Abstract is missing.
- 2nd International Workshop on Quality Assurance and Testing of Web-Based Applications (QATWBA 05) [doi]
- Message from the General Chair [doi]
- Message from the QATWBA 05 Program Co-Chairs [doi]
- Message from the IWSC 05 Workshop Organizers [doi]
- 1st International Workshop on Testing and Quality Assurance of Component-Based Software (TQACBS 2005) [doi]
- Message from the COMPSAC 2005 Fast Abstract Co-Chairs [doi]
- Message from the Standing Committee Chair [doi]
- Message from the TQACBS 2005 Program Co-Chairs [doi]
- Reviewers [doi]
- Message from the MAD 05 Workshop Chairs [doi]
- COMPSAC 2005 Fast Abstracts [doi]
- Committees [doi]
- 2nd International Workshop on Software Cybernetics (IWSC 05) [doi]
- 2nd International Workshop on Languages, Methods, and Tools for Model-Driven Agile Development (MAD 05) [doi]
- Message from the Program Co-Chairs [doi]
- Industry Trends and Software AssuranceGraham Spittle. 3 [doi]
- A Different View of Fault PredictionThomas J. Ostrand, Elaine J. Weyuker, Robert M. Bell, Rachel C. W. Ostrand. 3-4 [doi]
- A Specification Construction Unit-Based Editor for ZHiroshi Ishikawa 0003. 5-6 [doi]
- Contract-Based Formal Specification of Safety Critical SystemsWei Dong, Ji Wang. 7-8 [doi]
- Incremental Class Testing from a Class Test OrderYvan Labiche. 7-12 [doi]
- Towards Verification via SupercompilationAlexei Lisitsa, Andrei P. Nemytykh. 9-10 [doi]
- What Is SINS?Ramesh Bharadwaj. 11-12 [doi]
- Configuration-Oriented Symbolic Test Sequence Construction Method for EFSMShuhao Li, Ji Wang, Xin Wang, Zhi-Chang Qi. 13-18 [doi]
- Configuration Strategies for Evolutionary TestingXiaoyuan Xie, Baowen Xu, Changhai Nie, Liang Shi, Lei Xu. 13-14 [doi]
- PerAd-Service: A Middleware Service for Pervasive Advertisement in M-BusinessShameem Ahmed, Moushumi Sharmin, Sheikh Iqbal Ahamed. 17-18 [doi]
- Iterative Metamorphic TestingPeng Wu 0002. 19-24 [doi]
- Ubiquitous Computing for Hospital Applications: RFID-Applications to Enable Research in Real-Life EnvironmentsAndreas Holzinger, Klaus Schwaberger, Matthias Weitlaner. 19-20 [doi]
- Product Families On-Chip - Combining the Software Product Family Paradigm with Run-Time Reprogrammable Hardware TechnologyMichel Jaring. 21-22 [doi]
- A HAL for Component-Based Embedded Operating SystemsQiming Teng, Hua Wang, Xiangqun Chen. 23-24 [doi]
- Software Test Selection Patterns and Elusive BugsWilliam E. Howden. 25-32 [doi]
- Preventing Illegal Usage of Mobile Phone SoftwareYun-Sam Kim, Eun-Sun Cho. 25-26 [doi]
- Toward Stable Software Architecture for Wireless Sensor NetworksNader Mohamed, Haitham S. Hamza. 27-28 [doi]
- Recovering Lack of Words in Text Categorization for Item BanksAtorn Nuntiyagul, Nick Cercone, Kanlaya Naruedomkul. 31-32 [doi]
- Searching Design Patterns in Source CodeDetlef Streitferdt, Christian Heller, Ilka Philippow. 33-34 [doi]
- A Probabilistic Evaluation Function for Relaxed UnificationTony Abou-Assaleh, Nick Cercone, Vlado Keselj. 35-36 [doi]
- DIG: A Tool for Software Process Data Extraction and GroomingScott D. Miller, Aditya P. Mathur, Raymond A. DeCarlo. 35-40 [doi]
- Association Rule-Based Data Mining Agents for Personalized Web CachingSujaa Rani Mohan, E. K. Park, Yijie Han. 37-38 [doi]
- Data Mining Application in Customer Relationship Management of Credit Card BusinessRuey-Shun Chen, Ruey-Chyi Wu, J. Y. Chen. 39-40 [doi]
- Similarity Measurement Between ImagesChaur-Chin Chen, Hsueh-Ting Chu. 41-42 [doi]
- A Defect Estimation Approach for Sequential Inspection Using a Modified Capture-Recapture ModelChing-Pao Chang, Jia-Lyn Lv, Chih-Ping Chu. 41-46 [doi]
