


default search action
30th COMPSAC 2006: Chicago, Illinois, USA - Volume 2
- 30th Annual International Computer Software and Applications Conference, COMPSAC 2006, Chicago, Illinois, USA, September 17-21, 2006. Volume 2. IEEE Computer Society 2006
Pervasive/Performance
- Kamala Subramaniam, Alan L. Tharp, Arne A. Nilsson:
Location Updates In Cellular Networks Using Bloom Filters. 3-9 - Kyosuke Yasuda, Takao Miura, Isamu Shioya:
Distributed Processes on Tree Hash. 10-13 - Lorenz Froihofer, Johannes Osrael, Karl M. Göschka:
Trading Integrity for Availability by Means of Explicit Runtime Constraints. 14-17 - Zhou Yanming, Qu Mingbin Mingbin:
A Run-time Adaptive and Code-size Efficient XML Parser. 18-21 - Upsorn Praphamontripong, Swapna S. Gokhale, Aniruddha S. Gokhale
, Jeff Gray
:
Performance Analysis of an Asynchronous Web Server. 22-28
Requirements/Design
- João Araújo
, Jon Whittle, Ana Moreira
:
Choosing the Right Time to Compose Aspectual Scenarios. 29-32 - Michael E. Shin, Fernando Paniagua:
Self-Management of COTS Component-Based Systems Using Wrappers. 33-36 - Andreas S. Andreou
, Dimitrios Vogiatzis
, George A. Papadopoulos
:
Intelligent Classification and Retrieval of Software Components. 37-40 - Yao-Dong Feng, Gang Huang, Jie Yang, Hong Mei:
Traceability between Software Architecture Models. 41-44 - Xiaodong Liu, Yankui Feng, Jon M. Kerridge
:
Achieving Dependable Component-Based Systems Through Generative Aspect Oriented Component Adaptation. 45-48 - Zhao Liu, Gang Huang, Hong Mei:
The Model and Implementation of Component Array Container. 49-54
Design/Security
- Jihong Zuo, Qianxiang Wang, Hong Mei:
Preventing Feature Interactions by Constraints. 55-58 - Matt Barrett, Clark D. Thomborson
:
Frameworks Built on the Trusted Platform Module. 59-62 - Pierre-Etienne Poirot, Shangping Ren, Jerzy Nogiec, Jeffrey J. P. Tsai:
Separating Functional and Non-functional Concerns through Coordination: An Application to Reliability. 63-66 - Moushumi Sharmin, Sheikh Iqbal Ahamed, Shameem Ahmed, Haifeng Li:
SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment. 67-70 - Lin Liu, Eric S. K. Yu, John Mylopoulos:
Security Design Based on Social Modeling. 71-78
Security
- Dianxiang Xu, Vivek Goel, Kendall E. Nygard:
An Aspect-Oriented Approach to Security Requirements Analysis. 79-82 - Arnab Ray, Rance Cleaveland:
A Software Architectural Approach to Security by Design. 83-86 - Gernot Schmoelzer, Christian Kreiner
, Zsolt Kovács, Michael Thonhauser:
Reflective, Model-Based Data Access with the Type-Safe Entity Container. 87-92
Testing
- Adenilso da Silva Simão
, Rodrigo Fernandes de Mello
, Luciano José Senger:
A Technique to Reduce the Test Case Suites for Regression Testing Based on a Self-Organizing Neural Network Architecture. 93-96 - Sung Kim, Garrett Hoff:
Realization of Systematic Reliability Analysis of Decomposable Systems. 97-100 - Adnan Ashraf
, Aamer Nadeem
:
Automating the Generation of Test Cases from Object-Z Specifications. 101-104 - Yvan Labiche
:
Planning and Scheduling from a Class Test Order. 105-108 - Feng-Jian Wang, Chia-Lin Hsu, Huin-Jen Hsu:
Analyzing Inaccurate Artifact Usages in a Workflow Schema. 109-114
Web Services/Applications
- Yong Wang, Dick B. Simmons:
