The Community for Technology Leaders
2013 IEEE 37th Annual Computer Software and Applications Conference (2006)
Chicago, Illinois
Sept. 17, 2006 to Sept. 21, 2006
ISSN: 0730-3157
ISBN: 0-7695-2655-1
TABLE OF CONTENTS
Introduction
Panel Session

Granular computing, computer security and web intelligence (PDF)

T.Y. Lin , Dept. of Comput. Sci., San Jose State Univ., CA
pp. 22-23
Introduction

Committees (PDF)

pp. xv-xviii

Reviewers (PDF)

pp. xviii
Keynote

Practical Autonomic Computing (Abstract)

Ian D. Gregorio-De.Souza , Dartmouth College, USA
George Cybenko , Dartmouth College, USA
Vincent H. Berk , Dartmouth College, USA
Chad Behre , Dartmouth College, USA
pp. 3-14
Plenary Panel Session
Panel Session

Trustworthy Computing Needs (PDF)

Ann Miller , University of Missouri-Rolla, USA
pp. 34

Reliability and Fault Tolerance in Trust (PDF)

Jeffrey Voas , Science Applications International Corporation (SAIC), USA
pp. 35-36

Risk: A Good System Security Measure (PDF)

O. Sami Saydjari , Cyber Defense Agency, LLC, USA
pp. 37-38

Just Enough Requirements Traceability (PDF)

Jane Cleland-Huang , DePaul University, USA
pp. 41-42

Global Software Development for the Enterprise (PDF)

Rajiv Ramnath , The Ohio State University, USA
pp. 57-58
Applications

A Performance Engineering Tool for Tiered Software Systems (Abstract)

Vibhu Saujanya Sharma , Indian Institute of Technology Kanpur, India
Pankaj Jalote , Indian Institute of Technology Kanpur, India
Kishor S. Trivedi , Duke University, USA
pp. 63-70

Accomplishments and Challenges of Protein Ontology (Abstract)

Amandeep S. Sidhu , University of Technology Sydney, Australia
Tharam S. Dillon , University of Technology Sydney, Australia
Farookh K. Hussain , Curtin University of Technology, Australia
pp. 71-76

Alert Based Monitoring of Stock Trading Systems (Abstract)

Edward W.Y. Ho , Hong Kong University of Science and Technology, Hong Kong
Patrick C.K. Hung , University of Ontario Institute of Technology, Canada
Dickson K.W. Chiu , Hong Kong Polytechnic University, Hong Kong
pp. 77-86
Architecture 1

A Biologically-Inspired Autonomic Architecture for Self-Healing Data Centers (Abstract)

Paskorn Champrasert , University of Massachusetts, Boston, USA
Junichi Suzuki , University of Massachusetts, Boston, USA
pp. 103-112
Architecture 2

Detecting Data Races on Framework-Based Applications (Abstract)

Federico Balaguer , University of Illinois at Urbana-Champaign, USA
Ralph Johnson , University of Illinois at Urbana-Champaign, USA
Thuc S. M. Ho , University of Illinois at Urbana-Champaign, USA
pp. 113-120

Tool Support to Model-based Quality Analysis of Software Architecture (Abstract)

Hong Zhu , Oxford Brookes University, UK
Jian Wu , National University of Defense Technology, China
Qian Zhang , National University of Defense Technology, China
pp. 121-128

Generating Domain Specific Graphical Modeling Editors from Meta Models (Abstract)

Rabih Zbib , Telcordia Technologies, USA
Devasis Bassu , Telcordia Technologies, USA
Hiralal Agrawal , Telcordia Technologies, USA
Ashish Jain , Telcordia Technologies, USA
pp. 129-138
Formal Methods/Models 1

Verifying Java Programs By Theorem Prover HOL (Abstract)

Xiaoyu Song , Portland State University, USA
Anduo Wang , Tsinghua University, China
He Fei , Tsinghua University, China
Ming Gu , Tsinghua University, China
pp. 139-142

Model Checking with Induction (Abstract)

Kuangnan Chang , Eastern Kentucky University, USA
David Kung , The University of Texas at Arlington, USA
pp. 143-149

On the Distribution of Property Violations in Formal Models: An Initial Study (Abstract)

Jimin Gao , University of Minnesota, USA
Mats Heimdahl , University of Minnesota, USA
David Owen , Prologic Inc., USA
Tim Menzies , West Virginia University, USA
pp. 150-160
Formal Methods/Models 2

Efficient Modeling of Hierarchical Dialog Flows for Multi-ChannelWeb Applications (Abstract)

Matthias Book , University of Leipzig, Germany
Volker Gruhn , University of Leipzig, Germany
pp. 161-168

A Formal Approach to Pre-Market Review for Medical Device Software (Abstract)

S. Purushothaman Iyer , North Carolina State University, USA
William Spees , Food and Drug Administration, USA
Raoul Jetley , North Carolina State University, USA
Paul L. Jones , Food and Drug Administration, USA
pp. 169-177

