The Community for Technology Leaders
2013 IEEE 37th Annual Computer Software and Applications Conference (2006)
Chicago, Illinois
Sept. 17, 2006 to Sept. 21, 2006
ISSN: 0730-3157
ISBN: 0-7695-2655-1
TABLE OF CONTENTS
Introduction

Committees (PDF)

pp. xvi-xviii

Reviewers (PDF)

pp. xix
Pervasive/Performance

Location Updates In Cellular Networks Using Bloom Filters (Abstract)

Arne A. Nilsson , North Carolina State University, USA
Alan L. Tharp , North Carolina State University, USA
Kamala Subramaniam , North Carolina State University, USA
pp. 3-9

Distributed Processes on Tree Hash (Abstract)

Kyosuke Yasuda , Hosei University, Japan
Takao Miura , Hosei University, Japan
Isamu Shioya , Sanno University, USA
pp. 10-13

Trading Integrity for Availability by Means of Explicit Runtime Constraints (Abstract)

Johannes Osrael , Vienna University of Technology, Austria
Lorenz Froihofer , Vienna University of Technology, Austria
Karl M. Goeschka , Vienna University of Technology, Austria
pp. 14-17

A Run-time Adaptive and Code-size Efficient XML Parser (Abstract)

Qu Mingbin Mingbin , GSG China, Motorola
Zhou Yanming , GSG China, Motorola
pp. 18-21

Performance Analysis of an Asynchronous Web Server (Abstract)

Jeff Gray , U. of Alabama at Birmingham, USA
S. Gokhale , Univ. of Connecticut, USA
U. Praphamontripong , Univ. of Connecticut, USA
Aniruddha Gokhale , Vanderbilt Univ., USA
pp. 22-28
Requirements/Design

Choosing the Right Time to Compose Aspectual Scenarios (Abstract)

Jon Whittle , George Mason University, USA
Ana Moreira , Universidade Nova de Lisboa, Portugal
Jo?o Ara? , Universidade Nova de Lisboa, Portugal
pp. 29-32

Self-Management of COTS Component-Based Systems Using Wrappers (Abstract)

Michael E. Shin , Texas Tech University, USA
Fernando Paniagua , Texas Tech University, USA
pp. 33-36

Intelligent Classification and Retrieval of Software Components (Abstract)

George A. Papadopoulos , University of Cyprus, Cyprus
Dimitrios G. Vogiatzis , University of Cyprus, Cyprus
Andreas S. Andreou , University of Cyprus, Cyprus
pp. 37-40

Traceability between Software Architecture Models (Abstract)

Yaodong Feng , Peking University, China
Jie Yang , Peking University, China
Gang Huang , Peking University, China
Hong Mei Mei , Peking University, China
pp. 41-44

Achieving Dependable Component-Based Systems Through Generative Aspect Oriented Component Adaptation (Abstract)

Jon Kerridge , Napier University, UK
Xiaodong Liu , Napier University, UK
Yankui Feng , Napier University, UK
pp. 45-48

The Model and Implementation of Component Array Container (Abstract)

Gang Huang , Peking University, China
Hong Mei , Peking University, China
Zhao Liu , Peking University, China
pp. 49-54
Design/Security

Preventing Feature Interactions by Constraints (Abstract)

Hong Mei , Peking University, China
Jihong Zuo , Peking University, China
Qianxiang Wang , Peking University, China
pp. 55-58

Frameworks Built on the Trusted Platform Module (Abstract)

Matt Barrett , The University of Auckland, New Zealand
Clark Thomborson , The University of Auckland, New Zealand
pp. 59-62

Separating Functional and Non-functional Concerns through Coordination: An Application to Reliability (Abstract)

Jerzy Nogiec , Fermi National Accelerator Laboratory, USA
Shangping Ren , Illinois Institute of Technology, USA
Pierre-Etienne Poirot , Illinois Institute of Technology, USA
Jeffrey Tsai , University of Illinois, USA
pp. 63-66

SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment (Abstract)

Shameem Ahmed , Marquette University, USA
Haifeng Li , Marquette University, USA
Sheikh I. Ahamed , Marquette University, USA
Moushumi Sharmin , Marquette University, USA
pp. 67-70

Security Design Based on Social Modeling (Abstract)

Lin Liu , Tsinghua University, China
John Mylopoulos , University of Toronto, Canada
Eric Yu , University of Toronto, Canada
pp. 71-78
Security

An Aspect-Oriented Approach to Security Requirements Analysis (Abstract)

