


default search action
34th COMPSAC 2010: Seoul, Korea
- Sheikh Iqbal Ahamed, Doo-Hwan Bae, Sung Deok Cha, Carl K. Chang, Rajesh Subramanyan, W. Eric Wong, Hen-I Yang:

Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, COMPSAC 2010, Seoul, Korea, 19-23 July 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4085-6
Plenary Panels and Position Statements
- Stephen S. Yau:

Plenary Panel Description: Challenges and Future Directions of Software Technology. 1 - Vladimir Getov

:
Software Development Productivity: Challenges and Future Trends. 2-7 - John L. Gustafson:

Challenges and Future Directions of Software Technology: The Need for Explicit Programming Environments. 8-9 - K. H. (Kane) Kim:

Challenges and Future Directions of Cyber-Physical System Software. 10-13 - Hong Mei:

Internetware: Challenges and Future Direction of Software Paradigm for Internet as a Computer. 14-16 - Bhavani Thuraisingham, Kevin W. Hamlen:

Challenges and Future Directions of Software Technology: Secure Software Development. 17-20
Joint COMPSAC/SAINT Panel: Future of the Internet
- Eiji Kawai, Elisa Bertino, Sue Moon:

Panel Description: Joint COMPSAC/SAINT Panel: Future of the Internet. 21 - Kohei Shiomoto

:
Position Statement: Joint COMPSAC/SAINT Panel: Future of the Internet: What Can We Do to Support Super-Broadband Traffic in the Future Network? 22 - Hiroaki Harai:

Position Statement: Joint COMPSAC/SAINT Panel: Future of the Internet: Activity Status of New-Generation Network Design. 23
Joint COMPSAC/SAINT Panel: Green IT - From Devices to Applications
- Tohru Asami, Sahra Sedigh

:
Panel Description: Joint COMPSAC/SAINT Panel: Green IT - From Devices to Applications. 24
COMPSAC Panels
- Rajesh Subramanyan:

Panel Description: Are We Headed towards Smart Solutions? 25 - Sumi Helal

:
Panel Description: Towards New Roles and System Architecture Supporting the Full Life Cycle of Smart Spaces. 26
Security & Dependability I
- William R. Claycomb, Dongwan Shin

:
Towards Secure Virtual Directories: A Risk Analysis Framework. 27-36 - Tsutomu Nomoto, Yoshihiro Oyama, Hideki Eiraku, Takahiro Shinagawa

, Kazuhiko Kato:
Using a Hypervisor to Migrate Running Operating Systems to Secure Virtual Machines. 37-46 - Jianwei Liao, Yutaka Ishikawa:

A New Concurrent Checkpoint Mechanism for Real-Time and Interactive Processes. 47-52
Software Architecture & Design I
- Jonas Helming, Maximilian Koegel, Hoda Naguib, Miriam Schmidberger, Florian Schneider, Bernd Brügge:

An Analysis of Tool-Based Research in Software Engineering. 53-61 - Wenhui Zhu, Yang Tao, Gang Huang, Yanchun Sun, Hong Mei:

A Task-Oriented Navigation Approach to Enhance Architectural Description Comprehension. 62-71 - Xu Zhang, Chung-Horng Lung:

Improving Software Performance and Reliability with an Architecture-Based Self-Adaptive Framework. 72-81
Mobile & Pervasive Computing I
- Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed:

An Approach for Ensuring Robust Safeguard against Location Privacy Violation. 82-91 - Seungwoo Kang, Youngki Lee, Sunghwan Ihm, Souneil Park, Su Myeon Kim, Junehwa Song:

Design and Implementation of a Middleware for Development and Provision of Stream-Based Services. 92-100 - Ulrich Bareth, Axel Küpper

, Peter Ruppel:
geoXmart - A Marketplace for Geofence-Based Mobile Services. 101-106
Verification & Testing I
- Xiang Chen, Qing Gu, Jingxian Qi, Daoxu Chen:

Applying Particle Swarm Optimization to Pairwise Testing. 107-116 - Haroon Malik, Bram Adams

, Ahmed E. Hassan, Parminder Flora, Gilbert Hamann:
Using Load Tests to Automatically Compare the Subsystems of a Large Enterprise System. 117-126 - Hojun Jaygarl, Kai-Shin Lu, Carl K. Chang:

GenRed: A Tool for Generating and Reducing Object-Oriented Test Cases. 127-136
Security & Dependability II
- Gail-Joon Ahn

, Hongxin Hu, Joohyung Lee, Yunsong Meng:
Representing and Reasoning about Web Access Control Policies. 137-146 - Fred Cheng:

A Novel Rubbing Encryption Algorithm and the Implementation of a Web Based One-Time Password Token. 147-154 - Yoon-Su Jeong, Ning Sun, Sang-Ho Lee:

IPTV Micropayment System Based on Hash Chain Using RFID-USB Module. 155-160
Software Architecture & Design II
- Thomas Heyman, Riccardo Scandariato, Wouter Joosen:

Security in Context: Analysis and Refinement of Software Architectures. 161-170 - Takeru Inoue, Hiroshi Asakura, Hiroshi Sato, Noriyuki Takahashi:

