


default search action
33rd COMPSAC 2009: Seattle, Washington, USA - Volume 1
- Sheikh Iqbal Ahamed, Elisa Bertino, Carl K. Chang, Vladimir Getov, Lin Liu, Ming Hua, Rajesh Subramanyan:

Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 1. IEEE Computer Society 2009, ISBN 978-0-7695-3726-9
Location Based Services I (Privacy Protection in Location Based Services)
- Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Mohammad Tanviruzzaman:

A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services. 1-10 - Mehrab Monjur, Sheikh Iqbal Ahamed, Chowdhury Sharif Hasan:

ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems. 11-20 - Hendrik Lemelson, Stephan Kopf

, Thomas King, Wolfgang Effelsberg:
Improvements for 802.11-Based Location Fingerprinting Systems. 21-28
Location Based Services II (Privacy Protection in Location Based Services)
- Paolo Bellavista

, Antonio Corradi
, Luca Foschini
:
Enhancing the Scalability of IMS-Based Presence Service for LBS Applications. 29-36 - Peter Ruppel, Florian Gschwandtner, Corina Kim Schindhelm, Claudia Linnhoff-Popien:

Indoor Navigation on Distributed Stationary Display Systems. 37-44
Software Evolution I (Software Architecture Development and Evaluation)
- Kwanwoo Lee, Goetz Botterweck, Steffen Thiel:

Aspectual Separation of Feature Dependencies for Flexible Feature Composition. 45-52 - Dong Li, Carl K. Chang:

Initiating and Institutionalizing Software Product Line Engineering: From Bottom-Up Approach to Top-Down Practice. 53-60 - Marko Komssi, Marjo Kauppinen

, Juho Heiskari, Matti Ropponen:
Transforming a Software Product Company into a Service Business: Case Study at F-Secure. 61-66 - Mike Mannion

, Juha Savolainen, Timo Asikainen:
Viewpoint-Oriented Variability Modeling. 67-72
Testing I (Context-aware Software Analysis)
- Daniel Eichhorn, Agnes Koschmider

, Yu Li, Peter Stürzel, Andreas Oberweis, Ralf Trunko:
3D Support for Business Process Simulation. 73-80 - Lijun Mei, W. K. Chan

, T. H. Tse
, Fei-Ching Kuo:
An Empirical Study of the Use of Frankl-Weyuker Data Flow Testing Criteria to Test BPEL Web Services. 81-88 - Tsung-Han Tsai, Chin-Yu Huang, Jun-Ru Chang:

A Study of Applying Extended PIE Technique to Software Testability Analysis. 89-98
Testing II (Modularization, Composition and Reuse)
- Bo Jiang, Zhenyu Zhang, T. H. Tse

, Tsong Yueh Chen
:
How Well Do Test Case Prioritization Techniques Support Statistical Fault Localization. 99-106 - Youngki Park, Woosung Jung, Byungjeong Lee, Chisu Wu:

Automatic Discovery of Web Services Based on Dynamic Black-Box Testing. 107-114 - Siripol Noikajana, Taratip Suwannasart:

An Improved Test Case Generation Method for Web Service Testing from WSDL-S and OCL with Pair-Wise Testing Technique. 115-123
Testing III (Testing Economics, Models and Analysis)
- Carl J. Mueller, Dan E. Tamir, Oleg V. Komogortsev, Liam Feldman:

An Economical Approach to Usability Testing. 124-129 - Lixiao Zheng

, Duanyi Wu:
A Sentence Generation Algorithm for Testing Grammars. 130-135 - Sergiy A. Vilkomir, W. Thomas Swain, Jesse H. Poore:

Software Input Space Modeling with Constraints among Parameters. 136-141 - Qichang Chen, Liqiang Wang, Zijiang Yang:

HEAT: An Integrated Static and Dynamic Approach for Thread Escape Analysis. 142-147
Testing IV (Testing Theory, Methodology and Application)
- Hojun Jaygarl, Carl K. Chang, Sunghun Kim:

Practical Extensions of a Randomized Testing Tool. 148-153 - Martin Weiglhofer, Franz Wotawa

:
Asynchronous Input-Output Conformance Testing. 154-159 - Arnaud Gotlieb, Matthieu Petit:

Towards a Theory for Testing Non-terminating Programs. 160-165 - Lian Yu, Wei Zhao, Xiaofeng Di, Changzhu Kong, Wenbo Zhao, Qianxiang Wang, Jun Zhu:

