The Community for Technology Leaders
2013 IEEE 37th Annual Computer Software and Applications Conference (2007)
Beijing, China
July 24, 2007 to July 27, 2007
ISSN: 0730-3157
ISBN: 0-7695-2870-8
TABLE OF CONTENTS
Introduction

Reviewers (PDF)

pp. xxiii
Panels

Future Trends: Computing as a Core Discipline (Abstract)

Bruce M. McMillin , University of Missouri-Rolla
pp. 3-7

Ethics in Computing (PDF)

Sahra Sedigh , University of Missouri - Rolla
pp. 16

Software Process Improvement for Small Organizations (PDF)

Doo-Hwan Bae , KAIST, 373-1 Gusongdong, Yusonggu, Daejon, Korea
pp. 17
Security in Communication (Security 1)

A Framework for Enhancing Web Services Security (Abstract)

Navya Sidharth , Metropolitan State University
Jigang Liu , Metropolitan State University
pp. 23-30

A Scalable Service Scheme for Secure Group Communication in Grid (Abstract)

Deqing Zou , Huazhong University of Science and Technology, Wuhan, 430074, China
Yunfa Li , Huazhong University of Science and Technology, Wuhan, 430074, China
Hai Jin , Huazhong University of Science and Technology, Wuhan, 430074, China
Zongfen Han , Huazhong University of Science and Technology, Wuhan, 430074, China
Jieyun Chen , Huazhong University of Science and Technology, Wuhan, 430074, China
pp. 31-38

An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks (Abstract)

Johnny Wong , Iowa State University
Xia Wang , Iowa State University
pp. 39-48
Modeling Security (Security 2)

An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment (Abstract)

Munirul M. Haque , Marquette University, Milwaukee, Wisconsin, USA
Sheikh I. Ahamed , Marquette University, Milwaukee, Wisconsin, USA
pp. 49-56

An Authentication based Lightweight Device Discovery (ALDD) Model for Pervasive Computing Environment (Abstract)

Munirul M. Haque , Marquette University, Milwaukee, Wisconsin, USA
KM Asif , Marquette University, Milwaukee, Wisconsin, USA
Haifeng Li , Marquette University, Milwaukee, Wisconsin, USA
Sheikh I. Ahamed , Marquette University, Milwaukee, Wisconsin, USA
pp. 57-64

Defining and Detecting Bad Smells of Aspect-Oriented Software (Abstract)

Komsan Srivisut , Chulalongkorn University, Bangkok, Thailand
Pornsiri Muenchaisri , Chulalongkorn University, Bangkok, Thailand
pp. 65-70
Vulnerabilities - Detecting and Assessment (Security 3)

Mining User Query Logs to Refine Component Description (Abstract)

Bing Xie , Peking University
Yan Li , Peking University
Shaobin Cheng , Peking University
Jiasu Sun , Peking University
Lu Zhang , Peking University
pp. 71-78

A Machine Learning-Based Reliability Assessment Model for Critical Software Systems (Abstract)

Farokh B. Bastani , University of Texas at Dallas
Yinong Chen , Arizona State University
Wei-Tek Tsai , Arizona State University
Raymond A. Paul , OASD/C3I/Y2K Department of Defense
Venkata U.B. Challagulla , University of Texas at Dallas
pp. 79-86

A Static Analysis Framework For Detecting SQL Injection Vulnerabilities (Abstract)

Xiang Fu , Georgia Southwestern State University, Americus, GA
Boris Peltsverger , Georgia Southwestern State University, Americus, GA
Xin Lu , Georgia Southwestern State University, Americus, GA
Lixin Tao , Pace University, Pleasantville, NY
Kai Qian , Southern Polytechnic State University,Marietta, GA
Shijun Chen , Georgia Southwestern State University, Americus, GA
pp. 87-96
Infrastructure, Networking and Security (Security 4)

A model-driven framework for representing and applying design patterns (Abstract)

Ghizlane El Boussaidi , Universit? du Qu?bec ? Montr?al, Canada
Hafedh Mili , Universit? du Qu?bec ? Montr?al, Canada
pp. 97-100

Infrastructure Hardening: A Competitive Coevolutionary Methodology Inspired by Neo-Darwinian Arms Races (Abstract)

