Search For:

Displaying 1-50 out of 160 total
Is operator-based mutant selection superior to random mutant selection?
Found in: Software Engineering, International Conference on
By Lu Zhang,Shan-Shan Hou,Jun-Jue Hu,Tao Xie,Hong Mei
Issue Date:May 2010
pp. 435-444
Due to the expensiveness of compiling and executing a large number of mutants, it is usually necessary to select a subset of mutants to substitute the whole set of generated mutants in mutation testing and analysis. Most existing research on mutant selecti...
 
Consumer-Centric Web Services Discovery and Subscription
Found in: E-Business Engineering, IEEE International Conference on
By Xuanzhe Liu, Li Zhou, Gang Huang, Hong Mei
Issue Date:October 2007
pp. 543-550
Nowadays, there are a number of similar web services over the internet or intranet. They provide consumers with more choices according to their personalized QoS requirements. However, in current web service discovery and subscription, it takes consumers to...
 
Development of software engineering: co-operative efforts from academia, government and industry
Found in: Software Engineering, International Conference on
By Hong Mei, Fuqing Yang
Issue Date:May 2006
pp. 2-11
In the past 40 years, software engineering has emerged as an important sub-field of computer science. The quality and productivity of software have been improved and the cost and risk of software development been decreased due to the contributions made in ...
 
Internetware: Challenges and Future Direction of Software Paradigm for Internet as a Computer
Found in: Computer Software and Applications Conference, Annual International
By Hong Mei
Issue Date:July 2010
pp. 14-16
Internet is becoming an open, global, ubiquitous and smarter computer for our society and planet. Such “Internet as a Computer” requires substantial improvements in software characteristics such as collaborative, situational, autonomous, evolvable and trus...
 
Towards End User Service Composition
Found in: Computer Software and Applications Conference, Annual International
By Xuanzhe Liu, Gang Huang, Hong Mei
Issue Date:July 2007
pp. 676-678
The popularity of Service Oriented Computing (SOC) brings a large number of distributed, well-encapsulated and reusable services all over internet, and makes it possible to create value-added services by means of service composition. Current composition st...
 
Finding the merits and drawbacks of software resources from comments
Found in: Automated Software Engineering, International Conference on
By Changsheng Liu, Yanzhen Zou, Sibo Cai,Bing Xie, Hong Mei
Issue Date:November 2011
pp. 432-435
In order to reuse software resources efficiently, developers need necessary quality guarantee on software resources. However, our investigation proved that most software resources on the Internet did not provide enough quality descriptions. In this paper, ...
 
A Configuration Management System Supporting Component-Based Software Development
Found in: Computer Software and Applications Conference, Annual International
By Lu Zhang, Hong Mei, Hong Zhu
Issue Date:October 2001
pp. 25
Component-based software development has been viewed as an emerging paradigm of software development. This paper analyzes the requirements of configuration management in component-based development process. Based on the analysis, a prototype configuration ...
 
The Anti-salt Fog Surface Treatment Technology on Wind Turbine
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Sun Hong-Mei,Feng Xi-Guo
Issue Date:January 2013
pp. 1394-1395
Through expatiating the origin and corrosion characters of salt fog, discussing the hazard problems of salt fog to high-power wind generating set, preventive salt fog measures of wind generating set are put forward, and new anticorrosion schemes for wind g...
 
A General Framework for Publishing Privacy Protected and Utility Preserved Graph
Found in: 2012 IEEE 12th International Conference on Data Mining (ICDM)
By Mingxuan Yuan,Lei Chen,Weixiong Rao,Hong Mei
Issue Date:December 2012
pp. 1182-1187
The privacy protection of graph data has become more and more important in recent years. Many works have been proposed to publish a privacy preserving graph. All these works prefer publishing a graph, which guarantees the protection of certain privacy with...
 
Internetware: A Software Paradigm for Internet Computing
Found in: Computer
By Hong Mei,Gang Huang,Tao Xie
Issue Date:June 2012
pp. 26-31
To meet the needs of computing in the Internet environment, the Internetware software paradigm provides a set of technologies that support the development of applications with characteristics that are autonomous, cooperative, situational, evolvable, emerge...
 
SM@RT: representing run-time system data as MOF-compliant models
Found in: Software Engineering, International Conference on
By Hui Song,Gang Huang,Franck Chauvel,Yanchun Sun,Hong Mei
Issue Date:May 2010
pp. 303-304
Runtime models represent the dynamic data of running systems, and enable developers to manipulate the data in an abstract, model-based way. This paper presents SM@RT, a tool that help realize runtime models on a wide class of systems. Receiving a meta-mode...
 
