E-Book, Englisch, Band 59, 359 Seiten
Slezak / Kim / Kiumi Advances in Software Engineering
1. Auflage 2009
ISBN: 978-3-642-10619-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
International Conference on Advanced Software Engineering and Its Applications, ASEA 2009 Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings
E-Book, Englisch, Band 59, 359 Seiten
Reihe: Communications in Computer and Information Science
ISBN: 978-3-642-10619-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
This volume constitutes the refereed proceedings of the International Conference on Advanced Software Engineering and Its Applications, ASEA 2009, held as part of the Future Generation Information Technology Conference, FGIT 2009, on Jeju Island, Korea, in December 2009. The conference focuses on the various aspects of advances in advanced software engineering and its applications with computational sciences, mathematics and information technology.
Autoren/Hrsg.
Weitere Infos & Material
1;Foreword;5
2;Preface;7
3;Organization;8
4;Table of Contents;9
5;A Systematic Literature Review of Software Process Improvement in Small and Medium Web Companies;13
5.1;Introduction;13
5.2;Systematic Literature Review (SLR);14
5.2.1;Overview;14
5.2.2;Formulation of Research Questions;15
5.2.3;Identification of Relevant Literature;15
5.2.4;Study Quality Assessment;16
5.2.5;Data Extraction;17
5.3;Data Synthesis and Results of Systematic Literature Review;17
5.4;Discussion and Conclusions;18
5.5;References;19
6;An XCP Based Distributed Calibration System;21
6.1;Introduction;21
6.2;System Architecture;22
6.3;Implementation;23
6.3.1;TouCAN Driver Library;23
6.3.2;Command Handling Module;24
6.3.3;Synchronous Data Transfer;24
6.3.4;Event Channel Module;25
6.3.5;Power-Up Data Transfer;25
6.3.6;Flash Programming;25
6.4;Experiments;26
6.5;Conclusions;26
6.6;References;27
7;Structural and Behavioral Detection of Design Patterns;28
7.1;Introduction;28
7.2;Related Works;29
7.2.1;Current Pattern Identification Approaches;29
7.2.2;XML Document Retrieval;30
7.3;A New Pattern Detection Approach;30
7.3.1;Resemblance Determination: Structural Information;31
7.3.2;Resemblance Determination: Method Definition Information;32
7.3.3;Static Design Pattern Identification;32
7.4;Behavioral Resemblance Determination;32
7.5;Example: The JHotDraw Framewok and the Observer Pattern;33
7.6;Conclusion;36
7.7;References;36
8;Test Case Minimization and Prioritization Using CMIMX Technique;37
8.1;Introduction;37
8.2;Test Case Prioritization;38
8.3;Problem Statement;39
8.4;Algorithm;40
8.5;Application;40
8.6;Conclusion and Future Work;43
8.7;References;44
9;Embedded Control Software Design with Aspect Patterns;46
9.1;Introduction;46
9.2;Embedded Control Software Design;47
9.2.1;Functional Design;47
9.2.2;Timing Design;47
9.3;Aspect Description and Model Weaver;48
9.3.1;Aspect Description;48
9.3.2;Model Weaver;49
9.4;Aspect Patterns;49
9.4.1;Aspect Patterns for Timing Design;49
9.4.2;Mutual Exclusion;50
9.4.3;Double Buffering;51
9.5;Related Work;51
9.6;Conclusions;52
9.7;References;53
10;Towards a Consistent Semantics for Unsafe Time Petri Nets;54
10.1;Introduction;54
10.2;Time Petri Net;55
10.2.1;Formal Semantics of $TPN$;55
10.3;Discussion;57
10.4;A Sound Time Petri Net Semantics;59
10.5;Conclusion;61
10.6;References;61
11;A Multiple Viewed Interrelated Ontology Model for Holistic Component Specification and Retrieval;62
11.1;Introduction;62
11.2;Related Work;63
11.3;Multiple-Viewed Interrelated Component Specification Ontology Model (MVICS);64