William Siever , University of Missouri - Rolla
Daniel Tauritz , University of Missouri - Rolla
Travis Service , University of Missouri - Rolla
pp. 101-104

Reliable Self-Clustering P2P Overlay Networks (Abstract)

Wei Wang , Tongji University, 201804, Shanghai, China
Shihui Wang , Hubei University
Yan Zhang , Hubei University
pp. 105-108

Software Component Re-engineering for their Runtime Structural Adaptation (Abstract)

Gautier Bastide , Ecole des Mines de Douai, France
Mourad Oussalah , LINA, France
Abdelhak Seriai , Ecole des Mines de Douai, France
pp. 109-114
Design and Modeling (Requirements 1)

Structuring 2-way Branches in Binary Executables (Abstract)

Yu Chen , Peking University
Tao Wei , Peking University
Wei Zou , Peking University
Jian Mao , Peking University
pp. 115-118

FLEXCM - A Component Model for Adaptive Embedded Systems (Abstract)

Sindolfo Miranda Filho , Federal University of Paraiba
Guido Lemos , Federal University of Paraiba
Luiz Eduardo Cunha Leite , Federal University of Paraiba
Silvio Meira , Federal University of Pernambuco
pp. 119-126
Putting Models to Run (Requirements 2)

Understanding and Classifying Requirements for Computer-Aided Healthcare Workflows (Abstract)

Beatrice Hwong , Siemens Corporate Research Inc.
Xiping Song , Siemens Corporate Research Inc.
Arnold Rudorfer , Siemens Corporate Research Inc.
Gilberto Matos , Siemens Corporate Research Inc.
pp. 137-144

Deriving Formal Specifications from Informal Requirements (Abstract)

Dubravka Ilic , TU Iformation Technology, Finland
pp. 145-152

A Model-based Object-oriented Approach to Requirement Engineering (MORE) (Abstract)

Chih-Wei Lu , Hsiuping Institute of Technology, Taiwan
Chih-Hung Chang , National Chiao Tung University, Taiwan
William C. Chu , Tunghai University, Taiwan
Ching Huey Wang , National Chiao Tung University, Taiwan
pp. 153-156

Tool Support to Implementing Business Rules in Database Applications (Abstract)

Suzanne M. Embury , University of Manchester, UK
Liwen Lin , University of Manchester, UK
Brian C. Warboys , University of Manchester, UK
pp. 157-162
Event-Based and State-Based Modeling (Requirements 3)

Using UML Activity Diagrams and Event B for Distributed and Parallel Applications (Abstract)

Leila Jemni Ben Ayed , Research Unit of Technologies of Information and Communication (UTIC)- ESSTT-Tunisia
Ahlem Ben Younes , Research Unit of Technologies of Information and Communication (UTIC)- ESSTT-Tunisia
pp. 163-170

Integration of Agent-Oriented Conceptual Models and UML Activity Diagrams Using Effect Annotations (Abstract)

Aditya Ghose , University of Wollongong (UOW), Northfields Avenue, NSW 2522, Australia
Moshiur Bhuiyan , University of Wollongong (UOW), Northfields Avenue, NSW 2522, Australia
Aneesh Krishna , University of Wollongong (UOW), Northfields Avenue, NSW 2522, Australia
M.M.Zahidul Islam , University of Wollongong (UOW), Northfields Avenue, NSW 2522, Australia
pp. 171-178

A Data Mining Approach for Software State Definition (Abstract)

Cheng-Gang Bai , Beijing University of Aeronautics and Astronautics, China
Kai-Yuan Cai , Beijing University of Aeronautics and Astronautics, China
Bei-Bei Yin , Beijing University of Aeronautics and Astronautics, China
pp. 179-188
Ontology for Requirements Elicitation (Requirements 4)

Towards a Multiple Ontology Framework for Requirements Elicitation and Reuse (Abstract)

LI Zong-yong , Institute of Command Automation, PLA Univ., China
YANG Ying-ying , Institute of Command Automation, PLA Univ., China
WANG Zhi-xue , Institute of Command Automation, PLA Univ., China
WU Yue , Institute of Command Automation, PLA Univ., China
LIU Ying , Engineering Institute of Corps of Engineers, PLA Univ., China
pp. 189-195

