Sciweavers

COMPSAC
2006
IEEE
14 years 1 months ago
A Theory of Software-Mediated Enterprise Governance
Cybernetics, among its more general definitions, is about effective governance of dynamic probabilistic systems. First order cybernetics is concerned with [software] processes gov...
Jay S. Bayne
COMPSAC
2006
IEEE
14 years 1 months ago
Testability of Software in Service-Oriented Architecture
Service-Oriented Architecture (SOA) is a system architecture in which a collection of loosely coupled services communicate with each other using standard interfaces and message-ex...
Wei-Tek Tsai, Jerry Gao, Xiao Wei, Yinong Chen
COMPSAC
2006
IEEE
14 years 1 months ago
Model-Driven Agile Development of Reactive Multi-Agent Systems
The Sage development method and associated tool set support an incremental, iterative, model-driven process to build and maintain high assurance, reactive multi-agent systems. A s...
James Kirby Jr.
COMPSAC
2006
IEEE
14 years 1 months ago
Design Structural Stability Metrics and Post-Release Defect Density: An Empirical Study
This paper empirically explores the correlations between a suite of structural stability metrics for object-oriented designs and post-release defect density. The investigated stab...
Mahmoud O. Elish, David C. Rine
COMPSAC
2006
IEEE
14 years 1 months ago
An Agent-Based Metric for Quality of Services over Wireless Networks
In a wireless LAN environment, clients tend to associate with the nearest access point (AP) which usually provides the strongest signal. However, this does not guarantee that user...
Yaw-Chung Chen, Wen-Yen Chen
COMPSAC
2006
IEEE
14 years 1 months ago
Tool Support to Model-based Quality Analysis of Software Architecture
This paper presents an automated software tool SQUARE (Software QUality and ARchitecture modelling Environment). It is designed and implemented to support the analysis of software...
Qian Zhang, Jian Wu, Hong Zhu
COMPSAC
2006
IEEE
14 years 1 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
COMPSAC
2006
IEEE
14 years 1 months ago
Test Case Prioritization Using Relevant Slices
Software testing and retesting occurs continuously during the software development lifecycle to detect errors as early as possible. The sizes of test suites grow as software evolv...
Dennis Jeffrey, Neelam Gupta
COMPSAC
2006
IEEE
14 years 1 months ago
An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
Yonggang Zhang, Juergen Rilling, Volker Haarslev
COMPSAC
2006
IEEE
14 years 1 months ago
Automated Agent Synthesis for Situation Awareness in Service-Based Systems
Service-based systems have many applications, such as collaborative research and development, e-business, health care, military applications, and homeland security. In dynamic ser...
Stephen S. Yau, Haishan Gong, Dazhi Huang, Wei Gao...