The Community for Technology Leaders
2013 IEEE 37th Annual Computer Software and Applications Conference (2003)
Dallas, Texas
Nov. 3, 2003 to Nov. 6, 2003
ISBN: 0-7695-2020-0
TABLE OF CONTENTS

Foreword (PDF)

pp. xiii

Preface (PDF)

pp. xiv

Committees (PDF)

pp. xvi

Reviewers (PDF)

pp. xviii
Keynote Address 1
Session 1: Pervasive and Ubiquitous Systems

Mining Sequential Patterns Using Graph Search Techniques (Abstract)

Shao-Yuan Lin , National Yunlin University of Science and Technology
Yin-Fu Huang , National Yunlin University of Science and Technology
pp. 4

A Middleware Service for Secure Group Communication in Mobile Ad Hoc Networks (Abstract)

Stephen S. Yau , Arizona State University
Xinyu Zhang , Arizona State University
pp. 10

Device State Recovery in Non-volatile Main Memory Systems (Abstract)

Ren Ohmura , Keio University, Japan
Yuichiro Anzai , Keio University, Japan
Nobuyuki Yamasaki , Keio University, Japan
pp. 16
Session 2: Panel

Homeland Security's Cyber Component: A Survey of Legal Issues (Abstract)

Thomas C. Wingfield , The Potomac Institute for Policy Studies, Arlington, VA
Steven E. Roberts , Security Researcher and Author, Gainesville, FL
James B. Michael , Naval Postgraduate School, Monterey, California
pp. 24
Session 3: Software and System Testing (1)

BINTEST - Binary Search-based Test Case Generation (Abstract)

Sami Beydeda , University of Leipzig, Germany
Volker Gruhn , University of Leipzig, Germany
pp. 28

Automated Metamorphic Testing (Abstract)

Bernard Botella , THALES Airborne Systems
Arnaud Gotlieb , IRISA / INRIA
pp. 34

Smart Debugging Software Architectural Design in SDL (Abstract)

Tatiana Sugeta , University of Texas at Dallas
Jose C. Maldonado , University of Sao Paulo at Sao Carlos
W. Eric Wong , University of Texas at Dallas
Yu Qi , University of Texas at Dallas
pp. 41
Session 4: Software Reuse and Management

Lessons Learned from Software Engineering Multi-Agent Systems (Abstract)

Praveen Sankuratri , Univ. of Texas at Arlington
Sheila Nwokoro , Univ. of Texas at Arlington
David C. Kung , Univ. of Texas at Arlington
Ravindra Kambalakatta , Univ. of Texas at Arlington
Wesam Okasha , Univ. of Texas at Arlington
Hitesh Bhambhani , Univ. of Texas at Arlington
pp. 50

Application of Tightly Coupled Engineering Team for Development of Test Automation Software - A Real World Experience (Abstract)

Vivek Vijay , Guidant Corporation, St Paul, MN, USA
Abraham Eapen , Guidant Corporation, St Paul, MN, USA
Manoj Paul , Guidant Corporation, St Paul, MN, USA
Francoise Boudigou , Guidant Corporation, St Paul, MN, USA
Wesley Mcdermott , Guidant Corporation, St Paul, MN, USA
Corey Miklos , Guidant Corporation, St Paul, MN, USA
Ajay Pandey , Guidant Corporation, St Paul, MN, USA
Nader Kameli , Guidant Corporation, St Paul, MN, USA
Imelda Sutedjo , Guidant Corporation, St Paul, MN, USA
pp. 56

A Cooperative Framework for Inter-Organizational Workflow System (Abstract)

Shung-Bin Yan , National Chiao Tung University, Taiwan
Feng-Jian Wang , National Chiao Tung University, Taiwan
pp. 64
Session 5: Middleware Systems

Context Aware Deployment for Mobile Users (Abstract)

Erik Putrycz , National Research Council, Ottawa, Canada
Guy Bernard , GET/INT, CNRS-SAMOVAR, France
Chantal Taconet , GET/INT, CNRS-SAMOVAR, France
pp. 74

Policy-based Separation of Concerns for Dynamic Code Mobility Management (Abstract)

Cesare Stefanelli , Universit? di Ferrara, Italy
Gianluca Tonti , University of Bologna, Italy
Rebecca Montanari , University of Bologna, Italy
pp. 82

