The Community for Technology Leaders
2013 IEEE 37th Annual Computer Software and Applications Conference (1999)
Phoenix, Arizona
Oct. 25, 1999 to Oct. 26, 1999
ISSN: 0730-3157
ISBN: 0-7695-0368-3

Foreword (PDF)

pp. xv

Preface (PDF)

pp. xvi

Program Overview (PDF)

pp. xvii

Committees (PDF)

pp. xviii

Reviewers (PDF)

pp. xx
Keynote Address
Session 1: Legacy System

Architectural Evolution of Legacy Systems (Abstract)

George T. Heineman , Worcester Polytechnical Institute
Alok Mehta , American Financial Systems Incorporated
pp. 4

Extracting Ontologies from Legacy Systems for Understanding and Re-Engineering (Abstract)

Zhan Cui , De Montford University
Paul O'Brien , De Montford University
Hongji Yang , De Montford University
pp. 21
Session 2: Database Systems

The clustering Property of Corner Transformation for Spatial Database Applications (Abstract)

Sang-Wook Kim , Kangwon National University
Ju-Won Song , Korea Telecom
Young-Koo Lee , Korea Advanced Institute of Science and Technology
Kyu-Young Whang , Korea Advanced Institute of Science and Technology
pp. 28

Object-Oriented Database Access via Reflection (Abstract)

Raimund K. Ege , Florida International University
pp. 36

ORR: Object-Relational Rapprochement (Abstract)

Ali Orooji , University of Central Florida
James B. Crigler , Lockheed Martin Corporation
pp. 42
Session 3: Panel - Network Security

Protecting Information in the Web - Position Paper (Abstract)

Elisa Bertino , Universit? degli Studi di Milano
pp. 50
Session 4: Formal Verification

Dynamic Software Architecture Slicing (Abstract)

Dung T. Huynh , University of Texas at Dallas
Lawrence Chung , University of Texas at Dallas
Yeong-Tae Song , University of Texas at Dallas
Taeho Kim , University of Texas at Dallas
pp. 61
Session 5: Network Security

A Protocol and Simulation for Distributed Communicating Firewalls (Abstract)

Sourav Bhattacharya , Arizona State University
Robert N. Smith , Motorola Incorporated
pp. 74

Mobile Agents Protection in the Internet Environment (Abstract)

Cesare Stefanelli , Universit? di Ferrara
Antonio Corradi , Universit? di Bologna
Rebecca Montanari , Universit? di Bologna
pp. 80
Session 6: Panel - Can Generic Software Be Assured?

Can Generic Software Be Assured? (Abstract)

Jeffrey Voas , Reliable Software Technologies
pp. 94

Ensuring the Capability of COTS Products (Abstract)

John C. Dean , National Research Council of Canada
pp. 96

Cost Framework for COTS Evaluation (Abstract)

Norman F. Schneidewind , Naval Postgraduate School
pp. 100
Session 7: Software Testing

Validating Software Specifications against User Claims (Abstract)

Joseph E. Urban , Arizona State University
Chia-Chu Chiang , Viasoft Incorporated
pp. 104

Generating Goal-Oriented Test Cases (Abstract)

Michael Scheetz , Colorado State University
Eric Dahlman , Colorado State University
Anneliese von Mayrhauser , Colorado State University
pp. 110

CORBA Components Testing with Perception-Based State Behavior (Abstract)

David C. Kung , University of Texas at Arlington
Hwan Wook Sohn , University of Texas at Arlington
Pei Hsia , University of Texas at Arlington
pp. 116

An Object-Oriented Architecture Supporting Web Application Testing (Abstract)

William. C. Chu , Tung Hai University
Feng-Jian Wang , National Chiao Tung University
Jiun-Long Huang , National Chiao Tung University
Ji-Tzay Yang , National Chiao Tung University
pp. 122
Session 8: Reliable Distributed Computing

Distributed Object-Oriented Real-Time Simulation of Ground Transportation Networks with the TMO Structuring Scheme (Abstract)

Juqiang Liu , University of California at Irvine
Masaki Ishida , University of California at Irvine
K. H. (Kane) Kim , University of California at Irvine
Inho Kim , Chungnam Unviversity
pp. 130

Response Time Behavior of Voting Schemes for Managing Replicated Data (Abstract)

Ding-Chau Wang , National Cheng Kung University
Chih-Ping Chu , National Cheng Kung University
Ing-Ray Chen , Virginia Institute of Technology
pp. 139

Autonomous Coordination for Atomicity of Transaction in Heterogeneous Systems (Abstract)

Yongdong Tan , Tokyo Institute of Technology
Kinji Mori , Tokyo Institute of Technology
Isao Kaji , Tokyo Institute of Technology
pp. 145

Toward More Reliable Telecom Systems (Abstract)

Antonio Mendes da Silva Filho , State University of Maringa
pp. 151
Session 10: Software Design and Development