Modeling Web Accessibility: A Case Study on Texas A&M University People Website. 115-118 - José Antonio de Frutos, Esther Cadiñanos, Juan Ignacio Pérez, Sara García:
Tool for Analysis and Simulation of TTCAN Communication in Distributed Systems. 119-122 - R. Krishnan, Margaret Nadworny:
Moving Software from Expense to Asset. 123-126 - Russell Lock:
Automated Negotiation for Service Contracts. 127-134 - Li Ruan, Yongji Wang, Qing Wang, Fengdi Shu, Haitao Zeng, Shen Zhang:
ARIMAmmse: An Improved ARIMA-based. 135-138 - Zhenbang Chen, Ji Wang, Wei Dong, Zhichang Qi, Wing Lok Yeung:
An Interface Theory Based Approach to Verification of Web Services. 139-144
The Third International Workshop on Quality Assurance and Testing Web-Based Applications (QATWBA'06)
- Hong Zhu:
A Framework for Service-Oriented Testing of Web Services. 145-150 - Hany F. El Yamany
, Miriam A. M. Capretz
, Luiz Fernando Capretz:
A Multi-Agent Framework for Testing Distributed Systems. 151-156 - Nuo Li, Qin-qin Ma, Ji Wu, Maozhong Jin, Chao Liu:
A Framework of Model-Driven Web Application Testing. 157-162 - Wei-Tek Tsai, Jerry Gao, Xiao Wei, Yinong Chen
:
Testability of Software in Service-Oriented Architecture. 163-170
Second International Workshop on Testing and Quality Assurance for Component-Based Systems (TQACBS 2006)
- Dima Suliman, Barbara Paech, Lars Borner, Colin Atkinson
, Daniel Brenner, Matthias Merdes, Rainer Malaka
:
The MORABIT Approach to Runtime Component Testing. 171-176 - Fariaz Karim, Harish Thanneer:
Automated Health-Assessment of Software Components using Management Instrumentatio. 177-182 - Valdivino Alexandre de Santiago Jr.
, Ana Silvia Martins do Amaral, Nandamudi L. Vijaykumar, Maria de Fátima Mattiello-Francisco, Eliane Martins, Odnei Cuesta Lopes:
A Practical Approach for Automated Test Case Generation using Statecharts. 183-188 - Pekka Mäki-Asiala, Mari Matinlassi:
Quality Assurance of Open Source Components: Integrator Point of View. 189-194
Security, Privacy, and Trust for Pervasive Applications (SPTPA 2006)
- Hyun Seok Kim, Jeong-Hyun Oh, Jin-Young Choi
:
Security Analysis of RFID Authentication for Pervasive Systems using Model Checking. 195-202 - Bo Zhou, Qi Shi, Madjid Merabti:
Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test. 203-208 - John F. Buford, Emré Celebi, Phyllis G. Frankl:
Property-Based Peer Trust in the Sleeper Service Discovery Protocol. 209-214 - Zhengping Wu, Alfred C. Weaver
:
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing. 215-222
The Third International Workshop on Software Cybernetics (IWSC'06)
- Kai-Yuan Cai, Lei Zhao, Feng Wang:
A Dynamic Partitioning Approach for GUI Testing. 223-228 - Mohamad S. Bayan, João W. Cangussu:
Automatic Stress and Load Testing for Embedded Systems. 229-233 - Q. P. Hu
, Yuan-Shun Dai, Min Xie
, Szu Hui Ng:
Early Software Reliability Prediction with Extended ANN Model. 234-239 - Dianxun Shuai, Bin Zhang, Cunpai Lu:
A New Generalized Particle Dynamics Model For Software Cybernetics. 240-245 - Dianxun Shuai, Bin Zhang, Cunpai Lu:
Self-Organizing Software Processes Based on Particle Dynamics Model. 246-251 - Qianxiang Wang, Min Li, Na Meng:
A Visual Constraint Specifying Approach for Adaptive Software. 252-257 - Jay S. Bayne:
A Theory of Software-Mediated Enterprise Governance. 258-264 - Sami Beydeda:
Self-Metamorphic-Testing Components. 265-272