Semantic-based Approach to Streaming XML Contents using Xstream (Abstract)

Alvin T.S. Chan , The Hong Kong Polytechnic University
Hong-Va Leong , The Hong Kong Polytechnic University
Eugene Y.C. Wong , The Hong Kong Polytechnic University
pp. 91
Session 6: Trustworthy Software Systems

Design and Implementation of a Cache-Conscious Index Manager for the Tachyon, a Main Memory DBMS (Abstract)

Kyung-Tae Lee , Kangwon National University, Korea
Inbum Jung , Kangwon National University, Korea
Sang-Wook Kim , Hanyang University, Korea
Chang-Yeol Choi , Kangwon National University, Korea
Wan Choi , Electronics and Telecommunications Research Institute, Korea
pp. 111
Session 7: Panel

Software Testing (PDF)

Wei-tek Tsai , Arizona State University
T H Tse , The University of Hong Kong
Ramesh Bharadwaj , Naval Research Lab
Raymond Paul , Department of Defense, USA
David Kung , University of Texas at Arlington
pp. null
Session 8: Software Process Management

Towards Dynamic Process with Variable Structure by Reflection (Abstract)

Shaohua Liu , The Chinese Academy of Sciences, Beijing
Wei Xu , The Chinese Academy of Sciences, Beijing
Jun Wei , The Chinese Academy of Sciences, Beijing
pp. 120

Current Trends in the Adoption of the CMMI? Product Suite (Abstract)

Dave Zubrow , Software Engineering Institute
pp. 126

A CC-based Security Engineering Process Evaluation Model (Abstract)

Jieun Lee , Ewha Womans University, Korea
Jongsook Lee , Ewha Womans University, Korea
Byoungju Choi , Ewha Womans University, Korea
Seunghee Lee , Ewha Womans University, Korea
pp. 130
Session 9: Mobile and High Performance Systems

An Object-Passing Model for Parallel Programming (Abstract)

Nader Mohamed , University of Nebraska - Lincoln
Jameela Al-Jaroodi , University of Nebraska - Lincoln
pp. 138

Data Placement and Query Processing Based on RPE Parallelisms (Abstract)

Gang Wu , Northeastern University, China
Junan Hu , Northeastern University, China
Yaxin Yu , Northeastern University, China
Nan Tang , Northeastern University, China
Ge Yu , Northeastern University, China
Guoren Wang , Northeastern University, China
pp. 151
Session 10: Information Security

A Security Characterisation Framework for Trustworthy Component Based Software Systems (Abstract)

Jun Han , Swinburne University of Technology, Melbourne, Australia
Khaled Khan , University of Western Sydney
pp. 164

Exploiting Self-Modification Mechanism for Program Protection (Abstract)

Yuichiro Kanzaki , Nara Institute of Science and Technology
Akito Monden , Nara Institute of Science and Technology
Ken-ichi Matsumoto , Nara Institute of Science and Technology
Masahide Nakamura , Nara Institute of Science and Technology
pp. 170
Session 11: Software and System Testing (2)

Tolerance of Control-Flow Testing Criteria (Abstract)

Sergiy A. Vilkomir , University of Wollongong, Australia
Jonathan P. Bowen , London South Bank University, UK
Kalpesh Kapoor , London South Bank University, UK
pp. 182

Data-Flow-Based Unit Testing of Aspect-Oriented Programs (Abstract)

Jianjun Zhao , Fukuoka Institute of Technology, Japan
pp. 188

A Strategy for Selecting Synchronization Sequences to Test Concurrent Object-Oriented Software (Abstract)

Huo Yan Chen , Jinan University, China
T. H. Tse , The University of Hong Kong
Yu Xia Sun , Jinan University, China
pp. 198
Session 12: Panel

Global Trends in SPI (PDF)

David Card , Software Productivity Consortium, USA
Stephen Chen , Motorola, USA
David Zubrow , David Zubrow, Carneige-Mellon University, USA
Roger Fordham , Roger Fordham, Motorola, USA
pp. null
Plenary Panel Session

Challenges and Recent Advances in Developing Trustworthy Software-Based Systems (PDF)

Carl Landwehr , National Science Foundation, USA
Stephen S. Yau , Arizona State University, USA
Thomas Weigert, Sr. , Motorola Global Software Group, USA
Jeffrey Voas , Cigital, Inc., USA
pp. 208
Session 13: Collaborative Systems

