{"title":"Towards Unanticipated Adaptation: An Architecture-Based Approach","authors":"Bo Ding, Huaimin Wang, Dian-xi Shi, Xiang Rao","doi":"10.1109/SERA.2009.25","DOIUrl":"https://doi.org/10.1109/SERA.2009.25","url":null,"abstract":"Over its lifetime, adaptive software may have to deal with the environment not anticipated during the original development. In such cases, we should introduce new adaptive code, for example, to detect the strange contexts or update the out-of-date adaptation decision logic. This paper proposes an engineering approach facilitates this kind of post-delivery modifications based on software architecture techniques. Our approach introduces a component model separates different adaptation concerns (sensing, decision and execution) as different types of software architecture elements. The clear separation lays the foundation for the independent maintenance of each concern. And then, with the aid of a container supports the instantiation and run-time modification of the software architecture model, those concerns can be bound together without recompiling the whole software, even while it is running. Our approach enables the fine-grained, low-cost modifications of delivered adaptive software in the case that an unanticipated environment emerges.","PeriodicalId":333607,"journal":{"name":"2009 Seventh ACIS International Conference on Software Engineering Research, Management and Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115548385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adapting the NFR Framework to Aspectual Use-Case Driven Approach","authors":"Xiaomei Liu, Shulin Liu, Xiaojuan Zheng","doi":"10.1109/SERA.2009.31","DOIUrl":"https://doi.org/10.1109/SERA.2009.31","url":null,"abstract":"Aspect-Oriented Requirement Engineering (AORE) is a new approach of modulating requirements in order to discover crosscutting concerns in requirement phase and improve the degree of separation of concerns. In Aspectual Use-Case Driven Approach (AUC), the description of nonfunctional requirements is not specific enough. It should not be well mapped in implementation of the late development, thus it can not achieve a smooth transition between the system analysis and the design. In the NFR Framework approach, NFR is separate from dealing with functional requirements and can not be composed with functional requirements modeling. In this paper, it adapts the NFR Framework to AUC and the resulting method is called NFR/AUC method. NFR/AUC method not only identifies functional crosscutting concerns by template, but also can get the finer grain of the non-functional crosscutting concerns. Therefore, it achieves a smooth transition between the system analysis and the design.","PeriodicalId":333607,"journal":{"name":"2009 Seventh ACIS International Conference on Software Engineering Research, Management and Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131562009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Abstract Approach to Describing Scenario-Based Specifications","authors":"Zhongyu Chen, Huai-kou Miao","doi":"10.1109/SERA.2009.15","DOIUrl":"https://doi.org/10.1109/SERA.2009.15","url":null,"abstract":"Scenarios have been shown to be very helpful for requirements elicitation. However, they only capture partial behaviors of interaction among system component instances, and system behaviors are modeled by sequences of events. Such a behavioral model only captures parallel composition without synchronization in the sense that all the sequences of events are generated in an interleaving semantics. In this paper, we introduce a time model which is a category of time domains. We provide a trajectory model for the sequence of events. A trajectory describes precisely which events occur along the points of its time domain and show that categorial products allow us to compute parallel composition of behaviors with synchronization constraints. Our approach is helpful for broadening research vision of software engineering.","PeriodicalId":333607,"journal":{"name":"2009 Seventh ACIS International Conference on Software Engineering Research, Management and Applications","volume":"429 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133124352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linear Method for WLAN Positioning System","authors":"Yu-hong Liu, Yao-kuan Wang","doi":"10.1109/SERA.2009.16","DOIUrl":"https://doi.org/10.1109/SERA.2009.16","url":null,"abstract":"In this paper, a linear method is proposed to determine the distance according to RSSI, which avoids the traditional disadvantages of low effectiveness, high cost greatly. And two measures, first and second filtering, are taken to discard all the incorrect information and improve the accuracy for location.","PeriodicalId":333607,"journal":{"name":"2009 Seventh ACIS International Conference on Software Engineering Research, Management and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130148779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Data Mining System Using Multi-agent of e-Commerce","authors":"Qiang Wu","doi":"10.1109/SERA.2009.41","DOIUrl":"https://doi.org/10.1109/SERA.2009.41","url":null,"abstract":"The development of computer science and network technology, and the rapid emergence of e-commerce bring limitless business opportunity to trade company. For the trade company, any consumer-related information is very valuable, but searching for the enormous amount of data restricts the development of e-commerce. The combination of data mining technology with multi-Agent technology can decrease the amount of data transmission, lighten network load, improve mining performance and effectively guarantee the security of the data. This paper has introduced the performance of every Agent in detail and the basic thoughts of the mining method adopted. Furthermore, in view of the business backgrounds and characteristics of e-commerce trade, we design the data mining system based on Multi-Agent under the circumstance of e-commerce. It can achieve the goal of mining data accurately and effectively, and offer the personalized service to users, and improve operational efficiency for system.","PeriodicalId":333607,"journal":{"name":"2009 Seventh ACIS International Conference on Software Engineering Research, Management and Applications","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126971155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Hydropower Stations Optimal Operation Based on the Discrete Differential Dynamic Programming - Progressive Optimization Algorithm Combination Method","authors":"Xuan Yingji, Mei Yadong, Xu Jiangsong","doi":"10.1109/SERA.2009.26","DOIUrl":"https://doi.org/10.1109/SERA.2009.26","url":null,"abstract":"The progressive optimization algorithm over-depends on the initial state, it