Hong Kong
FINAL PROGRAM
MONDAY, 27TH SEPTEMBER 2004
6:00 - 7:30 WELCOME RECEPTION
  Crystal Rooms 2 & 3,  Holiday Inn Golden Mile (Conference Hotel)
TUESDAY, 28TH SEPTEMBER 2004
9:00 -10:00 OPENING SESSION
    Welcome and Remarks
General Chair: Paul YS Cheung, The University of Hong Kong, Hong Kong

Greetings and Remarks
Steering Committee Chair: Stephen S. Yau, Arizona State University, USA

Remarks and Award Presentations
IEEE Computer Society President: Carl Chang, Iowa State University, USA  

Program Overview
Program co-Chairs: Eric Wong, University of Texas at Dallas, USA
                               Karama Kanoun, LAAS-CNRS, France

Keynote Address
Positioning Hong Kong as a Trustworthy Partner in Software Development
Francis Ho, Permanent Secretary for Commerce, Industry and Technology, The Government of the Hong Kong SAR   
10:00 - 10:30 COFFEE BREAK
10:30 - 12:00 SESSION 1: COMPONENT-BASED SOFTWARE I
    Session Chair: T. H. Tse, The University of Hong Kong, Hong Kong

Distributed Component-Based Software Development: An Incremental Approach
Eduardo Santana de Almeida, Alexandre Alvaro, Federal University of Pernambuco, Brazil, Daniel Lucredio, Antonio Francisco do Prado, Luis Carlos Trevelin, Federal University of São Carlos, Brazil

TiViPE - Tino's Visual Programming Environment
Tino Lourens, Honda Research Institute Japan Co. Ltd., Japan

Codifying a Service Architectural Style
David Budgen, Pearl Brereton, and Mark Turner, Keele Univeristy, UK

Formal Support for Development of JavaBeans Component Systems
Bhim Prasad Upadhyaya, and Zhiming Liu, The United Nations University, Macau
10:30 - 12:00 SESSION 2: PROCESS MANAGEMENT I
  Session Chair: David Card, Software Productivity Consortium, USA

Assuring Assessment Success
Kevin McKeever, Eric Peterson, and Jonathan Morrison, Motorola, Australia

Enacting Conformance Assessment of Business Processeses - an ebXML based Approach in E-ADOME
Zhe Shan, Qing Li, City University of Hong Kong, Hong Kong, and Kamalakar Karlapalem, International Institute of Information Technology, India

Continuous Productivity Assessment and Effort Prediction Based on Bayesian Analysis
Seok Jun Yun and Dick B. Simmons, Texas A&M University, USA

Introducing Agility: A Case Study of Situational Method Engineering Using the OPEN Process Framework
M.K. Serour and B. Henderson-Sellers, University of Technology, Australia
10:30 - 12:00 SESSION 3: SOFTWARE TESTING I
  Session Chair: T. Y. Chen, Swinburne University of Technology, Australia

An Edge Marking Technique for Dynamic Slicing of Object-Oriented Programs
D. P. Mohapatra, R. Mall, and R. Kumar, Indian Institute of Technology Kharagpur, India

Modular Monadic Program Slicing
Baowen Xu, Yingzhou Zhang, Xiaoyu Zhou, and Liang Shi, Southeast University, China

Using Artificial Life Techniques to Generate Test Cases for Combinatorial Testing
Toshiaki Shiba, Tatsuhiro Tsuchiya, and Tohru Kikuno, Osaka University, Japan

A Revisit of Adaptive Random Testing by Restriction
Kwok Ping Chan, The University of Hong Kong, Hong Kong,  Tsong Yueh Chen, Fei-Ching Kuo, Swinburne University of Technology, Australia and Dave Towey, The University of Hong Kong, Hong Kong
10:30 - 12:00 SESSION 4: PANEL ON RISK MANAGEMENT AND DEPENDABILITY -- WHAT ARE THE KEY FACTORS?
 
