Sciweavers

APSEC
2008
IEEE
14 years 6 months ago
Flexible Generation of Pervasive Web Services Using OSGi Declarative Services and OWL Ontologies
There is a growing trend to deploy web services in pervasive computing environments. Implementing web services on networked, embedded devices leads to a set of challenges, includi...
Klaus Marius Hansen, Weishan Zhang, João Fe...
APSEC
2008
IEEE
14 years 6 months ago
Correctness of Request Executions in Online Updates of Concurrent Object Oriented Programs
Online update is a technique that reduces the disruption caused by a software update. It does so by applying a patch to a running process as opposed to shutting down the process a...
Yogesh Murarka, Umesh Bellur
APSEC
2008
IEEE
14 years 6 months ago
Jackson's JSP-Like Method for State Transition Design
This paper presents an idea to apply Jackson’s JSP method, which is suitable for the transformation problem frame, into the state transition design, presented in the behavior pr...
Osamu Shigo
APSEC
2008
IEEE
14 years 6 months ago
Towards Unanticipated Runtime Adaptation of Java Applications
Modifying an application usually means to stop the application, apply the changes, and start the application again. That means, the application is not available for at least a sho...
Mario Pukall, Christian Kästner, Gunter Saake
APSEC
2008
IEEE
14 years 6 months ago
Behavioral Specification of Real-Time Requirements
This paper aims to present a systematic method to: (1) specify high-level and event based real-time requirements and (2) map the specified requirements to low-level and state-base...
Seyed Morteza Babamir, Faezeh Sadat Babamir
APSEC
2008
IEEE
14 years 6 months ago
Using Abstraction to Verify Arbitrary Temporal Properties
straction to Verify Arbitrary Temporal Properties Amir Pnueli New York University and Weizmann Institute of Sciences (Emeritus) Perspectives in Concurrency Theory, Chennai, 15 Dece...
Amir Pnueli
APSEC
2008
IEEE
14 years 6 months ago
Test Case Prioritization Based on Analysis of Program Structure
Test case prioritization techniques have been empirically proved to be effective in improving the rate of fault detection in regression testing. However, most of previous techniqu...
Zengkai Ma, Jianjun Zhao
APSEC
2008
IEEE
14 years 6 months ago
A Heap Model for Java Bytecode to Support Separation Logic
Memory usage analysis is an important problem for resource-constrained mobile devices, especially under mission- or safety-critical circumstances. Program codes running on or bein...
Chenguang Luo, Guanhua He, Shengchao Qin
APSEC
2008
IEEE
14 years 6 months ago
Management of Composites in Software Engineering Environments
Design and development scalability, in any engineering, requires information hiding and a specific composition mechanism in which composite items are made-up of other items. This ...
Jacky Estublier, Germán Vega, Thomas Levequ...