimensional, which has smaller number of path and better energy efficiency than the plane allocation. This paper discusses the key management for secure communication between sensor nodes after sensor allocation. We propose the protocol of pairwise key establishment scheme using bivariate polynomial based on cluster in order to safety against attack by revealing of node. The proposed method guarantee the availability by clustering the network in three dimensional, which has smaller number of path and better energy efficiency.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116886181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
UML Modeling for the Workflow Engine Using Wf-XML Resource 使用Wf-XML资源的工作流引擎UML建模
2008 Advanced Software Engineering and Its Applications Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.50
Hyejin Jeong, Myung-Ju Shin, Yong-Sung Kim
{"title":"UML Modeling for the Workflow Engine Using Wf-XML Resource","authors":"Hyejin Jeong, Myung-Ju Shin, Yong-Sung Kim","doi":"10.1109/ASEA.2008.50","DOIUrl":"https://doi.org/10.1109/ASEA.2008.50","url":null,"abstract":"A series of business processes, based on Wf-XML, executing cooperatively and sharing information among customers, suppliers and business partners are used in electronic commerce. Wf-XML (Workflow-XML) is an asynchronous Web service protocol. A language defining XML-based protocol is suggested for the mutual linkage of the workflow engine. In this paper, the model is proposed to model the UML diagram on the resource model provided in Wf-XML to link different workflow engines. It facilitates understanding workflow for links and cooperation between enterprises.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115857209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CAWET: A Tool of Context-Aware Workflow with Hand-Held Devices CAWET:手持设备的上下文感知工作流工具
2008 Advanced Software Engineering and Its Applications Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.44
Peng Li, Yongyun Cho, Jaeyoung Choi
{"title":"CAWET: A Tool of Context-Aware Workflow with Hand-Held Devices","authors":"Peng Li, Yongyun Cho, Jaeyoung Choi","doi":"10.1109/ASEA.2008.44","DOIUrl":"https://doi.org/10.1109/ASEA.2008.44","url":null,"abstract":"Hand-held devices are rapidly becoming a common technology at work, school, and play. The technologies related with hand-held devices have widely applied to the areas of ubiquitous computing or embedded computing. In recent years, context-aware computing is rapidly developing and can bring important benefits such as interaction with computation by explicit acts of communication and implicit context. In this paper, we present CAWET (Context-Aware Workflow Editor Tool), a context-aware, adaptive and personalized development tool that can edit userpsilas current context information in ubiquitous computing environment through hand-held devices. In order to enhance the support offered by hand-held devices to users, enhanced convenience, more services and functionalities will be added into an initial workflow scenario without interfering workflow services. CAWET architecture provides context-aware information by using uWDL document as the context, which is not only used to express context data but also relation information among services into the fields of its nodes. The suggested CAWET uses an algorithm for context comparison between context sub-tree and userpsilas situation information. The algorithm selects a context that has values and types entirely equal to those of the userpsilas contexts.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130383532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Forensic Investigation for Suspects' Digital Evidences Using Image Categorization 基于图像分类的犯罪嫌疑人数字证据法医调查
2008 Advanced Software Engineering and Its Applications Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.19
Youngsoo Kim, Dowon Hong, Dong-Hyun Won
{"title":"A Forensic Investigation for Suspects' Digital Evidences Using Image Categorization","authors":"Youngsoo Kim, Dowon Hong, Dong-Hyun Won","doi":"10.1109/ASEA.2008.19","DOIUrl":"https://doi.org/10.1109/ASEA.2008.19","url":null,"abstract":"In computer crimes, even in general crimes, important evidence or clues are increasingly stored in a variety of electronic media, such as computer or mobile devices. The digital data is easily duplicated and it is difficult to discriminate the original from a copy. Further, the digital data can be easily falsified, changed, or deleted from the original data. Therefore, criminal investigations need high level forensic technologies to get better evidences from digital data in suspectspsila computers. This paper is about forensic analyses for digital evidences including a lot of images like pictures and photos. Usually forensic examiners open to check every image files included at hard disks of suspectspsila computers or memory cards. If they have huge amount of images, it takes too much time to check and analyze them. Therefore we use an image filter applying a learning model to divide them into some categories automatically. Through this way, forensic examiners can check out only related image files and then reduce analyzing time. Since, in advance, forensic examiners make some categories for classifying images and input and learn huge amount of image samples to this image filter, accuracy for classifying image files could be improved.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131775464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Formal Representations of the Data Flow Diagram: A Survey 数据流程图的形式化表示:综述
2008 Advanced Software Engineering and Its Applications Pub Date : 2008-12-13 DOI: 10.1109/ASEA.2008.34
A.A.A. Jilanic, A. Nadeem, Tai-hoon Kim, Eun-suk Cho
{"title":"Formal Representations of the Data Flow Diagram: A Survey","authors":"A.A.A. Jilanic, A. Nadeem, Tai-hoon Kim, Eun-suk Cho","doi":"10.1109/ASEA.2008.34","DOIUrl":"https://doi.org/10.1109/ASEA.2008.34","url":null,"abstract":"Structured analysis and design methodology has now been replaced by object oriented analysis and design software development techniques. A major design artifact in structured approach is the data flow diagram (DFD). DFD is very important for the modernization of old legacy systems. It is also very useful in requirement elicitation. However, DFD lacks formalism and by representing DFD formally, ambiguity and inconsistencies can be removed. Formal representation of DFD and its formal semantics help in better understanding of requirements and design. In this paper, we present a survey of techniques that formally represent or give formal semantics to the data flow diagram. We analyze formal representation techniques using analysis parameters. On the basis of identified parameters, we present an analysis table, which describes the strengths and weaknesses of representation techniques.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134219817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信