Fevzi Belli (Moderator)      University of Paderborn, Germany
Jean-Claude Laprie    LAAS-CNRS, France
Lucas Chi Kwong Hui  The University of Hong Kong, Hong Kong
Hans-Dieter Kochs   University of Duisburg Essen, Germany
12:00 - 1:30 LUNCH
1:30 - 3:00 SESSION 5: FORMAL METHODS I
  Session Chair: Allen Nikora, California Institute of Technology, USA

Implementing Hierarchical Features in a Graphically Based Formal Modelling Language
Peter Henderson, Robert John Walters, and Stephen Crouch, University of Southampton, UK
 
Situated Modelling of Scenarios
Francisco A. C. Pinheiro, Universidade de Brasilia, Brazil

PFGASAT-a Genetic SAT Solver Combining Partitioning and Fuzzy Strategies
Jianzhou Zhao, Jinian Bian, and Weimin Wu, Tsinghua University, China

Consistency Check in Modeling Multi-Agent Systems
Lijun Shan, National Univ. of Defence Technology, China and Hong Zhu, Oxford Brookes University, UK

1:30 - 3:00 SESSION 6: MIDDLEWARE
  Session Chair: Dongman Lee, Information and Communications University, Korea

Stream Composition for Highly Adaptive and Reconfigurable Mobile Middleware
Yongjie Zheng and Alvin T. S. Chan,  The Hong Kong Polytechnic University, Hong Kong  

SOWAC: A Service-Oriented Workflow Access Control Model
Xu Wei, Wei Jun, Liu Yu, and Li Jing, The Chinese Academy of Sciences, China

Towards Autonomic Computing Middleware via Reflection
Gang Huang, Tiancheng Liu, and Hong Mei, Peking University, China

A Semantic-Aware Publish/Subscribe System with RDF Patterns
Jinling Wang, Beihong Jin, Jing Li, and Danhua Shao, The Chinese Academy of Sciences, China
1:30 - 3:00 SESSION 7: REAL-TIME SYSTEMS
  Session Chair: Wei-tek Tsai, Arizona State University, USA

Worst-Case Response Time Analysis for OSEK/VDX Compliant Real-Time Distributed Control Systems
Wang Lei and Wu Zhaohui, Zhejiang University, China

Dynamic Real-Time Scheduling for Multi-Processor Tasks Using Genetic Algorithm
Shu-Chen Cheng and Yueh-Min Huang, National Cheng Kung University, Taiwan

Real-Time Strategy and Practice in Service Grid
Hai Jin, Hanhua Chen, Jian Chen, Ping Kuang, Li Qi, and  Deqing Zou, Huazhong University of Science and Technology, China

A New Scheduling Algorithm and a Compensation Strategy for Imprecise Computation
Albert M. K. Cheng and Rong Wang, University of Houston, USA
1:30 - 3:00 SESSION 8:  PANEL ON COMPUTER CURRICULA FOR SOFTWARE ENGINEERING
 
Barrie Thompson  (Moderator) University of Sunderland, UK    
David Budgen    Keele University, UK
Maarten Boasson   University of Amsterdam, Netherlands
Dick Simmons     Texas A&M University, USA
T. H. Tse     The University of Hong Kong, Hong Kong
3:00 - 3:30 COFFEE BREAK
3:30 - 5:00 SESSION 9:  SOFTWARE RELIABILITY
  Session Chair: Fevzi Belli, University of Paderborn, Germany

Application of Maximum Entropy Principle to Software Failure Prediction
Wu Ji, Yang Hai-yan, Jia Xiao-xia, Liu Chang, Liu Chao, and Jin Mao-zhong, Computer School of BeiHang University, China

Software Reliability Growth Models Incorporating Fault Dependency with Various Debugging Time Lags
Chin-Yu Huang, Chu-Ti Lin, National Tsing Hua University, Taiwan, Sy-Yen Kuo, National Taiwan University, Taiwan,  and Michael R. Lyu, The Chinese University of Hong Kong, Hong Kong

The Effects of Fault Counting Methods on Fault Model Quality
Allen P. Nikora, California Institute of Technology, USA, and John C. Munson, Cylant, Inc., USA

Portable Faultloads Based on Operator Faults for DBMS Dependability Benchmarking
Marco Vieira, Polytechnic Institute of Coimbra, Portugal, and Henrique Madeira, University of Coimbra, Portugal
3:30 - 5:00 SESSION 10:  SECURITY I
  Session Chair: Maarten Boasson, University of Amsterdam, The Netherlands

