The Community for Technology Leaders
2013 IEEE 37th Annual Computer Software and Applications Conference (2004)
Hong Kong
Sept. 28, 2004 to Sept. 30, 2004
ISSN: 0730-3157
ISBN: 0-7695-2209-2
TABLE OF CONTENTS
Introduction

Program Committee (PDF)

pp. xvii

Reviewers (PDF)

pp. xviii
Keynote Address 1
Component-Based Software I

Distributed Component-Based Software Development: An Incremental Approach (Abstract)

Daniel Lucredio , Federal University of S?o Carlos
Eduardo Santana de Almeida , Federal University of Pernambuco
Alexandre Alvaro , Federal University of Pernambuco
Luis Carlos Trevelin , Federal University of S?o Carlos
Antonio Francisco do Prado , Federal University of S?o Carlos
pp. 4-9

TiViPE — Tino's Visual Programming Environment (Abstract)

Tino Lourens , Honda Research Institute Japan Co. Ltd.
pp. 10-15

Codifying a Service Architectural Style (Abstract)

Mark Turner , Keele University
David Budgen , Keele University
Pearl Brereton , Keele University
pp. 16-22

Formal Support for Development of JavaBeans™ Component Systems (Abstract)

Zhiming Liu , United Nations University
Bhim Prasad Upadhyaya , United Nations University
pp. 23-28
Process Management I

Assuring Assessment Success (Abstract)

Kevin McKeever , Motorola Inc.
Eric Peterson , Motorola Inc.
Jonathan Morrison , Motorola Inc.
pp. 30-37

Enacting Conformance Assessment of Business Processes — An ebXML Based Approach in E-ADOME (Abstract)

Qing Li , City University of Hong Kong
Zhe Shan , City University of Hong Kong
Kamalakar Karlapalem , International Institute of Information Technology
pp. 38-43

Introducing Agility: A Case Study of Situational Method Engineering Using the OPEN Process Framework (Abstract)

B. Henderson-Sellers , University of Technology at Sydney
M. K. Serour , University of Technology at Sydney
pp. 50
Software Testing I

An Edge Marking Technique for Dynamic Slicing of Object-Oriented Programs (Abstract)

Rajeev Kumar , Indian Institute of Technology
Durga Prasad Mohapatra , Indian Institute of Technology
Rajib Mall , Indian Institute of Technology
pp. 60-65

Modular Monadic Program Slicing (Abstract)

Liang Shi , Southeast University and Jiangsu Institute of Software Quality
Baowen Xu , Southeast University, Jiangsu Institute of Software Quality and Wuhan University
Hongji Yang , De Montfort University
Yingzhou Zhang , Southeast University and Jiangsu Institute of Software Quality
Bixin Li , Southeast University
pp. 66-71

A Revisit of Adaptive Random Testing by Restriction (Abstract)

Dave Towey , University of Hong Kong
Tsong Yueh Chen , Swinburne University of Technology
Kwok Ping Chan , University of Hong Kong
Fei-Ching Kuo , Swinburne University of Technology
pp. 78-85
Panel on Risk Management and Dependability — What are the Key Factors?

null (PDF)

pp. null

Risk Management of Corporate Confidential Information in Digital Form (PDF)

K. H. Pun , University of Hong Kong
S. M. Yiu , University of Hong Kong
W. W. Tsang , University of Hong Kong
Lucas Hui , University of Hong Kong
H. W. Chan , University of Hong Kong
C. F. Chong , University of Hong Kong
K. P. Chow , University of Hong Kong
pp. 88-89
Formal Method I

Implementing Hierarchical Features in a Graphically Based Formal Modelling Language (Abstract)

Peter Henderson , University of Southampton
Stephen Crouch , University of Southampton
Robert John Walters , University of Southampton
pp. 92-98

Situated Modelling of Scenarios (Abstract)

Francisco A. C. Pinheiro , Universidade de Brasília
pp. 99-107

PFGASAT— A Genetic SAT Solver Combining Partitioning and Fuzzy Strategies (Abstract)