11.3.1;Intrinsic Model;64
11.3.2;Function Model;65
11.3.3;Context Model;65
11.3.4;Meta-relationship Model;65
11.4;Holistic and Precise Component Retrieval;67
11.4.1;Class Weight Calculation Method;67
11.4.2;Retrieval Algorithm;67
11.4.3;Precision Calculation Method;68
11.4.4;Adaptive Component Matching;68
11.4.5;Search Result Profile;68
11.5;The Prototype Tool and Case Study;68
11.6;Validation;70
11.7;Conclusions;71
11.8;References;71
12;A Conflict-Based Model for Problem-Oriented Software Engineering and Its Applications Solved by Dimension Change and Use of Intermediary;73
12.1;Introduction;73
12.2;TRIZ and Software Engineering;74
12.2.1;Contradictions;74
12.2.2;TRIZ;75
12.2.3;Software Engineering Problems with TRIZ;75
12.3;Butterfly Model;76
12.4;Examples;78
12.5;Conclusions;80
12.6;References;80
13;Requirements Engineering Problems and Practices in Software Companies: An Industrial Survey;82
13.1;Introduction;82
13.2;Data Gathering;83
13.2.1;Questionnaire Design;83
13.2.2;Population Determination;84
13.2.3;Data Collection;84
13.3;Results;84
13.3.1;Demographic of Respondents;85
13.3.2;Size of RE Problems;85
13.3.3;RE Problems Pattern and Company Maturity;85
13.4;Top-Ten RE Practices;86
13.5;Discussion;87
13.6;Conclusion;88
13.7;References;88
14;A Formal Methodology for Semantics and Time Consistency Checking of UML Dynamic Diagrams;90
14.1;Introduction;90
14.2;Sequence Diagrams as an Interactions Specification Language;91
14.3;StateCharts as Implementation Description Language;93
14.4;Consistency Checking of Dynamic Diagrams;94
14.4.1;Consistency Checking of Untimed Graphs;94
14.4.2;Consistency Checking of Timed Graphs;95
14.5;Conclusion;97
14.6;References;97
15;A Process Model for Forensic Analysis of Symbian Smart Phones;98
15.1;Introduction;98
15.2;The Existing Process Models;100
15.2.1;Digital Investigation Process Models;100
15.2.2;Windows Mobile Forensic Process Model;101
15.3;Process Model for Symbian Smartphones Forensics;101
15.3.1;The Impediments of Symbian Smartphones Forensics;101
15.3.2;The Symbian Smartphones Forensic Process Model;102
15.4;Conclusion and Future Works;104
15.5;References;104
16;Reliability Analysis Method for Supporting Traceability Using UML;106
16.1;Introduction;106
16.2;Related Work;107
16.3;Proposed Approach;107
16.3.1;Software Reliability Model;108
16.3.2;Reliability Prediction Method;109
16.3.3;Traceability;110
16.4;Evaluation;111
16.4.1;Reliability Evaluation;111
16.4.2;Traceability Evaluation;111
16.5;Conclusion;112
16.6;References;112
17;Applying Agility Framework in Small and Medium Enterprises;114
17.1;Introduction;114
17.2;Relevance Research Work;115
17.2.1;Analysis of the Process Area and Generic Practices in CMMI;115
17.2.2;Comparison of the Software Development Methodology;117
17.3;The Proposed Method;118
17.3.1;Agility Software Process Improvement for Small and Medium Enterprises: ASPISME;118
17.3.2;ASPISME Process;119
17.3.3;The ASPISME Project;121
17.4;Conclusion and Future Work;121
17.5;References;121
18;Using Area-Team to Evaluate the Software Architecture for an Online Banking System: A Case Study;123
18.1;Introduction;123
18.2;AREA-TEAM and Software Architecture Evaluation;124
18.3;Case Study of an Online Banking System;124
18.4;Architecture Evaluations through AREA-TEAM;125
18.5;Conclusions;129
18.6;References;129
19;Architectural Decay during Continuous Software Evolution and Impact of ‘Design for Change’ on Software Architecture;131
19.1;Introduction;131