A Multiple-Class SLIPPER System for Intrusion Detection
Zhenwei Yu and Jeffrey Tsai, University of Illinois at Chicago, USA

A Secure Mobile Agent System Model based on Extended Elementary Object Net
Lu Ma, Jeffrey Tsai, and Tad Murata, University of Illinois at Chicago, USA
 
A Secure and Fully Private Borda Voting Protocol with Universal Verifiability
Changjie Wang and Ho-fung Leung, The Chinese University of Hong Kong, Hong Kong

Enhanced Security Models for Operating Systems: A Cryptographic Approach
Christian Payne, Murdoch University,  Australia
3:30 - 5:00 SESSION 11: PANEL ON RESEARCH DIRECTIONS IN SOFTWARE PROCESS IMPROVEMENT
 
William Chu (Moderator) TungHai University, Taiwan
Dave Card                  Software Productivity Consortium, USA
Pankaj Jalote  Indian Institute of Technology and Microsoft, India
Miguel Serrano  Centro de Investigaciones en Matematica, Mexico
K.P. Chow The University of Hong Kong, Hong Kong
3:30 - 5:00 SESSION 12:  PLANNING MEETING FOR COMPSAC 2005
 
Steve Yau (Moderator) Arizona State University, USA

WEDNESDAY, 29TH SEPTEMBER 2004
9:00 -10:00 KEYNOTE ADDRESS II
  Dependable Computing: Concepts, Challenges, Directions
Jean-Claude Laprie, LAAS-CNRS, France 
10:00 - 10:30 COFFEE BREAK
10:30 - 12:00 SESSION 13: COMPONENT-BASED SOFTWARE II
    Session Chair: Carl Chang, Iowa State University, USA

Intelligent Component Selection
Valerie Maxville, Edith Cowan University,  Australia, Jocelyn Armarego, Murdoch University, Australia, and Chiou Peng Lam, Edith Cowan University, Australia

Component-Wise Mapping of Media-Needs to a Distributed Presentation Environment
Loe Feijs and Jun Hu, Eindhoven University of Technology, The Netherlands

Component Failure Mitigation According to Failure Type
Fan Ye and Tim Kelly, University of York, UK

Modular Design of Concurrent Systems
Cristina Cerschi Seceleanu and Tiberiu Seceleanu, Turku Centre for Computer Science, Finland

10:30 - 12:00 SESSION 14: PROCESS MANAGEMENT II
    Session Chair: F. T. Chan, The University of Hong Kong, Hong Kong

Software Effort Prediction Models Using Maximum Likelihood Methods Require Multivariate Normality of the Software Metrics Data Sample: Can Such a Sample Be Made Multivariate Normal?
Victor K.Y. Chan, City University of Hong Kong and Infotech Services (Hong Kong) Limited, Hong Kong

POP beyond SODA, Reaching the New Horizon of Service Cooperation
Shaohua Liu, Dan Ye, Jun Wei, Gang Xu, and Yonglin Xia, The Chinese Academy of Sciences, China

FC method: A Practical Approach to Improve Quality and Efficiency of Software Processes for Embedded System Revision
Kazuma Aizawa, Haruhiko Kaiya, and Kenji Kaijiri, Shinshu University, Japan  

A Complete Textual Merging Algorithm for Software Configuration Management Systems
Haifeng Shen, Nanyang Technological University, Singapore, and Chengzheng Sun, Griffith University, Australia
10:30 - 12:00 SESSION 15: SOFTWARE TESTING II
  Session Chair: Y. T. Yu, City University of Hong Kong, Hong Kong

Test Criteria for Context-Free Grammars
Hu Li, Maozhong Jin, Chao Liu, and Zhongyi Gao, Beihang University, China

Mutation-Based Testing Criteria for Timeliness
Robert Nilsson, University of Sk¨ovde, Sweden, Jeff Offutt, George Mason University, USA, and Sten F. Andler, University of Sk¨ovde, Sweden

Reachability Testing of Semaphore-based Programs
Yu Lei, The University of Texas at Arlington, USA,  and Richard Carver, George Mason University, USA