A Pattern-Based Approach to Structural Design Composition (Abstract)

Jing Dong , University of Waterloo
Carlos Lucena , PUC-RJ
Donald Cowan , University of Waterloo
Paulo Alencar , University of Waterloo
pp. 160

Testing Extensible Design Patterns in Object-Oriented Frameworks through Scenario Templates (Abstract)

Ezra Ebner , University of Minnesota
Yongzhong Tu , University of Minnesota
Wei-Tek Tsai , University of Minnesota
Weiguang Shao , University of Minnesota
pp. 166
Session 11: Information Systems and Information Retrieval

System Scaling for Large-scale Internet-Based Online Services (Abstract)

J. Martinez , Lucent Technologies
David C. Ni , Bank of America
J. Wang , AT&T
pp. 180

A Method for Controlling Errors in Two-Class Classification (Abstract)

G. Felici , CNR-IASI
K. Truemper , University of Texas at Dallas
F. Sun , Corporate Research Center
pp. 186

Hierarchically Organized Neural Net Agents for Distributed Web Information Retrieval (Abstract)

Suk I. Yoo , Seoul National University
Yong S. Choi , Seoul National University
Jaeho Lee , University of Seoul
pp. 192
Session 12: Panel - Software Engineering Licensing
Session 13: Software Process and Management

Implementation and Evaluation of an Automatic Personal Workflow Extraction Method (Abstract)

Akira Abeta , Kyushu Institute of Technology
Ken'ichi Kakizaki , Kyushu Institute of Technology
pp. 206

Using System Dynamics Modeling to Manage Projects (Abstract)

James S. Collofello , Arizona State University
Douglas Sycamore , Software Consultant
pp. 213

Cooperating Process Components (Abstract)

Timothy E. Lindquist , Arizona State University
Kevin A. Gary , Catholic University of America
pp. 218
Session 14: Network and Mobile Systems

Supporting Preemption in Wormhole Networks (Abstract)

Biao Chen , University of Texas at Dallas
Keith Knauber , University of Texas at Dallas
pp. 232

Performance Analysis of a Graph Model for Channel Assignment in a Cellular Network (Abstract)

David W. Matula , Southern Methodist University
Mihaela Iridon , Southern Methodist University
Hakki Candan Cankaya , ALCATEL Corporate Research Center
pp. 239
Session 15: Panel - Here, There and Everywhere: The Future of Software Engineering Education
Session 16: Software Architecture

Architecture-Centered Enterprise System Development and Integration Based on Distributed Object Technology Standard (Abstract)

Yi Deng , Florida International University
Kent Wreder , Baptist Health Systems of South Florida
pp. 250

Object-Oriented Architectural Support for Developing Complex Systems (Abstract)

Giorgio Bruno , Politecnico, Dip. Automatica e Informatica
M. Torchiano , Politecnico, Dip. Automatica e Informatica
Rakesh Agarwal , Infosys Technologies Limited
pp. 259

Software Architecture Analysis-A Case Study (Abstract)

Mei-Huei Tang , State University of New York at Albany
Mei-Hwa Chen , State University of New York at Albany
Wen-Li Wang , State University of New York at Albany
pp. 265
Session 17: Storage System and Caching

Merging Interval Caching with Adaptive Viewers' Bias Based Caching Strategy (Abstract)

M.R. Ito , University of British Columbia
B. Sonah , University of Mauritius
pp. 272

A Proxy Server Structure and its Cache Consistency Mechanism at the Network Bottleneck (Abstract)

Kern Koh , Seoul National University
Joo-Yong Kim , Seoul National University
Kyoung-Woon Cho , Seoul National University
pp. 278

A New Flash Memory Management for Flash Storage System (Abstract)

Han-joon Kim , Seoul National University
Sang-goo Lee , Seoul National University
pp. 284
Session 19: Application of Special Interests

The Design of Agent-Based Tools for Bio-Informatics (Abstract)

Wei Kuo , Chung Yuan C. University
Chung-Shyan Liu , Chung Yuan C. University
Wen-Chang Lin , Academia Sinica
Lan-Yang Ch'ang , Academia Sinica
pp. 294

Mining Weak Rules (Abstract)

Huan Liu , National University of Singapore
Hongjun Lu , Hong Kong University of Science and Technology
pp. 309
Session 20: Software Development

Patterns in Postmortems (Abstract)

Linda Rising , AG Communication Systems
pp. 314

The Unique Reference NCSLOC Metric (Abstract)

Dick B. Simmons , Texas A&M University
Stephanie D. Crouch , Texas A&M University
pp. 316

A Useful Approach to Developing Reverse Engineering Metrics (Abstract)

Hongji Yang , De Montfort University
Shikun Zhou , De Montfort University
Paul Luker , De Montfort University
Xudong He , North Dakata State University
pp. 320
Session 21: Software Frameworks and Systems Engineering