19.2;Architectural Decay;132
19.3;Architectural Decay, Software Evolution, and Code Decay;132
19.4;Factors Contributing to Architectural Decay;133
19.5;Symptoms and Practices for Identification, Resolution and Prevention of Architectural Decay;133
19.5.1;Symptoms of Architectural Decay;133
19.5.2;Practices for the Identification, Resolution and Prevention of Architectural Decay;133
19.6;Controlled Experiment to Observe the Impact of $Design for Change$ on Architectural Decay;136
19.6.1;Experimental Design and Software under Study;136
19.6.2;Experimental Results;136
19.7;Conclusions and Future Work;137
19.8;References;138
20;Software Fault Localization Using Elastic Net: A New Statistical Approach;139
20.1;Introduction;139
20.2;Related Work;140
20.3;The Proposed Approach;141
20.3.1;Instrumentation;141
20.3.2;Bug Predictor Selection;141
20.3.3;Backward Slicing Technique;143
20.4;Experimental Results;144
20.4.1;Experiments on EXIF;144
20.4.2;Experiments on Siemens;144
20.5;Concluding Remarks;145
20.6;References;146
21;Applying Formal Methods to Process Innovation;147
21.1;Introduction;147
21.2;Preliminaries;148
21.3;The Method;149
21.4;An Example;151
21.5;Conclusion and Related Work;153
21.6;References;154
22;Abstracting Models from Execution Traces for Performing Formal Verification;155
22.1;Introduction;155
22.2;Instrumentation;157
22.3;The Method;157
22.3.1;Obtaining Execution Traces from Java Bytecode-Based Programs;158
22.3.2;Discovering Models from Traces Using Program Transformation for Checking Properties;158
22.4;Conclusion and Related Work;161
22.5;References;161
23;A Hybrid Model in Dynamic Software Updating for C;163
23.1;Introduction;163
23.2;Related Works;164
23.3;Hybrid Model;165
23.3.1;Architecture and Design;165
23.3.2;Implementation and Its Issues;167
23.4;Comparison and Evaluation;168
23.4.1;Performance;168
23.4.2;Memory Footprint;169
23.4.3;Service Disruption Time;169
23.5;Conclusion and Future Work;170
23.6;References;170
24;A Function Point Logic File Identification Technique Using UML Analysis Class Diagrams;172
24.1;Introduction;172
24.2;Related Work;173
24.3;Rules to Identify Logical Files;173
24.4;Experimental Design;175
24.4.1;Variables Selection and Participants;175
24.4.2;Materials and Case Studies;176
24.5;Results;176
24.6;Discussion;177
24.7;Conclusions and Future Work;178
24.8;References;179
25;Reliable Mobile Application Modeling Based on Open API;180
25.1;Introduction;180
25.2;Related Research;181
25.3;Proposed Approach;182
25.3.1;Design Model;182
25.3.2;Analyze Model;183
25.3.3;Application Code Generation;183
25.3.4;Fault Detection;183
25.3.5;Modify Code;183
25.4;Implementation and Evaluation;183
25.5;Conclusion;186
25.6;References;187
26;An Improved Steganography Covert Channel;188
26.1;Introduction;188
26.2;Proposed Approach;189
26.2.1;S and T JPEG Blocks;190
26.2.2;Shifting Nonzero AC Coefficients;191
26.2.3;Modifying Magnitude Nonzero AC Coefficients;193
26.2.4;Embedding Algorithm;194
26.3;Experiment and Discussions;196
26.4;Conclusions;197
26.5;References;198
27;Software Test Data Generation Based on Multi-agent;200
27.1;Introduction;200
27.2;The Principles of the Framework;200
27.2.1;The Principles of the Framework;200
27.2.2;The Design of the Framework;201
27.3;Test Input Information Extraction;202
27.3.1;Test Input Information;202
27.3.2;The Coverage Criteria of UML Diagrams;202
27.3.3;Extraction of Software Test Input Information;202
27.4;Software Test Data Generation;203
27.5;Case Study;204
27.6;Conclusion;206
27.7;References;207