A Multi-Agent Software Environment for Testing Web-based Applications (Abstract)

Qingning Huo , Lanware Limited
Hong Zhu , Oxford Brookes Univ., UK
Sue Greenwood , Oxford Brookes Univ., UK
pp. 210

Mediating Electronic Meetings (Abstract)

Jen-Yao Chung , IBM T.J. Watson Research
Jia Zhang , Chicago Technology Partners Inc.
Carl K. Chang , Iowa State University, Ames
pp. 216

Scalable Multilateral Communication Technique for Large-Scale Information Systems (Abstract)

Kinji Mori , Tokyo Institute of Technology
Khaled Ragab , Tokyo Institute of Technology
Naohiro Kaji , Tokyo Institute of Technology
Koichi Moriyama , Tokyo Institute of Technology
pp. 222
Session 14: Software Architecture and Framework

Runtime Software Architecture Based Software Online Evolution (Abstract)

Junrong Shen , Peking University, China
Gang Huang , Peking University, China
Hong Mei , Peking University, China
Fuqing Yang , Peking University, China
Qianxiang Wang , Peking University, China
pp. 230

The XIS Generative Programming Techniques (Abstract)

Alberto Rodrigues da Silva , INESC & IST (Technical University of Lisbon)
Tiago Matias , INESC & IST (Technical University of Lisbon)
Marco Costa , INESC & IST (Technical University of Lisbon)
Gon?alo Lemos , INESC & IST (Technical University of Lisbon)
pp. 236

Proactive Views on Concrete Aspects: A Pattern Documentation Approach for Software Evolution (Abstract)

S.C. Cheung , Hong Kong University of Science and Technology
T.H. Ng , Hong Kong University of Science and Technology
pp. 242
Session 15: Requirements Engineering

A Feature Oriented Approach to Modeling and Reusing Requirements of Software Product Lines (Abstract)

Wei Zhang , Peking University, Beijing, China
Fang Gu , Peking University, Beijing, China
Hong Mei , Peking University, Beijing, China
pp. 250

A Synergistic Interweaving of Formal and Informal Methods (Abstract)

Karl R.P.H. Leung , Hong Kong Institute of Vocational Education
W. L. Yeung , Lingnan University, Hong Kong
pp. 257

Mockup-driven Fast-prototyping Methodology for Web Requirements Engineering (Abstract)

Jen-Yao Chung , IBM T.J. Watson Research
Jia Zhang , Chicago Technology Partners Inc.
Carl K. Chang , Iowa State University, Ames
pp. 263
Session 16: Panel

Case Studies in Systems/Software Engineering (PDF)

Robert T. McCann , Lockheed Matin Management & Data Systems, USA
Louis Blazy , University of Maryland, USA
Caroline M. Birog , American Chemical Society, USA
Jeanne Behnke , NASA Godard Space Flight Center, USA
pp. null
Session 17: Internet and Web-Based Systems

Integrating Heterogeneous Web Services with WebXcript (Abstract)

S.C. Cheung , Hong Kong University of Science and Technology
Dickson K.W. Chiu , Chinese University of Hong Kong
Alex K.C. Lee , Chinese University of Hong Kong
Danny Kok , Chinese University of Hong Kong
pp. 272

A Probabilistic Model for Intelligent Web Crawlers (Abstract)

Ke Hu , The Chinese University of Hong Kong
Wing Shing Wong , The Chinese University of Hong Kong
pp. 278

Autonomous Decentralized Database System Reconstruction Technology through Mobile Agent Monitoring and Coordination (Abstract)

Carlos Perez Leguizamo , Tokyo Institute of Technology
Dake Wang , Tokyo Institute of Technology
Kinji Mori , Tokyo Institute of Technology
pp. 283
Session 18: Software Reengineering (1)

Incremental Transformation of Procedural Systems to Object Oriented Platforms (Abstract)

Kostas Kontogiannis , University of Waterloo, Canada
Ying Zou , University of Waterloo, Canada
pp. 290

Migrating Web Frameworks Using Water Transformations (Abstract)

Ahmed E. Hassan , University of Waterloo, Canada
Richard C. Holt , University of Waterloo, Canada
pp. 296

Bridging Legacy Systems to Model Driven Architecture (Abstract)