SREM: A Service Requirements Elicitation Mechanism based on Ontology (Abstract)

Wei Qiao , Tsinghua University, Beijing, China
Lin Liu , Tsinghua University, Beijing, China
Jian Xiang , Tsinghua University, Beijing, China
Jingwei Yang , Tsinghua University, Beijing, China
pp. 196-203

Ontology Learning by Clustering Based on Fuzzy Formal Concept Analysis (Abstract)

Wen ZHOU , Shanghai University, Shanghai, China
Zong-tian LIU , Shanghai University, Shanghai, China
Yan ZHAO , Shanghai University, Shanghai, China
pp. 204-210
Analysis & Modeling (Requirements 5)

A Method of Requirement Inconsistency Analysis (Abstract)

Cui Duwu , Xi?an University of Technology
Zhang Yikun , Xi?an University of Technology
Xia Hui , Xi?an University of Technology
Yin Peng , Xi?an University of Technology
pp. 211-214

A metamodel for the notation of graphical modeling languages (Abstract)

Zhiyi Ma , Peking University
Ge Li , Peking University
Weizhong Shao , Peking University
Xiao He , Peking University
pp. 219-224
Internet and Web-Based Systems (Life Cycle 1)

A Satisfaction Driven Approach for the Composition of Interactive Web Services (Abstract)

Shuchao Wan , Graduate School of the Chinese Academy of Sciences, Beijing, China
Hua Zhong , Chinese Academy of Sciences, Beijing, China
Jun Wei , Chinese Academy of Sciences, Beijing, China
Jingyu Song , Chinese Academy of Sciences, Beijing, China
pp. 225-232

Knowledge Hiding in Data Mining by Transaction Adding and Removing (Abstract)

Xiaoming Zhang , Beijing Institute of Petrochemical Technology
pp. 233-240

Performance Evaluation of Notifications in a Web Services and P2P-Based Network Management Overlay (Abstract)

Ewerton Monteiro Salvador , Federal University of Rio Grande do Sul, Brazil
Sergio Luis Cechin , Federal University of Rio Grande do Sul, Brazil
Maria Janilce Bosquiroli Almeida , Federal University of Rio Grande do Sul, Brazil
Carlos Raniery Paula dos Santos , Federal University of Rio Grande do Sul, Brazil
Lisandro Zambenedetti Granville , Federal University of Rio Grande do Sul, Brazil
Clarissa Cassales Marquezan , Federal University of Rio Grande do Sul, Brazil
pp. 241-250
Component-Based Software and Architecture (Life Cycle 2)

Iterative Planning in the Context of Automated Code Synthesis (Abstract)

I-Ling Yen , University of Texas at Dallas
Farokh B. Bastani , University of Texas at Dallas
Jicheng Fu , University of Texas at Dallas
pp. 251-259

Automating Dynamic Reconfiguration for Non-Stop Dataflow Systems (Abstract)

Zhikun Zhao , Central Queensland University, Rockhampton, QLD 4702, Australia
Wei Li , Central Queensland University, Rockhampton, QLD 4702, Australia
pp. 260-267

An Architectural Framework for the Design and Analysis of Autonomous Adaptive Systems (Abstract)

Joao W. Cangussu , University of Texas at Dallas
Kendra Cooper , University of Texas at Dallas
Eric Wong , University of Texas at Dallas
pp. 268-278
Embedded systems (Life Cycle 3)

Flexible Application Software Generation for Heterogeneous Multi-Processor System-on-Chip (Abstract)

Wassim Youssef , TIMA Laboratory, Grenoble, France
Xavier Guerin , TIMA Laboratory, Grenoble, France
Katalin Popovici , TIMA Laboratory, Grenoble, France
Frederic Rousseau , TIMA Laboratory, Grenoble, France
Ahmed Jerraya , TIMA Laboratory, Grenoble, France
pp. 279-286

A Semantic Anchoring Infrastructure for the Design of Embedded Systems (Abstract)

Graham Hemingway , Vanderbilt University
Kai Chen , Motorola Labs
Hang Su , Vanderbilt University
T. John Koo , Shantou University
pp. 287-294