needs to assume certain different types of initial test strategies and corresponding initial test paths, the calculation process repeats 2 to 5 times. Considering the shortfalls mentioned above, this paper presents discrete differential dynamic programming-progressive optimum combination method which is applied in the operation of hydropower station and designs a solution based on the method to optimize the operation of hydropower stations. Calculation example shows that this method is effective, highly reliable in global optimization and full of prospects.","PeriodicalId":333607,"journal":{"name":"2009 Seventh ACIS International Conference on Software Engineering Research, Management and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122670471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cross Platform Test Management System for the SUDAAN Statistical Software Package","authors":"Donghui Wang, B. Barnwell, M. Witt","doi":"10.1109/SERA.2009.32","DOIUrl":"https://doi.org/10.1109/SERA.2009.32","url":null,"abstract":"Testing software can be particularly challenging for a small or mid-size firm interested in commercially distributing their software to a wide variety of users. Testing is clearly an important part of any software development life cycle (SDLC) because it provides a method for the developers to verify and validate the software. However, testing can be expensive and time-consuming, and creating a testing strategy that ensures a software product is 100% bug-free is unrealistic and impossible. This paper discusses the methodologies used to address one component of software testing by a small group of developers (essentially equivalent to a small firm) responsible for programming and distributing the SUDAAN® Statistical Software product. In addition we discuss SUDAAN’s bug management system. Specifically, this paper discusses issues related to testing and debugging software on multiple platforms and operating systems.","PeriodicalId":333607,"journal":{"name":"2009 Seventh ACIS International Conference on Software Engineering Research, Management and Applications","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131564968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Study of Multidimensional-Data Flow of Fishbone Applied for Data Mining","authors":"Yun Zhang, Weihua Li, Yang Chen","doi":"10.1109/SERA.2009.22","DOIUrl":"https://doi.org/10.1109/SERA.2009.22","url":null,"abstract":"Data Mining Driven Fishbone, which is whole a new term, is an enhancement of abstractive conception of multidimensional-data flow of fishbone applied for data mining to optimize the process and structure of data mining. End-to-end DMDF diagram includes complex dataflow and different processing component and improvements for numerous aspects in multiply level. DMDF provides integrated platform and mixed methodology to support the whole life cycle of data mining with comprehensive methodology. Data preprocessing, data Classification, Association rule mining and Prediction are the foundation and linkage of the whole data mining process life cycle. DMDF supports combination of different mining component from strategy level, tactical level to abstractive level, and then re-engineered data mining process into execution system to realize reasonable architecture. DMDF is a new direction of the structure of data mining process.","PeriodicalId":333607,"journal":{"name":"2009 Seventh ACIS International Conference on Software Engineering Research, Management and Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114453168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Array Bounds Check Elimination for Java Based on Sparse Representation","authors":"Keqiao Yang, Zeng Huang, Min Yang","doi":"10.1109/SERA.2009.11","DOIUrl":"https://doi.org/10.1109/SERA.2009.11","url":null,"abstract":"As a type-safe program language, Java requires bounds checks of array accesses. Whenever an array element is accessed, a cmp (compare) instruction is executed to check whether the index value is within the valid bounds. Array bounds checks may prevent many useful optimizations because of precise exception. We present a new ABCE (Array Bounds Check Elimination) algorithm to eliminate redundant checks based on sparse representation for a Java static compiler. In contrast to other approaches performing in JVMs, we adhere to the design principle of the static compiler to optimize scientific Java applications. The algorithm is a light-weight algorithm working on an intermediate representation in Static Single Assignment form. It fully removes bounds checks if it can be proven that they never fail. Whenever possible, it moves bounds checks out of loops to reduce the total number of executed checks. If such a check fails, the executing program branches into the unmodified loop to preserve the exception semantics of Java. For the scientific SciMark 2.0 benchmark suite, this algorithm removes on average 76% of bounds check instructions. The evaluation shows a speedup near to the theoretical maximum for LU test case.","PeriodicalId":333607,"journal":{"name":"2009 Seventh ACIS International Conference on Software Engineering Research, Management and Applications","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132657326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Extended Finite State Machine and Fault Tolerant Mechanism in Distributed Systems","authors":"Shengfa Gao, Xin Li, Ruihua Zhang","doi":"10.1109/SERA.2009.33","DOIUrl":"https://doi.org/10.1109/SERA.2009.33","url":null,"abstract":"Synchronization and fault tolerance of processes are emphasis in the distributed systems research, but only a few people involves in the mathematics model used in processes synchronization and fault tolerance yet. This paper takes distributed system as an event driven system, classify the events that cause system state variety into four classes, and proposed an Extended Finite State Machine (EFSM) with synchronization and fault tolerant message to the distributed system. Accordingly, a checkpoint set up algorithm based in this EFSM is proposed. During the establishing of the checkpoint, the consistency of checkpoint can be determined by calculating the number of sending and receiving messages. In case of lost message, sending and receiving process that lost message can be found by checking the number of sending and receiving messages, and the lost messages can be retransmitted and received. Thus the establishing of the distributed systems global state has been simplified.","PeriodicalId":333607,"journal":{"name":"2009 Seventh ACIS International Conference on Software Engineering Research, Management and Applications","volume":"360 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127952997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}