Weimin Wu , Tsinghua University
Jianzhou Zhao , Tsinghua University
Jinian Bian , Tsinghua University
pp. 108-113

Consistency Check in Modelling Multi-Agent Systems (Abstract)

Lijun Shan , National University of Defence Technology
Hong Zhu , Oxford Brookes University
pp. 114-119
Middlware

Stream Composition for Highly Adaptive and Reconfigurable Mobile Middleware (Abstract)

Yongjie Zheng , Hong Kong Polytechnic University
Alvin T. S. Chan , Hong Kong Polytechnic University
pp. 122-127

SOWAC: A Service-Oriented Workflow Access Control Model (Abstract)

Yu Liu , Chinese Academy of Sciences
Wei Xu , Chinese Academy of Sciences
Jun Wei , Chinese Academy of Sciences
Jing Li , Chinese Academy of Sciences
pp. 128-134

Towards Autonomic Computing Middleware via Reflection (Abstract)

Zizhan Zheng , Peking University
Hong Mei , Peking University
Gang Fan , Peking University
Gang Huang , Peking University
Tiancheng Liu , Peking University
Zhao Liu , Peking University
pp. 135-140

A Semantic-Aware Publish/Subscribe System with RDF Patterns (Abstract)

Beihong Jin , Chinese Academy of Sciences
Danhua Shao , Chinese Academy of Sciences
Jing Li , Chinese Academy of Sciences
Jinling Wang , Chinese Academy of Sciences
pp. 141-146
Real-Time Systems

Worst-Case Response Time Analysis for OSEK/VDX Compliant Real-Time Distributed Control Systems (Abstract)

Mingde Zhao , Zhejiang University
Zhaohui Wu , Zhejiang University
Wang Lei , Zhejiang University
pp. 148-153

Dynamic Real-Time Scheduling for Multi-Processor Tasks Using Genetic Algorithm (Abstract)

Yueh-Min Huang , National Cheng Kung University
Shu-Chen Cheng , Southern Taiwan University of Technology
pp. 154-160

Real-Time Strategy and Practice in Service Grid (Abstract)

Deqing Zou , Huazhong University of Science and Technology
Ping Kuang , Huazhong University of Science and Technology
Jian Chen , Huazhong University of Science and Technology
Li Qi , Huazhong University of Science and Technology
Hai Jin , Huazhong University of Science and Technology
Hanhua Chen , Huazhong University of Science and Technology
pp. 161-166
Panel on Computer Curricula for Software Engineering

null (PDF)

pp. null
Software Reliability

Application of Maximum Entropy Principle to Software Failure Prediction (Abstract)

Hai-yan Yang , Beijing University of Aeronautics and Astronautics
Ji Wu , Beijing University of Aeronautics and Astronautics
Chao Liu , Beijing University of Aeronautics and Astronautics
Xiao-xia Jia , Beijing University of Aeronautics and Astronautics
Mao-zhong Jin , Beijing University of Aeronautics and Astronautics
Chang Liu , Beijing University of Aeronautics and Astronautics
pp. 180-185

Software Reliability Growth Models Incorporating Fault Dependency with Various Debugging Time Lags (Abstract)

Sy-Yen Kuo , National Taiwan University
Michael R. Lyu , Chinese University of Hong Kong
Chuan-Ching Sue , National Cheng-Kung University
Chu-Ti Lin , National Tsing Hua University
Chin-Yu Huang , National Tsing Hua University
pp. 186-191

The Effects of Fault Counting Methods on Fault Model Quality (Abstract)

John C. Munson , Cylant, Inc.
Allen P. Nikora , California Institute of Technology
pp. 192-201

Portable Faultloads Based on Operator Faults for DBMS Dependability Benchmarking (Abstract)

Henrique Madeira , University of Coimbra
Marco Vieira , Polytechnic Institute of Coimbra
pp. 202-209
Security I

A Multi-Class SLIPPER System for Intrusion Detection (Abstract)

Zhenwei Yu , University of Illinois at Chicago
Jeffrey J. P. Tsai , University of Illinois at Chicago
pp. 212-217

A Secure Mobile Agent System Model Based on Extended Elementary Object System (Abstract)

