The Community for Technology Leaders
Proceedings. Twenty-Third Annual International Computer Software and Applications Conference (Cat. No.99CB37032) (1999)
Phoenix, Arizona
Oct. 25, 1999 to Oct. 26, 1999
ISSN: 0730-3157
ISBN: 0-7695-0368-3

Foreword (PDF)

pp. xv

Preface (PDF)

pp. xvi

Program Overview (PDF)

pp. xvii

Committees (PDF)

pp. xviii

Reviewers (PDF)

pp. xx
Keynote Address
Session 1: Legacy System

Architectural Evolution of Legacy Systems (Abstract)

Alok Mehta , American Financial Systems Incorporated
George T. Heineman , Worcester Polytechnical Institute
pp. 4

Extracting Ontologies from Legacy Systems for Understanding and Re-Engineering (Abstract)

Hongji Yang , De Montford University
Zhan Cui , De Montford University
Paul O'Brien , De Montford University
pp. 21
Session 2: Database Systems

The clustering Property of Corner Transformation for Spatial Database Applications (Abstract)

Ju-Won Song , Korea Telecom
Kyu-Young Whang , Korea Advanced Institute of Science and Technology
Young-Koo Lee , Korea Advanced Institute of Science and Technology
Sang-Wook Kim , Kangwon National University
pp. 28

Object-Oriented Database Access via Reflection (Abstract)

Raimund K. Ege , Florida International University
pp. 36

ORR: Object-Relational Rapprochement (Abstract)

James B. Crigler , Lockheed Martin Corporation
Ali Orooji , University of Central Florida
pp. 42
Session 3: Panel - Network Security

Protecting Information in the Web - Position Paper (Abstract)

Elisa Bertino , Universit? degli Studi di Milano
pp. 50
Session 4: Formal Verification

Dynamic Software Architecture Slicing (Abstract)

Taeho Kim , University of Texas at Dallas
Yeong-Tae Song , University of Texas at Dallas
Lawrence Chung , University of Texas at Dallas
Dung T. Huynh , University of Texas at Dallas
pp. 61
Session 5: Network Security

A Protocol and Simulation for Distributed Communicating Firewalls (Abstract)

Robert N. Smith , Motorola Incorporated
Sourav Bhattacharya , Arizona State University
pp. 74

Mobile Agents Protection in the Internet Environment (Abstract)

Antonio Corradi , Universit? di Bologna
Rebecca Montanari , Universit? di Bologna
Cesare Stefanelli , Universit? di Ferrara
pp. 80
Session 6: Panel - Can Generic Software Be Assured?

Can Generic Software Be Assured? (Abstract)

Jeffrey Voas , Reliable Software Technologies
pp. 94

Ensuring the Capability of COTS Products (Abstract)

John C. Dean , National Research Council of Canada
pp. 96

Cost Framework for COTS Evaluation (Abstract)

Norman F. Schneidewind , Naval Postgraduate School
pp. 100
Session 7: Software Testing

Validating Software Specifications against User Claims (Abstract)

Chia-Chu Chiang , Viasoft Incorporated
Joseph E. Urban , Arizona State University
pp. 104

Generating Goal-Oriented Test Cases (Abstract)

Anneliese von Mayrhauser , Colorado State University
Michael Scheetz , Colorado State University
Eric Dahlman , Colorado State University
pp. 110

CORBA Components Testing with Perception-Based State Behavior (Abstract)

Hwan Wook Sohn , University of Texas at Arlington
David C. Kung , University of Texas at Arlington
Pei Hsia , University of Texas at Arlington
pp. 116

An Object-Oriented Architecture Supporting Web Application Testing (Abstract)

Ji-Tzay Yang , National Chiao Tung University
Jiun-Long Huang , National Chiao Tung University
Feng-Jian Wang , National Chiao Tung University
William. C. Chu , Tung Hai University
pp. 122
Session 8: Reliable Distributed Computing

Distributed Object-Oriented Real-Time Simulation of Ground Transportation Networks with the TMO Structuring Scheme (Abstract)

K. H. (Kane) Kim , University of California at Irvine
Juqiang Liu , University of California at Irvine
Masaki Ishida , University of California at Irvine
Inho Kim , Chungnam Unviversity
pp. 130

Response Time Behavior of Voting Schemes for Managing Replicated Data (Abstract)

Ing-Ray Chen , Virginia Institute of Technology
Ding-Chau Wang , National Cheng Kung University
Chih-Ping Chu , National Cheng Kung University
pp. 139

Autonomous Coordination for Atomicity of Transaction in Heterogeneous Systems (Abstract)

Yongdong Tan , Tokyo Institute of Technology
Isao Kaji , Tokyo Institute of Technology
Kinji Mori , Tokyo Institute of Technology
pp. 145

Toward More Reliable Telecom Systems (Abstract)

Antonio Mendes da Silva Filho , State University of Maringa
pp. 151
Session 10: Software Design and Development

