14th Asia-pacific Software Engineering Conference (Apsec 2007)
, by Institute of Electrical and Electronics Engineers- ISBN: 9780769530574 | 0769530575
- Cover: Paperback
- Copyright: 6/7/2008
| Specialising in software engineering | p. 3 |
| Evaluating product line architectures : methods and techniques | p. 13 |
| The problem frames approach to software engineering | p. 14 |
| Aligning the map requirements modelling with the B-method for formal software development | p. 17 |
| A methodological framework for SysML : a problem frames-based approach | p. 25 |
| Extraction of viewpoints for eliciting customer's requirements based on analysis of specification change records | p. 33 |
| Using genetic algorithms to aid test-data generation for data-flow coverage | p. 41 |
| Finding a test order using object-oriented slicing technique | p. 49 |
| Function call flow based fitness function design in evolutionary testing | p. 57 |
| Secure behavior of Web browsers to prevent information leakages | p. 65 |
| Realizability of collaboration-based service specifications | p. 73 |
| The validation and verification of WSCDL | p. 81 |
| Figure out the current software requirements engineering - what practitioners expect to requirements engineering? | p. 89 |
| A method for early requirements triage and selection utilizing product strategies | p. 97 |
| Pseudo software : a new concept for iterative requirement development and validation | p. 105 |
| Enterprise assets security requirements construction from ESRMG grammar based on security patterns | p. 112 |
| Construction method of a high-order Markov chain usage model | p. 120 |
| Static call graph generator for C++ using debugging information | p. 127 |
| Improving data integrity with a Java mutability analysis | p. 135 |
| Field escape analysis for data confidentiality in Java components | p. 143 |
| Coordination-policy based composed system behavior derivation | p. 151 |
| Approximation algorithms for software component selection problem | p. 159 |
| Towards instant automatic model refinement based on OCL | p. 167 |
| Modeling and learning interaction-based accidents for safety-critical software systems | p. 175 |
| Conformance checking of running programs in dynamic aspect-oriented systems | p. 183 |
| Toward efficient aspect mining for Linux | p. 191 |
| Using B to verify the weaving of aspects | p. 199 |
| E-AoSAS++ and its software development environment | p. 206 |
| Visualization for software evolution based on logical coupling and module coupling | p. 214 |
| Optimising project feature weights for analogy-based software cost estimation using the Mantel correlation | p. 222 |
| An empirical study of class sizes for large Java systems | p. 230 |
| Are size measures better than expert judgement? : an industrial case study on requirements volatility | p. 238 |
| A middleware-based approach to model refactoring at runtime | p. 246 |
| Applying a code clone detection method to domain analysis of device drivers | p. 254 |
| Simultaneous modification support based on code clone analysis | p. 262 |
| Incentive compatible mechanisms for group ticket allocation in software maintenance services | p. 270 |
| Statechart-based verification of object-oriented design models | p. 278 |
| Compositional verification of UML dynamic models | p. 286 |
| Requirements engineering for reactive systems : coloured Petri nets for an elevator controller | p. 294 |
| An executable UML with OCL-based action semantics language | p. 302 |
| Injecting security as aspectable NFR into software architecture | p. 310 |
| An investigation into concurrency control mechanisms in data service layers | p. 318 |
| Enhancing the ESIM (embedded systems improving method) by combining information flow diagram with analysis matrix for efficient analysis of unexpected obstacles in embedded software | p. 326 |
| Developing an insulin pump system using the SOFL method | p. 334 |
| Aspect-oriented modeling for embedded software design | p. 342 |
| Automatic extraction and verification of page transitions in a Web application | p. 350 |
| Disk based software verification via bounded model checking | p. 358 |
| A synchronization flow analysis of concurrent objects in AIBO OPEN-R programs based on communicating processes | p. 366 |
| A process pattern language for agile methods | p. 374 |
| Deriving software process simulation model from SPEM-based software process model | p. 382 |
| Definition of an executable SPEM 2.0 | p. 390 |
| Experiment-driven approach to building support for distributed agile teams | p. 398 |
| An approach to probabilistic effort estimation for military avionics software maintenance by considering structural characteristics | p. 406 |
| A large-scale empirical comparison of object-oriented cohesion metrics | p. 414 |
| An approach for specifying access control policy in J2EE applications | p. 422 |
| Early validation and verification of a distributed role-based access control model | p. 430 |
| Reducing unnecessary conservativeness in access rights analysis with string analysis | p. 438 |
| A Six Sigma framework for software process improvements and its implementation | p. 446 |
| Methodology support for the model driven architecture | p. 454 |
| Use of agile methods and practices in the Philippines | p. 462 |
| A survey on the business relationship between Chinese outsourcing software suppliers and their outsourcers | p. 470 |
| Identifying key requirements for a new product line | p. 478 |
| Tailoring the domain engineering process of the PLUS method | p. 486 |
| Deriving product line requirements : the RED-PL guidance approach | p. 494 |
| ezContract : using Marker library and Bytecode instrumentation to support design by contract in Java | p. 502 |
| MKtrace : in innovative debugging tool for multi-threaded programs on multiprocessor systems | p. 510 |
| Checking distributed programs with partially ordered atoms | p. 518 |
| Quantitative analysis of value-based software processes using decision-based stochastic object Petri-nets | p. 526 |
| Improving effort estimation accuracy by weighted grey relational analysis during software development | p. 534 |
| A novel approach of prioritizing use case scenarios | p. 542 |
| W1 : workshop on accountability and traceability in global software engineering (ATGSE2007) | p. 553 |
| W2 : first international workshop on management and economics of software product lines (MESPUL) | p. 555 |
| W3 : 1st international workshop on software patterns and quality (SPAQu'07) | p. 557 |
| W4 : workshop on service oriented architecture | p. 559 |
| W5 : education workshop : bridging the university/industry gap | p. 560 |
| W6 : the first international workshop on software productivity analysis and cost estimation (SPACE'07) | p. 562 |
| Robust and flexible software inspection model for software re-engineering process : abstraction phase | p. 565 |
| Architectural naming, a secret of agile thinking | p. 565 |
| Time-quality metric model for quality measurement of Web-based systems | p. 566 |
| Analyzing the service level of software debugging system through simulation-based queuing approach | p. 566 |
| Distributed collaborative modeling support system for UML diagrams | p. 567 |
| The TASM language and the Hi-Five framework : specification, validation, and verification of embedded real-time systems | p. 567 |
| UCSI : towards a user-centric service integration approach | p. 568 |
| Formal model-driven engineering of distributed simulation systems based on architecture-centric domain-specific approach | p. 568 |
| DFTL : a description language for transformation of data formats | p. 569 |
| Email and trouble report analysis for revealing context with the project replayer | p. 569 |
| PORD : a reversible debugging tool using dynamic binary translation | p. 570 |
| Non-functional requirements elicitation and incorporation into functional models | p. 570 |
| Validating software reliability by binary translation | p. 570 |
| Project management practices on building management information system in IBM global business service | p. 571 |
| MEtaGile : an agile domain-specific modeling environment | p. 571 |
| Analysis of the factors of influencing parent's confidence on the Internet by associating rules mining | p. 572 |
| Author index | p. 573 |
| Table of Contents provided by Blackwell. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.



