Sciweavers

COMPSAC
2005
IEEE
14 years 1 months ago
Reasoning About Software Architecture-Based Regression Testing Through a Case Study
Two main issues need to be covered when dealing with the dependability of component-based systems: quality assurance of reusable software components and quality assurance of the a...
Henry Muccini, Marcio S. Dias, Debra J. Richardson
COMPSAC
2005
IEEE
14 years 1 months ago
Toward Stable Software Architecture for Wireless Sensor Networks
This research aims at developing an approach for architecting and communicating software systems in the context of wireless sensor networks. In particular, it focuses on developin...
Nader Mohamed, Haitham S. Hamza
COMPSAC
2005
IEEE
14 years 1 months ago
Self-Configuring Communication Middleware Model for Multiple Network Interfaces
Communication middleware such as MuniCluster provides highlevel communication mechanisms for networked applications through hiding the low-level communication details from the app...
Nader Mohamed
COMPSAC
2005
IEEE
14 years 1 months ago
Increasing Web Service Dependability Through Consensus Voting
This paper demonstrates our Web Service based NVersion model, WS-FTM (Web Service-Fault Tolerance Mechanism), which applies this well proven technique to the domain of Web Service...
Nik Looker, Malcolm Munro, Jie Xu
COMPSAC
2005
IEEE
14 years 1 months ago
A Comparison of Network Level Fault Injection with Code Insertion
This paper describes our research into the application of fault injection to Simple Object Access Protocol (SOAP) based Service Oriented-Architectures (SOA). We show that our prev...
Nik Looker, Malcolm Munro, Jie Xu
COMPSAC
2005
IEEE
14 years 1 months ago
Buffer Overrun Prevention Through Component Composition Analysis
Buffer overrun vulnerabilities cause significant security problems, and have proven to be difficult to prevent. In this paper we present a novel approach to tackling the problem...
David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob...
COMPSAC
2005
IEEE
14 years 1 months ago
Incremental Class Testing from a Class Test Order
Many approaches exist to decide the order in which classes should be integrated during (integration) testing. Most of them, based on an analysis of class dependencies (for instanc...
Yvan Labiche
COMPSAC
2005
IEEE
14 years 1 months ago
Protecting Users Against Phishing Attacks with AntiPhish
Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have b...
Engin Kirda, Christopher Krügel
COMPSAC
2005
IEEE
14 years 1 months ago
Preventing Illegal Usage of Mobile Phone Software
Mobile software industry is suffering from the illegal usage of the software. PKI will not be a solution for small software distribution. We introduce a lightweight but safe metho...
Yun-Sam Kim, Eun-Sun Cho
COMPSAC
2005
IEEE
14 years 1 months ago
Exception Handling in Coordination-Based Mobile Environments
Mobile agent systems have many attractive features including asynchrony, openness, dynamicity and anonymity, which makes them indispensable in designing complex modern application...
Alexei Iliasov, Alexander B. Romanovsky