Kendall Nygard , North Dakota State University, USA
Vivek Goel , North Dakota State University, USA
Dianxiang Xu , North Dakota State University, USA
pp. 79-82

A Software Architectural Approach to Security by Design (Abstract)

Arnab Ray , University of Maryland at College Park, USA
Rance Cleaveland , University of Maryland at College Park, USA
pp. 83-86

Reflective, Model-Based Data Access with the Type-Safe Entity Container (Abstract)

Gernot Schmoelzer , Graz University of Technology, Austria
Christian Kreiner , Graz University of Technology, Austria
Zsolt Kovacs , Salomon Automation GmbH, Austria
Michael Thonhauser , Graz University of Technology, Austria
pp. 87-92
Testing

Realization of Systematic Reliability Analysis of Decomposable Systems (Abstract)

Sung Kim , North Dakota State University, USA
Garrett Hoff , North Dakota State University, USA
pp. 97-100

Automating the Generation of Test Cases from Object-Z Specifications (Abstract)

Aamer Nadeem , Mohammad Ali Jinnah University, Pakistan
Adnan Ashraf , Mohammad Ali Jinnah University, Pakistan
pp. 101-104

Planning and Scheduling from a Class Test Order (Abstract)

Yvan Labiche , Carleton University, Canada
pp. 105-108

Analyzing Inaccurate Artifact Usages in a Workflow Schema (Abstract)

Chia-Lin Hsu , National Chiao Tung University, Taiwan, ROC
Huin-Jen Hsu , National Chiao Tung University, Taiwan, ROC
Feng-Jian Wang , National Chiao Tung University, Taiwan, ROC
pp. 109-114
Web Services/Applications

Modeling Web Accessibility: A Case Study on Texas A&M University People Website (Abstract)

Yong Wang , Texas A&M University, USA
Dick Simmons , Texas A&M University, USA
pp. 115-118

Tool for Analysis and Simulation of TTCAN Communication in Distributed Systems (Abstract)

Jos? Antonio de Frutos , Universidad de Alcal?, Spain
Juan Ignacio P?rez , Universidad de Alcal?, Spain
Sara Garc? , Universidad de Alcal?, Spain
Esther Cadi?anos , Universidad de Alcal?, Spain
pp. 119-122

Moving Software from Expense to Asset (Abstract)

Margaret Nadworny , Global Software Group, Motorola
R Krishnan , Global Software Group, Motorola
pp. 123-126

Automated Negotiation for Service Contracts (Abstract)

Russell Lock , Lancaste University, UK
pp. 127-134

ARIMAmmse: An Improved ARIMA-based (Abstract)

Haitao Zeng , The Chinese Academy of Sciences, China
Shen Zhang , The Chinese Academy of Sciences, China
Yongji Wang , The Chinese Academy of Sciences, China
Qing Wang , The Chinese Academy of Sciences, China
Fengdi Shu , The Chinese Academy of Sciences, China
Li Ruan , The Chinese Academy of Sciences, China
pp. 135-138

An Interface Theory Based Approach to Verification of Web Services (Abstract)

Zhenbang Chen , National Laboratory for Parallel and Distributed Processing, China
Ji Wang , National Laboratory for Parallel and Distributed Processing, China
Wei Dong , National Laboratory for Parallel and Distributed Processing, China
Zhichang Qi , National Laboratory for Parallel and Distributed Processing, China
W.L. Yeung , Lingnan University, Hong Kong
pp. 139-144
The Third International Workshop on Quality Assurance and Testing Web-Based Applications (QATWBA'06)

A Framework for Service-Oriented Testing of Web Services (Abstract)

Hong Zhu , Oxford Brookes University, UK
pp. 145-150

A Multi-Agent Framework for Testing Distributed Systems (Abstract)

Miriam A. M. Capretz , University of Western Ontario, Canada
Hany F. EL Yamany , University of Western Ontario, Canada
Luiz F. Capretz , University of Western Ontario, Canada
pp. 151-156

A Framework of Model-Driven Web Application Testing (Abstract)

Chao Liu , Beihang University, China
Ji Wu , Beihang University, China
Mao-zhong Jin , Beihang University, China
Nuo Li , Beihang University, China
Qin-qin Ma , Beihang University, China
pp. 157-162

Testability of Software in Service-Oriented Architecture (Abstract)

Jerry Gao , San Jose State University, USA
Yinong Chen , Arizona State University, USA
Xiao Wei , Arizona State University, USA
W. T. Tsai , Arizona State University, USA
pp. 163-170
Second International Workshop on Testing and Quality Assurance for Component-Based Systems (TQACBS 2006)