Lu Ma , University of Illinois at Chicago
Tadao Murata , University of Illinois at Chicago
Jeffrey J. P. Tsai , University of Illinois at Chicago
pp. 218-223

A Secure and Fully Private Borda Voting Protocol with Universal Verifiability (Abstract)

Changjie Wang , Chinese University of Hong Kong
Ho-fung Leung , Chinese University of Hong Kong
pp. 224-229
Panel on Research Directions in Software Process Improvement

null (PDF)

pp. null

Research Directions in Software Process Improvement (PDF)

David N. Card , Software Productivity Consortium
pp. 238
Keynote Address 2
Component-Based Software II

Intelligent Component Selection (Abstract)

Chiou Peng Lam , Edith Cowan University
Jocelyn Armarego , Murdoch University
Valerie Maxville , Edith Cowan University
pp. 244-249

Component-Wise Mapping of Media-Needs to a Distributed Presentation Environment (Abstract)

Jun Hu , Eindhoven University of Technology
Loe Feijs , Eindhoven University of Technology
pp. 250-257

Component Failure Mitigation According to Failure Type (Abstract)

Tim Kelly , University of York
Fan Ye , University of York
pp. 258-264

Modular Design of Reactive Systems (Abstract)

Cristina Cerschi Seceleanu , Åbo Akademi and TUCS
Tiberiu Seceleanu , University of Turku
pp. 265-271
Process Management II

POP beyond SODA, Reaching the New Horizon of Service Cooperation (Abstract)

Shaohua Liu , Chinese Academy of Sciences
Yonglin Xia , Chinese Academy of Sciences
Gang Xu , Chinese Academy of Sciences
Dan Ye , Chinese Academy of Sciences
Jun Wei , Chinese Academy of Sciences
Yu Liu , Chinese Academy of Sciences
pp. 280-285

FC Method: A Practical Approach to Improve Quality and Efficiency of Software Processes for Embedded System Revision (Abstract)

Kenji Kaijiri , Shinshu University
Haruhiko Kaiya , Shinshu University
Kazuma Aizawa , Shinshu University and Epson Kowa Corporation
pp. 286-292

A Complete Textual Merging Algorithm for Software Configuration Management Systems (Abstract)

Haifeng Shen , Nanyang Technological University
Chengzheng Sun , Griffith University
pp. 293-298
Software Testing II

Test Criteria for Context-Free Grammars (Abstract)

Chao Liu , Beijing University of Aeronautics and Astronautics
Zhongyi Gao , Beijing University of Aeronautics and Astronautics
Maozhong Jin , Beijing University of Aeronautics and Astronautics
Hu Li , Beijing University of Aeronautics and Astronautics
pp. 300-305

Mutation-Based Testing Criteria for Timeliness (Abstract)

Robert Nilsson , University of Skövde
Jeff Offutt , George Mason University
Sten F. Andler , University of Skövde
pp. 306-311

Reachability Testing of Semaphore-Based Programs (Abstract)

Richard Carver , George Mason University
Yu Lei , University of Texas at Arlington
pp. 312-317

On the Testing of Particular Input Conditions (Abstract)

Yuen Tak Yu , City University of Hong Kong
Eric Ying Kwong Chan , City University of Hong Kong
Pak-Lok Poon , Hong Kong Polytechnic University
pp. 318-325
Panel on Computer Supported Cooperative Work in Software Engineering

null (PDF)

pp. null

Computer Supported Cooperative Work in Software Engineering (PDF)

Aidtya Mathur , Purdue University
Tangqiu Li , Xiamen University
Karama Kanoun , LAAS-CNRS
Zongkai Lin , Chinese Academy of Sciences
J. Jenny Li , Avaya Labs Research
pp. 328
Formal Method II

Towards a Model Logic for π-Calculus (Abstract)

Tingting Han , Nanjing University
Jian Lu , Nanjing University
Taolue Chen , Nanjing University
pp. 330-335

Generating Regression Tests via Model Checking (Abstract)