JDF: detecting duplicate bug reports in Jazz
Found in: Software Engineering, International Conference on
By Yoonki Song,Xiaoyin Wang,Tao Xie,Lu Zhang,Hong Mei
Issue Date:May 2010
pp. 315-316
Both developers and users submit bug reports to a bug repository. These reports can help reveal defects and improve software quality. As the number of bug reports in a bug repository increases, the number of the potential duplicate bug reports increases. D...
 
A Browser-Based Middleware for Service-Oriented Rich Client
Found in: Service Sciences, International Conference on
By Qi Zhao, Xuanzhe Liu, Gang Huang, Jiyu Huang, Hong Mei
Issue Date:May 2010
pp. 22-27
Along with the proliferation of web-delivered services and the wide adoption of popular Web technologies, it has been an emerging development style that composes service-oriented applications with rich user experiences in the web browser. Currently, these ...
 
A User-Oriented Approach to Automated Service Composition
Found in: Web Services, IEEE International Conference on
By Xuanzhe Liu, Gang Huang, Hong Mei
Issue Date:September 2008
pp. 773-776
In the past a few years, the Web has undergone a tremendous change towards a highly user-centric environment. Millions of users can participate and collaborate for their own interests and benefits. Service Oriented Computing and web services have created g...
 
An Approach for Generation of J2EE Access Control Configurations from Requirements Specification
Found in: Quality Software, International Conference on
By Lianshan Sun, Gang Huang, Yanchun Sun, Hui Song, Hong Mei
Issue Date:August 2008
pp. 87-96
Access control of sensitive resources is a widely used means to achieve information security. When building large-scale systems based on popular commercial component middleware, such as J2EE, a usual way to enforce access control is to define access contro...
 
Self-Adaptive Software: Cybernetic Perspective and an Application Server Supported Framework
Found in: Computer Software and Applications Conference, Annual International
By Junrong Shen, Qianxiang Wang, Hong Mei
Issue Date:September 2004
pp. 92-95
With emerging areas such as web services, pervasive computing, wireless sensor networks and so on, self-adaptive software is becoming more and more important and topical. As a new emerging discipline, self-adaptive software has strong background in control...
 
Algorithms for Parallel Machine Scheduling on Any Number of Machine
Found in: Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, IACIS International Symposium on
By Li Meng, Sun Qiu Mei, Hao Fei Long, Song Hong Mei
Issue Date:October 2010
pp. 12-17
In this paper, we present algorithms for the problem of scheduling n independent jobs on m identical machines. As a generalization of the classical parallel machine scheduling problem each machine is available only at a machine dependent release time. For ...
 
Traceability between Software Architecture Models
Found in: Computer Software and Applications Conference, Annual International
By Yaodong Feng, Gang Huang, Jie Yang, Hong Mei Mei
Issue Date:September 2006
pp. 41-44
Software architecture (SA) is the blueprint of the software system and considered as one of the most important artifacts in component based development. The design and analysis of SA can be very complex. Under the inspiration of Model-Driven Development, t...
 
QoS-Driven Service Composition with Reconfigurable Services
Found in: IEEE Transactions on Services Computing
By Hui Ma,Favyen Bastani,I-Ling Yen,Hong Mei
Issue Date:January 2013
pp. 20-34
Service-oriented architecture provides a framework for achieving rapid system composition and deployment. To satisfy different system QoS requirements, it is possible to select an appropriate set of concrete services and compose them to achieve the QoS goa...
 
Research on the Performance Appraisal of Construction Enterprise Independent Innovation Based on the Grey Relevance Theory
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Yuan Qi-Liang,Wan Hong-Mei
Issue Date:January 2013
pp. 1210-1214
Based on the gray relevance theory, this paper analyses the level and ranking of input relational grade, output relational grade, the relational grade of input effectiveness, and the relational grade of organizing effectiveness in large and medium Construc...
 
A self-management approach for service developers of PaaS
Found in: Service-Oriented System Engineering, IEEE International Workshop on
By Hao Wei,Jin Shao,Bang Liu,Haiwen Liu,Qianxiang Wang,Hong Mei
Issue Date:December 2011
pp. 85-92
SaaS (Software as a Service) has been widely recognized as a new kind of service. Meanwhile, PaaS (Platform as a Service) is emerging in recent years. The management of service on PaaS platform is quite different from that of traditional services. This pap...
 
