Search For:

Displaying 1-28 out of 28 total
Facilitating e-Negotiation Processes with Semantic Web Technologies
Found in: Hawaii International Conference on System Sciences
By Dickson K. W. Chiu, S. C. Cheung, Patrick C. K. Hung, Ho-fung Leung
Issue Date:January 2005
pp. 36a
Semantic Web technologies have recently been maturing to make e-commerce interactions and cross-organizational processes more flexible and automated. Ontology has also been developed in various business domains. However, researches in Semantic Web have lar...
   
Detecting atomic-set serializability violations in multithreaded programs through active randomized testing
Found in: Software Engineering, International Conference on
By Zhifeng Lai,S. C. Cheung,W. K. Chan
Issue Date:May 2010
pp. 235-244
Concurrency bugs are notoriously difficult to detect because there can be vast combinations of interleavings among concurrent threads, yet only a small fraction can reveal them. Atomic-set serializability characterizes a wide range of concurrency bugs, inc...
 
Publishing and composition of atomicity-equivalent services for B2B collaboration
Found in: Software Engineering, International Conference on
By W. K. Chan, S. C. Cheung, Chunyang Ye
Issue Date:May 2006
pp. 351-360
Exception handling resolves inconsistency by backward or forward error recovery methods or both in Business-to-Business (B2B) process collaboration. To avoid committing irrevocable tasks followed by exceptions, B2B processes, which guarantee the atomicity ...
 
On the Modelling of Document Exchange Processes in E-Commerce Protocols
Found in: Asia-Pacific Conference on Quality Software
By X. Wang, S.-C. Cheung, J. Wei
Issue Date:December 2001
pp. 0387
This paper presents an approach to modelling e- commerce protocols in a combined language of CSP and Z. It is illustrated by a practical application on one of the most important Internet retailing protocol, Internet Open Trading Protocol (IOTP). Compared t...
 
Use of Cryptographic Technologies for Privacy Protection of Watermarks in Internet Retails of Digital Contents
Found in: Advanced Information Networking and Applications, International Conference on
By Changjie Wang, Ho-fung Leung, S. C. Cheung, Yumin Wang
Issue Date:March 2004
pp. 414
In this paper, we propose an implementation of secure watermarking protocol using cryptographic technologies for use in real-life Internet retails market of digital contents, in which there is no trust assumption between a customer and a digital contents p...
 
Towards the Application of Classification Techniques to Test and Identify Faults in Multimedia Systems
Found in: Quality Software, International Conference on
By M. Y. Cheng, S. C. Cheung, T. H. Tse
Issue Date:September 2004
pp. 32-40
The advances in computer and graphic technologies have led to the popular use of multimedia for information exchange. However, multimedia systems are difficult to test. A major reason is that these systems generally exhibit fuzziness in their temporal beha...
 
Reference Models and Automatic Oracles for the Testing of Mesh Simplification Software for Graphics Rendering
Found in: Computer Software and Applications Conference, Annual International
By W. K. Chan, S. C. Cheung, Jeffrey C.F. Ho, T.H. Tse
Issue Date:September 2006
pp. 429-438
Software with graphics rendering is an important class of applications. Many of them use polygonal models to represent the graphics. Mesh simplification is a vital technique to vary the levels of object details and, hence, improve the overall performance o...
 
Incremental consistency checking for pervasive context
Found in: Software Engineering, International Conference on
By W. K. Chan, S. C. Cheung, Chang Xu
Issue Date:May 2006
pp. 292-301
Applications in pervasive computing are typically required to interact seamlessly with their changing environments. To provide users with smart computational services, these applications must be aware of incessant context changes in their environments and ...
 
Towards a Metamorphic Testing Methodology for Service-Oriented Software Applications
Found in: Quality Software, International Conference on
By W. K. Chan, S. C. Cheung, Karl. R. P.H. Leung
Issue Date:September 2005
pp. 470-476
Web services have been increasingly used to integrate and build business applications over the Internet in the recent years. Once a Web service is published and deployed, other applications can discover and invoke it. A component Web service usually provid...
 