A Pattern-Based Approach to Structural Design Composition (Abstract)

Paulo Alencar , University of Waterloo
Donald Cowan , University of Waterloo
Jing Dong , University of Waterloo
Carlos Lucena , PUC-RJ
pp. 160

Testing Extensible Design Patterns in Object-Oriented Frameworks through Scenario Templates (Abstract)

Wei-Tek Tsai , University of Minnesota
Yongzhong Tu , University of Minnesota
Weiguang Shao , University of Minnesota
Ezra Ebner , University of Minnesota
pp. 166
Session 11: Information Systems and Information Retrieval

System Scaling for Large-scale Internet-Based Online Services (Abstract)

David C. Ni , Bank of America
J. Martinez , Lucent Technologies
J. Wang , AT&T
pp. 180

A Method for Controlling Errors in Two-Class Classification (Abstract)

G. Felici , CNR-IASI
F. Sun , Corporate Research Center
K. Truemper , University of Texas at Dallas
pp. 186

Hierarchically Organized Neural Net Agents for Distributed Web Information Retrieval (Abstract)

Yong S. Choi , Seoul National University
Suk I. Yoo , Seoul National University
Jaeho Lee , University of Seoul
pp. 192
Session 12: Panel - Software Engineering Licensing
Session 13: Software Process and Management

Implementation and Evaluation of an Automatic Personal Workflow Extraction Method (Abstract)

Akira Abeta , Kyushu Institute of Technology
Ken'ichi Kakizaki , Kyushu Institute of Technology
pp. 206

Using System Dynamics Modeling to Manage Projects (Abstract)

Douglas Sycamore , Software Consultant
James S. Collofello , Arizona State University
pp. 213

Cooperating Process Components (Abstract)

Kevin A. Gary , Catholic University of America
Timothy E. Lindquist , Arizona State University
pp. 218
Session 14: Network and Mobile Systems

Supporting Preemption in Wormhole Networks (Abstract)

Keith Knauber , University of Texas at Dallas
Biao Chen , University of Texas at Dallas
pp. 232

Performance Analysis of a Graph Model for Channel Assignment in a Cellular Network (Abstract)

Hakki Candan Cankaya , ALCATEL Corporate Research Center
David W. Matula , Southern Methodist University
Mihaela Iridon , Southern Methodist University
pp. 239
Session 15: Panel - Here, There and Everywhere: The Future of Software Engineering Education
Session 16: Software Architecture

Architecture-Centered Enterprise System Development and Integration Based on Distributed Object Technology Standard (Abstract)

Kent Wreder , Baptist Health Systems of South Florida
Yi Deng , Florida International University
pp. 250

Object-Oriented Architectural Support for Developing Complex Systems (Abstract)

Rakesh Agarwal , Infosys Technologies Limited
Giorgio Bruno , Politecnico, Dip. Automatica e Informatica
M. Torchiano , Politecnico, Dip. Automatica e Informatica
pp. 259

Software Architecture Analysis-A Case Study (Abstract)

Wen-Li Wang , State University of New York at Albany
Mei-Huei Tang , State University of New York at Albany
Mei-Hwa Chen , State University of New York at Albany
pp. 265
Session 17: Storage System and Caching

Merging Interval Caching with Adaptive Viewers' Bias Based Caching Strategy (Abstract)

B. Sonah , University of Mauritius
M.R. Ito , University of British Columbia
pp. 272

A Proxy Server Structure and its Cache Consistency Mechanism at the Network Bottleneck (Abstract)

Joo-Yong Kim , Seoul National University
Kyoung-Woon Cho , Seoul National University
Kern Koh , Seoul National University
pp. 278

A New Flash Memory Management for Flash Storage System (Abstract)

Han-joon Kim , Seoul National University
Sang-goo Lee , Seoul National University
pp. 284
Session 19: Application of Special Interests

The Design of Agent-Based Tools for Bio-Informatics (Abstract)

Chung-Shyan Liu , Chung Yuan C. University
Wei Kuo , Chung Yuan C. University
Lan-Yang Ch'ang , Academia Sinica
Wen-Chang Lin , Academia Sinica
pp. 294

Mining Weak Rules (Abstract)

Huan Liu , National University of Singapore
Hongjun Lu , Hong Kong University of Science and Technology
pp. 309
Session 20: Software Development

Patterns in Postmortems (Abstract)

Linda Rising , AG Communication Systems
pp. 314

The Unique Reference NCSLOC Metric (Abstract)

Stephanie D. Crouch , Texas A&M University
Dick B. Simmons , Texas A&M University
pp. 316

A Useful Approach to Developing Reverse Engineering Metrics (Abstract)

Shikun Zhou , De Montfort University
Hongji Yang , De Montfort University
Paul Luker , De Montfort University
Xudong He , North Dakata State University
pp. 320
Session 21: Software Frameworks and Systems Engineering