The MORABIT Approach to Runtime Component Testing (Abstract)

Dima Suliman , University of Heidelberg, Germany
Barbara Paech , University of Heidelberg, Germany
Daniel Brenner , Mannheim University, Germany
Lars Borner , University of Heidelberg, Germany
Colin Atkinson , Mannheim University, Germany
Matthias Merdes , EML Research gGmbH, Germany
Rainer Malaka , EML Research gGmbH, Germany
pp. 171-176

A Practical Approach for Automated Test Case Generation using Statecharts (Abstract)

N. L. Vijaykumar , National Institute for Space Reseach, Brazil
Odnei Cuesta Lopes , DBA Engenharia de Sistemas, Brazil
Eliane Martins , University of Campinas, Brazil
Valdivino Santiago , National Institute for Space Reseach, Brazil
Maria de F?tima Mattiello-Francisco , National Institute for Space Reseach, Brazil
Ana Silvia Martins do Amaral , National Institute for Space Reseach, Brazil
pp. 183-188

Quality Assurance of Open Source Components: Integrator Point of View (Abstract)

Mari Matinlassi , VTT Technical Research Centre of Finland
Pekka M?ki-Asiala , VTT Technical Research Centre of Finland
pp. 189-194
Security, Privacy, and Trust for Pervasive Applications (SPTPA 2006)

Security Analysis of RFID Authentication for Pervasive Systems using Model Checking (Abstract)

Jeong-Hyun Oh , Korea University, Korea
Hyun-Seok Kim , Korea University, Korea
Jin-Young Choi , Korea University, Korea
pp. 195-202

Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test (Abstract)

Bo Zhou , Liverpool John Moores University, UK
Madjid Merabti , Liverpool John Moores University, UK
Qi Shi , Liverpool John Moores University, UK
pp. 203-208

Property-Based Peer Trust in the Sleeper Service Discovery Protocol (Abstract)

E. Celebi , Polytechnic University, USA
J. Buford , Panasonic Princeton Lab, USA
P. Frankl , Polytechnic University, USA
pp. 209-214

Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing (Abstract)

Zhengping Wu , University of Virginia, USA
Alfred C. Weaver , University of Virginia, USA
pp. 215-222
The Third International Workshop on Software Cybernetics (IWSC'06)

A Dynamic Partitioning Approach for GUI Testing (Abstract)

Kai-Yuan Cai , Beijing University of Aeronautics and Astronautics, China
Lei Zhao , Beijing University of Aeronautics and Astronautics, China
Feng Wang , Beijing University of Aeronautics and Astronautics, China
pp. 223-228

Automatic Stress and Load Testing for Embedded Systems (Abstract)

Mohamad S. Bayan , University of Texas at Dallas, USA
Joao W. Cangussu , University of Texas at Dallas, USA
pp. 229-233

Early Software Reliability Prediction with Extended ANN Model (Abstract)

S.H. Ng , National University of Singapore, Singapore
M. Xie , National University of Singapore, Singapore
Q.P. Hu , National University of Singapore, Singapore
Y. S. Dai , Purdue University School of Science, USA
pp. 234-239

A New Generalized Particle Dynamics Model For Software Cybernetics (Abstract)

Dianxun Shuai , East China University of Sci. and Tech., China
Cunpai Lu , East China University of Sci. and Tech., China
Bin Zhang , East China University of Sci. and Tech., China
pp. 240-245

Self-Organizing Software Processes Based on Particle Dynamics Model (Abstract)

Cunpai Lu , East China University of Sci. and Tech., China
Bin Zhang , East China University of Sci. and Tech., China
Dianxun Shuai , East China University of Sci. and Tech., China
pp. 246-251

A Visual Constraint Specifying Approach for Adaptive Software (Abstract)

Qianxiang Wang , Peking University, China
Min Li , Peking University, China
Na Meng , Peking University, China
pp. 252-257

A Theory of Software-Mediated Enterprise Governance (Abstract)

Jay S. Bayne , Meta Command Systems, Inc.
pp. 258-264

Self-Metamorphic-Testing Components (Abstract)

Sami Beydeda , ZIVIT, Germany
pp. 265-272
International Workshop on Engineering Semantic Agent Systems (ESAS 2006)

Discovery and Scoring of Semantic Web Services based on Client Requirement(s) through a Semantic Search Agent (Abstract)

Duygu ?elik , Eastern Mediterranean University, Turkey
Atilla Elci , Eastern Mediterranean University, Turkey
pp. 273-278

