{"title":"A semantic-aware publish/subscribe system with RDF patterns","authors":"Jinling Wang, Beihong Jin, Jing Li, Danhua Shao","doi":"10.1109/CMPSAC.2004.1342818","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342818","url":null,"abstract":"The publish/subscribe paradigm provides a loosely coupled form of interaction that is well suitable for the large-scale distributed systems. In this paper, we introduce the semantic Web technologies into the publish/subscribe systems and propose a new type of publish/subscribe system. In the system, concept models are represented as ontologies, events are represented as RDF graphs, and subscriptions are represented as RDF graph patterns. The system can match events with subscriptions based on the semantics of events, and support events with complex data structures such as graphs","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130199008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach to generate the thin-threads from the UML diagrams","authors":"Xiaoqing Bai, C. Lam, Huaizhong Li","doi":"10.1109/CMPSAC.2004.1342893","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342893","url":null,"abstract":"Software testing plays a crucial role in assuring software quality. One of the most important issues in software testing research is the generation of the test cases. For scenario-based software testing, the thin-threads, which are the usage scenarios in a software system from the end user's point of view, are frequently used to generate test cases. However, the generation of the thin-threads is not an easy task. A scenario-based business model has to be manually derived or labor-intensive business analysis has to be manually carried out in order to extract the thin-threads from a software system. In this work, we propose an automated approach to directly generate thin-threads from the UML artifacts. The generated thin-threads can be used to generate and to prioritize the test cases for scenario-based software testing.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126961917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software test process control: status and future directions","authors":"Ghaffari Abu, Leeny Chacko, João W. Cangussu","doi":"10.1109/CMPSAC.2004.1342701","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342701","url":null,"abstract":"The modeling of the software test process using a state variable approach and the use of control theory concepts to regulate the process and calibrate the model has proven to be a valuable alternative for software process control. A description of the current status of the technique along with recent model improvements is presented. The architecture of a Web-based tool to hide the complexity of the model and algorithms and increase the applicability of the technique is also presented. Finally, the directions of future research toward improvement in the accuracy of the model and in the calibration algorithm are described.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127796043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lessons learned from the practice of mobile health application development","authors":"Robert Yu, Hui Yu","doi":"10.1109/CMPSAC.2004.1342675","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342675","url":null,"abstract":"This fast abstract briefly discusses lessons learned in terms of how to overcome limitations of PDA devices, effectively capture requirements for mobile health application development and effectively reengineer a desktop application on PDA. The limitation of PDA devices includes: (1) small screen size, which limits text-based data entry, reporting and browsing; (2) limited storage space and slow processing, which requires effective and efficient coding generation; (3) security limitations and inadequate third party application support, which poses challenge for application development. The corresponding strategies addressing the above challenges are: (1) providing check box, radio button, drop down list, text field, combo box based data entry and minimize text-based data entry, such as text area; (2) allocating as much as possible data storage, communication and computation tasks to the desktop system and minimize the function PDA component needs to handle, store data in file instead of database on PDA; (3) carefully selecting the device and implementation platform that supports development. To maximize the usability of PDA-based health application, the solution to be implemented on PDA ideally should be data management tasks with minimum text-based data entry and high frequency of recording. Challenges and solutions for software reengineering from desktop system to PDA-based application is outlined based on one application developed for World Health Organisation. In this example, the complex task of communication among PDA-based application, desktop system and the existent desktop application EpiData is effectively handled through the utilisation of XML files. A dynamic tool 'Questionnaire Designer' provides a completely dynamic user interface generation tool that could easily be handled by end user. The design idea for this application sets up a model for mobile health application with adequate flexibility of handling changing data management needs of end users.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129153838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web application bypass testing","authors":"A. Offutt, Ye Wu, Xiaochen Du, Hong Huang","doi":"10.1109/CMPSAC.2004.1342687","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342687","url":null,"abstract":"Input validation refers to checking user inputs to a program to ensure that they conform to expectations of the program. Input validation is used to check the format of numbers and strings, check the length of strings, and to ensure that strings do not contain invalid characters. Input validation testing (IVT) is particularly important for software that has a heavy reliance on user inputs, including Web applications. A common technique in Web applications is to perform input validation on the client by using HTML attributes and scripting languages such as JavaScript. An insidious problem with performing input validation on the client is that end users have the ability to bypass this validation. Bypass testing is a unique and novel way to create test cases that is available only because of the unusual mix of client-server, HTML GUI, and JavaScript technologies that are used in Web applications. This workshop paper presents the issues and concerns that allow bypass testing, the preliminary concepts behind the technique, and some early results on applying it. How effective and useful bypass testing can be in testing Web applications is determined through ongoing research and automation.