|
|
|
COMPSAC 2003 AT-A-GLANCE |
|
Monday |
Tuesday |
Wednesday |
Thursday |
|
November 3 |
November 4 |
November 5 |
November 6 |
|
Opening Session |
Plenary
Panel Session |
Keynote Session |
|
|
Keynote: |
Chair :
Stephen S. Yau |
Keynote: |
|
|
Louis J. Blazy |
|
Robin Bloomfield
|
|
|
Coffee Break |
Coffee Break |
Coffee Break |
|
|
Parallel Sessions: |
Parallel Sessions: |
Parallel Sessions: |
Parallel Sessions: |
|
1 Pervasive & Ubiquitous Computing |
13 Collaborative
Systems |
22 Distributed Systems |
28 System Reliability (1) |
|
2 Panel:
Homeland Security’s Cyber Comp. |
14 Software Architecture & Framework |
|
Workshop
3: WEBSA2003 (1 of 3) |
|
3 Software & System Testing (1) |
15 Requirements Engineering |
23 Component-Based Software Engineering |
|
|
4 Software
Reuse & Management |
16 Panel:
Case Studies in Systems/Software |
Workshop 2: Web & Security Informatics (1 of 3) |
|
|
Lunch Break |
Lunch Break |
Lunch Break |
Lunch Break |
|
Parallel Sessions: |
Parallel Sessions: |
Parallel Sessions: |
Parallel Sessions: |
|
5 Middleware Systems |
17 Internet & Web-based Systems |
24 Network Systems |
29 System Reliability (2) |
|
6 Trustworthy Software Systems |
18 Software Reengineering (1) |
|
Workshop
3: WEBSA2003 (2 of 3) |
|
7 Panel: Software Testing |
19 Quality
Management |
25
Object-Oriented
Development (1) |
|
|
8 Software
Process Management |
Workshop 1: WACAI 2003
(1 of 2) |
Workshop
2: Web & Security Infrmatics (2 of 3) |
|
|
Coffee Break |
Coffee Break |
Coffee Break |
Coffee Break |
|
Parallel Sessions: |
Parallel Sessions: |
Parallel Sessions: |
Session: |
|
9 Performance Systems |
|
26 |
|
|
10 Information Security |
20 Software Reengineering (2) |
|
Workshop
3: WEBSA2003 (3 of 3) |
|
11 Software & System Testing (2) |
21 Measurement & Metrics |
27 Object-Oriented Development
(2) |
|
|
12 Panel:
Global Trends in SPI |
Workshop
1: WACAI 2003 (2
of 2) |
Workshop 2: Web & Security Informatics (3 of 3) |
|
CONFERENCE VENUE
Omni Richardson Hotel |
SOCIAL FUNCTIONS
Conference
Reception
|
COMPSAC 2003 TECHNICAL PROGRAM |
•Welcome and Remarks: General Chair: Robert Helms,
•Additional Greetings and
Remarks: Steering
Committee Chair: Stephen S. Yau,
•Program Overview: Program Co-Chair: Jeffrey Voas, Cigital, Inc,
•Keynote Address 1: The Ruthless Pursuit of Frameworks and Patterns for
Web-Based Applications: Louis J. Blazy, Deputy Assistant Secretary, Department
of Housing and Urban Development, and Professor, Software Engineering,
University of Maryland, USA
Session 1: Pervasive & Ubiquitous Systems
Chair: Peter In,
•Mining Sequential Patterns Using Graph Search Techniques: Yin-Fu Huang and Shao-Yuan Lin,
•A
Middleware Service for Secure Group Communication in
•
Session 2: Panel: Homeland
Security’s Cyber Component: A Survey of Legal Issues
Chair: Bret Michael, Naval
Panelists: Bret Michael, Naval
Thomas C. Wingfield, Potomac Institute for Policy Studies,
Steven Roberts,
Session 3: Software and System Testing (1)
Chair: T.