Tuning Adaptive Computations for Performance Improvement of Autonomic Middleware in PaaS Cloud
Found in: Cloud Computing, IEEE International Conference on
By Ying Zhang,Gang Huang,Xuanzhe Liu,Hong Mei
Issue Date:July 2011
pp. 732-733
In a cloud platform belonging to the PaaS (Platform as a Service) category, autonomic middleware have become the fundamental part of a cloud node. An autonomic middleware can perform adaptive computations for self-management of the system. However, these a...
 
Towards SOA-Based Code Defect Analysis
Found in: Service-Oriented System Engineering, IEEE International Workshop on
By Qianxiang Wang, Na Meng, Zhiyi Zhou, Jinhui Li, Hong Mei
Issue Date:December 2008
pp. 269-274
Static code analysis is the analysis of software that is performed to acquire information concerning the dynamic behavior of programs built from that software, without actually executing the programs. Currently, most analysis techniques are implemented as ...
 
Towards Service Discovery and Subscription based on Community-of-Interest
Found in: Service-Oriented System Engineering, IEEE International Workshop on
By Xuanzhe Liu, Gang Huang, Hong Mei
Issue Date:October 2006
pp. 167-174
Current service discovery and subscription are
 
Towards Autonomic Computing Middleware via Reflection
Found in: Computer Software and Applications Conference, Annual International
By Gang Huang, Tiancheng Liu, Hong Mei, Zizhan Zheng, Zhao Liu, Gang Fan
Issue Date:September 2004
pp. 135-140
Autonomic computing middleware is a promising way to enable middleware based systems to cope with the rapid and continuous changes in the era of Internet. Technically, there have three fundamental and challenging capabilities to an autonomic computing midd...
 
Locating Need-to-Externalize Constant Strings for Software Internationalization with Generalized String-Taint Analysis
Found in: IEEE Transactions on Software Engineering
By Xiaoyin Wang,Lu Zhang,Tao Xie,Hong Mei,Jiasu Sun
Issue Date:April 2013
pp. 516-536
Nowadays, a software product usually faces a global market. To meet the requirements of different local users, the software product must be internationalized. In an internationalized software product, user-visible hard-coded constant strings are externaliz...
 
Effective Message-Sequence Generation for Testing BPEL Programs
Found in: IEEE Transactions on Services Computing
By Yitao Ni, Shan-Shan Hou, Lu Zhang, Jun Zhu, Zhong Jie Li, Qian Lan, Hong Mei, Jia-Su Sun
Issue Date:January 2013
pp. 7-19
With the popularity of Web Services and Service-Oriented Architecture (SOA), quality assurance of SOA applications, such as testing, has become a research focus. Programs implemented by the Business Process Execution Language for Web Services (WS-BPEL), wh...
 
A Core-Periphery-Legality Architectural Style for Open Source System Development
Found in: 2013 46th Hawaii International Conference on System Sciences (HICSS)
By Alexander Lokhman,Tommi Mikkonen,Imed Hammouda,Rick Kazman,Hong-Mei Chen
Issue Date:January 2013
pp. 3148-3157
Despite the rapid rise of open source systems (OSS), it is unclear what architectural patterns enable the success of these systems. There is little guidance on architectural patterns for OSS development. Consequently the creators of OSS projects have often...
   
A Static Approach to Prioritizing JUnit Test Cases
Found in: IEEE Transactions on Software Engineering
By Hong Mei,Dan Hao,Lingming Zhang,Lu Zhang,Ji Zhou,Gregg Rothermel
Issue Date:November 2012
pp. 1258-1275
Test case prioritization is used in regression testing to schedule the execution order of test cases so as to expose faults earlier in testing. Over the past few years, many test case prioritization techniques have been proposed in the literature. Most of ...
 
Can I clone this piece of code here?
Found in: 2012 27th IEEE/ACM International Conference on Automated Software Engineering (ASE)
By Xiaoyin Wang,Yingnong Dang,Lu Zhang,Dongmei Zhang,Erica Lan,Hong Mei
Issue Date:September 2012
pp. 170-179
While code cloning is a convenient way for developers to reuse existing code, it may potentially lead to negative impacts, such as degrading code quality or increasing maintenance costs. Actually, some cloned code pieces are viewed as harmless since they e...
 