- An Agent-Based Testing Approach for Web ApplicationsYu Qi, David Chenho Kung, W. Eric Wong. 45-50 [doi]
- Parallel Changes: Detecting Semantic InterferencesG. Lorenzo Thione, Dewayne E. Perry. 47-56 [doi]
- Autonomous Hot Patching for Web-Based ApplicationsHai Huang, Wei-Tek Tsai, Yinong Chen. 51-56 [doi]
- A Testing Approach for XML SchemasMaria Cláudia Figueiredo Pereira Emer, Silvia Regina Vergilio, Mario Jino. 57-62 [doi]
- A Productivity Metric Based on Statistical Pattern RecognitionJody L. Sharpe, João W. Cangussu. 59-64 [doi]
- Optimizing and Simplifying Software Metric Models Constructed Using Maximum Likelihood MethodsVictor K. Y. Chan, W. Eric Wong. 65-70 [doi]
- Keynote Speech: Testing Web Applications: The State of Art and the Future TrendsGiuseppe A. Di Lucca. 65 [doi]
- Increasing Web Service Dependability Through Consensus VotingNik Looker, Malcolm Munro, Jie Xu. 66-69 [doi]
- Measuring the Functionality of Online StoresErnest Cachia, Mark Micallef. 70-73 [doi]
- Structure Analysis for Dynamic Software Architecture Based on Spatial LogicTingting Han, Taolue Chen, Jian Lu. 71-76 [doi]
- Keynote Speech: The Information Age: Challenges and Opportunities for Control and EngineeringJ. Douglas Birdwell, J. N. Chiasson, Chaouki T. Abdallah, Majeed M. Hayat, Z. Tang, J. White. 77-82 [doi]
- Performability Analysis of a Pipeline Software ArchitectureSwapna S. Gokhale, Sherif Yacoub. 77-82 [doi]
- State Space Approach to Security QuantificationChristopher Griffin, Bharat B. Madan, Kishor S. Trivedi. 83-88 [doi]
- High-Assurance Software Design for Mobile Tele-Health SystemsJose C. Lacal. 85 [doi]
- Wireless Security for Personalized and Mobile Healthcare ServicesRobert S. H. Istepanian. 86 [doi]
- An Extended Approach to Improving the Semantic Interoperation Among Reuse RepositoriesYing Pan, Lei Wang, Lu Zhang, Bing Xie, Fuqing Yang. 89-94 [doi]
- Requirement Process Establishment and Improvement: From the Viewpoint of CyberneticsHong Xu, Peter Sawyer, Ian Sommerville. 89-92 [doi]
- FMECA Control for Software DevelopmentJames H. Graham. 93-96 [doi]
- An Empirical Study of a Reverse Engineering Method for Aggregation Relationship Based on Operation PropagationDowming Yeh, Pei-Chen Sun, William Cheng-Chung Chu, Chien-Lung Lin, Hongji Yang. 95-100 [doi]
- Supervisory Control of Time Petri Nets Using Net UnfoldingUgo Buy, Houshang Darabi, Mihai Lehene, Vikram Venepally. 97-100 [doi]
- Adaptive Testing, Oracle Generation, and Test Case Ranking for Web ServicesWei-Tek Tsai, Yinong Chen, Raymond A. Paul, Hai Huang, Xinyu Zhou, Xiao Wei. 101-106 [doi]
- A Software Cybernetic Approach to Control of the Software System Test PhaseScott D. Miller, Raymond A. DeCarlo, Aditya P. Mathur. 103-108 [doi]
- Situation-Awareness for Adaptive Coordination in Service-Based SystemsStephen S. Yau, Dazhi Huang, Haishan Gong, Hasan Davulcu. 107-112 [doi]
- Self-Testability in Unit TestingSami Beydeda. 109-112 [doi]
- Partition Testing with Dynamic PartitioningKai-Yuan Cai, Tao Jing, Chenggang Bai. 113-116 [doi]
- Self-Configuring Communication Middleware Model for Multiple Network InterfacesNader Mohamed. 115-120 [doi]
- Novelty Detection for a Neural Network-Based Online Adaptive SystemYan Liu, Bojan Cukic, Edgar Fuller, Srikanth Gururajan, Sampath Yerramalla. 117-122 [doi]
- Using Aspect Oriented Techniques to Support Separation of Concerns in Model Driven DevelopmentArnor Solberg, Devon M. Simmonds, Raghu Reddy, Sudipto Ghosh, Robert B. France. 121-126 [doi]