Y. Chen,
• BINTEST
- Binary Search-based Test Case Generation: Sami Beydeda,
•Automated Metamorphic
Testing: Arnaud Gotlieb, IRISA/INRIA, Bernard Botella, THALES Airborne
Systems,
•Smart Debugging Software
Architectural Design in SDL: W. Eric Wong, Tatiana Sugeta, and Yu Qi,
Session 4: Software Reuse & Management
Chair: Huimin Lin,
•Lessons Learned from
Software Engineering Multi-Agent Systems: David C. Kung, Hitesh Bhambhani, Sheila Nwokoro, Wesam Okasha, Ravindra
Kambalakatta, and Praveen Sankuratri, University of Texas at Arlington, USA
•Application of Tightly
Coupled Engineering Team for Development of Test Automation Software – A real
world Experience: Nader Kameli, Abraham Eapen,
Ajay Pandey, Corey Miklos,
Francoise Boudigou, Imelda Sutedjo,
Manoj Paul, Vivek Vijay,
and Wesley McDermott, Guidant Corporation,
•A Cooperative Framework for
Inter-Organizational Workflow System: Shung-Bin Yan and Feng-Jian
Wang,
Session
5: Middleware Systems
Chair:
Peter Henderson,
•Context Aware Deployment
for
•Policy-based Separation of
Concerns for Dynamic Code Mobility Management: Rebecca Montanari, Universita di Bologna, Cesare Stefanelli, Universita di Ferrara, and Gianluca Tonti, Universita di Bologna, Italy
•Semantic-based Approach to Streaming XML Contents using Xstream:
Eugene Y.C. Wong,
Alvin T.S. Chan, and Hong-Va Leong,
Session 6: Trustworthy
Software Systems
Chair: Karama Kanoun,
•Automating Checking of
Models built using a Graphically Based Formal Modelling Language: Robert John Walters,
•Techniques and Tools for Automated Safety Analysis & Decision Support for
Redundancy Allocation in Automotive Systems: Yiannis Papadopoulos, University of Hull,
UK, Christian Grante, Volvo Cars, Sweden
•Design and Implementation of a Cache-Conscious Index Manager for the Tachyon, a Main-Memory DBMS: Sang-Wook Kim and Kyung-Tae Lee,
Panel Session 2: Software
Testing
Organizer: W.T. Tsai,
Panelists: Ramesh Bharadwaj,
Navel Research
David Kung,
Raymond
Paul, Department of
Session 7: Panel: Software
Testing
Organizer: W.T. Tsai,
Panelists: Ramesh Bharadwaj,
Navel Research
David Kung,
Raymond Paul, Department of
T. H. Tse, The
Session 8: Software
Process Management
Chair:
David Card, Software Productivity
•Towards Dynamic Process
with Variable Structure by Reflection: Shaohua Liu, Jun Wei,
and Wei Xu, The
Chinese
•Current Trends in the
Adoption of the CMMI Product Suite: David Zubrow, SEI,
•A CC-based Security
Engineering Process Evaluation Model: Jongsook Lee, Jieun Lee, Seunghee
Lee, and Byoungju Choi ,
Session 9:
Chair: Kinji Mori, Tokyo Institute of
•An Object-Passing Model for
Parallel Programming: Jameela Al-Jaroodi and Nader Mohamed,
•Conceptual Modelling of
•Data Placement and Query
Processing Based on RPE Parallelisms: Yaxin Yu, Gang
Wu, Junan Hu, and
Session 10: Information Security
Chair: Ramesh Bharadwaj, Navel Research
• A Protection Environment for
Administrators of Windows 2000/XP Against Malicious
Program Attacks: Adrian Spalka, Marcel Winandy, and Hanno Langweg,
•A Security Characterisation
Framework for Trustworthy Component Based Software Systems: Khaled M. Khan,
•Exploiting
Self-Modification Mechanism for Program Protection: Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, and Ken-ichi Matsumoto, Nara Institute of
Science and
Session 11: Software and
System Testing (2)
Chair: Sami Beydeda,
•Tolerance of Control-Flow Testing Criteria: Sergiy A. Vilkomir, Kalpesh Kapoor, and
•Data Flow-Based Unit Testing of Aspect-Oriented Programs: Jianjun Zhao, Fukuoka Institute of
•A Strategy for Selecting
Synchronization Sequences to Test Concurrent Object-Oriented Software: Huo Yan Chen, Yu Xia Sun, Jinan
University, China and T.H. Tse, The University of Hong Kong, Hong Kong
Session 12: Panel: Global
Trends in SPI
Organizer: Stephen Chen,
Panelists: David Card, Software Productivity
Roger Fordham,
David Zubrow,
Planning
Meeting for COMPSAC2004
September
28 –
Panel: Challenges and Recent Advances
in Developing Trustworthy Software-Based Systems