Concurrency Control Modularization with Aspect-Oriented Programming (Abstract)

Paulo Borba , Federal University of Pernambuco, Brazil
Ricardo Lima , Pernambuco State University, Brazil
Sergio Soares , Pernambuco State University, Brazil
pp. 295-300
Process and Maintenance (Life Cycle 4)

Tracking Projects through A Three-Dimensional Software Development Model (Abstract)

Nan Jiang , Chinese Academy of Sciences
Juan Li , Chinese Academy of Sciences
Qing Wang , Chinese Academy of Sciences
Yanwu Yang , Chinese Academy of Sciences
Mingshu Li , Chinese Academy of Sciences
pp. 301-308

Traceability Link Evolution Management with Incremental Latent Semantic Indexing (Abstract)

Fei Dong , Iowa State University
Carl K. Chang , Iowa State University
Hsin-yi Jiang , Iowa State University
Tien N. Nguyen , Iowa State University
pp. 309-316
Quality of Service and Performance (QoS 1)

Performance Prediction of Service-Oriented Applications based on an Enterprise Service Bus (Abstract)

Yan Liu , National ICT Australia
Ian Gorton , Pacific Northwest National Laboratory
Liming Zhu , National ICT Australia
pp. 327-334

An Online Monitoring Approach for Web services (Abstract)

Min Li , Peking University
Hong Mei , Peking University
Qianxiang Wang , Peking University
Yonggang Liu , Peking University
pp. 335-342

SQS: A Secure and QoS Guaranteed Solution for Mobile Service (Abstract)

Xiaopeng Gao , University of Aeronautics and Astronautics, China
Chao Tong , University of Aeronautics and Astronautics, China
Xiang Long , University of Aeronautics and Astronautics, China
Wei Chen , University of Aeronautics and Astronautics, China
pp. 343-352
Quality of Service and Service Composition (QoS 2)

An Interaction Instance Oriented Approach for Web Application Integration in Portals (Abstract)

Shuchao Wan , Chinese Academy of Sciences
Jingyu Song , Chinese Academy of Sciences
Jun Wei , Chinese Academy of Sciences
Hua Zhong , Chinese Academy of Sciences
pp. 353-360

QoS-aware Service Composition Based on Tree-Coded Genetic Algorithm (Abstract)

Huowang Chen , National University of Defense Technology, Changsha, China
Chunming Gao , Hunan Normal University
Meiling Cai , Hunan Normal University
pp. 361-367

Dynamic Reconfigurable Testing of Service-Oriented Architecture (Abstract)

Dezheng Xu , Tsinghua University, China
Xiaoying Bai , Tsinghua University, China
Guilan Dai , Tsinghua University, China
pp. 368-378
Modeling and Validation for Quality of Service (QoS 3)

Validity Checking On Grid Service Composition (Abstract)

Guosun Zeng , Tongji University, Shanghai 201804, China
Jing Zhou , Tongji University, Shanghai 201804, China
pp. 379-382

A Fast Replica Selection Algorithm for Data Grid (Abstract)

Dafei Yin , Peking University, Beijing
Yu Fang , Peking University, Beijing
Bin Chen , Peking University, Beijing
pp. 383-387

Improving the Accuracy of UML Class Model Recovery (Abstract)

Wuwei Shen , Western Michigan University
Kun Wang , Western Michigan University
pp. 387-90

Connectors conveying Software Architecture Evolution (Abstract)

Mourad OUSSALAH , Nantes University, Nantes Atlantique University
Nassima SADOU , Nantes University, Nantes Atlantique University
Dalila TAMZALIT , Nantes University, Nantes Atlantique University
pp. 391-396
Validation and Assessment (Quality 1)

Risk Assessment in Early Software Design Based on the Software Function-Failure Design Method (Abstract)

Robert B. Stone , University of Missouri - Rolla
Xiaoqing (Frank) Liu , University of Missouri - Rolla
Irem Y. Tumer , Oregon State University
Jayson P. Vucovich , University of Missouri - Rolla
pp. 405-412
Quantification (Quality 2)

Architecture-Based Software Reliability: Why Only a Few Parameters Matter? (Abstract)

Katerina Go?seva-Popstojanova , West Virginia University, Morgantown, WV
Margaret Hamill , West Virginia University, Morgantown, WV
pp. 423-430