The MEA Framework: A New Perspective for the Development of Situation-Specific Methods (Abstract)

J Barrie Thompson , University of Sunderland
Colin J Hardy , University of Sunderland
Helen M. Edwards , University of Sunderland
pp. 330

Dynamic Client-Side Scheduling in a Real-Time CORBA System (Abstract)

W. Feng , Purdue University and Los Alamos National Laboratory
pp. 332

Failure Planning in STESCA (Abstract)

Michael L. Nelson , University of Texas - Pan American
Guillermo Flores Jr , University of Texas - Pan American
pp. 334

Effect of Complementary Processing on Navy Command and Control Software (Abstract)

Ray C. Trout , Complementary Systems Inc.
Tse Lee , Complementary Systems Inc.
Marion G. Ceruti , Space and Naval Warfare Systems Center
pp. 336
Plenary Panel - Supply and Demands of Information Technology Workers
Session 23: Software Reuse

Software Reuse through a Novel Representation that Supports Factorization (Abstract)

Hua Koon Tan , Nanyang Technological University
Hee Beng Kuan Tan , Nanyang Technological University
pp. 344

Processing Queries with Expensive Predicates by Filtering (Abstract)

Toshiro Ohno , Tsukuba Inte'l University
Nobuo Ohbo , University of Tsukuba
Hanxiong Chen , Tsukuba Inte'l University
pp. 350

Reusing CAD Tools in Object Oriented Based Framework (Abstract)

Kuo-Feng Ssu , University of Illinois at Urbana-Champaign
Yu-Ping Ko , Feng Chia University
Hewijin C. Jiau , National Cheng Kung University
Jim-Min Lin , Feng Chia University
pp. 357
Session 24: Project Management

Tracking Personal Processes in Group Projects (Abstract)

Jeremy Cairney , Arizona State University
Ly Danielle Sauer , Sandia Noational Laboratories
Timothy E. Lindquist , Arizona State University
pp. 364

Brooks' Law Revisited: A System Dynamics Approach (Abstract)

Pei Hsia , University of Texas at Arlington
David C. Kung , University of Texas at Arlington
Chih-tung Hsu , University of Texas at Arlington
pp. 370

A Decision Support System for Software Reliability Engineering Strategy Selection (Abstract)

James S. Collofello , Arizona State University
Ioana Rus , University of Marryland at College Park
pp. 376
Session 25: Panel - Computers as Partners: A Technology Forecast for Decision-making in the 21st Century

Developing Dynamic Decision Support: Opportunities, Issues and Approaches (Abstract)

E. Coupey , Virginia Institute of Technology
Pamplin Hall , Virginia Institute of Technology
pp. 386

NLP-Supported Decision-Making (Abstract)

Elizabeth D. Liddy , TextWise, LLC
pp. 390
Session 26: Software System Development

I3: A Petri-Net Based Specification Method for Architectural Components (Abstract)

Carl K. Chang , University of Illinois at Chicago
Seongwoon Kim , University of Illinois at Chicago
pp. 396

An Active Database Approach to Integrating Black-Box Software Components (Abstract)

Vandana Shah , Arizona State University
Suzanne W. Dietrich , Arizona State University
Amy Sundermier , Arizona State University
pp. 403
Session 27: E-Business and Application Systems

Signature Management in Workflow Systems (Abstract)

Lucas C.K. Hui , University of Hong Kong
Karl R.P.H. Leung , University of Hong Kong
pp. 424

Performance Analysis of Traffic Control System Based on Stochastic Timed Petri Net Models (Abstract)

Yi Deng , Florida International University
Chun Jin , Florida International University
Jiacun Wang , Florida International University
pp. 436
Session 28: Software Verification and Analysis

OBL: A Formal Deduction Method for Object-Oriented Systems (Abstract)

Pei Hsia , University of Texas at Arlington
Kuangnan Chang , University of Texas at Arlington
David Kung , University of Texas at Arlington
pp. 450

Detecting Null Pointer Violations in Java Programs (Abstract)

Xiaoping Jia , DePaul University
Sushant Sawant , DePaul University
Jiangyu Zhou , DePaul University
Sotiris Skevoulis , DePaul University
pp. 456

A New Approach to Verify Rule-Based Systems Using Petri Nets (Abstract)

Stephen J.H. Yang , National Central University of Taiwan
William C. Chu , TungHai University of Taiwan
Xudong He , North Dakota State University
Hongji Yang , De Montfort University
pp. 462

Optimal Software Release Policy Based on Cost and Reliability with Testing Efficiency (Abstract)

Chin-Yu Huang , National Taiwan University
Sy-Yen Kuo , National Taiwan University
Michael R. Lyu , Chinese University of Hong Kong
Sy-Yen Kuo , National Taiwan University
pp. 468

Author Index (PDF)

pp. 476
106 ms
(Ver 3.1 (10032016))