Chair: Stephen S. Yau,
Panelists: Carl Landwehr,
National Science
Jeffrey Voas, Cigital,
Inc.,
Thomas Weigert, Motorola Global Software
Group,
Chair: Hans-Dieter Enrich,
•A Multi-Agent Software
Environment for Testing Web-based Applications: Qingning Huo, Hong Zhu, and Sue Greenwood, Oxford Brookes University, UK
•Mediating Electronic Meetings: Jia Zhang, infiNET Solutions, Carl K. Chang,
•Scalable Multilateral
Communication Technique for Large-Scale Information Systems:
Khaled Ragab, Takanori Ono, Naohiro Kaji, and Kinji Mori, Tokyo Institute of
Session 14: Software Architecture
& Framework
Chair: Jeff Lei,
•Runtime Software Architecture
Based Software
Online Evolution: Qianxiang Wang, Gang Huang, Junrong Shen, Hong Mei,
and Fuqing Yang, Peking University, China
•Proactive Views on Concrete
Aspects: A Pattern Documentation Approach for
Software Evolution: T.H. Ng and S.C. Cheung,
• The XIS Generative
Programming Techniques: Alberto Rodrigues da Silva, Instituto SuperiorTecnico /
Session 15: Requirements Engineering
Chair: Hongji Yang, De Montfort
University,
•A Feature-Oriented Approach
to Modeling and Reusing Requirements of Software
Product Lines: Hong Mei, Wei Zhang, and Fang Gu,
•A Synergistic Interweaving
of Formal and Informal Methods: W.L. Yeung, Lingnan
University, Karl R.P.H. Leung, Hong Kong Institute of Vocational Education,
Hong Kong
•Mockup-Driven Fast-Prototyping
for Web Requirements
Engineering: Jia Zhang, infiNET Solutions, Carl K. Chang, Iowa State
University, Jen-Yao
Chung, IBM Watson Research, USA
Session 16: Panel: Case
Studies in Systems/Software Engineering
Chair: Louis Blazy, Department of Housing and
Urban Development and
Panelists: Jeanne Behnke,
Caroline
M. Birog, American Chemical
Robert T. McCann, Lockheed Matin Management
& Data Systems,
Session 17: Internet & Web-based Systems
Chair: Kendra Cooper,
•Integrating Heterogeneous
Web Services with WebXcript: Dickson K. W. Chiu, Danny Kok, and Alex K.C. Lee,
•A Probabilistic Model for
Intelligent Web Crawler: Ke Hu and Wing Shing Wong, Chinese
•Autonomous Decentralized Database System Reconstruction Technology
through
Chair:
T.
H. Tse, The
•Incremental Transformation of Procedural Systems to Object Oriented
Platforms: Ying Zou and Kostas Kontogiannis,
•Migrating Web Frameworks Using
Water Transformations: Ahmed E. Hassan and Richard C. Holt,
•Bridging Legacy Systems to
Model Driven Architecture: Bing Qiao and Hongji
Yang, De Montfort University,
Session 19: Quality Management
Chair: Hong Zhu,
• Transforming
quantities into qualities in assessment of software systems: Gerardo Canfora, Luigi Cerulo,
and Luigi Troiano,
• Information
Quality Assessment of a Yellow-Pages Location-Based
Service: Artem Katasonov and Markku Sakkinen,
•VDM over PSP:A Pilot Course for VDM
Beginners to Confirm its Suitability for Their Development: Hisayuki Suzumori , Haruhiko Kaiya, and Kenji Kaijiri, Shinshu University,
Japan
Session 20: Software Reengineering (2)
Chair: Feng-Jian
Wang,
•A Reengineering Process for
Migrating from an Object-Oriented Legacy System to a
Component-Based System: Eunjoo Lee, Seoul National University, Woochang Shin, Seokyeong University, Byungjeong
Lee, University of Seoul, and Chisu Wu, Seoul National University, Korea
•Determining
Granularity of Independent Tasks for Reengineering a Legacy System into an OO
System: Richard Millham, Martin Ward,
and Hongji Yang, De Montfort Univ.,
•Recovering a Business
Object Model from Web Applications: Giuseppe Antonio Di Lucca,
Session
21: Measurement & Metrics
Chair: Nader Kameli,
Guidant Corp.,
•Testing the Suitability of Markov Chains as Web Usage Models: Zhao Li and Jeff Tian, Southern
•Integrating Practical Software Measurement and the Balanced Scorecard: David Card, Software Productivity
•A Cut-Based Algorithm for Reliability Analysis of
Terminal-Pair Network Using OBDD: Yung-Ruei Chang, Hung-Yau
Lin, and Sy-Yen Kuo,
Chair: Jeffrey Voas, Cigital, Inc.,
