Sciweavers

COMPSAC
2008
IEEE
14 years 6 months ago
Behavioral Dependency Measurement for Change-Proneness Prediction in UML 2.0 Design Models
During the development and maintenance of ObjectOriented (OO) software, the information on the classes which are more prone to be changed is very useful. Developers and maintainer...
Ah-Rim Han, Sang-Uk Jeon, Doo-Hwan Bae, Jang-Eui H...
COMPSAC
2008
IEEE
14 years 6 months ago
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider
—Internet users interact with multiple Web Service Providers (WSP), and therefore, must remember and manage multiple passwords. Users try to overcome the burden of password manag...
Golnaz Elahi, Zeev Lieber, Eric S. K. Yu
COMPSAC
2008
IEEE
14 years 6 months ago
Editable Replay of IDE-Based Repetitive Tasks
Ying Zhang, Gang Huang, Nuyun Zhang, Hong Mei
COMPSAC
2008
IEEE
14 years 6 months ago
Mutation-Based Testing of Buffer Overflow Vulnerabilities
Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
Hossain Shahriar, Mohammad Zulkernine
COMPSAC
2008
IEEE
14 years 6 months ago
Service-Oriented Modelling of Automotive Systems
We discuss the suitability of service-oriented computing for the automotive domain. We present a formal high-level language in which complex automotive activities can be modelled ...
Laura Bocchi, José Luiz Fiadeiro, Ant&oacut...
COMPSAC
2008
IEEE
14 years 6 months ago
Towards Engineering Ontologies for Cognitive Profiling of Agents on the Semantic Web
Research shows that most agent-based collaborations suffer from lack of flexibility. This is due to the fact that most agent-based applications assume pre-defined knowledge of age...
Amna Basharat, Gabriella Spinelli
COMPSAC
2008
IEEE
14 years 6 months ago
On the Performance of Transactional Remote Invocations over Commonly Used Transports
We have measured the performance of transactional remote invocations over three commonly used transports: IIOP, SOAP/HTTP, and JBoss Remoting. In the IIOP case, our transactional ...
Ivan Silva Neto, Francisco Reverbel
COMPSAC
2008
IEEE
14 years 6 months ago
Ontology Model-Based Static Analysis on Java Programs
1 Typical enterprise and military software systems consist of millions of lines of code with complicated dependence on library abstractions. Manually debugging these codes imposes ...
Lian Yu, Jun Zhou, Yue Yi, Ping Li, Qianxiang Wang
COMPSAC
2008
IEEE
14 years 6 months ago
How to Enhance UDDI with Dependability Capabilities
How dependability is to be assessed and ensured during Web Service operation and how unbiased and trusted mechanisms supporting this are to be developed are still open issues. Thi...
Anatoliy Gorbenko, Alexander Romanovsky, Vyachesla...
COMPSAC
2008
IEEE
14 years 6 months ago
Design Methodology for a Modular Component Based Software Architecture
Michael Caragiozidis, Nikos Mouratidis, Christofor...