A Three-Layer Architecture for E-Contract Enforcement in an E-Service Environment
Found in: Hawaii International Conference on System Sciences
By Dickson K. W. Chiu, S. C. Cheung, Sven Till
Issue Date:January 2003
pp. 74a
In an e-service environment, contracts are important for attaining business process interoperability and enforcing their proper enactment. An e-contract is the computerized facilitation or automation of a contract in a cross-organizational business process...
   
Rights Protection for Digital Contents Redistribution Over the Internet
Found in: Computer Software and Applications Conference, Annual International
By S. C. Cheung, Hanif Curreem
Issue Date:August 2002
pp. 105
Although Customer-to-Customer (C2C) business model has been around for years, second-hand markets of digital contents over the Internet are still unpopular. A key factor to the success of second-hand markets lies in the support of rights management of digi...
 
A Multi-Agent Infrastructure for Mobile Workforce Management in a Service Oriented Enterprise
Found in: Hawaii International Conference on System Sciences
By Dickson K. W. Chiu, S. C. Cheung, Ho-fung Leung
Issue Date:January 2005
pp. 85c
With recent advances in mobile technologies and infrastructures, there are increasing demands for the support of mobile workforce management (MWM) across multiple platforms. Mobile users can interact with the MWM system through SMS messages or Web browsers...
   
On the e-Negotiation of Unmatched Logrolling Views
Found in: Hawaii International Conference on System Sciences
By S. C. Cheung, Patrick C. K. Hung, Dickson K. W. Chiu
Issue Date:January 2003
pp. 29b
An e-Negotiation process comprises computer-facilitated tasks, each of which aims at resolving an issue or a collection of co-related issues under negotiation. It involves an iterative decision process in which two or more parties make individual decisions...
   
Automatic Generation of Database Instances for White-box Testing
Found in: Computer Software and Applications Conference, Annual International
By Jian Zhang, Chen Xu, S.-C. Cheung
Issue Date:October 2001
pp. 161
Testing is a critical activity for database application programs as faults if undetected could lead to unrecoverable data loss. Database application programs typically contain statements written in an imperative programming language with embedded data mani...
 
A Watermarking Infrastructure for Enterprise Document Management
Found in: Hawaii International Conference on System Sciences
By S. C. Cheung, Dickson K. W. Chiu
Issue Date:January 2003
pp. 105b
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been employed extensively for protecting rights of multimedia digital contents over th...
   
The first international workshop on automation of software test
Found in: Software Engineering, International Conference on
By Joseph R. Horgan, J. Jenny Li, S. C. Cheung, Hong Zhu
Issue Date:May 2006
pp. 1028-1029
No abstract available
   
Flows and views for scalable scientific process integration
Found in: Proceedings of the 1st international conference on Scalable information systems (InfoScale '06)
By Dickson K. W. Chiu, Patrick C. K. Hung, Qing Li, S. C. Cheung, Zhe Shan
Issue Date:May 2006
pp. 30-es
Workflow technology has recently been employed in scientific applications because of their ever-increasing complexities across multiple organizations, institutes, research labs, or units over the Internet and Intranet. In this paper, we propose a methodolo...
     
Partial constraint checking for context consistency in pervasive computing
Found in: ACM Transactions on Software Engineering and Methodology (TOSEM)
By Chang Xu, Chunyang Ye, S. C. Cheung, W. K. Chan
Issue Date:January 2010
pp. 1-61
Pervasive computing environments typically change frequently in terms of available resources and their properties. Applications in pervasive computing use contexts to capture these changes and adapt their behaviors accordingly. However, contexts available ...
     
Inter-context control-flow and data-flow test adequacy criteria for nesC applications
Found in: Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering (SIGSOFT '08/FSE-16)
By S. C. Cheung, W. K. Chan, Zhifeng Lai
Issue Date:November 2008
pp. 1-2
NesC is a programming language for applications that run on top of networked sensor nodes. Such an application mainly uses an interrupt to trigger a sequence of operations, known as contexts, to perform its actions. However, a high degree of inter-context ...
     