Keynote Address 2: The Pursuit of Trust: Finding a Way Through the High Assurance Landscape: Robin Bloomfield, Professor,
Adelard and
Chair: Rida
Bazzi,
•IBHIS: Integration Broker
for Heterogeneous Information Sources: Ioannis Kotsiopoulos and John Keane, UMIST, Mark Turner, University of Keele, Paul Layzell, UMIST, Fujun Zhu,
University of Durham, UK
•Protecting Distributed
Software Upgrades that Involve Message-Passing Interface Changes: Ann T. Tai and Kam S. Tso, IA Tech, Inc, and William Sanders,
•Implementation of Nonstop Software Update for Client-Server Applications: Wen-Kang Wei, Kuo-Feng
Ssu, and Hewijin Christine Jiau,
Session 23: Component-Based Software
Engineering
Chair: I-Ling Yen,
• A Test-Driven Component
Development Framework based on the CORBA Component Model: Egon Teiniker, Stefan Mitterdorfer, Graz University of
Technology and Salomon Automation GmbH, Leif Morgan Johnson, Salomon Automation
GmbH, Christian Kreiner, Graz University of
Technology and Salomon Automation GmbH, Zsolt Kovacs, Salomon Automation GmbH, and Reinhold Weiss, Graz University of Technology, Austria
• Information Use in
CBSE Design: Stephen Owen, David Budgen, and
•Variable Strength Interaction Testing of Components: Myra B. Cohen, Peter B. Gibbons, and Warwick B. Mugridge,
University of Auckland, New Zealand, Charles J. Colbourn, and James S. Collofello, Arizona State
University, USA
•Just What Could Possibly Go Wrong in B2B Integration?: Dean Kuo,
Alan Fekete, Paul Greenfield, Julian Jang, and Doug Palmer, CSIRO,
Session 24: Network Systems
Chair: Carl Chang,
•An Integrated Approach to Scatternet Traffic Management in Bluetooth Ad Hoc Networks: Liza Lai-Yee Shek and Yu-Kwong
Kwok,
•Distributed Garbage Collection by Timeouts and Backward Inquiry: Sung-Wook Ryu, Veritas Software Co., USA, Eul Gyu Im, National Security Research Inst.,
•Facilitating Secure Ad hoc
Service Discovery in Public Environments: Feng Zhu, Matt Mutka,
Session 25: Object-Oriented Development (1)
Chair: Mei Hong,
•Precise Specification to
Compound Patterns with ExLePUS: Jeffrey K. H. Mak, Clifford S.T.Choy, and Daniel P.K. Lun, The Hong Kong Polytechnic University, Hong Kong
•Scenario Architecture - A
Methodology to Build a Global View of OO Software System: Yiausyu Tsai and
Hewijin Christine Jiau,
•A Role-Based Metamodeling Approach to Specifying Design Patterns: Dae-Kyoo Kim, Robert France, Sudipto Ghosh, and Eunjee Song,
Session 26:
Chair: Dick B. Simmons, Texas A & M University, USA
•A Toolkit for Developing
Web-based Information Systems: Case Studies: Thierry Bodhuin, PST and
•Rapid Verification of
Embedded Systems Using Patterns: W.T. Tsai, Arizona State University, F. Zhu, University of Minnesota, R. Paul, Department of Defense, L. Yu, C. Fan, and D. Wang, Arizona State
University, USA
•Software
Documentation-Driven Manufacturing: Luqi, Xianzhong Liang,
Lin Zhang, and
Session 27: Object Oriented
Development (2)
Chair: William
Chu,
•
•A Flexible Framework for Replication in Distributed Systems: Eul Gyu Im, National Security Research Institute,
•A Graph Grammar Approach to
Software Architecture Verification and Transformation: Jun Kong, Kang Zhang, Jing Dong, and Guanglei Song, The
Session 28: System Reliability (1)
Chair: Kai-Yuan Cai,
•Sensitivity Analysis of
Software Reliability for Component-Based Software Applications: Jung-Hua
Lo, Chin-Yu Huang, and Sy-Yen Kuo, National Taiwan
University, Taiwan, Michael R. Lyu, The Chinese University of Hong Kong, Hong Kong
•Effects of Introducing
Survival Behaviours into Automated Negotiators: Peter Henderson, Stephen Crouch, Robert John Walters, and Qinglai Ni,
•An Architecture of Wireless Web and
Dialogue System Convergence for Multimodal Service Interaction Over Converged
Networks: Feng Liu, J. Jenny Li, Xueshan
Shan, and Wu Chou, Avaya Labs Research, USA
Chair: Michael R. Lyu, The
•Integrating Runtime Assertions With Dynamic Types:
Structuring Derivation From An Incomputable Specification: Paul A. Bailes and Colin J.M.