Key Roles of Session State: Not against REST Architectural Style. 171-178 - Derdour Makhlouf

, Philippe Roose
, Marc Dalmau, Nacira Ghoualmi-Zine, Adel Alti:
An Adaptation Approach for Component-Based Software Architecture. 179-187
Software Quality I
- Michael Grottke

, Lars M. Karg, Arne Beckhaus:
Team Factors and Failure Processing Efficiency: An Exploratory Study of Closed and Open Source Software Development. 188-197 - Xiaoqing Frank Liu, Praveen Inuganti, Kunio Noguchi, Yuji Kyoya:

Target Setting for Technical Requirements in Time-Stamped Software Quality Function. 198-207 - Shokoofeh Hesari, Hoda Mashayekhi

, Raman Ramsin
:
Towards a General Framework for Evaluating Software Development Methodologies. 208-217
Verification & Testing II
- Hua Jie Lee, Lee Naish, Kotagiri Ramamohanarao

:
Effective Software Bug Localization Using Spectral Frequency Weighting Function. 218-227 - Deqing Wang, Mengxiang Lin, Hui Zhang, Hongping Hu:

Detect Related Bugs from Source Code Using Bug Information. 228-237 - Vladimir P. Bubnov

, Alexey V. Tyrva, Anatoly D. Khomonenko
:
Model of Reliability of the Software with Coxian Distribution of Length of Intervals between the Moments of Detection of Errors. 238-243
Fast Abstract I
- Evgeny Gershikov, Moshe Porat:

Efficient Color Image Compression Using Demosaicing. 244-245 - Anas Mahmoud, Nan Niu:

Using Semantics-Enabled Information Retrieval in Requirements Tracing: An Ongoing Experimental Investigation. 246-247 - Osamu Mizuno

, Hideaki Hata
:
An Empirical Comparison of Fault-Prone Module Detection Approaches: Complexity Metrics and Text Feature Metrics. 248-249 - Chia-Tien Dan Lo, Kai Qian:

Green Computing Methodology for Next Generation Computing Scientists. 250-251
Security & Dependability III
- Thorsten Höllrigl

, Jochen Dinger, Hannes Hartenstein:
A Consistency Model for Identity Information in Distributed Systems. 252-261 - Young Hee Park, Qinghua Zhang, Douglas S. Reeves, Vikram Mulukutla:

AntiBot: Clustering Common Semantic Patterns for Bot Detection. 262-272 - Jichiang Tsai, Che-Cheng Chang:

A Weaker Knowledge Connectivity Condition Sufficient for Fault-Tolerant Consensus with Unknown Participants. 273-278
Software Evolution and Maintenance I
- Qichao Liu, Barrett R. Bryant, Marjan Mernik:

Metamodel Recovery from Multi-tiered Domains Using Extended MARS. 279-288 - Ming Hua, Carl K. Chang, Katsunori Oyama, Hen-I Yang:

Reasoning about Human Intention Change for Individualized Runtime Software Service Evolution. 289-296 - Tae-hyung Kim, Kimun Kim, Woomok Kim:

An Interactive Change Impact Analysis Based on an Architectural Reflexion Model Approach. 297-302
Mobile and Pervasive Computing II
- Yukihiko Shigesada, Shinsuke Kobayashi, Noboru Koshizuka, Ken Sakamura:

ucR Based Interoperable Spatial Information Model for Realizing Ubiquitous Spatial Infrastructure. 303-310 - Hyunho Park, Gonzalo Huerta Cánepa, Dongman Lee, Ho NamKoong, Byoungoh Kim, Soon J. Hyun:

A Personalized Navigation Guide Using a Social-Spatial Ontology. 311-316
Requirements Engineering
- Sang-Hyun Lee, In-Young Ko, Sungwon Kang, Danhyung Lee:

A Usability-Pattern-Based Requirements-Analysis Method to Bridge the Gap between User Tasks and Application Features. 317-326 - Massila Kamalrudin

, John C. Grundy
, John G. Hosking
:
Managing Consistency between Textual Requirements, Abstract Interactions and Essential Use Cases. 327-336 - Nan Niu, Juha Savolainen, Yijun Yu

:
Variability Modeling for Product Line Viewpoints Integration. 337-346
Doctoral Symposium
- Jeyoun Dong, Hen-I Yang, Katsunori Oyama, Carl K. Chang:

Human Desire Inference Process Based on Affective Computing. 347-350
Smart Computing
- Anestis A. Toptsis, Joshua Majonis:

PAAKL: Password Authentication Using Behavioral Metrics. 351-356 - Harald Psaier, Florian Skopik

, Daniel Schall, Schahram Dustdar
:
Behavior Monitoring in Self-Healing Service-Oriented Systems. 357-366 - Chunxiang Xu, Yu Huang, Wanling Qu, Hanpin Wang, Xiaojuan Ban:

A Petri Net-Based Algorithm for RFID Event Detection. COMPSAC 2010: 367-372
Software Evolution and Maintenance II
- Xiaobing Sun

