


default search action
17th ASWEC 2006: Sydney, Australia
- 17th Australian Software Engineering Conference (ASWEC 2006), 18-21 April 2006, Sydney, Australia. IEEE Computer Society 2006, ISBN 0-7695-2551-2
Introduction
- Message from the General Chair.
- Message from the Research Program Chairs.
- Organizing Committee.
- Steering Committee.
- Research Program Committee.
- Industry Program Committee.
- Additional Reviewers.
Keynotes
- Linda M. Northrop:
Software Product Lines: Reuse That Makes Business Sense. 3 - Julian Edwards:
State of the Art v State of the Practice: A Personal Perspective on the Changes in the Australian Software Engineering Landscape.. 4 - John G. Hosking
:
The Software Engineering Academy's Role in Industrial Innovation. 5
Software Requirements and Design
- Martín López Nores
, José Juan Pazos-Arias, Jorge García Duque, Ana Belén Barragáns-Martínez
:
An Agile Approach to Support Incremental Development of Requirements Specifications. 9-18 - Christine Choppy, Gianna Reggio:
Requirements Capture and Specification for Enterprise Applications: a UML Based Attempt. 19-28 - Oddleif Halvorsen, Øystein Haugen:
Proposed Notation for Exception Handling in UML 2 Sequence Diagrams. 29-40
Component Based Software Engineering
- Johannes Maria Zaha, Antonia Albani:
Compatibility Test for Coordination Aspects of Software Components. 41-48 - Lei Wang, Padmanabhan Krishnan:
A Framework for Checking Behavioral Compatibility for Component Selection. 49-60
Web Services and Service Oriented Systems
- Jun Shen
, Jun Yan
, Yun Yang:
SwinDeW-S: Extending P2P Workflow Systems for Adaptive Composite Web Services. 61-69 - Zheng Li, Yan Jin, Jun Han:
A Runtime Monitoring and Validation Framework for Web Service Interactions. 70-79 - Jenny Bhuiyan, Surya Nepal, John J. Zic:
Checking Conformance between Business Processes and Web Service Contract in Service Oriented Applications. 80-89 - Mohan Baruwal Chhetri
, Jian Lin, SukKeong Goh, Jian Ying Zhang, Ryszard Kowalczyk
, Jun Yan
:
A Coordinated Architecture for the Agent-based Service Level Agreement Negotiation ofWeb Service Composition. 90-99 - Alex Ng
:
Optimising Web Services Performance with Table Driven XML. 100-112
Software Patterns, Frameworks, and Architectures
- Ayodele Oluyomi, Shanika Karunasekera
, Leon Sterling:
Design of Agent-Oriented Pattern Templates. 113-121 - Feras T. Dabous, Fethi A. Rabhi:
A Framework for Evaluating Alternative Architectures and its Application to Financial Business Processes. 122-131 - Therese Helland, John C. Grundy
, John G. Hosking
:
A Service-Oriented Architecture for Software Process Technology. 132-141 - Minh Hong Tran, Yun Yang, Gitesh K. Raikundalia:
The Transparent Adaptation Approach to the Development of Awareness Mechanisms for Groupware. 142-151 - Anders Magnus Andersen, Torab Torabi:
A Holistic Framework for Mobile Environments. 152-158 - Tore Fjellheim:
Over-the-air Deployment of Applications in Multi-Platform Environments. 159-170
Software Security
- Benjamin W. Long, Colin J. Fidge
:
Formally Analysing a Security Protocol for Replay Attacks. 171-180 - Elankayer Sithirasenan, Saad Zafar
, Vallipuram Muthukkumarasamy:
Formal Verification of the IEEE 802.11i WLAN Security Protocol. 181-190 - Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kothari:
Preventing SQL Injection Attacks in Stored Procedures. 191-198 - Khaled M. Khan
, Jun Han:
Assessing Security Properties of Software Components: A Software Engineer's Perspective. 199-210
Formal Methods
- Brijesh Dongol
:
Derivation of Java Monitors. 211-220 - Judy Bowen, Steve Reeves
:
Formal Refinement of Informal GUI Design Artefacts. 221-230 - Lin Wang, Gillian Dobbie, Jing Sun
, Lindsay Groves:
Validating ORA-SS Data Models using Alloy. 231-242
Software Analysis
- Andreas Bauer, Martin Leucker
, Christian Schallhart:
Model-based runtime analysis of distributed reactive systems. 243-252 - Phil Cook, Colin J. Fidge
:
Well-Measuring Programs. 253-261 - David J. A. Cooper, Mun Wai Chan, Gautam Mehra, Peter Woodward, Brian R. von Konsky, Michael C. Robey, Michael Harding:
Using Dependence Graphs to Assist Manual and Automated Object Oriented Software Inspections. 262-269 - Junhua Wang, Soon-Kyeong Kim, David A. Carrington:
Verifying Metamodel Coverage of Model Transformations. 270-282
Software Testing
- Ossi Taipale, Heikki Kälviäinen, Kari Smolander
:
Factors Affecting Software Testing Time Schedule. 283-291 - Tafline Murnane, Karl Reed, Richard Hall:
Tailoring of Black-Box Testing Methods. 292-299 - Tsong Yueh Chen
, Robert G. Merkel
:
Efficient and Effective Random Testing Using the Voronoi Diagram. 300-299
Software Maintenance and Evolution
- Khanh Hoa Dam
, Michael Winikoff, Lin Padgham
:
An agent-oriented approach to change propagation in software evolution. 309-318 - Lugang Xu, Greg Butler:
Cascaded Refactoring for Framework Development and Evolution. 319-330
Software Engineering Tools
- Erica Mealy, Paul A. Strooper
:
Evaluating software refactoring tool support. 331-340 - Abdelsalam Shanneb
, John Potter:
Lock Selection Made Easy. 341-350 - Ming-Yang (Jerry) Lin, Robert Amor
, Ewan D. Tempero:
A Java Reuse Repository for Eclipse using LSI. 351-362
Software Measurement and Experimentation
- Dror G. Feitelson, Gillian Z. Heller
, Stephen R. Schach:
An Empirically-Based Criterion for Determining the Success of an Open-Source Project. 363-368 - Blair Neate, Warwick Irwin, Neville Churcher:
CodeRank: A New Family of Software Metrics. 369-378 - Muhammad Ali Babar, Barbara A. Kitchenham
, Piyush Maheshwari:
The Value of Architecturally Significant Information Extracted from Patterns for Architecture Evaluation: A Controlled Experiment. 379-390
Software Process
- He Zhang, Ming Huo, Barbara A. Kitchenham
, D. Ross Jeffery:
Qualitative Simulation Model for Software Engineering Process. 391-400 - Jean-Guy Schneider
, Rajesh Vasa
:
Agile Practices in Software Development - Experiences from Student Projects. 401-410 - Diana Kirk, Ewan D. Tempero:
Identifying Risks in XP Projects through Process Modelling. 411-420

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.