- A Control Approach for Agile ProcessesJoão W. Cangussu, Richard M. Karcich. 123-126 [doi]
- On the Potential of Process Simulation in Software Project Schedule OptimizationFrank Padberg. 127-130 [doi]
- Agent Oriented Programming Based on SLABSJi Wang, Rui Shen, Hong Zhu. 127-132 [doi]
- Considerations on a New Software Architecture for Distributed Environments Using Autonomous Semantic AgentsAtilla Elçi, Behnam Rahnama. 133-138 [doi]
- Intention Scheduling for BDI Agent SystemsShung-Bin Yan, Zu-Nien Lin, Hsun-Jen Hsu, Feng-Jian Wang. 133-140 [doi]
- Constraint Violation Detection: A Fundamental Part of Software CyberneticsQianxiang Wang. 139-142 [doi]
- Handling High-Bandwidth Traffic Aggregates by Receiver-Driven Feedback ControlChee-Wei Tan, Dah-Ming Chiu, John C. S. Lui, David K. Y. Yau. 143-145 [doi]
- Detecting Intrusions Specified in a Software Specification LanguageMohammad Feroz Raihan, Mohammad Zulkernine. 143-148 [doi]
- Synchronized Architectures for Adaptive SystemsTiberiu Seceleanu, David Garlan. 146-151 [doi]
- SecureC: Control-Flow Protection Against General Buffer Overflow AttackHiroyasu Nishiyama. 149-155 [doi]
- Component Security - Issues and an ApproachNimal Nissanke. 152-155 [doi]
- Buffer Overrun Prevention Through Component Composition AnalysisDavid Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith. 156-163 [doi]
- Keynote Speech: Model-Driven Agile Development (MAD) for Situation-Aware Software in Ubiquitous Computing EnvironmentsStephen S. Yau. 159 [doi]
- Extreme Programming for Distributed Legacy System ReengineeringBin Xu. 160-165 [doi]
- Efficiently Managing Security Concerns in Component Based System DesignAmmar Masood, Sahra Sedigh-Ali, Arif Ghafoor. 164-169 [doi]
- From Extreme Programming and Usability Engineering to Extreme Usability in Software Engineering Education (XP+UE->XU)Andreas Holzinger, Maximilian Errath, Gig Searle, Bettina Thurnher, Wolfgang Slany. 169-172 [doi]
- Industry and Academia: Can They Agree on Best Practice Within Software Engineering?J. Barrie Thompson. 173 [doi]
- Experiences with a Dialog-Driven Process Model for Web Application DevelopmentMatthias Book, Volker Gruhn. 173-178 [doi]
- Best Practices in Software Engineering: Does Anybody in Industry or Academia Care?Stephen Chen. 174 [doi]
- Principles Should Underlie Standards and Best PracticesPierre Bourque. 175 [doi]
- The Vital Few Versus the Trivial Many: Examining the Pareto Principle for SoftwareMechelle Gittens, Yong Kim, David Godwin. 179-185 [doi]
- Fault Injection Approach Based on Dependence AnalysisRegina L. O. Moraes, Eliane Martins, Naaliel Vicente Mendes. 181-188 [doi]
- Transitioning from Product Line Requirements to Product Line ArchitectureJuha Savolainen, Ian Oliver, Mike Mannion, Hailang Zuo. 186-195 [doi]
- Reasoning About Software Architecture-Based Regression Testing Through a Case StudyHenry Muccini, Marcio S. Dias, Debra J. Richardson. 189-195 [doi]
- Designing Controllers for ReachabilityCristina Cerschi Seceleanu. 196-203 [doi]
- Automated Harvesting of Test Oracles for Reliability TestingOliver Hummel, Colin Atkinson. 196-202 [doi]
- Melody Classification Using EM AlgorithmYukiteru Yoshihara, Takao Miura. 204-210 [doi]
- Towards Self-Testing of Component-Based SoftwareFevzi Belli, Christof J. Budnik. 205-210 [doi]
- A Component Testability Model for Verification and MeasurementJerry Gao, Ming-Chih Shih. 211-218 [doi]
- A Formal Approach to Designing a Class-Subclass Structure Using a Partial-Order on the FunctionsSukhamay Kundu, Nigel Gwee. 213-220 [doi]