, Bixin Li, Chuanqi Tao, Wanzhi Wen, Sai Zhang:
Change Impact Analysis Based on a Taxonomy of Change Types. 373-382 - Hong Zhou, Hongji Yang, Andrew Hugill

:
An Ontology-Based Approach to Reengineering Enterprise Software for Cloud Computing. 383-388 - Liwei Shen, Xin Peng, Jiayi Zhu, Wenyun Zhao:

Synchronized Architecture Evolution in Software Product Line Using Bidirectional Transformation. 389-394
Performance Engineering
- S. Sharanyan, Arvind Kumar:

An Optimized Checkpointing Based Learning Algorithm for Single Event Upsets. 395-400 - Kyungmin Cho, Younghyun Ju, SungJae Jo, Yunseok Rhee, Junehwa Song:

A Scalable and Efficient Path Management Scheme for Internet-Based Sensor Data Delivery Infrastructure. 401-406 - Venkata Krishna Suhas Nerella, Swetha Surapaneni, Sanjay Kumar Madria, Thomas Weigert:

Exploring Query Optimization in Programming Codes by Reducing Run-Time Execution. 407-412
Verification & Testing III
- Yu-Chi Huang, Chin-Yu Huang, Jun-Ru Chang, Tsan-Yuan Chen:

Design and Analysis of Cost-Cognizant Test Case Prioritization Using Genetic Algorithm with Test History. 413-418 - Alberto González-Sanchez, Éric Piel, Hans-Gerhard Groß, Arjan J. C. van Gemund:

Minimising the Preparation Cost of Runtime Testing Based on Testability Metrics. 419-424
Formal Methods
- Hehua Zhang, Ming Gu, Xiaoyu Song:

Specifying Time-Sensitive Systems with TLA+. 425-430 - Sungwon Kang, Hyunho Kim, Jongmoon Baik, Ho-Jin Choi, ChangSup Keum:

Transformation Rules for Synthesis of UML Activity Diagram from Scenario-Based Specification. 431-436 - Zizhen Wang, Hanpin Wang, Yongzhi Cao

, Wanling Qu, Wei Jin, Meixia Zhu:
A Game Perspective of Refinement of Component Models. 437-442
Real-Time & Embedded Systems
- Xiaowei Zhang, Donggang Cao, Yunpeng Gao, Xiangqun Chen, Hong Mei:

An Automatic Configuration Approach to Improve Real-Time Application Throughput While Attaining Determinism. 443-452 - Yeonseung Ryu:

SAT: Switchable Address Translation for Flash Memory Storages. 453-461 - Nien-Lin Hsueh, Peng-Hua Chu, Pao-Ann Hsiung

, Min-Ju Chuang, William C. Chu, Chih-Hung Chang
, Chorng-Shiuh Koong, Chihhsiong Shih:
Supporting Design Enhancement by Pattern-Based Transformation. 462-467
Web Engineering
- Chunxiang Xu, Wanling Qu, Hanpin Wang, Zizhen Wang, Xiaojuan Ban:

A Petri Net-Based Method for Data Validation of Web Services Composition. 468-476 - Reza Babanezhad, Yusef Mehrdad Bibalan, Raman Ramsin

:
Process Patterns for Web Engineering. 477-486 - Wei Jin, Hanpin Wang, Yongzhi Cao

, Zizhen Wang, Xiaojuan Ban:
Modeling BPEL and BPEL4People with a Timed Interruptable pi-Calculus. 487-492
Software Quality II
- Wei Zhang, Carl K. Chang, Taiming Feng

, Hsinyi Jiang:
QoS-Based Dynamic Web Service Composition with Ant Colony Optimization. 493-502 - Tuan Khanh Le-Do, Kyung-A Yoon, Yeong-Seok Seo

, Doo-Hwan Bae:
Filtering of Inconsistent Software Project Data for Analogy-Based Effort Estimation. 503-508 - Yaw-Chung Chen, Shang-Shu Li, Kuan-Teng Chen:

An Efficient Source Allocation Approach for QoS Support in P2PTV Systems. 509-514
Verification & Testing IV
- Yue Lu, Thomas Nolte, Iain Bate, Christer Norström:

Timing Analyzing for Systems with Task Execution Dependencies. 515-524 - Yunja Choi:

Systematic Composition and Verification of Abstract Components. 525-530 - Chao-Jung Hsu, Chin-Yu Huang:

A Study on the Applicability of Modified Genetic Algorithms for the Parameter Estimation of Software Reliability Modeling. 531-540
Fast Abstracts II
- Jeong-Si Kim, Chaedeok Lim, Tae-Man Han:

A Model-Based Design Tool of Automotive Software Architecture. 541-542 - Yoshitaka Aoki, Saeko Matsuura:

A Method for Detecting Defects in Source Codes Using Model Checking Techniques. 543-544 - Ilhom Karimov

, Nuriddin Rayimov, Jing Liu, Jungwook Song, Sungchol Cho, Sunyoung Han, Chinchol Kim:
Reconnection of the Pre-assigning Peers in the Seamless Video Streaming. 545-546 - Rika Kawai, Atsuo Hazeyama:

A Know-How Recommendation System for a Software Engineering Project Course by Using the Content Filtering Technique. 547-548

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














