default search action
34th COMPSAC 2010: Seoul, Korea
- Sheikh Iqbal Ahamed, Doo-Hwan Bae, Sung Deok Cha, Carl K. Chang, Rajesh Subramanyan, W. Eric Wong, Hen-I Yang:
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, COMPSAC 2010, Seoul, Korea, 19-23 July 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4085-6
Plenary Panels and Position Statements
- Stephen S. Yau:
Plenary Panel Description: Challenges and Future Directions of Software Technology. 1 - Vladimir Getov:
Software Development Productivity: Challenges and Future Trends. 2-7 - John L. Gustafson:
Challenges and Future Directions of Software Technology: The Need for Explicit Programming Environments. 8-9 - K. H. (Kane) Kim:
Challenges and Future Directions of Cyber-Physical System Software. 10-13 - Hong Mei:
Internetware: Challenges and Future Direction of Software Paradigm for Internet as a Computer. 14-16 - Bhavani Thuraisingham, Kevin W. Hamlen:
Challenges and Future Directions of Software Technology: Secure Software Development. 17-20
Joint COMPSAC/SAINT Panel: Future of the Internet
- Eiji Kawai, Elisa Bertino, Sue Moon:
Panel Description: Joint COMPSAC/SAINT Panel: Future of the Internet. 21 - Kohei Shiomoto:
Position Statement: Joint COMPSAC/SAINT Panel: Future of the Internet: What Can We Do to Support Super-Broadband Traffic in the Future Network? 22 - Hiroaki Harai:
Position Statement: Joint COMPSAC/SAINT Panel: Future of the Internet: Activity Status of New-Generation Network Design. 23
Joint COMPSAC/SAINT Panel: Green IT - From Devices to Applications
- Tohru Asami, Sahra Sedigh:
Panel Description: Joint COMPSAC/SAINT Panel: Green IT - From Devices to Applications. 24
COMPSAC Panels
- Rajesh Subramanyan:
Panel Description: Are We Headed towards Smart Solutions? 25 - Sumi Helal:
Panel Description: Towards New Roles and System Architecture Supporting the Full Life Cycle of Smart Spaces. 26
Security & Dependability I
- William R. Claycomb, Dongwan Shin:
Towards Secure Virtual Directories: A Risk Analysis Framework. 27-36 - Tsutomu Nomoto, Yoshihiro Oyama, Hideki Eiraku, Takahiro Shinagawa, Kazuhiko Kato:
Using a Hypervisor to Migrate Running Operating Systems to Secure Virtual Machines. 37-46 - Jianwei Liao, Yutaka Ishikawa:
A New Concurrent Checkpoint Mechanism for Real-Time and Interactive Processes. 47-52
Software Architecture & Design I
- Jonas Helming, Maximilian Koegel, Hoda Naguib, Miriam Schmidberger, Florian Schneider, Bernd Brügge:
An Analysis of Tool-Based Research in Software Engineering. 53-61 - Wenhui Zhu, Yang Tao, Gang Huang, Yanchun Sun, Hong Mei:
A Task-Oriented Navigation Approach to Enhance Architectural Description Comprehension. 62-71 - Xu Zhang, Chung-Horng Lung:
Improving Software Performance and Reliability with an Architecture-Based Self-Adaptive Framework. 72-81
Mobile & Pervasive Computing I
- Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed:
An Approach for Ensuring Robust Safeguard against Location Privacy Violation. 82-91 - Seungwoo Kang, Youngki Lee, Sunghwan Ihm, Souneil Park, Su Myeon Kim, Junehwa Song:
Design and Implementation of a Middleware for Development and Provision of Stream-Based Services. 92-100 - Ulrich Bareth, Axel Küpper, Peter Ruppel:
geoXmart - A Marketplace for Geofence-Based Mobile Services. 101-106
Verification & Testing I
- Xiang Chen, Qing Gu, Jingxian Qi, Daoxu Chen:
Applying Particle Swarm Optimization to Pairwise Testing. 107-116 - Haroon Malik, Bram Adams, Ahmed E. Hassan, Parminder Flora, Gilbert Hamann:
Using Load Tests to Automatically Compare the Subsystems of a Large Enterprise System. 117-126 - Hojun Jaygarl, Kai-Shin Lu, Carl K. Chang:
GenRed: A Tool for Generating and Reducing Object-Oriented Test Cases. 127-136
Security & Dependability II
- Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong Meng:
Representing and Reasoning about Web Access Control Policies. 137-146 - Fred Cheng:
A Novel Rubbing Encryption Algorithm and the Implementation of a Web Based One-Time Password Token. 147-154 - Yoon-Su Jeong, Ning Sun, Sang-Ho Lee:
IPTV Micropayment System Based on Hash Chain Using RFID-USB Module. 155-160
Software Architecture & Design II
- Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Security in Context: Analysis and Refinement of Software Architectures. 161-170 - Takeru Inoue, Hiroshi Asakura, Hiroshi Sato, Noriyuki Takahashi:
Key Roles of Session State: Not against REST Architectural Style. 171-178 - Derdour Makhlouf, Philippe Roose, Marc Dalmau, Nacira Ghoualmi-Zine, Adel Alti:
An Adaptation Approach for Component-Based Software Architecture. 179-187
Software Quality I
- Michael Grottke, Lars M. Karg, Arne Beckhaus:
Team Factors and Failure Processing Efficiency: An Exploratory Study of Closed and Open Source Software Development. 188-197 - Xiaoqing Frank Liu, Praveen Inuganti, Kunio Noguchi, Yuji Kyoya:
Target Setting for Technical Requirements in Time-Stamped Software Quality Function. 198-207 - Shokoofeh Hesari, Hoda Mashayekhi, Raman Ramsin:
Towards a General Framework for Evaluating Software Development Methodologies. 208-217
Verification & Testing II
- Hua Jie Lee, Lee Naish, Kotagiri Ramamohanarao:
Effective Software Bug Localization Using Spectral Frequency Weighting Function. 218-227 - Deqing Wang, Mengxiang Lin, Hui Zhang, Hongping Hu:
Detect Related Bugs from Source Code Using Bug Information. 228-237 - Vladimir P. Bubnov, Alexey V. Tyrva, Anatoly D. Khomonenko:
Model of Reliability of the Software with Coxian Distribution of Length of Intervals between the Moments of Detection of Errors. 238-243
Fast Abstract I
- Evgeny Gershikov, Moshe Porat:
Efficient Color Image Compression Using Demosaicing. 244-245 - Anas Mahmoud, Nan Niu:
Using Semantics-Enabled Information Retrieval in Requirements Tracing: An Ongoing Experimental Investigation. 246-247 - Osamu Mizuno, Hideaki Hata:
An Empirical Comparison of Fault-Prone Module Detection Approaches: Complexity Metrics and Text Feature Metrics. 248-249 - Chia-Tien Dan Lo, Kai Qian:
Green Computing Methodology for Next Generation Computing Scientists. 250-251
Security & Dependability III
- Thorsten Höllrigl, Jochen Dinger, Hannes Hartenstein:
A Consistency Model for Identity Information in Distributed Systems. 252-261 - Young Hee Park, Qinghua Zhang, Douglas S. Reeves, Vikram Mulukutla:
AntiBot: Clustering Common Semantic Patterns for Bot Detection. 262-272 - Jichiang Tsai, Che-Cheng Chang:
A Weaker Knowledge Connectivity Condition Sufficient for Fault-Tolerant Consensus with Unknown Participants. 273-278
Software Evolution and Maintenance I
- Qichao Liu, Barrett R. Bryant, Marjan Mernik:
Metamodel Recovery from Multi-tiered Domains Using Extended MARS. 279-288 - Ming Hua, Carl K. Chang, Katsunori Oyama, Hen-I Yang:
Reasoning about Human Intention Change for Individualized Runtime Software Service Evolution. 289-296 - Tae-hyung Kim, Kimun Kim, Woomok Kim:
An Interactive Change Impact Analysis Based on an Architectural Reflexion Model Approach. 297-302
Mobile and Pervasive Computing II
- Yukihiko Shigesada, Shinsuke Kobayashi, Noboru Koshizuka, Ken Sakamura:
ucR Based Interoperable Spatial Information Model for Realizing Ubiquitous Spatial Infrastructure. 303-310 - Hyunho Park, Gonzalo Huerta Cánepa, Dongman Lee, Ho NamKoong, Byoungoh Kim, Soon J. Hyun:
A Personalized Navigation Guide Using a Social-Spatial Ontology. 311-316
Requirements Engineering
- Sang-Hyun Lee, In-Young Ko, Sungwon Kang, Danhyung Lee:
A Usability-Pattern-Based Requirements-Analysis Method to Bridge the Gap between User Tasks and Application Features. 317-326 - Massila Kamalrudin, John C. Grundy, John G. Hosking:
Managing Consistency between Textual Requirements, Abstract Interactions and Essential Use Cases. 327-336 - Nan Niu, Juha Savolainen, Yijun Yu:
Variability Modeling for Product Line Viewpoints Integration. 337-346
Doctoral Symposium
- Jeyoun Dong, Hen-I Yang, Katsunori Oyama, Carl K. Chang:
Human Desire Inference Process Based on Affective Computing. 347-350
Smart Computing
- Anestis A. Toptsis, Joshua Majonis:
PAAKL: Password Authentication Using Behavioral Metrics. 351-356 - Harald Psaier, Florian Skopik, Daniel Schall, Schahram Dustdar:
Behavior Monitoring in Self-Healing Service-Oriented Systems. 357-366 - Chunxiang Xu, Yu Huang, Wanling Qu, Hanpin Wang, Xiaojuan Ban:
A Petri Net-Based Algorithm for RFID Event Detection. COMPSAC 2010: 367-372