- A Framework for Efficient Contract-Based Testing of Software ComponentsEgon Valentini, Gerhard Fliess, Edmund Haselwanter. 219-222 [doi]
- A Family of Extended Fuzzy Description LogicsYanhui Li, Baowen Xu, Jianjiang Lu, Dazhou Kang, Peng Wang. 221-226 [doi]
- Extended Symbolic Transition Graphs with AssignmentWeijia Deng, Huimin Lin. 227-232 [doi]
- MetaWSL and Meta-Transformations in the FermaT Transformation SystemMartin P. Ward, Hussein Zedan. 233-238 [doi]
- Using AOP to Monitor and Administer Software for Grid Computing EnvironmentsMark Grechanik, Dewayne E. Perry, Don S. Batory. 241-248 [doi]
- Nearest Neighbor Queries on Extensible Grid Files Using Dimensionality ReductionRyosuke Miyoshi, Takao Miura, Isamu Shioya. 249-255 [doi]
- Power Transmission Control Using Distributed Max FlowAustin Armbruster, Michael R. Gosnell, Bruce M. McMillin, M. L. Crow. 256-263 [doi]
- Security and Privacy in Collaborative Distributed SystemsStephen S. Yau. 267 [doi]
- Rule Languages for Security and Privacy in Cooperative SystemsPiero A. Bonatti. 268-269 [doi]
- Experiences on Intrusion Tolerance Distributed SystemsDengguo Feng, Ji Xiang. 270-271 [doi]
- Tree-Map Visualization for Web AccessibilityJohn Bailey, Elizabeth Burd. 275-280 [doi]
- On Personal Data License Design and NegotiationYuh-Jzer Joung, Cheng Yen, Chung-Tang Huang, Yi-Jhan Huang. 281-286 [doi]
- Adapting Single-Request/Multiple-Response Messaging to Web ServicesMichael Ruth, Feng Lin, Shengru Tu. 287-292 [doi]
- A Web Data Extraction Description Language and Its ImplementationI-Chen Wu, Jui-Yuan Su, Loon-Been Chen. 293-298 [doi]
- A Blocking-Based Approach to Protocol ValidationYu Lei, David Chenho Kung, Qizhi Ye. 301-306 [doi]
- An Empirical Performance Study for Validating a Performance Analysis Approach: PSIMJinchun Xia, Yujia Ge, Carl K. Chang. 307-312 [doi]
- Empirical Validation of Website Timeliness MeasuresYanlong Zhang, Hong Zhu, Sue Greenwood. 313-318 [doi]
- Hybrid Intelligent Systems: Selecting Attributes for Soft-Computing AnalysisPuntip Pattaraintakorn, Nick Cercone, Kanlaya Naruedomkul. 319-325 [doi]
- Model-Based Software Testing and VerificationAditya P. Mathur. 329 [doi]
- Model-Based Testing: Challenges AheadMats Per Erik Heimdahl. 330 [doi]
- Model-Based Testing for Enterprise Software SolutionsAshish Jain. 331 [doi]
- Research Directions on Model-Based Metamorphic Testing and VerificationT. H. Tse. 332 [doi]
- A Probabilistic Approach to the Anxious Home for Activity MonitoringGeoff A. W. West, Stewart Greenhill, Svetha Venkatesh. 335-340 [doi]
- Exception Handling in Coordination-Based Mobile EnvironmentsAlexei Iliasov, Alexander B. Romanovsky. 341-350 [doi]
- A User-Adaptable User Interface Model to Support Ubiquitous User Access to EIS Style ApplicationsJon Davis, Andrew Tierney, Elizabeth Chang. 351-358 [doi]
- A Dynamic Context-Conflict Management Scheme for Group-Aware Ubiquitous Computing EnvironmentsInsuk Park, Dongman Lee, Soon J. Hyun. 359-364 [doi]
- Twenty-First Century Software Production ParadigmsDick B. Simmons. 367 [doi]
- SSI, Academia and Industry CollaborationChris Nelson. 368 [doi]
- Conquering the Crisis in Software EngineeringVictoria Livschitz. 369 [doi]
- 21st-Century Global Software Development and Education Position StatementJames H. Cross II. 370 [doi]
- Collaborative Global Software Development and EducationXiaoqing Frank Liu. 371 [doi]
- A Tool and Case Study for Specification-Based Program ReviewFumiko Nagoya, Shaoying Liu, Yuting Chen. 375-380 [doi]