Modeling the Symptomatic Fixes Archetype in Enterprise Computer Security (Abstract)

Michel Cukier , University of Maryland at College Park, USA
Ioana Rus , Engineering Maryland, USA
Shalom N. Rosenfeld , University of Maryland at College Park, USA
pp. 178-188
Maintenance

An Experimental Study on Software Aging and Rejuvenation in Web Servers (Abstract)

Paulo J. F. Filho , Federal University of Santa Catarina, Brazil
Rivalino Matias , Federal University of Santa Catarina, Brazil
pp. 189-196

A Formal Model Driven Approach to Dependable Software Evolution (Abstract)

Bing Qiao , De Montfort University, UK
Feng Chen , De Montfort University, UK
Hongji Yang , De Montfort University, UK
William Cheng-Chung Chu , TungHai University, Taiwan
pp. 205-214
Metrics

Do Structural Design Patterns Promote Design Stability? (Abstract)

Mahmoud Elish , King Fahd University of Petroleum and Minerals, Saudi Arabia
pp. 215-220

Software Effort Estimation Based on Use Cases (Abstract)

Marcio Rodrigo Braz , Federal University of Parana - UFPR, Brazil
Silvia Regina Vergilio , Federal University of Parana - UFPR, Brazil
pp. 221-228

Scale Free in Software Metrics (Abstract)

Peng Rong , Wuhan University, China
Liu Jing , Wuhan University, China
He Keqing , Wuhan University, China
Ma Yutao , Wuhan University, China
pp. 229-235

An Agent-Based Metric for Quality of Services over Wireless Networks (Abstract)

Yaw-Chung Chen , National Chiao Tung University, Taiwan
Wen-Yen Chen , National Chiao Tung University, Taiwan
pp. 236-246
Pervasive Computing

Highly Reliable Mobile Desktop Computing in Your Pocket (Abstract)

Jason Nieh , Columbia University, USA
Shaya Potter , Columbia University, USA
pp. 247-254

Proxy-Based Pervasive Multimedia Content Delivery (Abstract)

Chi-Hung Chi , Tsinghua University, China
Henry N. Palit , Tsinghua University, China
Lin Liu , Tsinghua University, China
pp. 255-264
Requirements Design 1

Phrasing in Dynamic Requirements Trace Retrieva (Abstract)

Jane Cleland-Huang , DePaul University, USA
Xuchang Zou , DePaul University, USA
Raffaella Settimi , DePaul University, USA
pp. 265-272
Requirements Design 2

A Coordination Framework for Software Component Based Development (Abstract)

Jiang Guo , California State University Los Angeles, USA
pp. 291-298

An Approach for Developing Adaptive, Mobile Applications with Separation of Concerns (Abstract)

George A. Papadopoulos , University of Cyprus, Cyprus
Nearchos Paspallis , University of Cyprus, Cyprus
pp. 299-306

CAPIS Model Based Software Design Method for Sharing Experts' Thought Processes (Abstract)

Atsushi Takeuchi , Nihon University, Japan
Hiroshi Fujimoto , Nihon University, Japan
Katsunori Oyama , Nihon University, Japan
pp. 307-316
Security 1

A Pattern-Based Technique for Developing UML Models of Access Control Systems (Abstract)

Dae-Kyoo Kim , Oakland University, USA
Priya Gokhale , Oakland University, USA
pp. 317-324

An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns (Abstract)

Volker Haarslev , Concordia University, Canada
Yonggang Zhang , Concordia University, Canada
Juergen Rilling , Concordia University, Canada
pp. 333-342
Security 2

Integrating Static and Dynamic Analysis for Detecting Vulnerabilities (Abstract)

Ashish Aggarwal , Indian Institute of Technology, India
Pankaj Jalote , Indian Institute of Technology, India
pp. 343-350

Security Consistency in UML Designs (Abstract)

Anneliese Andrews , University of Denver, USA
Daniel Williams , Washington State University, USA
Orest Pilskalns , Washington State University, USA
Damir Aracic , Washington State University, USA
pp. 351-358

A Service-Oriented Design Framework for Secure Network Applications (Abstract)

Hiroshi Wada , University of Massachusetts, Boston, USA
Katsuya Oba , OGIS International, Inc., USA
Junichi Suzuki , University of Massachusetts, Boston, USA
pp. 359-368
Testing 1

Proportional Intensity-Based Software Reliability Modeling with Time-Dependent Metrics (Abstract)

Tadashi Dohi , Hiroshima University, Japan
Kazuya Shibata , Hiroshima University, Japan
Koichiro Rinsaka , Hiroshima University, Japan
pp. 369-376

Automatic Identification of Change Points for the System Testing Process (Abstract)

Joao W. Cangussu , University of Texas at Dallas, USA
Michael Baron , University of Texas at Dallas, USA
pp. 377-384

Backtracking Algorithms and Search Heuristics to Generate Test Suites for Combinatorial Testing (Abstract)

Jian Zhang , Chinese Academy of Sciences, China
Jun Yan , Chinese Academy of Sciences, China
pp. 385-394
Testing 2