Hongji Yang , De Montfort University, England
Baowen Xu , Southeast University, China
Bing Qiao , De Montfort University, England
William C. Chu , TungHai University, Taiwan
pp. 304
Session 19: Quality Management

Transforming quantities into qualities in assessment of software systems (Abstract)

G. Canfora , University of Sannio, Italy
L. Cerulo , University of Sannio, Italy
L. Troiano , University of Sannio, Italy
pp. 312

Information Quality Assessment of a Yellow-Pages Location-Based Service (Abstract)

Artem Katasonov , University of Jyv?skyl?, Finland
Markku Sakkinen , University of Jyv?skyl?, Finland
pp. 320
Paper Session 20: Software Reengineering (2)

A Reengineering Process for Migrating from an Object-oriented Legacy System to a Component-based System (Abstract)

Woochang Shin , Seokyeong University, Seoul, Korea
Byungjeong Lee , University of Seoul, Seoul, Korea
Eunjoo Lee , Seoul National University, Seoul, Korea
Chisu Wu , Seoul National University, Seoul, Korea
pp. 336

Determining Granularity of Independent Tasks for Reengineering a Legacy System into an OO System (Abstract)

Martin Ward , De Montfort University, England
Richard Millham , De Montfort University, England
Hongji Yang , De Montfort University, England
pp. 342

Recovering a Business Object Model from Web Applications (Abstract)

Anna Rita Fasolino , Universit? di Napoli Federico II, Italy
Porfirio Tramontana , Universit? di Napoli Federico II, Italy
Ugo De Carlini , Universit? di Napoli Federico II, Italy
Giuseppe Antonio Di Lucca , University of Sannio, Italy
pp. 348
Session 21: Measurement and Metrics

Testing the Suitability of Markov Chains as Web Usage Models (Abstract)

Zhao Li , Southern Methodist University, Dallas, Texas
Jeff Tian , Southern Methodist University, Dallas, Texas
pp. 356

A Cut-Based Algorithm for Reliability Analysis of Terminal-Pair Network Using OBDD (Abstract)

Sy-Yen Kuo , National Taiwan University
Yung-Ruei Chang , National Taiwan University
Hung-Yau Lin , National Taiwan University
Ing-Yi Chen , Department of Computer Science and Information Engineering of National Taipei University of Technology, Taiwan.
pp. 368
Keynote Address 2:
Session 22: Distributed Systems

IBHIS: Integration Broker for Heterogeneous Information Sources (Abstract)

Mark Turner , University of Keele, UK
John Keane , UMIST, UK
Paul Layzell , UMIST, UK
Fujun Zhu , University of Durham, UK
pp. 378

Implementation of Nonstop Software Update for Client-Server Applications (Abstract)

Kuo-Feng Ssu , National Cheng Kung University
Wen-Kang Wei , National Cheng Kung University
Hewijin Christine Jiau , National Cheng Kung University
pp. 391
Session 23: Component Based Software Engineering

A Test-Driven Component Development Framework based on the CORBA Component Model (Abstract)

Leif Morgan Johnson , Salomon Automation GmbH
Christian Kreiner , Graz University of Technology, Austria; Salomon Automation GmbH
Stefan Mitterdorfer , Graz University of Technology, Austria; Salomon Automation GmbH
Zsolt Kov?cs , Salomon Automation GmbH
Reinhold Weiss , Graz University of Technology, Austria
Egon Teiniker , Graz University of Technology, Austria; Salomon Automation GmbH
pp. 400

Information use in CBSE design (Abstract)

Pearl Brereton , Keele University, UK
Stephen Owen , Keele University, UK
David Budgen , Keele University, UK
pp. 406

Variable Strength Interaction Testing of Components (Abstract)

Myra B. Cohen , University of Auckland, New Zealand
Warwick B. Mugridge , University of Auckland, New Zealand
James S. Collofello , Arizona State University, Tempe
Peter B. Gibbons , University of Auckland, New Zealand
Charles J. Colbourn , Arizona State University, Tempe
pp. 413
Session 24: Network Systems

An Integrated Approach to Scatternet Traffic Management in Bluetooth Ad Hoc Networks (Abstract)

Liza Lai-Yee Shek , The University of Hong Kong, Pokfulam Road
Yu-Kwong Kwok , The University of Hong Kong, Pokfulam Road
pp. 420

Distributed Garbage Collection by Timeouts and Backward Inquiry (Abstract)