28;Knowledge Creation and Creativity in Agile Teams;208
28.1;Introduction;208
28.2;eXtreme Programming;209
28.3;Knowledge Creation and Software Engineering;209
28.4;Creativity in Software Development;210
28.5;Creativity: Purposes, Performance and Structure;210
28.5.1;Roles in a Creative Team;211
28.6;Creativity in eXtreme Programming;212
28.6.1;Team Structure (Base and Supporting Roles);212
28.7;Conclusions;213
28.8;References;214
29;TEST: Testing Environment for Embedded Systems Based on TTCN-3 in SILS;216
29.1;Introduction;216
29.2;Related Work;217
29.2.1;TTCN-3 Testing System;217
29.2.2;Testing an Embedded Systems Software;218
29.2.3;Testing on SILS;219
29.3;TTCN-3 for Testing Embedded Systems Software;219
29.3.1;Hardware Description of the Embedded Systems;220
29.3.2;Communication Interface with SUT;220
29.4;Implementation of the Testing System;221
29.4.1;Automatic Update of SUT Adapter Using Hardware Descriptor;221
29.4.2;Interface between Testing System and SUT;222
29.4.3;Example of the Testing Result;223
29.5;Conclusion;223
29.6;References;224
30;A Framework for Measuring the Alignment between Business Processes and Software Systems;225
30.1;Introduction;225
30.2;Measuring the Alignment;226
30.2.1;Q1. Evaluating the Technological Coverage;227
30.2.2;Q2. Evaluating the Technological Adequacy;228
30.3;An Example;229
30.4;Conclusions;231
30.5;References;231
31;Service Composition System in Consideration of the Characteristics of Services;233
31.1;Introduction;233
31.2;An e-Engineering Framework and the Engineering Process;234
31.3;Characteristics of Engineering Service;234
31.4;Proposed Service Composition System;236
31.4.1;System Architecture;236
31.4.2;Proposed Methods;238
31.5;Related Researches;239
31.6;Conclusion and Future Work;240
31.7;References;240
32;Business Viability Assessment of Potential Software Projects: An Empirical Study with the CASSE Framework;241
32.1;Introduction;241
32.2;Purpose;242
32.3;The CASSE Framework Approach;242
32.3.1;The Project Value Evaluator;242
32.4;Case Study Evaluation;244
32.4.1;Case Study Description;244
32.4.2;Analysis Parameters;245
32.4.3;Case Study Analysis Results;246
32.4.4;The Quadrant Analysis;246
32.4.5;Case Study Implications;247
32.5;Conclusion and Future Work;248
32.6;References;248
33;Aligning the Software Project Selection Process with the Business Strategy: A Pilot Study;249
33.1;Introduction;249
33.2;Purpose;250
33.3;Methodology;251
33.4;Presentation of Findings;251
33.4.1;Interpretation Summary;252
33.4.2;Discussion;255
33.5;Conclusion;256
33.6;References;256
34;RE4Gaia: A Requirements Modeling Approach for the Development of Multi-Agent Systems;257
34.1;Introduction;257
34.2;Related Work;258
34.3;The Gaia Methodology;258
34.4;The Requirements Modeling Approach;259
34.4.1;Requirements Modeling;259
34.4.2;Requirements Analysis;260
34.5;Case Study;261
34.5.1;Traceability Framework;263
34.6;Conclusions and Further Work;263
34.7;References;264
35;Execution Traces: A New Domain That Requires the Creation of a Standard Metamodel;265
35.1;Introduction;265
35.2;Execution Traces as a New Domain;266
35.2.1;Statement-Level Traces;266
35.2.2;Routine Call Traces;267
35.2.3;Inter-process Level Traces;268
35.2.4;System Call Level Traces;268
35.2.5;Execution Traces for Performance Analysis;269
35.3;Existing Metamodels;269
35.3.1;Compact Trace Format;270
35.3.2;Unified Modeling Language;270
35.3.3;Knowledge Discovery Metamodel;271
35.4;Proposed Execution Trace Metamodel;271
35.5;Conclusion and Future Work;273