On impact-oriented automatic resolution of pervasive context inconsistency
Found in: Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering (ESEC-FSE '07)
By Chang Xu, Chunyang Ye, S. C. Cheung, W. K. Chan
Issue Date:September 2007
pp. 569-572
Context-awareness is a capability that allows applications in pervasive computing to adapt themselves continuously to changing contexts of their environments. However, contexts from physical environments may be inconsistent. It affects the correctness of t...
     
Detection and resolution of atomicity violation in service composition
Found in: Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering (ESEC-FSE '07)
By Chang Xu, Chunyang Ye, S. C. Cheung, W. K. Chan
Issue Date:September 2007
pp. 235-244
Atomicity is a desirable property that safeguards application consistency for service compositions. A service composition exhibiting this property could either complete or cancel itself without any side effects. It is possible to achieve this property for ...
     
Toward effective deployment of design patterns for software extension: a case study
Found in: Proceedings of the 2006 international workshop on Software quality (WoSQ '06)
By S. C. Cheung, T. H. Ng, W. K. Chan, Y. T. Yu
Issue Date:May 2006
pp. 51-56
A design pattern documents a reference design for the solution to a recurring problem encountered in object-oriented software development. The fundamental theme of design patterns is to encapsulate the concepts that vary. Software practitioners generally t...
     
The first international workshop on automation of software test
Found in: Proceeding of the 28th international conference on Software engineering (ICSE '06)
By Hong Zhu, J. Jenny Li, Joseph R. Horgan, S. C. Cheung
Issue Date:May 2006
pp. 1028-1029
In many industries, the adoption of technology developed at universities and independent research labs is the prevalent paradigm. However, in the software space, this is a relatively rare occurrence. In many cases, academic software engineering tends to la...
     
Publishing and composition of atomicity-equivalent services for B2B collaboration
Found in: Proceeding of the 28th international conference on Software engineering (ICSE '06)
By Chunyang Ye, S. C. Cheung, W. K. Chan
Issue Date:May 2006
pp. 351-360
Exception handling resolves inconsistency by backward or forward error recovery methods or both in Business-to-Business (B2B) process collaboration. To avoid committing irrevocable tasks followed by exceptions, B2B processes, which guarantee the atomicity ...
     
Incremental consistency checking for pervasive context
Found in: Proceeding of the 28th international conference on Software engineering (ICSE '06)
By Chang Xu, S. C. Cheung, W. K. Chan
Issue Date:May 2006
pp. 292-301
Applications in pervasive computing are typically required to interact seamlessly with their changing environments. To provide users with smart computational services, these applications must be aware of incessant context changes in their environments and ...
     
Inconsistency detection and resolution for context-aware middleware support
Found in: Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering (ESEC/FSE-13)
By Chang Xu, S. C. Cheung
Issue Date:September 2005
pp. 336-345
Context-awareness is a key feature of pervasive computing whose environments keep evolving. The support of context-awareness requires comprehensive management including detection and resolution of context inconsistency, which occurs naturally in pervasive ...
     
Compositional reachability analysis of finite-state distributed systems with user-specified constraints
Found in: Proceedings of the 3rd ACM SIGSOFT symposium on Foundations of software engineering (SIGSOFT '95)
By J. Kramer, S. C. Cheung
Issue Date:October 1995
pp. 100-106
Although many local area networks and operating systems support the use of multicast communications, multicast communications have remained primarily an interesting research tool. However, the growing research interest in multimedia and hypermedia for know...
     
Enhancing compositional reachability analysis with context constraints
Found in: Proceedings of the 1st ACM SIGSOFT symposium on Foundations of software engineering (SIGSOFT '93)
By J. Kramer, S. C. Cheung
Issue Date:December 1993
pp. 100-106
Although many local area networks and operating systems support the use of multicast communications, multicast communications have remained primarily an interesting research tool. However, the growing research interest in multimedia and hypermedia for know...
     
 1