On Identifying Bug Patterns in Aspect-Oriented Programs (Abstract)

Jianjun Zhao , Shanghai Jiao Tong University
Sai Zhang , Shanghai Jiao Tong University
pp. 431-438

Measuring and Assessing Software Reliability Growth through Simulation-Based Approaches (Abstract)

Chuan-Ching Sue , National Cheng Kung University, Taiwan
Chin-Yu Huang , National Tsing Hua University, Taiwan
Chu-Ti Lin , National Tsing Hua University, Taiwan
pp. 439-448
Coverage and Prioritization for Testing (Quality 3)

Effective Fault Localization using Code Coverage (Abstract)

Lei Zhao , University of Texas at Dallas
Kai-Yuan Cai , Beijing University of Aeronautics
W. Eric Wong , University of Texas at Dallas
Yu Qi , University of Texas at Dallas
pp. 449-456

A Study of Enhanced MC/DC Coverage Criterion for Software Testing (Abstract)

Chin-Yu Huang , National Tsing Hua University
Jun-Ru Chang , National Tsing Hua University
pp. 457-464

Test Case Prioritization for Black Box Testing (Abstract)

Bo Qu , Southeast University, Nanjing, China
Baowen Xu , Southeast University, Nanjing, China
Changhai Nie , Southeast University, Nanjing, China
Xiaofang Zhang , Southeast University, Nanjing, China
pp. 465-474
Specification and Verification (Quality 4)

Unified Property Specification for Hardware/Software Co-Verification (Abstract)

Fei Xie , Portland State University
Huaiyu Liu , Intel Corporation, OR
pp. 483-490

Model Checking Aspect-Oriented Design Specification (Abstract)

Izzat Alsmadi , North Dakota State University
Weifeng Xu , North Dakota State University
Dianxiang Xu , North Dakota State University
pp. 491-500
Analysis and Testing (Quality 5)

Parameter and Return-value Analysis of Binary Executables (Abstract)

Jianmin Pang , National Digital Switching System Engineering & Technological Research Center of China
Jingbo Zhang , National Digital Switching System Engineering & Technological Research Center of China
Rongcai Zhao , National Digital Switching System Engineering & Technological Research Center of China
pp. 501-508

Test Case Generation for Collaborative Real-time Editing Tools (Abstract)

Lian Yu , Peking University
Lin Ma , Peking University
Hui Su , China Research Center IBM
Wenping Xiao , China Research Center IBM
Changyan Chi , China Research Center IBM
pp. 509-516

Contract-Based Testing for Web Services (Abstract)

Xiaoying Bai , Tsinghua University, China
Fengjun Dai , Tsinghua University, China
Yongbo Wang , Tsinghua University, China
Guilan Dai , Tsinghua University, China
pp. 517-526
Quality, Diversity and Services (Quality 6)

Architectural Adaptation Addressing the Criteria of Multiple Quality Attributes in Mission-Critical Systems (Abstract)

Gang Huang , Peking University
Yanchun Sun , Peking University
Xiaofeng Cui , Peking University
Hong Mei , Peking University
pp. 527-530

A Quality Verification Model for Design Pattern (Abstract)

Jonathan Lee , National Central University
Nien-Lin Hsueh , Feng Chia University
Peng-Hua Chu , Feng Chia University
William Chu , Tunghai University
pp. 531-534

Bivariate Software Fault-Detection Models (Abstract)

Tadashi Dohi , Hiroshima University
Tomotaka Ishii , Hiroshima University
Hiroyuki Okamura , Hiroshima University
pp. 535-538

Model Oriented Evolutionary Redocumentation (Abstract)

Hongji Yang , De Montfort University, Leicester, UK
Feng Chen , De Montfort University, Leicester, UK
pp. 543-548
Process Models (Industrial Track 1)

State of Modernization Practice in Four Swedish Organizations (Abstract)

Mira Kajko-Mattsson , Stockholm University
Lukas Wilczek , Stockholm University
Mi Ta , Stockholm University
pp. 549-556

ePVM - An Embeddable Process Virtual Machine (Abstract)