Towards Call for Testing: An Application to User Acceptance Testing of Web Applications. 166-171
Software Quality I (Software Quality Measurement, Modelling and Analysis)
- Tae Yeon Kim, Yun Kyu Kim, Heung Seok Chae:

Towards Improving OCL-Based Descriptions of Software Metrics. 172-179 - Michael Grottke

, Christian A. Graf:
Modeling and Predicting Software Failure Costs. 180-189 - Beihong Jin, Haibin Weng, Yunfeng Wen, Faen Zhang:

A Service Discovery System Analyzed with a Queueing Theory Model. 190-198
Software Quality II (Software and Services Reliability Models)
- Lijun Wang, Xiaoying Bai, Lizhu Zhou, Yinong Chen

:
A Hierarchical Reliability Model of Service-Based Software System. 199-208 - Arne Beckhaus, Lars M. Karg, Gerrit Hanselmann:

Applicability of Software Reliability Growth Modeling in the Quality Assurance Phase of a Large Business Software Vendor. 209-215 - Chang-Ai Sun:

Towards Transaction-Based Reliable Service Compositions. 216-221
Software Quality III (Software Quality Improvement Technique)
- Fang Deng, Qianxiang Wang, Jin Shao:

Toward Middleware-Based Online Application Migration. 222-227 - Hong Zhu, Ian Bayley, Lijun Shan, Richard Amphlett:

Tool Support for Design Pattern Recognition at Model Level. 228-233 - M. K. Abdi, Hakim Lounis, Houari A. Sahraoui:

Predicting Change Impact in Object-Oriented Applications with Bayesian Networks. 234-239 - Xiaozhi Du, Yong Qi, Di Hou, Ying Chen, Xiao Zhong:

Modeling and Performance Analysis of Software Rejuvenation Policies for Multiple Degradation Systems. 240-245
Social Networks I (Collaborative Networks)
- Jordi Nin

, Barbara Carminati
, Elena Ferrari
, Vicenç Torra
:
Computing Reputation for Collaborative Private Networks. 246-253 - Yingbo Wang, Yali Wu, Andrew A. Allen

, Barbara Espinoza, Peter J. Clarke
, Yi Deng:
Towards the Operational Semantics of User-Centric Communication Models. 254-262 - Yi Wang, Huihui Shi:

Software Outsourcing Subcontracting and Its Impacts: An Exploratory Investigation. 263-270
Social Networks II (Trust and Contracting in Social Networks)
- Karim M. El Defrawy, John Solis, Gene Tsudik:

Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks. 271-279 - Claudia Canali

, Michele Colajanni
, Riccardo Lancellotti
:
Hot Set Identification for Social Network Applications. 280-285 - Manling Zhu, Zhi Jin:

An Agent-Based Framework Supporting Trust Evaluation for Service Selection. 286-291 - Dongwan Shin

, Rodrigo Lopes, William R. Claycomb, Gail-Joon Ahn
:
A Framework for Enabling User-Controlled Persona in Online Social Networks. 292-297
Embedded Systems I (Design and Verification of Embedded Systems)
- Youngsam Shin, Seungwon Lee:

ACaMES: A Novel Design Methodology on Multicore Embedded System. 298-304 - Nicholas T. Pilkington, Juncao Li, Fei Xie:

ESIDE: An Integrated Development Environment for Component-Based Embedded Systems. 305-314 - Hai Wan, Gang Chen, Xiaoyu Song, Ming Gu:

Formalization and Verification of PLC Timers in Coq. 315-323
Requirements Engineering I (Requirements Structure, Analysis, and Traceability)
- Zhe Chen, Gilles Motet:

System Safety Requirements as Control Structures. 324-331 - Gustaf Juell-Skielse

, Erik Perjons:
Improving E-Government through Benefit Analysis and Value Modeling. 332-339 - Jörn David, Maximilian Koegel, Helmut Naughton

, Jonas Helming:
Traceability ReARMed. 340-348
Requirements Engineering II (Process Analysis and Service Management)
- Sophie Ramel, Eric Grandry, Eric Dubois

:
Towards a Design Method Supporting the Alignment between Business and Software Services. 349-354 - Chris Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong:

A Framework for Cost Sensitive Assessment of Intrusion Response Selection. 355-360 - Ying Jin, Jing Zhang, Pengfei Ma, Weiping Hao, Shutong Luo, Zepeng Li:

Applying PageRank Algorithm in Requirement Concern Impact Analysis. 361-366 - Dongmei Xu, Jun Kurogi, Yoshihide Ohgame, Atsuo Hazeyama:

Distributed Collaborative Modeling Support System Associating UML Diagrams with Chat Messages. 367-372
Security I (Security Analysis and Protection Techniques)
- Hiroyuki Sato:

Analyzing Semantics of Documents by Using a Program Analysis Method. 373-382 - Shucai Xiao, Jung-Min Park, Yanzhu Ye:

Tamper Resistance for Software Defined Radio Software. 383-391 - Zhenyun Zhuang, Ying Li, Zesheng Chen:

PAIDS: A Proximity-Assisted Intrusion Detection System for Unidentified Worms. 392-399 - Kai Wang, Xukai Zou, Yan Sui:

A Multiple Secret Sharing Scheme based on Matrix Projection. 400-405
Security II (Intelligent Applications)
- Johan Åkerberg, Mats Björkman:

Exploring Security in PROFINET IO. 406-412 - Hyun-il Lim, Heewan Park, Seokwoo Choi, Taisook Han:

A Static Java Birthmark Based on Control Flow Edges. 413-420 - M. Fahim Ferdous Khan, Takeshi Yashiro, Ito So, Masahiro Bessho, Ken Sakamura:

A Secure and Flexible Electronic-Ticket System. 421-426
Software Architecture I (Software Architecture Development and Scheduling)
- Chao You, Minghui Zhou, Zan Xiao, Hong Mei:

Towards a Well Structured and Dynamic Application Server. 427-434 - Ali Razavi, Kostas Kontogiannis:

ProtoTalk: A Generative Software Engineering Framework for Prototyping Protocols in Smalltalk. 435-442 - Dongsun Kim

, Seokhwan Kim, Sooyong Park:
Usage History-Based Architectural Scheduling. 443-451
Software Architecture II (Software Architecture Specification and Analysis)
- J. Marco Mendes, Axel Bepperling, João Pinto, Paulo Leitão

, Francisco J. Restivo
, Armando W. Colombo
:
Software Methodologies for the Engineering of Service-Oriented Industrial Automation: The Continuum Project. 452-459 - Holger Arndt, Markus Bundschus, Andreas Nägele:

Towards a Next-Generation Matrix Library for Java. 460-467 - Zan Xiao, Donggang Cao, Chao You, Minghui Zhou, Hong Mei:

Towards Dynamic Component Updating: A Flexible and Lightweight Approach. 468-473
Software Architecture III (Analysis of Software Updates)
- Liang-Jie Zhang

, Jia Zhang:
Design of Service Component Layer in SOA Reference Architecture. 474-479 - George H. Ford Jr., Ramesh K. Karne, Alexander L. Wijesinha, Patrick Appiah-Kubi:

The Design and Implementation of a Bare PC Email Server. 480-485 - Feng Chen, Zhuopeng Zhang, Jianzhi Li, Jian Kang, Hongji Yang:

Service Identification via Ontology Mapping. 486-491
Mobile and Pervasive Computing I (RFID, Wireless Network and Services)
- Wei Ye, Wen Zhao, Yu Huang, Wenhui Hu, Shikun Zhang, Lifu Wang:

Towards Passive RFID Event. 492-499 - Mi-Young Park, Sang-Hwa Chung, Prasanthi Sreekumari:

Estimating Rate of Queue Usage to Differentiate Cause of Packet Loss in Multi-hop Wireless Networks. 500-508 - Antonin Chazalet, Philippe Lalanda:

Deployment of Services Applications in Services Execution Environments. 509-516
Mobile and Pervasive Computing II (Software Testing and Re-engineering)
- Kyungman Kwak, Gonzalo Huerta Cánepa, Yangwoo Ko, Dongman Lee, Soon J. Hyun:

An Overlay-Based Resource Monitoring Scheme for Social Applications in MANET. 517-524 - Lijun Mei, Zhenyu Zhang, W. K. Chan

:
More Tales of Clouds: Software Engineering Research Issues from the Cloud Application Perspective. 525-530 - Sushamna Deodhar, Alan L. Tharp:

Shift Hashing for Memory-Constrained Applications. 531-536 - Tiberiu Seceleanu

, Ivica Crnkovic
, Cristina Cerschi Seceleanu
:
Transaction Level Control for Application Execution on the SegBus Platform. 537-542
Formal Methods (Formal Specification and Model Checking)
- Jiaqi Zhu, Yu Huang, Hanpin Wang:

A Formal Descriptive Language and an Automated Detection Method for Complex Events in RFID. 543-552 - Min Zhou, Fei He, Ming Gu, Xiaoyu Song:

Translation-Based Model Checking for PLC Programs. 553-562 - Yuan Dong, Shengyuan Wang, Liwei Zhang, Ping Yang:

Modular Certification of Low-Level Intermediate Representation Programs. 563-570
Best Practice
- Jonas Helming, Jörn David, Maximilian Koegel, Helmut Naughton

:
Integrating System Modeling with Project Management - A Case Study. 571-578 - Gerhard Wellein

, Georg Hager
, Thomas Zeiser, Markus Wittmann, Holger Fehske:
Efficient Temporal Blocking for Stencil Computations by Multicore-Aware Wavefront Parallelization. 579-586 - Cheng-Zen Yang

, Ing-Xiang Chen, Jia-Da Ye:
Extensions for Integrated Queries on Heterogeneous Semantic Web Resources. 587-592 - Tad Gonsalves, Kei Yamagishi, Kiyoshi Itoh:

Swarm Intelligence in the Fine-Tuning of Software Development Cost Estimation Models. COMPSAC (1) 2009: 593-598
Education and Learning (Domain Specific Software Architecture Design)
- Steven Burrows, Alexandra L. Uitdenbogerd, Andrew Turpin:

Temporally Robust Software Features for Authorship Attribution. 599-606 - Li Jin

, Zhigang Wen
:
An Augmented Social Interactive Learning Approach through Web2.0. 607-611 - Shaoshan Liu, Chengrui Deng, Xiao-Feng Li, Jean-Luc Gaudiot:

RHE: A Lightweight JVM Instructional Tool. 612-619
Fast Abstracts I (Formal Methods, Software Tools, Robotics)
- Holger Arndt:

The Java Data Mining Package - A Data Processing Library for Java. 620-621 - Chih-Hong Cheng, Markus Rickert

, Christian Buckl
, Edward A. Lee, Alois C. Knoll
:
Toward the Design of Robotic Software with Verifiable Safety. 622-623 - Bingu Shim, Beomho Baek, Sooyong Park:

A Systematic Robot Fault-Tolerance Approach. 624-625 - James D. McCaffrey:

Generation of Pairwise Test Sets Using a Genetic Algorithm. 626-631 - Han Li, Feng Chen, Hongji Yang, He Guo, William Cheng-Chung Chu, Yuansheng Yang:

An Ontology-Based Approach for GUI Testing. 632-633 - David S. Allison, Hany F. El Yamany

, Miriam A. M. Capretz:
A Fine-Grained Privacy Structure for Service-Oriented Architecture. 634-635
Fast Abstracts II (Software Engineering, MDA)
- Clênio F. Salviano:

A Multi-model Process Improvement Methodology Driven by Capability Profiles. 636-637 - Xiao He

, Zhiyi Ma, Yan Zhang, Weizhong Shao:
On Model Transformation Reuse. 638-639 - Xiaohong Li, Qiang Liu:

Requirement Risk Assessment Focused-On Stakeholder Risk Analysis. 640-641 - Mira Kajko-Mattsson, Jan Lundholm, Jonas Norrby:

Industrial Opinion on the Effectiveness of Risk Management Methods. 642-643 - Nancy R. Mead

, Antonio Drommi, Daniel Shoemaker, Jeffrey A. Ingalsbe:
A Study of the Impact on Students Understanding Cross Cultural Differences in Software Engineering Work. 644-645 - Richard C. Millham

, Hongji Yang:
Industrial Report: Data Reengineering of COBOL Sequential Legacy Systems. 646-647
Doctoral Symposium
- David A. Cape, Bruce M. McMillin

:
Dihomotopic Reduction Used in Deadlock Detection. 648-651 - Aneta Vulgarakis:

Towards a Resource-Aware Component Model for Embedded Systems. 652-655 - Jan Stender:

Efficient Management of Consistent Backups in a Distributed File System. 656-659 - Ravi Akella, Bruce M. McMillin

:
Model-Checking BNDC Properties in Cyber-Physical Systems. 660-663 - Cristian Dittamo:

On Expressing Different Concurrency Paradigms on Virtual Execution Systems. 664-667 - Jing Lin, Sahra Sedigh

, Ann Miller:
A General Framework for Quantitative Modeling of Dependability in Cyber-Physical Systems: A Proposal for Doctoral Research. 668-671 - Ayman Z. Faza

, Sahra Sedigh
, Bruce M. McMillin:
Reliability Modeling for the Advanced Electric Power Grid: A Proposal for Doctoral Research. 672-675 - Qichang Chen, Liqiang Wang:

An Integrated Framework for Checking Concurrency-Related Programming Errors. 676-679

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