Testing Scenario Implementation with Behavior Contracts (Abstract)

Kai Xu , University of Minnesota, USA
Donglin Liang , University of Minnesota, USA
pp. 395-402

On Detection Conditions of Double FaultsRelated to Terms in Boolean Expressions (Abstract)

Y. T. Yu , City University of Hong Kong, Hong Kong
Y. Liu , Swinburne University of Technology, Australia
M. F. Lau , Swinburne University of Technology, Australia
pp. 403-410

Test Case Prioritization Using Relevant Slices (Abstract)

Neelam Gupta , The University of Arizona, USA
Dennis Jeffrey , The University of Arizona, USA
pp. 411-420
Testing 3

A Network-Level Distributed Fault Injector for Experimental Validation of Dependable Distributed Systems (Abstract)

Taisy Silva Weber , Universidade Federal do Rio Grande do Sul, Brazil
Roberto Jung Drebes , Universidade Federal do Rio Grande do Sul, Brazil
Joana M. F. Trindade , Universidade Federal do Rio Grande do Sul, Brazil
Gabriela Jacques-Silva , Universidade Federal do Rio Grande do Sul, Brazil
Ingrid Jansch-P?rto , Universidade Federal do Rio Grande do Sul, Brazil
J?lio Gerchman , Universidade Federal do Rio Grande do Sul, Brazil
pp. 421-428

Reference Models and Automatic Oracles for the Testing of Mesh Simplification Software for Graphics Rendering (Abstract)

W. K. Chan , The Hong Kong University of Science and Technology, Hong Kong
S. C. Cheung , The Hong Kong University of Science and Technology, Hong Kong
Jeffrey C.F. Ho , The University of Hong Kong, Hong Kong
T.H. Tse , The University of Hong Kong, Hong Kong
pp. 429-438
Testing 4

Automatic Validation of Java Page Flows Using Model-Based Coverage Criteria (Abstract)

Peter J. Clarke , Florida International University, USA
Jonatan Alava , Florida International University, USA
Tariq M. King , Florida International University, USA
pp. 439-446

A Case Study for Invalidating the Markovian Property of GUI Software Structural Profile (Abstract)

Yan Shi , Beijing University of Aeronautics and Astronautics, China
Cheng-Gang Bai , Beijing University of Aeronautics and Astronautics, China
Kai-Yuan Cai , Beijing University of Aeronautics and Astronautics, China
Bei-Bei Yin , Beijing University of Aeronautics and Astronautics, China
pp. 447-454

A Systematic Regression Testing Method and Tool For Software Components (Abstract)

Deepa Gopinathan , San Jose State University, USA
Jingsha He , Beijing University of Technology, China
Jerry Gao , San Jose State University, USA
Quan Mai , San Jose State University, USA
pp. 455-466
Testing 6

Architecting a Testing Framework for Publish/Subscribe Applications (Abstract)

Anton Michlmayr , Vienna University of Technology, Austria
Pascal Fenkam , Vienna University of Technology, Austria
Schahram Dustdar , Vienna University of Technology, Austria
pp. 467-474

An Empirical Study on the Selection of Good Metamorphic Relations (Abstract)

Johannes Mayer , Ulm University, Germany
Ralph Guderlei , Ulm University, Germany
pp. 475-484

Forgetting Test Cases (Abstract)

T.Y. Chen , Swinburne University of Technology, Australia
Dave Towey , BNU-HKBU UIC, China
Kwok Ping Chan , The University of Hong Kong, Hong Kong
pp. 485-494
Web Service 1

Performance and Availability Analysis of an E-Commerce Site (Abstract)

Jijun Lu , University of Connecticut, USA
Swapna S. Gokhale , University of Connecticut, USA
pp. 495-502

Automated Agent Synthesis for Situation Awareness in Service-Based Systems (Abstract)

W. Gao , Arizona State University, USA
L. Zhu , Arizona State University, USA
D. Huang , Arizona State University, USA
S. S. Yau , Arizona State University, USA
H. Gong , Arizona State University, USA
pp. 503-512
Web Service 2

Web Service Retrieval: An Approach Based on Context Ontology (Abstract)

Lin Liu , Tsinghua University, China
Zhi Jin , Chinese Academy of Science, China
pp. 513-520

A Communication Virtual Machine (Abstract)

Yi Deng , Florida International University, USA
Nagarajan Prabakar , Florida International University, USA
Vagelis Hristidis , Florida International University, USA
Peter J. Clarke , Florida International University, USA
Chi Zhang , Florida International University, USA
S. Masoud Sadjadi , Florida International University, USA
Raju Rangaswami , Florida International University, USA
pp. 521-531

Quantitative Analysis on the Cacheability Factors of Web Objects (Abstract)

Lin Liu , Tsinghua University, China
Chi-Hung Chi , Tsinghua University, China
LuWei Zhang , Tsinghua University, China
pp. 532-538
Author Index

Author Index (PDF)

pp. 539-540
96 ms
(Ver 3.1 (10032016))