Marcio Dias , University of California at Irvine
Debra Richardson , University of California at Irvine
Lihua Xu , University of California at Irvine
pp. 336-341

Automated Consistency and Completeness Checking of Testing Models for Interactive Systems (Abstract)

Amit Paradkar , IBM T.J. Watson Research Center
Tim Klinger , IBM T.J. Watson Research Center
pp. 342-348

Design of a CIL Connector to SPIN (Abstract)

Xue Rui , State Key Laboratory of Information Security
Li Yongjian , Chinese Academy of Sciences and State Key Laboratory of Information Security
pp. 349-354
Software Architecture

A Development Framework for Rapid Meta-Heuristics Hybridization (Abstract)

Min Kwang Lim , National University of Singapore
Steven Halim , National University of Singapore
Wee Chong Wan , National University of Singapore
Hoong Chuin Lau , National University of Singapore
pp. 362-367

Safety Tactics for Software Architecture Design (Abstract)

Tim Kelly , University of York
Weihang Wu , University of York
pp. 368-375

A Uniform Meta-Model for Mediating Formal Electronic Conferences (PDF)

Carl K. Chang , Iowa State University
Jeff Voas , Cigital
Jia Zhang , Northern Illinois University
pp. 376-383
Security II

Publicly Verifiable Auctions with Minimal Leakage (Abstract)

Xiaofeng Chen , Sun Yat-sen University
Qianhong Wu , Xidian University
Yumin Wang , Xidian University
Changjie Wang , Chinese University of Hong Kong
pp. 384-389

A Hybrid Security Framework of Mobile Code (Abstract)

Long Qin , Peking University
Si Duanfeng , Peking University
Zou Wei , Peking University
Han Xinhui , Peking University
pp. 390-395

A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy (Abstract)

Yu-Fang Chung , National Taiwan University
Chang-Sin Tian , National Chiayi University
Tzer-Shyong Chen , Tung-Hai University
pp. 396-401
Panel on Embedded Software Systems

null (PDF)

pp. null
Requirement & Design

Priority Assessment of Software Requirements from Multiple Perspectives (Abstract)

Yan Sun , University of Missouri - Rolla
Xiaoqing (Frank) Liu , University of Missouri - Rolla
Yuji Kyoya , Toshiba Corporation
Kunio Noguchi , Toshiba Corporation
Chandra Sekhar Veera , University of Missouri - Rolla
pp. 410-415

An Approach to Feature Based Modelling by Dependency Alignment for the Maintenance of the Trustworthy System (Abstract)

Doo Hwan Bae , Korea Advanced Institute of Science and Technology
Jungyoon Kim , Korea Advanced Institute of Science and Technology
pp. 416-423

Hiding Sensitive Patterns in Association Rules Mining (Abstract)

Chien-Yu Chang , National Dong Hwa University
Guanling Lee , National Dong Hwa University
Arbee L. P. Chen , National Cheng-chi University
pp. 424-429

Efficient Partial Multiple Periodic Patterns Mining without Redundant Rules (Abstract)

Wenpo Yang , National Dong Hua University
Guanling Lee , National Dong Hua University
pp. 430-435
Pervasive/Ubiquitous Computing

Materializing Ubiquitous Computing Environments (Abstract)

Kimio Kuramitsu , Kogakuin University
Hideyuki Tokuda , Keio University
pp. 438-443

Context-Based Access Control for Ubiquitous Service Provisioning (Abstract)

Rebecca Montanari , Universit? di Bologna
Antonio Corradi , Universit? di Bologna
Daniela Tibaldi , Universit? di Bologna
pp. 444-451

Development and Runtime Support for Situation-Aware Application Software in Ubiquitous Computing Environments (Abstract)

Stephen S. Yau , Arizona State University
Dazhi Huang , Arizona State University
Haishan Gong , Arizona State University
Siddharth Seth , Arizona State University
pp. 452-457

Testing Context-Sensitive Middleware-Based Software Applications (Abstract)

Stephen S. Yau , Arizona State University
T. H. Tse , University of Hong Kong
W. K. Chan , University of Hong Kong
T. Y. Chen , Swinburne University of Technology
Heng Lu , University of Hong Kong
pp. 458-466
Internet Web System