35.6;References;273
36;Software Performability Measurement Based on Availability Model with User-Perceived Performance Degradation;276
36.1;Introduction;276
36.2;Software Availability Model with Performance Degradation;277
36.3;Model Description and Analysis for Task Processing;279
36.4;Derivation of Software Performability Measures;281
36.5;Numerical Example;282
36.6;Concluding Remarks;283
36.7;References;283
37;An Experimental Evaluation of Error Rate in a Web Server System;284
37.1;Introduction;284
37.2;Experiments;286
37.2.1;Experimental Setup;286
37.2.2;Data Collection;286
37.3;Logit Model;287
37.3.1;Regression-Based Model;287
37.4;Real Data Analysis;289
37.5;Conclusion;291
37.6;References;291
38;A New Criterion for the Optimal Software Release Problems: Moving Average Quality Control Chart with Bootstrap Sampling;292
38.1;Introduction;292
38.2;Concept of the Optimal Release Policy;293
38.3;Model Description;294
38.3.1;Evaluation of Cov [X,Y ];295
38.3.2;Bootstrap Sampling with Incomplete Gamma Function Model;296
38.4;Example of Data Analysis;297
38.5;Concluding Remarks;299
38.6;References;299
39;An EM Algorithm for Record Value Statistics Models in Software Reliability Estimation;300
39.1;Introduction;300
39.2;Software Reliability Modeling;301
39.3;Parameter Estimation;303
39.4;Illustration of EM Procedure for Musa-Okumoto SRM;305
39.5;Discussions and Future Research;306
39.6;References;306
40;Yet Another Metric for Predicting Fault-Prone Modules;308
40.1;Introduction;308
40.2;Objective;309
40.3;Metrics Suit and Prediction Method;309
40.3.1;History Metrics;309
40.3.2;Complexity Metrics;310
40.3.3;Text-Filtering Metrics;310
40.3.4;Fault-Prone Prediction Methods;311
40.4;Experiment;311
40.4.1;Target Project;311
40.4.2;Collection of Faulty Modules;311
40.4.3;Evaluation Measures;312
40.4.4;Procedure;313
40.4.5;Results of Experiment;313
40.4.6;Discussion;313
40.5;Threats to Validity;314
40.6;Conclusions;315
40.7;References;315
41;Quantifying the Influences of Imperfect Debugging on Software Development Using Simulation Approach;317
41.1;Introduction;317
41.2;Related Works;318
41.3;Simulation Procedures;319
41.4;Numerical Example;321
41.5;Conclusions;323
41.6;References;324
42;Service Reliability and Availability Analysis of Distributed Software Systems Considering Malware Attack;325
42.1;Introduction;325
42.2;Modeling of Malware Attack in Distributed Systems;326
42.2.1;Modelling of Distributed System under Malware Attack;326
42.2.2;Derivation of Service Reliability and Availability;329
42.3;Numerical Examples;330
42.4;Conclusions;331
42.5;References;332
43;A Test Coverage-Based Model for Predicting Software Fault Content and Location during Multi-phase Functional Testing;333
43.1;Introduction;333
43.2;Number of Failures Experienced and Faults Remaining in the Case of Multiple Functional Test Phases;334
43.3;Extensions in the Case of a Non-uniform Distribution of Faults;337
43.4;Conclusions;340
43.5;References;340
44;A Refined Non-parametric Algorithm for Sequential Software Reliability Estimation;342
44.1;Introduction;342
44.2;Software Reliability Model;344
44.2.1;Parametric Models;344
44.2.2;Non-parametric Models;344
44.3;Parameter Estimation;345
44.4;Numerical Illustrations;347
44.5;Conclusion;348
44.6;References;349
45;A Tool-Supported Process for Reliable Classification of Web Pages;350
45.1;Introduction;350
45.2;The Classification Technique;351
45.3;A Case Study;354
45.4;Conclusions and Future Works;356
45.5;References;357
46;Author Index;358