Sung-Wook Ryu , Veritas Software Co.
Eul Gyu Im , National Security Research Inst.
pp. 426

Facilitating Secure Ad hoc Service Discovery in Public Environments (Abstract)

Lionel Ni , Michigan State University, East Lansing; Hong Kong University of Science and Technology, Kowloon
Matt Mutka , Michigan State University, East Lansing
Feng Zhu , Michigan State University, East Lansing
pp. 433
Session 25: Object-Oriented Development (1)

Precise Specification to Compound Patterns with ExLePUS (Abstract)

Daniel P.K. Lun , The Hong Kong Polytechnic University
Clifford S. T. Choy , The Hong Kong Polytechnic University
Jeffrey K.H. Mak , The Hong Kong Polytechnic University
pp. 440

Scenario Architecture - A Methodology to Build a Global View of OO Software System (Abstract)

Kuo-Feng Ssu , National Cheng Kung University, Tainan, Taiwan
Yiausyu Earl Tsai , National Cheng Kung University, Tainan, Taiwan
Hewijin Christine Jiau , National Cheng Kung University, Tainan, Taiwan
pp. 446

A Role-Based Metamodeling Approach to Specifying Design Patterns (Abstract)

Sudipto Ghosh , Colorado State University
Eunjee Song , Colorado State University
Robert France , Colorado State University
Dae-Kyoo Kim , Colorado State University
pp. 452
Session 26: Enterprise Systems

A Toolkit for Developing Web-based Information Systems: Case Studies (Abstract)

Maria Tortorella , RCOST, University of Sannio, Italy
Thierry Bodhuin , RCOST, University of Sannio, Italy; Parco Scientifico e Tecnologico di Salerno e delle Aree Interne della Campania, Italy
pp. 460

Rapid Verification of Embedded Systems Using Patterns (Abstract)

L. Yu , Arizona State University
R. Paul , Department of Defense
F. Zhu , University of Minnesota
W. T. Tsai , Arizona State University
pp. 466

Software Documentation-Driven Manufacturing (Abstract)

V. Berzins , Naval Postgraduate School, Monterey, CA
Luqi , Naval Postgraduate School, Monterey, CA
L. Zhang , Naval Postgraduate School, Monterey, CA
X Liang , Naval Postgraduate School, Monterey, CA
pp. 472
Session 27: Object Oriented Development (2)

Meta Model Approach for Mediation (Abstract)

Isamu Shioya , Hosei University, Tokyo, Japan
Masataro Shiroiwa , Hosei University, Tokyo, Japan
Takao Miura , Hosei University, Tokyo, Japan
pp. 480

A Flexible Framework for Replication in Distributed Systems (Abstract)

Eul Gyu Im , National Security Research Institute
B. Clifford Neuman , University of Southern California
pp. 486

A Graph Grammar Approach to Software Architecture Verification and Transformation (Abstract)

Kang Zhang , The University of Texas at Dallas
Guanglei Song , The University of Texas at Dallas
Jing Dong , The University of Texas at Dallas
Jun Kong , The University of Texas at Dallas
pp. 492
Paper Session 28: System Reliability (1)

Sensitivity Analysis of Software Reliability for Component-Based Software Applications (Abstract)

Jung-Hua Lo , National Taiwan University, Taipei
Sy-Yen Kuo , National Taiwan University, Taipei
Michael R. Lyu , The Chinese University of Hong Kong, Shatin,
Chin-Yu Huang , National Tsing Hua University, Hsinchu
pp. 500

Effects of Introducing Survival Behaviours into Automated Negotiators (Abstract)

Qinglai Ni , University of Southampton, UK
Robert John Walters , University of Southampton, UK
Stephen Crouch , University of Southampton, UK
Peter Henderson , University of Southampton, UK
pp. 506

An Architecture of Wireless Web and Dialogue System Convergence for Multimodal Service Interaction Over Converged Networks (Abstract)

J. Jenny Li , Avaya Labs Research, NJ
Wu Chou , Avaya Labs Research, NJ
Xueshan Shan , Avaya Labs Research, NJ
Feng Liu , Avaya Labs Research, NJ
pp. 513
Session 29: System Reliability (2)

Integrating Runtime Assertions with Dynamic Types: Structuring a Derivation from an Incomputable Specification (Abstract)