- Tridirectional Computed Chaining: An Efficient Hashing Algorithm for Limited Space ApplicationsMitchell Loeb, Alan L. Tharp. 381-387 [doi]
- A Requirement Engineering Approach for Designing XML-View Driven, XML Document WarehousesVicky Nassis, Rajagopal Rajugan, Tharam S. Dillon, J. Wenny Rahayu. 388-395 [doi]
- Structured Object-Oriented Co-Analysis/Co-Design of Hardware/Software for the FACTS Power SystemMatt Ryan, Sojan Markose, Xiaoqing Frank Liu, Ying Cheng. 396-402 [doi]
- Gompertz Software Reliability Model and Its ApplicationKoji Ohishi, Hiroyuki Okamura, Tadashi Dohi. 405-410 [doi]
- Software Reliability Growth Model Considering Testing Profile and Operation ProfileJing Zhao, Hongwei Liu, Gang Cui, Xiao-Zong Yang. 411-416 [doi]
- RIES - Internet Voting in ActionEngelbert Hubbers, Bart Jacobs, Wolter Pieters. 417-424 [doi]
- Two Variations to the mCESG Pollsterless E-Voting SchemeTim Storer, Ishbel Duncan. 425-430 [doi]
- Towards a Model of Seamless Mobility - User Value and Security in Computing, Content, and CommunicationsJeena Srinivas, Stephen Chen. 433-434 [doi]
- Towards Describing Black-Box Testing Methods as Atomic RulesTafline Murnane, Richard Hall, Karl Reed. 437-442 [doi]
- Testing the Semantics of W3C XML SchemaJian Bing Li, James Miller. 443-448 [doi]
- Goal-Oriented Test Data Generation for Programs with Pointer VariablesArnaud Gotlieb, Tristan Denmat, Bernard Botella. 449-454 [doi]
- Coverage-Directed Test Generation with Model Checkers: Challenges and OpportunitiesGeorge Devaraj, Mats Per Erik Heimdahl, Donglin Liang. 455-462 [doi]
- Testing Coverage Analysis for Software Component ValidationJerry Gao, Raquel Espinoza, Jingsha He. 463-470 [doi]
- Availability Evaluation of Hardware/Software Systems with Several Recovery ProceduresSergiy A. Vilkomir, David Lorge Parnas, Veena B. Mendiratta, Eamonn Murphy. 473-478 [doi]
- A Comparison of Network Level Fault Injection with Code InsertionNik Looker, Malcolm Munro, Jie Xu. 479-484 [doi]
- The Coordinated Recovery of Data Service and Transaction Service in J2EETiancheng Liu, Gang Huang, Gang Fan, Hong Mei. 485-490 [doi]
- A Low-Latency Checkpointing Scheme for Mobile Computing SystemsGuohui Li, LihChyun Shu. 491-496 [doi]
- How Democratic Will E-Democracy Be?Stuart Anderson, Massimo Felici. 499 [doi]
- Who Is Enfranchised by Remote Voting?Ian Brown. 500 [doi]
- Prospects for E-VotingPeter Ryan. 501 [doi]
- How Democratic Will E-Democracy Be?Jacques Bus. 502 [doi]
- Automated Negotiation of Privacy ContractsMichael Maaser, Peter Langendörfer. 505-510 [doi]
- A Novel Method for Protecting Sensitive Knowledge in Association Rules MiningEn Tzu Wang, Guanling Lee, Yu-Tzu Lin. 511-516 [doi]
- Protecting Users Against Phishing Attacks with AntiPhishEngin Kirda, Christopher Krügel. 517-524 [doi]
- A Performance-Based Grid Intrusion Detection SystemFang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang. 525-530 [doi]
- Scoped Broadcast in Dynamic Peer-to-Peer NetworksHung-Chang Hsiao, Chung-Ta King. 533-538 [doi]
- Character Recognition System for Cellular Phone with CameraK. S. Bae, K. K. Kim, Y. G. Chung, W. P. Yu. 539-544 [doi]
- Towards a Contract Aware CORBA Component ContainerEgon Teiniker, Robert Lechner, Gernot Schmoelzer, Christian Kreiner, Zsolt Kovács, Reinhold Weiss. 545-550 [doi]
- New Method for Dispatching Waiting Logical Processors in Virtual Machine SystemsHidenori Umeno, Masato Kiyama, Takafumi Fukunaga, Takashige Kubo. 551-560 [doi]
- Trust Management in a Distributed EnvironmentBhavani M. Thuraisingham. 561-562 [doi]