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131582967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A decision-making model for intelligent agent with internal state","authors":"Shan-li Hu, Hai-Yan Wu","doi":"10.1109/CMPSAC.2004.1342668","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342668","url":null,"abstract":"Russell and Subramanian considered decision-making model of agent as an function, which maps environment sequence or percept to action. This depiction can't represent the effects of internal state of intelligent agent to action selection. Wooldridge considered internal state as basic condition of representing an intelligent agent. But in his decision-making model, action can affect internal state merely through changing environment. Thus, the internal state isn't suitable for including mental state of intelligent agents. Therefore, We put forward two decision-making models for intelligent agents with internal state. In these two models, the action of agents not only can affect environment, then affect the internal state of agents through the percept of environment, but also can directly affect the internal state itself. This depiction of internal state is fit to include the mental state of agent, thus provide a suitable model for the decision-making of intelligent agents.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"490 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132864250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative agent approach to quality assurance and testing Web software","authors":"Hong Zhu","doi":"10.1109/CMPSAC.2004.1342688","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342688","url":null,"abstract":"This work applies Lehman's theory of software evolution to analyse the characteristics of Web-based applications and identifies the essences and incidents that cause difficulties in developing high quality Web-based applications. It is argued that they belong to Lehman's E-type systems, hence satisfy Lehman's eight laws of software evolution. The uncertainties underlying the development of Web applications are analyzed and their implications are discussed. In order to support sustainable long term evolution of such systems, we proposed a cooperative multiagent system approach to support both development and maintenance activities. A prototype system with emphasis on testing and quality assurance is reported.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"58 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133170852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced security models for operating systems: a cryptographic approach","authors":"Christian N. Payne","doi":"10.1109/CMPSAC.2004.1342833","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342833","url":null,"abstract":"Security problems are increasing and, while existing systems are often found lacking, practical problems limit the adoption of more secure trusted systems. This paper describes a new operating system security model called Vaults utilising cryptography to provide dramatically enhanced security over existing systems. This approach provides many of the benefits of trusted system designs, while being more intuitive and applicable to varying security requirements","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124061855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A complete textual merging algorithm for software configuration management systems","authors":"Haifeng Shen, Chengzheng Sun","doi":"10.1109/CMPSAC.2004.1342846","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342846","url":null,"abstract":"Software configuration management (SCM) systems are very important for coordinating group efforts in developing large and complex software systems. The ability to support concurrent software development is the key to deliver high quality software with low time-to-market, where merging is the core enabling technique. Textual merging is the primary and the only successful merging function available in today's SCM systems. However none of them supports complete textual merging, which is not only very useful itself but also the foundation for syntactic and semantic textual merging. In this paper we propose a novel operation-based textual merging algorithm, which has the capability of supporting complete textual merging while still preserving the intentions of individual editing operations","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121336441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-dimension browse","authors":"Tsung-Yuan Liu, Yuh-Jzer Joung","doi":"10.1109/CMPSAC.2004.1342882","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342882","url":null,"abstract":"Conventional hierarchical organizations are inadequate in managing multi-dimensional artifacts such as publications. Much research has attempted at a more usable high dimensional information visualization and browsing experience, but has failed at the curse of dimensionality, exhibiting one or more of the following symptoms: (1) interface is unfamiliar, non-intuitive or cluttered; (2) dimensions viewable are limited or require to be in numeric domain; (3) update and/or browsing requires exponential time. This work proposes a hypercube artifact space model and an interactive browsing methodology, multi-dimension browse, which offers: (1) a familiar, intuitive and simple interface with summarization results; (2) browse against any and all dimensions; (3) update and browse costs linear in number of dimensions and artifacts respectively, and browse costs can be further reduced logarithmically on parallel platforms.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"67 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128684541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}