{"title":"Evaluation and Research of Strong Migration of Mobile Agent for Exploiting Type Inference","authors":"Donghong Qin, Zhi Li","doi":"10.1109/QSIC.2006.27","DOIUrl":"https://doi.org/10.1109/QSIC.2006.27","url":null,"abstract":"Strong migration of mobile agents is a study hotspot of the mobile agent system, which plays a basic and important role in studying and applying the technology of mobile agents. In this paper, we mainly focus on the technique for strong migration of mobile agent, and propose an approach to capture and reestablish the agent runtime state. This is achieved thanks to the use of type inference technique. We introduce the type-inference technique and describe the design and implementation details of agent strong migration prototype. We report on experiments conducted with our prototype, present a comparative performance evaluation of the main strong migration techniques","PeriodicalId":378310,"journal":{"name":"2006 Sixth International Conference on Quality Software (QSIC'06)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122552280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Industrial Perspective on the Usefulness of Design Rationale for Software Maintenance: A Survey","authors":"M. Babar, A. Tang, I. Gorton, Jun Han","doi":"10.1109/QSIC.2006.35","DOIUrl":"https://doi.org/10.1109/QSIC.2006.35","url":null,"abstract":"Software maintenance is widely known as a problematic area that may consume up to 80% of a software project's resources. It has been claimed that providing an effective mechanism to access design rationale (DR) has great potential to improve software maintenance processes. However, we postulate that the first step towards exploring the potential of DR for improving software maintenance should be to gain a better understanding of what DR means to practitioners, how valuable they consider DR to be and how they use DR. To determine the perceived usefulness of DR, we surveyed a large number of software designers. This exploratory study has discovered that practitioners recognize the importance of DR to understand existing designs and frequently use it to reason about proposed modifications. The results of this study establish that DR is perceived by practitioners to be useful and the efforts required to capture DR for the purpose of maintenance are worthwhile. The findings allow us to identify areas of further research on DR support that have the potential to improve the maintenance process","PeriodicalId":378310,"journal":{"name":"2006 Sixth International Conference on Quality Software (QSIC'06)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121653254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defect Prevention: A General Framework and Its Application","authors":"Li Meng, Xiaoyuan He, Sontakke Ashok","doi":"10.1109/QSIC.2006.22","DOIUrl":"https://doi.org/10.1109/QSIC.2006.22","url":null,"abstract":"Defect prevention in CMM and causal analysis and resolution in CMMI are focused on identifying the root cause of defects and preventing defects from recurring. Actions are expected at a project level as well as organization level. This paper provides a general framework of defect prevention activities which consists of organization structure, defect definition, defect prevention process and quality culture establishment. Implementation of defect prevention results in rapid and sustained improvement in software product quality which is evident from an example in Neusoft Group, where defect density in post release phase decreased from 0.85 defects/KLOC in 2000 to 0.1 defects/KLOC in 2005","PeriodicalId":378310,"journal":{"name":"2006 Sixth International Conference on Quality Software (QSIC'06)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115384178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Reflection Mechanism for Reusing Software Architecture","authors":"Ying Shi, Liang Zaoqing, Wang Junli, Wang Fudi","doi":"10.1109/QSIC.2006.5","DOIUrl":"https://doi.org/10.1109/QSIC.2006.5","url":null,"abstract":"Reusing software architecture and its constituents, which are a kind of coarse-grained software resources, are confronted with great difficulty. Reflection mechanism has been successfully applied in the reuse of code component, but scarcely applied in the reuse of architecture and its constituents. Architectural reflection is the computation performed by a system about its own architecture, and currently confined in the realm of the runtime management and dynamic evolution of software systems. This paper proposes a reflection mechanism supporting the reuse of architectural level design, which offers the information support for reusing the architecture and its constituents at design time of software architecture by modeling the meta-information about the base-level to construct a meta-level architecture. Moreover, this paper illustrates the approach to describing meta-level architecture of this reflection mechanism, and presents the solution of constructing this reflection mechanism in detail. Through this reflection mechanism, architects could accomplish the tasks of architecture design efficiently at software design stage, by reusing software architecture and its constituents","PeriodicalId":378310,"journal":{"name":"2006 Sixth International Conference on Quality Software (QSIC'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128406068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive Caching Mechanism for Web Services","authors":"Lei Li, Chunlei Niu, Haoran Zheng, Jun Wei","doi":"10.1109/QSIC.2006.9","DOIUrl":"https://doi.org/10.1109/QSIC.2006.9","url":null,"abstract":"Web services, with an emphasis on open standards and flexibility, can provide benefits over existing capital markets integration practices. However, Web services must first meet certain technical requirements including performance, security and so on. SOAP, based on extensible markup language (XML), inherits not only the advantages of XML, but its relatively poor performance. This makes SOAP a poor choice for many high-performance applications. Cache is effective approach for improving the round-trip time for request-response exchanges. At present, there are lots of researches on server side cache implementation for Web services have been presented, however, each of these studies has its own limitations and no one is the best in all situations. Focusing on these issues, this paper proposed a novel adaptive cache mechanism, which can choose an optimized cache implementation dynamically in the runtime. Moreover, this paper presented a fine-grained cache approach to obtain the further performance gain and design a cache key associated method to decrease the usage of memory. Through our experiments in this paper, we observed that our approach obtained a huge performance gain by incorporating the adaptive cache mechanism into the SOAP engine","PeriodicalId":378310,"journal":{"name":"2006 Sixth International Conference on Quality Software (QSIC'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130046738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Masahiro Nakano, K. Ogata, Masaki Nakamura, K. Futatsugi