International Workshop on Engineering Semantic Agent Systems (ESAS 2006)
- Duygu Çelik
, Atilla Elçi:
Discovery and Scoring of Semantic Web Services based on Client Requirement(s) through a Semantic Search Agent. 273-278 - Ergun Biçici
:
Consensus Ontology Generation in a Socially Interacting MultiAgent System. 279-284 - Dianxun Shuai, Cunpai Lu, Bin Zhang:
Entanglement Partitioning of Quantum Particles for Data Clustering. 285-290 - Xian Shen, Xin Jin, Rongfang Bie, Yunchuan Sun:
MSC: A Semantic Ranking for Hitting Results of Matchmaking of Services. 291-296 - James Kirby Jr.:
Model-Driven Agile Development of Reactive Multi-Agent Systems. 297-302 - Deepak Dahiya
, Rajinder K. Sachdeva:
Understanding Requirements: Aspect Oriented Software Development. 303-308 - Darren Xu, Lein Harn, Mayur Narasimhan, Junzhou Luo:
An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks. 309-314 - Mohamed M. Kouta
, Mohammed M. Abou Rizka, Ahmed M. Elmisery
:
Secure e-Payment using Multi-agent Architecture. 315-320 - Stanislav Ustymenko
, Daniel G. Schwartz:
An Agent-Oriented Logic for Belief and Trust. 321-326 - Kashif Zafar, Shahzad Badar Qazi, Abdul Rauf Baig:
Mine Detection and Route Planning in Military Warfare using Multi Agent System. 327-332 - Mehmet Tahir Sandikkaya
, Bülent Örencik:
Agent-Based Offline Electronic Voting. 333-340
PH-D Papers
- Scott D. Miller:
A Control-Theoretic Aid to Managing the Construction Phase in Incremental Software Development (Extended Abstract). 341-343 - Ryan Babbitt:
Information Privacy Management in Smart Home Environments: Modeling, Verification, and Implementation. 344-346 - Xia Wang:
Intrusion Detection Techniques in Wireless Ad Hoc Networks. 347-349 - Paskorn Champrasert
, Junichi Suzuki:
SymbioticSphere: A Biologically-Inspired Autonomic Architecture for Self-Managing Network Systems. 350-352 - Hiroshi Wada, Junichi Suzuki:
A Domain Specific Modeling Framework for Secure Network Applications. 353-355 - Ayman Z. Faza
, Sahra Sedigh-Ali
:
A General Purpose Framework for Wireless Sensor Network Applications. 356-358 - Jinchun Xia:
QoS-Based Service Composition. 359-361 - Hsinyi Jiang:
Can the Genetic Algorithm Be a Good Tool for Software Engineering Searching Problems? 362-366
Fast Abstracts
- Nai Yan Zhao, Mi Wan Shum:
Technical Solution to Automate Smoke Test Using Rational Functional Tester and Virtualization Technology. 367 - K. R. Jayaram:
Identifying andTesting for Insecure Paths in Cryptographic Protocol Implementations. 368-369 - Sandro Ronaldo Bezerra Oliveira, Alexandre Marcos Lins de Vasconcelos
:
A Continuous Improvement Model in ImPProS. 370-371 - Tuomas Lindroth
, Raicea Lavinia, Tiberiu Seceleanu
, Nastooh Avessta, Jukka Teuhola:
Building a UML Profile for On-Chip Distributed Platforms. 372-373 - James H. Cross II, T. Dean Hendrix, Larry A. Barowski, Jhilmil Jain:
Dynamic Object Viewers for Java. 374-375 - John R. Koch, Thomas V. Freiberger:
Autonomous Real-Time Monitoring of Hydrological Environments. 376-377 - Valerio Plessi, Filippo Bastianini, Sahra Sedigh-Ali
:
An Autonomous and AdaptableWireless Device for Flood Monitoring. 378-379
Supplement
- Mahmoud O. Elish, David C. Rine:
Design Structural Stability Metrics and Post-Release Defect Density: An Empirical Study. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.