Paul A. Bailes , The University of Queensland, Australia
Colin J.M. Kemp , The University of Queensland, Australia
pp. 520

An Efficient Defect Estimation Method for Software Defect Curves (Abstract)

T.Y. Chen , University of Technology, Australia
Chenggang Bai , Beijing University of Aeronautics and Astronautics, China
Kai-Yuan Cai , Beijing University of Aeronautics and Astronautics, China
pp. 534
Workshop 1:

Workshop on Architectures for Complex Application Integration (WACAI 2003) (PDF)

Anna Liu , Microsoft Australia
Ian Gorton , Pacific Northwest National Laboratory, Battelle
Piyush Maheshwari , The University of New South Wales, Sydney
pp. 542

Just What Could Possibly Go Wrong In B2B Integration? (Abstract)

Julian Jang , CSIRO Mathematical and Information Sciences, Australia
Doug Palmer , CSIRO Mathematical and Information Sciences, Australia
Dean Kuo , CSIRO Mathematical and Information Sciences, Australia
Alan Fekete , University of Sydney, Australia
Paul Greenfield , CSIRO Mathematical and Information Sciences, Australia
pp. 544

Flexible Fault Tolerance in Configurable Middleware for Embedded Systems (Abstract)

Kevin Dorow , Pacific Northwest National Laboratory, Richland, WA
pp. 563

Ad Hoc Software Interfacing: Enterprise Application Integration (EAI) when Middleware is Overkill (Abstract)

Vijai Mohan , University of Texas at Arlington
Arthur A. Reyes , University of Texas at Arlington
Jos? R. Espino , University of Texas at Arlington
Monica Nadkar , University of Texas at Arlington
pp. 570

Next Generation Application Integration: Challenges and New Approaches (Abstract)

Ian Gorton , Pacific Northwest National Laboratory, Richland, WA
Judi Thomson , Pacific Northwest National Laboratory, Richland, WA
Dave Thurman , Pacific Northwest National Laboratory, Richland, WA
pp. 576
Workshop 2:

Web Security Informatics Workshop (PDF)

Tsau Young Lin , San Jose State University, USA
pp. null

Intelligent Web Topics Search Using Early Detection and Data Analysis (Abstract)

Yixin Yang , California State University at Hayward
Ching-Cheng Lee , California State University at Hayward
pp. 584

Discovering Cyber Communities from the WWW (Abstract)

Xiaohua Hu , Drexel University, Philadelphia, PA
Nick Cercone , Dalhousie University, Halifax, NS Canada
Jianchoa Han , California State University Dominguez Hills, Carson, CA
pp. 590

Internet-based Decision Support: Towards E-Hospital (Abstract)

Shusaku Tsumoto , Shimane University
Shoji Hirano , Shimane University
Eisuke Hanada , Shimane University Hospital
pp. 595

A Framework for Web-based Research Support Systems (Abstract)

Y. Y. Yao , University of Regina, Saskatchewan, Canada
pp. 601

Intelligent Mobile Agents for Efficient and Inexpensive e-Shopping (Abstract)

Lin Lu , Georgia State University, Atlanta
Yan-Qing Zhang , Georgia State University, Atlanta
pp. 607

Managing Security Policy in a Large Distributed Web Services Environment (Abstract)

Meichun Hsu , Commerce One Inc.
Symon Chang , Commerce One Inc.
Qiming Chen , Commerce One Inc.
pp. 610

Information Flows in E-Government (Abstract)

Tsau Young (T.Y.) Lin , San Jose State University, CA
pp. 616

Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System (Abstract)

James B. Michael , Naval Postgraduate School, Monterey, California
Thomas C. Wingfield , The Potomac Institute for Policy Studies, Arlington, VA
Duminda Wijesekera , George Mason University, Fairfax, VA
pp. 621

A Methodology for Hiding Knowledge in XML Document Collections (Abstract)

Vijay V. Raghavan , University of Louisiana Lafayette, LA
Robert B. Sweeney , University of South Alabama, Mobile, AL
Tom Johnsten , University of South Alabama, Mobile, AL
pp. 627

Security Issues for the Semantic Web (Abstract)

Bhavani Thuraisingham , The National Science Foundation, Arlington, VA
pp. 632

Situation-Aware Personalized Information Retrieval for Mobile Internet (Abstract)