Mining binary constraints in the construction of feature models
Found in: 2012 IEEE 20th International Requirements Engineering Conference (RE)
By Li Yi,Wei Zhang,Haiyan Zhao,Zhi Jin,Hong Mei
Issue Date:September 2012
pp. 141-150
Feature models provide an effective way to organize and reuse requirements in a specific domain. A feature model consists of a feature tree and cross-tree constraints. Identifying features and then building a feature tree takes a lot of effort, and many se...
 
Intelligent Question Answering System of Research Based Ontology on Excellent Courses: "University Computer Basis" Course as an Example
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Liu Hong Mei
Issue Date:August 2012
pp. 784-787
The intelligent degree of question answering system is the important factors that influences the sustainable development of the excellent course. The intelligent question answering system based ontology can automatically generate the related knowledge area...
 
Improved 3GPP System and WLAN Interworking Network Architecture
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Hong Mei Liu
Issue Date:August 2012
pp. 830-833
We proposed an improved 3GPP system and WLAN interworking network architecture by adding a management server in current architecture. This paper described the switchover process, the function of management server (MS). It analysed the security, load balanc...
 
An Effective Defect Detection and Warning Prioritization Approach for Resource Leaks
Found in: 2012 IEEE 36th Annual Computer Software and Applications Conference - COMPSAC 2012
By Guangtai Liang,Qian Wu,Qianxiang Wang,Hong Mei
Issue Date:July 2012
pp. 119-128
Failing to release unneeded system resources such as I/O streams can result in resource leaks, which can lead to performance degradation and system crashes. Existing resource-leak detectors are usually based on predefined defect patterns to detect resource...
 
Towards Online Localization and Recovery for Faulty Components in Component-Based Applications
Found in: 2012 IEEE 36th Annual Computer Software and Applications Conference - COMPSAC 2012
By Chao You,Minghui Zhou,Hongwu Lin,Zan Xiao,Hong Mei
Issue Date:July 2012
pp. 138-147
Off-The-Shelf (COTS) software components have been extensively used by applications over the world. However, COTS components always carry issues that might and sometimes only take place at runtime, in particular, when combined with other components. This m...
 
Iterative mining of resource-releasing specifications
Found in: Automated Software Engineering, International Conference on
By Qian Wu,Guangtai Liang,Qianxiang Wang,Tao Xie,Hong Mei
Issue Date:November 2011
pp. 233-242
Software systems commonly use resources such as network connections or external file handles. Once finish using the resources, the software systems must release these resources by explicitly calling specific resource-releasing API methods. Failing to relea...
 
Towards a Constraint-Based Framework for Dynamic Business Process Adaptation
Found in: Services Computing, IEEE International Conference on
By Zan Xiao,Donggang Cao,Chao You,Hong Mei
Issue Date:July 2011
pp. 685-692
The dynamic unpredictable nature of service-oriented environments demands service-based systems to be inherently flexible and adaptive. In this paper, we propose a constraint-based framework for supporting dynamic business process adaptation. In our framew...
 
A Policy-Based Framework for Automated Service Level Agreement Negotiation
Found in: Web Services, IEEE International Conference on
By Zan Xiao,Donggang Cao,Chao You,Hong Mei
Issue Date:July 2011
pp. 682-689
Service Level Agreements (SLAs) play an important role in service-based systems. However, traditional approaches to establish SLAs are mostly manual and predefined which is not suitable for the highly dynamic and unpredictable service-oriented environment....
 
Composing Data-Driven Service Mashups with Tag-Based Semantic Annotations
Found in: Web Services, IEEE International Conference on
By Xuanzhe Liu,Qi Zhao,Gang Huang,Hong Mei,Teng Teng
Issue Date:July 2011
pp. 243-250
Spurred by Web 2.0 paradigm, there emerge large numbers of service mashups by composing readily accessible data and services. Mashups usually address solving situational problems and require quick and iterative development lifecyle. In this paper, we propo...
 
Detecting Concurrency-Related Problematic Activity Arrangement in WS-BPEL Programs
Found in: Services Computing, IEEE International Conference on
By Yitao Ni,Lu Zhang,Zhongjie Li,Tao Xie,Hong Mei
Issue Date:July 2011
pp. 209-217
A composite web service often interacts with several partner web services hosted in different servers. These partner web services are represented as activities in a WS-BPEL program describing the composite web service. Invoking the maximal number of these ...
 