Thomas Weigold , IBM Zurich Research Laboratory
Thorsten Kramp , IBM Zurich Research Laboratory
Peter Buhler , IBM Zurich Research Laboratory
pp. 557-564

State-based Process Description Model in Chinese E-government Affair System (Abstract)

Lei Li , Sun Yat-sen University
Yunxiang Zheng , Sun Yat-sen University
Hai Wan , Sun Yat-Sen University
pp. 565-568

Analyzing and Re-structuring Product Line Dependencies (Abstract)

Tomi Mannisto , Helsinki University of Technology
Varvana Myllarniemi , Helsinki University of Technology
Ian Oliver , Nokia Research Center
Juha Savolainen , Nokia Research Center
pp. 569-574
Data, Repositories, Design Methods (Industrial Track 2)

Towards a Design Methodology for Multiprocessor Platforms (Abstract)

Tiberiu Seceleanu , University of Turku, FINLAND
Johan Lilius , Embedded Systems Lab., Department of Information Technologies, Abo Akademi, Turku, FINLAND
Hannu Tenhunen , University of Turku, FINLAND
Dragos Truscan , Embedded Systems Lab., Department of Information Technologies, Abo Akademi, Turku, FINLAND
pp. 575-578

Specification, Design and Implementation of a Reuse Repository (Abstract)

Eduardo Santana Almeida , Federal University of Pernambuco and Recife Center for Advanced Studies and Systems
Daniel Lucredio , Federal University of Pernambuco and Recife Center for Advanced Studies and Systems
Silvio Lemos Meira , Federal University of Pernambuco and Recife Center for Advanced Studies and Systems
Vanilson Arruda Buregio , Federal University of Pernambuco and Recife Center for Advanced Studies and Systems
pp. 579-582

DataWarp: Empowering Applications to Make Progress in the Face of Contradictory or Inconsistent Data (Abstract)

Robert John Walters , University of Southampton
Stephen Crouch , University of Southampton
Peter Henderson , University of Southampton
pp. 583-590

VOEditor: a Visual Environment for Ontology Construction and Collaborative Querying of Semantic Web Resources (Abstract)

Ruliang Xiao , Wuhan University, Wuhan, 430072, China
Lina Fang , Wuhan University, Wuhan, 430072, China
Shengqun Tang , Wuhan University, Wuhan, 430072, China
Yang Xu , Wuhan University, Wuhan, 430072, China
Xinguo Deng , Wuhan University, Wuhan, 430072, China
Ling Li , Wuhan University, Wuhan, 430072, China
Youwei Xu , Wuhan University, Wuhan, 430072, China
pp. 591-600
Networking and Distribution (Industrial Track 3)

Mobile Game Development: Object-Orientation or Not (Abstract)

Klaus Marius Hansen , University of Aarhus, Denmark
Thomas Kunz , Carleton University, Canada
Weishan Zhang , Tongji University
Dong Han , Anhui Vocational College
pp. 601-608

A Dynamic-Reconfigurable Architecture for Protocol Stacks of Networked Systems (Abstract)

Rasool Jalili , Sharif University of Technology, Tehran, Iran
Mahdi Niamanesh , Sharif University of Technology, Tehran, Iran
pp. 609-612

A Study on Distributed Resource Information Service in Grid System (Abstract)

Yi Yang , Lanzhou University, Lanzhou, Gansu, China
Jiuyuan Huo , Lanzhou Jiao tong University, Lanzhou, Gansu, China
Liqun Liu , Lanzhou University, Lanzhou, Gansu, China
Li Liu , Lanzhou University, Lanzhou, Gansu, China
Lian Li , Lanzhou University, Lanzhou, Gansu, China
pp. 613-618
Session 1: Software Engineering Methods and Tools

Comparing Fault-based Testing Strategies of General Boolean Specifications (Abstract)

Changhai Nie , Southeast University, China
Baowen Xu , Southeast University, China
Zhenyu Chen , Southeast University, China
pp. 621-622

Patterns Topology for Performance Evaluation (Abstract)

M. E. Fayad , San Jose State University & vrlSoft, Inc.
pp. 623-624

Mining Software Repositories to Understand the Performance of Individual Devel (Abstract)