Kemp, The
•Deductive Schedulability Verification Methodology of Real-Time
Software using both Refinement Verification and Hybrid Automata: Satoshi
Yamane,
•An Efficient Defect
Estimation Method for Software Defect Curves: Chenggang Bai and Kai-Yuan Cai, Beijing University of
Aeronautics and Astronautics, China, and T.Y. Chen, Swinburne University of Technology, Australia
COMPSAC 2003 WORKSHOPS |
Workshop 1: Workshop
on Architectures for Complex Application
Integration (WACAI2003)
Organiser
and Chair: Piyush Maheshwari, The
•An Experience of Applying Architecture-based Approach to Build a
Component-based Requirements Management Toolset: Muhammad Ali Babar, The University of New South Wales,
§
Architecture: Piyush Maheshwari,
The
§
Flexible Fault Tolerance in Configurable Middleware for Embedded
Systems: Kevin
Dorow,
§
Ad Hoc Software Interfacing:
Middleware Is Overkill: Arthur A. Reyes, Jose R.
Espino, Vijai Mohan and
Monica
Nadkar,
§
Next Generation Application Integration: Challenges and New
Approach:
Ian Gorton, Pacific National
Workshop 2: Web &
Security Informatics Workshop
Organiser
and Chair: Tsau Young
Lin,
•Workshop Chair’s Introduction: Tsau Young
Lin,
•Intelligent Web Topics
Search Using Early Detection and Data Analysis: Ching-Cheng Lee and
•Discovering Cyber
Communities from WWW: Xiaohua Hu,
•Internet-Based Decision
Support: toward E-hospital: Shusaku Tsumoto,
Shoji Hirano and Eisuke Hanada,
•A Framework for
Web-based Research Support Systems: Yiyu Yao,
•Intelligent
•Managing Security Policy in
Large Distributed Web Services Environment: Symon Chang, and Qiming Chen, Commerce
One Inc.,
•Information Flow
in E-Government: Tsau Young Lin,
•Measured Responses to
Cyber Attacks using Schmitt Analysis: A Case Study of Attack Scenarios for
Software-Intensive Mass Transportation Systems: J. B. Michael and T. C. Wingfield,
•A Methodology for Hiding
Knowledge in XML Document Collections: Vijay V. Raghavan, University of Louisiana Lafayette, Tom Johnsten, Robert B. Sweeney, University of South
Alabama, USA
•Security
for the Semantic Web: Bhavani
Thuraisingham, The National Science
•Situation-Aware
Personalized Information Retrieval for
Workshop 3: Web Based
Systems and Applications (WEBSA2003)
Organiser
and Chair: Baowen Xu,
•A Multiple-Tier Model Manipulation Architecture on Enterprise
Decision Making: Zhihong Liang, Shaoyun Li, Hongwei Kang, Qing Duan, Hua Zhou, and Hongji Yang, De Montfort
University, UK
•Regression Testing for Web Applications Based On Slicing: Lei Xu and Baowen
Xu,
•A Supervised
Visual Wrapper Generator for Web-Data Extraction: Xiaofeng Meng, Haiyan Wang, Chen Li, Huizhong Kou, People’s
•A Dynamic Information Retrieval System for the Web: Xiangzhu Gao and San Murugesan, Southern
•A Pattern Language Model for Framework Development: Liu Wudong, He Keqing,
Ying Shi, Xu Hui, Jing Yixing, Wuhan University, China
•Some Domain Patterns in Web Application Framework: Liu Chao, He Keqing,
Liu Jie, Ying Shi, Fujitsu Limited,
•Web-Based Support for Managing Large Collections of Software
Artefacts: Cornelia Boldyreff, Phyo Kyaw, Janet Lavery, David Nutter,
and Stephen Rank, University of Durham, UK
•MDA-based Development of E-Learning System: Hong Wang and Dong Zhang,
•PeAgent
– A Mobile Agent System to Support Secure Internet and Web Applications: Qingkai Ma, Wei Hao, Wei
Li, Manghui Tu, I-Ling Yen,
•Toward
an Easy Programming Environment
for Implementing
R. Sunderraman, and V. Madisetti,
•A Hierarchical Strategy for Testing
Web-Based Applications and Ensuring Their
Reliability: Jeff Tian, Li Ma, Zhao Li and A. Gunes Koru, Southern Methodist