Towards Balancing Determinism, Memory Consumption and Throughput for RTSJ-Based Real-Time Applications
Found in: Quality Software, International Conference on
By Xiaowei Zhang, Donggang Cao, Hong Mei, Fuqing Yang
Issue Date:July 2011
pp. 86-95
Determinism, memory consumption and throughput are three important performance indicators for RTSJ-based real-time applications, but they often interact and conflict with each other. Manually balancing these performance indicators is often time-consuming. ...
 
Auto-tuning Dense Matrix Multiplication for GPGPU with Cache
Found in: Parallel and Distributed Systems, International Conference on
By Xiang Cui, Yifeng Chen, Changyou Zhang, Hong Mei
Issue Date:December 2010
pp. 237-242
In this paper we discuss about our experiences in improving the performance of GEMM (both single and double precision) on Fermi architecture using CUDA, and how the new features of Fermi such as cache affect performance. It is found that the addition of ca...
 
Lazy Runtime Verification for Constraints on Interacting Objects
Found in: Asia-Pacific Software Engineering Conference
By Jin Shao, Fang Deng, Haiwen Liu, Qianxiang Wang, Hong Mei
Issue Date:December 2010
pp. 242-251
Application Programming Interface (API) constraints on objects are rules that API client code must follow in order to get expected results from these objects. Runtime verification, an important approach for detecting API constraint violations, usually suff...
 
Security Model Oriented Attestation on Dynamically Reconfigurable Component-Based Systems
Found in: Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on
By Liang Gu, Guangdong Bai, Yao Guo, Xiangqun Chen, Hong Mei
Issue Date:October 2010
pp. 299-304
As more and more component-based systems (CBS) run in the open and dynamic Internet, it is very important to establish trust between clients and CBS. One of the key mechanisms to establish trust among different platforms in an open and dynamic environment ...
 
A Self-Adaptive Mechanism for Software Configuration Based on Case-based Reasoning and Policy
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Maoguang Wang, Hong Mei, Wenpin Jiao, Junjing Jie, Jianzhu Ma
Issue Date:October 2010
pp. 250-255
Self-adaptive software expects the system to adapt its behaviors to environment changes. One main challenge is how to improve self-adaptation efficiency. In this paper case-based reasoning method is used to support the self-configuration case reuse which r...
 
Test generation via Dynamic Symbolic Execution for mutation testing
Found in: Software Maintenance, IEEE International Conference on
By Lingming Zhang, Tao Xie, Lu Zhang, Nikolai Tillmann, Jonathan de Halleux, Hong Mei
Issue Date:September 2010
pp. 1-10
Mutation testing has been used to assess and improve the quality of test inputs. Generating test inputs to achieve high mutant-killing ratios is important in mutation testing. However, existing test-generation techniques do not provide effective support fo...
 
A Task-Oriented Navigation Approach to Enhance Architectural Description Comprehension
Found in: Computer Software and Applications Conference, Annual International
By Wenhui Zhu, Yang Tao, Gang Huang, Yanchun Sun, Hong Mei
Issue Date:July 2010
pp. 62-71
The way to document architecture is called Architecture Description (AD). It contains all the key design decisions, presents how the system is composed, specifies the interface of the component, and etc. Such information is needed not only during the whole...
 
An Automatic Configuration Approach to Improve Real-Time Application Throughput While Attaining Determinism
Found in: Computer Software and Applications Conference, Annual International
By Xiaowei Zhang, Donggang Cao, Yunpeng Gao, Xiangqun Chen, Hong Mei
Issue Date:July 2010
pp. 443-452
Determinism and throughput are two important performance measures for Java-based real-time applications, but they often conflict. Therefore, it is significant to improve throughput for Java-based real-time applications while guaranteeing its execution time...
 
Towards an Empirical Reuse Approach for the Software Evolution: A Case Study
Found in: Quality Software, International Conference on
By Ziyou Wang, Minghui Zhou, Hong Mei
Issue Date:July 2010
pp. 282-287
Software systems must evolve, or they risk losing market share to competitors. However, evolving such a system is extraordinarily difficult, complicated, and time consuming. In this case, how to reuse the existing features of the previous version and reduc...
 
A Runtime Model Based Monitoring Approach for Cloud
Found in: Cloud Computing, IEEE International Conference on
By Jin Shao, Hao Wei, Qianxiang Wang, Hong Mei
Issue Date:July 2010
pp. 313-320
Monitoring plays a significant role in improving the quality of service in cloud computing. It helps clouds to scale resource utilization adaptively, to identify defects in services for service developers, and to discover usage patterns of numerous end use...
 
 1  2 Next >>