Li Ruan , Chinese Academy of Sciences, Beijing
Yongji Wang , Chinese Academy of Sciences, Beijing
Shen Zhang , Chinese Academy of Sciences, Beijing
Feng Yuan , Chinese Academy of Sciences, Beijing
pp. 625-626

Towards Capability Maturity in Software Review (Abstract)

Bin Xu , Zhejiang Gongshang University, Hangzhou 310035, China
Hua Hu , Zhejiang Gongshang University, Hangzhou 310035, China
Jun Yu , Zhejiang Gongshang University, Hangzhou 310035, China
pp. 629-630

Fuxi: An Agile Development Environment for Embedded Systems (Abstract)

Zhongbin Wang , Hitrend Information Technologies, Inc.
pp. 631-632

OCL4X: An Action Semantics Language for UML Model Execution (Abstract)

Ke Jiang , Hitachi (China) Research & Development Corporation, China
Shigeru Miyake , Hitachi (China) Research & Development Corporation, China
Lei Zhang , Hitachi (China) Research & Development Corporation, China
pp. 633-636
Session 2: Software Applications

Towards an Aspect-Oriented Intrusion Detection Framework (Abstract)

Mohammad Zulkernine , Queen?s University, Canada
Zhi Jian Zhu , Queen?s University, Canada
pp. 637-638

An InnovativeWorkflow Product Structure (Abstract)

Lijie Wen , Tsinghua University, Beijing, PR China
Jianmin Wang , Tsinghua University, Beijing, PR China
Haiping Zha , Tsinghua University, Beijing, PR China
pp. 639-640

Matrix-based Change Impact Analysis for Component-based Software (Abstract)

Jinlong Zhang , University of Finance
Yansheng Lu , Huazhong University of Science and Technology
Chengying Mao , Huazhong University
pp. 641-642

A Novel Authentication Scheme Based on Trust-value Updated Model in Adhoc Network (Abstract)

YANG Ya-tao , Beijing Electronic Science & Technology Institute
FANG Yong , Beijing Electronic Science & Technology Institute
ZENG Ping , Beijing Electronic Science & Technology Institute
YUAN Zheng , Beijing Electronic Science & Technology Institute
pp. 643-645

Execution Mechanism of Service Proxy in Web Services Composition Execution Engine (Abstract)

Xiaojuan Yuan , Hunan Normal University
Huowang Chen , National University of Defense Technology
Chunming Gao , Hunan Normal University
pp. 647-648

Study on GML Spatial Interoperability based on Web Service (Abstract)

Jiayan Gan , Nanjing Normal University
Shuliang Zhang , Nanjing Normal University
Guonian Lv , Nanjing Normal University
Jiazhu Huang , Nanjing Normal University
LiZhi Miao , Nanjing Normal University
pp. 649-656

Web System for Electronic Nautical Charts Service Based On ArcIMS (Abstract)

ZHU Berlin , Dalian Maritime University
ZHANG Yingjun , Dalian Maritime University
ZHU Feixiang , Dalian Maritime University
pp. 657-661
Doctoral Symposium

Challenges in Selecting COTS Component Guidelines (Abstract)

Somnuk Kereto , Kasetsart University, Thailand
Walisa Romsaiyud , Kasetsart University, Thailand
pp. 661-663

Management and Control of Coding and Testing of Component-based Software (Abstract)

Clovis Torres Fernandes , ITA - Aeronautical Institute of Technology
Tatiane Macedo Prudencio Lopes , ITA - Aeronautical Institute of Technology
pp. 664-666

Functional Specifications of Object Oriented Systems: A Model Driven Framework (Abstract)

Swapan Bhattacharya , Jadavpur University, Kolkata
Sabnam Sengupta , Jadavpur University, Kolkata
pp. 667-672

Model Checking of Component Connectors (Abstract)

Farhad Arbab , Leiden University, Netherlands.
Ali Movaghar , Sharif Univ. of Technology, Tehran, Iran
Mohammad Izadi , Sharif Univ. of Technology, Tehran, Iran
pp. 673-675

Towards End User Service Composition (Abstract)

Gang Huang , Peking University
Hong Mei , Peking University
Xuanzhe Liu , Peking University
pp. 676-678
Author Index

Author Index (PDF)

pp. 679
106 ms
(Ver )