{"title":"Automating Invariant Verification of Behavioral Specifications","authors":"Masahiro Nakano, K. Ogata, Masaki Nakamura, K. Futatsugi","doi":"10.1109/QSIC.2006.17","DOIUrl":"https://doi.org/10.1109/QSIC.2006.17","url":null,"abstract":"We describe a method of automating invariant verification of behavioral specifications, which are algebraic specifications of abstract machines. The proposed method is based on fixed-point computation, which is one of the standard techniques for automatic (invariant) verification. One notable feature of the proposed method is to find and use as lemmas state predicates whose invariant proofs may (even mutually) depend on other state predicates whose invariant proofs may not be completed. Creme is a tool based on the proposed method. We also report on a case study in which Creme proves fully automatically that the NSLPK authentication protocol satisfies the secrecy property","PeriodicalId":378310,"journal":{"name":"2006 Sixth International Conference on Quality Software (QSIC'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130789156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asynchronous Semantics and Anti-patterns for Interacting Web Services","authors":"Yongyan Zheng, P. Krause","doi":"10.1109/QSIC.2006.14","DOIUrl":"https://doi.org/10.1109/QSIC.2006.14","url":null,"abstract":"Web service is an emerging paradigm for distributed computing. First, in order to verify Web services rigorously, it is important to provide a formal semantics for the flow-based Web service language (WS). A suitable formal model should cover most features of the WS. The existing formal models either abstract from data, cover a simple subset of WS, or omit the interactions between certain components. This paper presents a Web service automaton, an extension of Mealy machine, to fulfill the formal model requirements of the Web service domain. Second, semantic compatibility checking between Web services is another important issue. The existing checking approaches are post-checking, where the compatibility is checked after composition. As a complement to post-checking, we proposes anti-patterns for Web service interactions as a pre-checking, so that certain incompatible Web services can be modified or re-selected in the earliest stages","PeriodicalId":378310,"journal":{"name":"2006 Sixth International Conference on Quality Software (QSIC'06)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132486960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Random Testing of Image Processing Applications","authors":"Johannes Mayer, Ralph Guderlei","doi":"10.1109/QSIC.2006.45","DOIUrl":"https://doi.org/10.1109/QSIC.2006.45","url":null,"abstract":"Testing image processing applications is a non-trivial task. Complex inputs have to be generated and complex test results have to be evaluated. In the present paper, models for random generation of images are proposed and compared. The study for their comparison uses mutants of one particular implementation of an image processing operator, namely an implementation of the Euclidean distance transform. Metamorphic relations, necessary properties, and special values are furthermore identified for this distance transform to enable automatic evaluation of test results. These criteria are also compared using mutation analysis. Based on the results, general hints are given on how to choose random models and automatically evaluate test results for testing in the field of image processing","PeriodicalId":378310,"journal":{"name":"2006 Sixth International Conference on Quality Software (QSIC'06)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132324650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Event-Driven Adaptive Differentiated Service Web Container Architecture","authors":"Li Yang, C. Ning-jiang, H. Tao","doi":"10.1109/QSIC.2006.12","DOIUrl":"https://doi.org/10.1109/QSIC.2006.12","url":null,"abstract":"Web container conforming to J2EE specification is adopted by more and more Web servers to provide dynamic content services for Internet-based applications. Web applications with complex business require Web container to provide differentiated services for requests from different clients according to role or payment, etc. However, most traditional Web containers still adopt the best-effort service mode. Some approaches such as admission control and priority scheduling have been provided to do with the problem, but they do not solve the problem completely for lack of the considerations in the architecture. This paper brings forward an event-driven adaptive differentiated service Web container architecture named EADWA. In EADWA, requests from clients are encapsulated into request events which connect a group of self-management units (SMU) to compose request process flow that is called SMU chain. EADWA provides both SMU-based and SMU chain-based differentiated services for requests from different clients according to SLA (Service Level Agreement) defined by application developer. In addition, SMU-based differentiated services can select proper differentiated service strategies adaptively. The experiments on prototype show the effect of EADWA","PeriodicalId":378310,"journal":{"name":"2006 Sixth International Conference on Quality Software (QSIC'06)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122286513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Software Engineering: a Rigorous Architectural Approach","authors":"J. Kramer","doi":"10.1109/QSIC.2006.23","DOIUrl":"https://doi.org/10.1109/QSIC.2006.23","url":null,"abstract":"The engineering of distributed software is a complex task which requires a rigorous approach. Software architectural (structural) concepts and principles are highly beneficial in specifying, designing, analysing, constructing and evolving distributed software. A rigorous architectural approach dictates formalisms and techniques that are compositional, components that are context independent and systems that can be constructed and evolved incrementally. This extended abstract overviews some of the underlying reasons for adopting this architectural approach and provides a brief \"rational history\" of our research work, together with some selected references","PeriodicalId":378310,"journal":{"name":"2006 Sixth International Conference on Quality Software (QSIC'06)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126867678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}