Entanglement Partitioning of Quantum Particles for Data Clustering (Abstract)

Dianxun Shuai , East China University of Sci. and Tech., China
Bin Zhang , East China University of Sci. and Tech., China
Cunpai Lu , East China University of Sci. and Tech., China
pp. 285-290

MSC: A Semantic Ranking for Hitting Results of Matchmaking of Services (Abstract)

Yunchuan Sun , Beijing Normal University, China
Xin Jin , Beijing Normal University, China
Rongfang Bie , Beijing Normal University, China
Xian Shen , Beijing Normal University, China
pp. 291-296

An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks (Abstract)

Lein Harn , University of Missouri-Kansas City, USA
Junzhou Luo , Southeast University, P.R. China
Darren Xu , YRC Worldwide Technologies, USA
Mayur Narasimhan , University of Missouri-Kansas City, USA
pp. 309-314

Secure e-Payment using Multi-agent Architecture (Abstract)

Mohammed. M. Abou Rizka , Arab Academy For Science And Technology and Maritime Transport, Egypt
Ahmed M Elmisery , Technical College ,Egypt
Mohamed M Kouta , Arab Academy For Science And Technology and Maritime Transport, Egypt
pp. 315-320

An Agent-Oriented Logic for Belief and Trust (Abstract)

Stanislav Ustymenko , Florida State University, USA
Daniel G. Schwartz , Florida State University, USA
pp. 321-326

Mine Detection and Route Planning in Military Warfare using Multi Agent System (Abstract)

Shahzad Badar Qazi , National University of Computer & Emerging Sciences, Islamabad
A. Rauf Baig , National University of Computer & Emerging Sciences, Islamabad
Kashif Zafar , National University of Computer & Emerging Sciences, Islamabad
pp. 327-332

Agent-Based Offline Electronic Voting (Abstract)

Mehmet Tahir Sandikkaya , Istanbul Technical University, Turkey
Bulent Orencik , Istanbul Technical University, Turkey
pp. 333-340
PH-D Papers

Intrusion Detection Techniques in Wireless Ad Hoc Networks (Abstract)

Xia Wang , Iowa State University, USA
pp. 347-349

SymbioticSphere: A Biologically-Inspired Autonomic Architecture for Self-Managing Network Systems (Abstract)

Paskorn Champrasert , University of Massachusetts, Boston, USA
Junichi Suzuki , University of Massachusetts, Boston, USA
pp. 350-352

A Domain Specific Modeling Framework for Secure Network Applications (Abstract)

Junichi Suzuki , University of Massachusetts, Boston, USA
Hiroshi Wada , University of Massachusetts, Boston, USA
pp. 353-355

A General Purpose Framework for Wireless Sensor Network Applications (Abstract)

Ayman Z. Faza , University of Missouri-Rolla, USA
Sahra Sedigh-Ali , University of Missouri-Rolla, USA
pp. 356-358

QoS-Based Service Composition (Abstract)

Jinchun Xia , Iowa State University, USA
pp. 359-361
Fast Abstracts

A Continuous Improvement Model in ImPProS (PDF)

Sandro Ronaldo Bezerra Oliveira , Universidade da Amaz?nia (UNAMA), Brazil
Alexandre Marcos Lins de Vasconcel , Universidade Federal de Pernambuco (UFPE), Brazil
pp. 370-371

Building a UML Profile for On-Chip Distributed Platforms (PDF)

Nastooh Avessta , University of Turku, Finland
Tiberiu Seceleanu , University of Turku, Finland
Tuomas Lindroth , University of Turku, Finland
Raicea Lavinia , Polytechnic University, Romania
Jukka Teuhola , University of Turku, Finland
pp. 372-373

Dynamic Object Viewers for Java (PDF)

James H. Cross II , Auburn University, USA
T. Dean Hendrix , Auburn University, USA
Jhilmil Jain , Auburn University, USA
Larry A. Barowski , Auburn University, USA
pp. 374-375

Autonomous Real-Time Monitoring of Hydrological Environments (PDF)

Thomas V. Freiberger , University of Missouri-Rolla, USA
John R. Koch , University of Missouri-Rolla, USA
pp. 376-377

An Autonomous and AdaptableWireless Device for Flood Monitoring (PDF)

Valerio Plessi , University of Missouri-Rolla, USA
Filippo Bastianini , University of Missouri-Rolla, USA
Sahra Sedigh-Ali , University of Missouri-Rolla, USA
pp. 378-379
Author Index

Author Index (PDF)

pp. 380-381
78 ms
(Ver 3.1 (10032016))