Software Evolution and Maintenance II
- Xiaobing Sun, Bixin Li, Chuanqi Tao, Wanzhi Wen, Sai Zhang:
Change Impact Analysis Based on a Taxonomy of Change Types. 373-382 - Hong Zhou, Hongji Yang, Andrew Hugill:
An Ontology-Based Approach to Reengineering Enterprise Software for Cloud Computing. 383-388 - Liwei Shen, Xin Peng, Jiayi Zhu, Wenyun Zhao:
Synchronized Architecture Evolution in Software Product Line Using Bidirectional Transformation. 389-394
Performance Engineering
- S. Sharanyan, Arvind Kumar:
An Optimized Checkpointing Based Learning Algorithm for Single Event Upsets. 395-400 - Kyungmin Cho, Younghyun Ju, SungJae Jo, Yunseok Rhee, Junehwa Song:
A Scalable and Efficient Path Management Scheme for Internet-Based Sensor Data Delivery Infrastructure. 401-406 - Venkata Krishna Suhas Nerella, Swetha Surapaneni, Sanjay Kumar Madria, Thomas Weigert:
Exploring Query Optimization in Programming Codes by Reducing Run-Time Execution. 407-412
Verification & Testing III
- Yu-Chi Huang, Chin-Yu Huang, Jun-Ru Chang, Tsan-Yuan Chen:
Design and Analysis of Cost-Cognizant Test Case Prioritization Using Genetic Algorithm with Test History. 413-418 - Alberto González-Sanchez, Éric Piel, Hans-Gerhard Groß, Arjan J. C. van Gemund:
Minimising the Preparation Cost of Runtime Testing Based on Testability Metrics. 419-424
Formal Methods
- Hehua Zhang, Ming Gu, Xiaoyu Song:
Specifying Time-Sensitive Systems with TLA+. 425-430 - Sungwon Kang, Hyunho Kim, Jongmoon Baik, Ho-Jin Choi, ChangSup Keum:
Transformation Rules for Synthesis of UML Activity Diagram from Scenario-Based Specification. 431-436 - Zizhen Wang, Hanpin Wang, Yongzhi Cao, Wanling Qu, Wei Jin, Meixia Zhu:
A Game Perspective of Refinement of Component Models. 437-442
Real-Time & Embedded Systems
- Xiaowei Zhang, Donggang Cao, Yunpeng Gao, Xiangqun Chen, Hong Mei:
An Automatic Configuration Approach to Improve Real-Time Application Throughput While Attaining Determinism. 443-452 - Yeonseung Ryu:
SAT: Switchable Address Translation for Flash Memory Storages. 453-461 - Nien-Lin Hsueh, Peng-Hua Chu, Pao-Ann Hsiung, Min-Ju Chuang, William C. Chu, Chih-Hung Chang, Chorng-Shiuh Koong, Chihhsiong Shih:
Supporting Design Enhancement by Pattern-Based Transformation. 462-467
Web Engineering
- Chunxiang Xu, Wanling Qu, Hanpin Wang, Zizhen Wang, Xiaojuan Ban:
A Petri Net-Based Method for Data Validation of Web Services Composition. 468-476 - Reza Babanezhad, Yusef Mehrdad Bibalan, Raman Ramsin:
Process Patterns for Web Engineering. 477-486 - Wei Jin, Hanpin Wang, Yongzhi Cao, Zizhen Wang, Xiaojuan Ban:
Modeling BPEL and BPEL4People with a Timed Interruptable pi-Calculus. 487-492
Software Quality II
- Wei Zhang, Carl K. Chang, Taiming Feng, Hsinyi Jiang:
QoS-Based Dynamic Web Service Composition with Ant Colony Optimization. 493-502 - Tuan Khanh Le-Do, Kyung-A Yoon, Yeong-Seok Seo, Doo-Hwan Bae:
Filtering of Inconsistent Software Project Data for Analogy-Based Effort Estimation. 503-508 - Yaw-Chung Chen, Shang-Shu Li, Kuan-Teng Chen:
An Efficient Source Allocation Approach for QoS Support in P2PTV Systems. 509-514
Verification & Testing IV
- Yue Lu, Thomas Nolte, Iain Bate, Christer Norström:
Timing Analyzing for Systems with Task Execution Dependencies. 515-524 - Yunja Choi:
Systematic Composition and Verification of Abstract Components. 525-530 - Chao-Jung Hsu, Chin-Yu Huang:
A Study on the Applicability of Modified Genetic Algorithms for the Parameter Estimation of Software Reliability Modeling. 531-540
Fast Abstracts II
- Jeong-Si Kim, Chaedeok Lim, Tae-Man Han:
A Model-Based Design Tool of Automotive Software Architecture. 541-542 - Yoshitaka Aoki, Saeko Matsuura:
A Method for Detecting Defects in Source Codes Using Model Checking Techniques. 543-544 - Ilhom Karimov, Nuriddin Rayimov, Jing Liu, Jungwook Song, Sungchol Cho, Sunyoung Han, Chinchol Kim:
Reconnection of the Pre-assigning Peers in the Seamless Video Streaming. 545-546 - Rika Kawai, Atsuo Hazeyama:
A Know-How Recommendation System for a Software Engineering Project Course by Using the Content Filtering Technique. 547-548
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.