The MEA Framework: A New Perspective for the Development of Situation-Specific Methods (Abstract)

Colin J Hardy , University of Sunderland
Helen M. Edwards , University of Sunderland
J Barrie Thompson , University of Sunderland
pp. 330

Dynamic Client-Side Scheduling in a Real-Time CORBA System (Abstract)

W. Feng , Purdue University and Los Alamos National Laboratory
pp. 332

Failure Planning in STESCA (Abstract)

Michael L. Nelson , University of Texas - Pan American
Guillermo Flores Jr , University of Texas - Pan American
pp. 334

Effect of Complementary Processing on Navy Command and Control Software (Abstract)

Marion G. Ceruti , Space and Naval Warfare Systems Center
Ray C. Trout , Complementary Systems Inc.
Tse Lee , Complementary Systems Inc.
pp. 336
Plenary Panel - Supply and Demands of Information Technology Workers
Session 23: Software Reuse

Software Reuse through a Novel Representation that Supports Factorization (Abstract)

Hee Beng Kuan Tan , Nanyang Technological University
Hua Koon Tan , Nanyang Technological University
pp. 344

Processing Queries with Expensive Predicates by Filtering (Abstract)

Hanxiong Chen , Tsukuba Inte'l University
Toshiro Ohno , Tsukuba Inte'l University
Nobuo Ohbo , University of Tsukuba
pp. 350

Reusing CAD Tools in Object Oriented Based Framework (Abstract)

Hewijin C. Jiau , National Cheng Kung University
Kuo-Feng Ssu , University of Illinois at Urbana-Champaign
Jim-Min Lin , Feng Chia University
Yu-Ping Ko , Feng Chia University
pp. 357
Session 24: Project Management

Tracking Personal Processes in Group Projects (Abstract)

Ly Danielle Sauer , Sandia Noational Laboratories
Timothy E. Lindquist , Arizona State University
Jeremy Cairney , Arizona State University
pp. 364

Brooks' Law Revisited: A System Dynamics Approach (Abstract)

Pei Hsia , University of Texas at Arlington
Chih-tung Hsu , University of Texas at Arlington
David C. Kung , University of Texas at Arlington
pp. 370

A Decision Support System for Software Reliability Engineering Strategy Selection (Abstract)

Ioana Rus , University of Marryland at College Park
James S. Collofello , Arizona State University
pp. 376
Session 25: Panel - Computers as Partners: A Technology Forecast for Decision-making in the 21st Century

Developing Dynamic Decision Support: Opportunities, Issues and Approaches (Abstract)

E. Coupey , Virginia Institute of Technology
Pamplin Hall , Virginia Institute of Technology
pp. 386

NLP-Supported Decision-Making (Abstract)

Elizabeth D. Liddy , TextWise, LLC
pp. 390
Session 26: Software System Development

I3: A Petri-Net Based Specification Method for Architectural Components (Abstract)

Carl K. Chang , University of Illinois at Chicago
Seongwoon Kim , University of Illinois at Chicago
pp. 396

An Active Database Approach to Integrating Black-Box Software Components (Abstract)

Amy Sundermier , Arizona State University
Suzanne W. Dietrich , Arizona State University
Vandana Shah , Arizona State University
pp. 403
Session 27: E-Business and Application Systems

Signature Management in Workflow Systems (Abstract)

Karl R.P.H. Leung , University of Hong Kong
Lucas C.K. Hui , University of Hong Kong
pp. 424

Performance Analysis of Traffic Control System Based on Stochastic Timed Petri Net Models (Abstract)

Jiacun Wang , Florida International University
Chun Jin , Florida International University
Yi Deng , Florida International University
pp. 436
Session 28: Software Verification and Analysis

OBL: A Formal Deduction Method for Object-Oriented Systems (Abstract)

Kuangnan Chang , University of Texas at Arlington
David Kung , University of Texas at Arlington
Pei Hsia , University of Texas at Arlington
pp. 450

Detecting Null Pointer Violations in Java Programs (Abstract)

Xiaoping Jia , DePaul University
Sushant Sawant , DePaul University
Jiangyu Zhou , DePaul University
Sotiris Skevoulis , DePaul University
pp. 456

A New Approach to Verify Rule-Based Systems Using Petri Nets (Abstract)

Xudong He , North Dakota State University
William C. Chu , TungHai University of Taiwan
Hongji Yang , De Montfort University
Stephen J.H. Yang , National Central University of Taiwan
pp. 462

Optimal Software Release Policy Based on Cost and Reliability with Testing Efficiency (Abstract)

Chin-Yu Huang , National Taiwan University
Sy-Yen Kuo , National Taiwan University
Sy-Yen Kuo , National Taiwan University
Michael R. Lyu , Chinese University of Hong Kong
pp. 468

Author Index (PDF)

pp. 476
93 ms
(Ver 3.3 (11022016))