Yisheng Yao , Arizona State University, Tempe
Stephen S. Yau , Arizona State University, Tempe
Dazhi Huang , Arizona State University, Tempe
Huan Liu , Arizona State University, Tempe
pp. 638
Workshop 3:

Web Based Systems and Applications (WEBSA2003) (PDF)

Baowen Xu , Southeast University, China
pp. null

A Multiple-Tier Model Manipulation Architecture for Enterprise Decision Making (Abstract)

Q. Duan , Yunnan University, China
H. Yang , De Montfort University, Leicester, UK
H. Zhou , Yunnan University, China
H. Kang , Yunnan University, China
S. Li , De Montfort University, Leicester, UK
Z. Liang , Yunnan University, China
H. Liao , Yunnan University, China
pp. 646

Regression Testing for Web Applications Based on Slicing (Abstract)

Zhenqiang Chen , Southeast University, Nanjing, China; Jiangsu Institute of Software Quality, Nanjing, China
Lei Xu , Southeast University, Nanjing, China; Jiangsu Institute of Software Quality, Nanjing, China
Jixiang Jiang , Southeast University, Nanjing, China; Jiangsu Institute of Software Quality, Nanjing, China
Baowen Xu , Southeast University, Nanjing, China; Jiangsu Institute of Software Quality, Nanjing, China; National University of Defense Technology, Changsha, China
Huowang Chen , National University of Defense Technology, Changsha, China
pp. 652

A Supervised Visual Wrapper Generator for Web-Data Extraction (Abstract)

Xiaofeng Meng , Renmin University of China, China
Dongdong Hu , Renmin University of China, China
Chen Li , University of California, Irvine
Haiyan Wang , Renmin University of China, China
pp. 657

A Dynamic Information Retrieval System for the Web (Abstract)

San Murugesan , Southern Cross University, Lismore, Australia
Xiangzhu Gao , Southern Cross University, Lismore, Australia
Bruce Lo , University of Wisconsin-Eau Claire, WI, USA
pp. 663

A Pattern Language Model for Framework Development (Abstract)

He Ke-qing , Wuhan University
Xu Hui , Wuhan University
Liu Wu-dong , Wuhan University
Jing Yi-xing , Wuhan University
Yingshi , Wuhan University
pp. 669

Some Domain Patterns in Web Application Framework (Abstract)

Liu Jie , BeiHang University, Beijing, China
Liu Chao , Wuhan University, China
He Keqing , Wuhan University, China
Ying Shi , Wuhan University, China
pp. 674

Web-Based Support for Managing Large Collections of Software Artefacts (Abstract)

Janet Lavery , University of Durham, UK
Chris Korhonen , University of Durham, UK
David Nutter , University of Durham, UK
Cornelia Boldyreff , University of Durham, UK
Phyo Kyaw , University of Durham, UK
James Brittle , University of Durham, UK
Stephen Rank , University of Durham, UK
pp. 678

MDA-based Development of E-Learning System (Abstract)

Hong Wang , Carleton University
Dong Zhang , Carleton University
pp. 684

PeAgent - A Mobile Agent System to Support Secure Internet and Web Applications (Abstract)

Qingkai Ma , University of Texas at Dallas
Manghui Tu , University of Texas at Dallas
I-Ling Yen , University of Texas at Dallas
Wei Hao , University of Texas at Dallas
Wei Li , University of Texas at Dallas
pp. 690

Toward an Easy Programming Environment for Implementing Mobile Applications: A Fleet Application Case Study using SyD Middleware (Abstract)

V. Madisetti , Georgia Institute of Technology, Atlanta
S. K. Prasad , Georgia State University, Atlanta
A. Zelikovsky , Georgia State University, Atlanta
Y. Zhang , Georgia State University, Atlanta
R. Sunderraman , Georgia State University, Atlanta
M. Weeks , Georgia State University, Atlanta
S. Belkasim , Georgia State University, Atlanta
pp. 696

A Hierarchical Strategy for Testing Web-Based Applications and Ensuring Their Reliability (Abstract)

Zhao Li , Southern Methodist University, Dallas, Texas
Jeff Tian , Southern Methodist University, Dallas, Texas
A. G? Koru , Southern Methodist University, Dallas, Texas
Li Ma , Southern Methodist University, Dallas, Texas
pp. 702

Author Index (PDF)

pp. 708
96 ms
(Ver 3.3 (11022016))