Identifying and Breaking Necessary Constraints to Web-Based Metacomputing (Abstract)

Wei Li , Central Queensland University
Minjie Zhang , University of Wollongong
W. K. Daniel Pun , Central Queensland University
pp. 474-479

Multi-Dimension Browse (Abstract)

Yuh-Jzer Joung , National Taiwan University
Tsung-Yuan Liu , National Chiao Tung University
pp. 480-485

Supporting Concept Assignment in the Comprehension of Web Applications (Abstract)

Ugo De Carlini , Universit? di Napoli Federico II
Porfirio Tramontana , Universit? di Napoli Federico II
Giuseppe Antonio Di Lucca , University of Sannio
Anna Rita Fasolino , Universit? di Napoli Federico II
pp. 492-497
Keynote Address 3

Formal Methods for Trustworthy Mobile Computing (PDF)

Huimin Lin , Chinese cademy of Sciences
pp. 500
Software Re-Engineering

JART: Grammar-Based Approach to Refactoring (Abstract)

Viljem Žumer , University of Maribor
Tomaž Kosar , University of Maribor
Marjan Mernik , University of Maribor
pp. 502-507

Extraction and Visualization of Architectural Structure Based on Cross References among Object Files (Abstract)

Xiangqun Chen , Peking University
Lu Zhang , Peking University
Wei Zhu , Peking University
Xia Zhao , Peking University
Qiming Teng , Peking University
pp. 508-513

Agentification for Web Services (Abstract)

Hongji Yang , De Montfort University
He Guo , Dalian University of Technology
Baowen Xu , Southeast University
Feng Chen , De Montfort University
pp. 514-519

Software Quality and Agile Methods (Abstract)

June Verner , National ICT Australia Ltd. and University of New South Wales
Muhammad Ali Babar , National ICT Australia Ltd. and University of New South Wales
Liming Zhu , National ICT Australia Ltd. and University of New South Wales
Ming Huo , National ICT Australia Ltd. and University of New South Wales
pp. 520-525
Quality Assurance

An Approach for Software Reliability Model Selection (Abstract)

Ch. Ali Asad , Mohammad Ali Jinnah University
Muhammad Irfan Ullah , Mohammad Ali Jinnah University
Muhammad Jaffar-Ur Rehman , Mohammad Ali Jinnah University
pp. 534-539

An Integrated Software Development Environment with XML Internal Representation (Abstract)

Chih-Hung Chang , Feng Chia University and Hsiuping Institute of Technology
William C. Chu , Tunghai University
Don-Lin Yang , Feng Chia University
Chih-Wei Lu , Hsiuping Institute of Technology
pp. 540-545

An Approach to Generate the Thin-Threads from the UML Diagrams (Abstract)

Xiaoqing Bai , Guangxi University
C. Peng Lam , Edith Cowan University
Huaizhong Li , Edith Cowan University
pp. 546-552
Embedded Systems

Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed Computing (Abstract)

Weiwei Song , Arizona State University
W. T. Tsai , Arizona State University
Zhibin Cao , Arizona State University
Ray Paul , Department of Defense
Hai Huang , Arizona State University
pp. 554-559

A New Receiver-Based Layered-Rate Estimator Algorithm for Fair Bandwidth Distribution (Abstract)

Naveen K. Chilamkurti , La Trobe University
Ben Soh , La Trobe University
Kon Papazis , La Trobe University
pp. 560-565

Study on Performance of IP-SWAN Based on Distributed NS-RAID (Abstract)

Jun Liu , Nankai University and Tianjin University of Finance and Economics
Baojiang Cui , Beijing University of Posts and Telecommunications
Gang Wang , Nankai University
Jing Liu , Nankai University
pp. 566-571

A Reliable OS Kernel for Smart Sensors (Abstract)

Wang Lei , Zhejiang University
Zheng Kougen , Zhejiang University
Wu Zhaohui , Zhejiang University
pp. 572-577
Author Index

Author Index (PDF)

pp. 579-581
105 ms
(Ver )