On the Testing of Particular Input Conditions
Eric Y. K. Chan, City University of Hong Kong, Hong Kong, P.L. Poon, The Hong Kong Polytechnic University, Hong Kong, and Y. T. Yu, City University of Hong Kong, Hong Kong
10:30 - 12:00 SESSION 16: PANEL ON COMPUTER SUPPORTED COOPERATIVE WORK IN SOFTWARE ENGINEERING
 
Jenny Li  (Moderator) Avaya Research Labs, USA
Stephen Chen    Motorola, USA
Tangqiu Li    Xiamen University, China
Aditya Mathyr Purdue University, USA
Karama Kanoun LAAS-CNRS, France
Zongkai Lin    The Chinese Academy of Sciences, China
12:00 - 1:30 LUNCH
1:30 - 3:00 SESSION 17: FORMAL METHODS II
  Session Chair: Humin Lin, Chinese Academy of Science, China

Pi-Mu-Logic and Model Checking Algorithm
Taolue Chen, Tingting Han, and Jian Lu, Nanjing University, China

Generating Regression Tests via Model Checking
Lihua Xu, Marcio Dias, and Debra Richardson, University of California at Irvine, USA

Automated Consistency and Completeness Checking of Testing Models for Interactive Systems
Amit Paradkar and Tim Klinger, IBM T.J. Watson Research Center, USA
 
Design of a CIL Connector to SPIN
Li Yongjian and Xue Rui, The Chinese Academy of Sciences, China

1:30 - 3:00 SESSION 18: SOFTWARE ARCHITECTURE
  Session Chair: Jeff Offutt, George Mason University, USA

A Taxonomy and Hierarchy of Variability Dependencies in Product Family Engineering
M. Jaring and J. Bosch, University of Groningen, The Netherlands

A Development Framework for Rapid Meta-heuristics Hybridization
Hoong Chuin Lau, Min Kwang Lim, Wee Chong Wan, and Steven Halim, National University of Singapore, Singapore

Safety Tactics for Software Architecture Design
Weihang Wu and Tim Kelly, University of York, UK

A Uniform Meta-Model for Mediating Formal Electronic Conferences
Jia Zhang, Northern Illinois University, USA, Carl K. Chang, Iowa State University, USA, and Jeff Voas, Cigital Inc., USA
1:30 - 3:00 SESSION 19: SECURITY II
  Session Chair: Andreas Ulrich, Siemens, Germany

Publicly Verifiable Auctions with Minimal Leakage
Qianhong Wu, Changjie Wang, Xiaofeng Chen, and Yumin Wang, Xidian University, China

A Hybrid Security Framework of Mobile Code
Long Qin, Si Duanfeng, Han Xinhui, and Pan Aimin, Peking University, China

A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy
Tzer-Shyong Chen, Jen-Yan Huang,  Tung-Hai University, Taiwan, and Yu-Fang Chung, National Taiwan University, Taiwan
1:30 - 3:00 SESSION 20: PANEL ON EMBEDDED SOFTWARE SYSTEMS
 
Michael Kay (Moderator) Motorola Global Software Group, UK
Dongman Lee Information and Communications University, Korea
Stephen S. Yau Arizona State University, USA
Bhaskar Harita Motorola Global Software Group, India
3:00 - 3:30 COFFEE BREAK
3:30 - 5:00 SESSION 21: REQUIREMENT & DESIGN
    Session Chair: Michael Lyu, The Chinese University of Hong Kong, Hong Kong

Priority Assessment of Software Requirements from Multiple Perspectives
Xiaoqing (Frank) Liu, Chandra Sekhar Veera, Yan Sun, University of Missouri ?Rolla, USA, Kunio Noguchi, and Yuji Kyoya, Software EngineeringCenter, Toshiba Corporation, Japan

An Approach to Feature Based Modelling by Dependency Alignment
Jungyoon Kim and Doo Hwan Bae, Korea Advanced Institute of Science and Technology, Korea

Hiding Sensitive Patterns in Association Rules Mining
Guanling Lee, Chien-Yu Chang, and Arbee L.P Chen, National Dong Hwa University, Taiwan

Efficient Partial Multiple Periodic Patterns Mining without Redundant Rules
Wenpo Yang and Guanling Lee, National Dong Hua University, Taiwan

3:30 - 5:00 SESSION 22: PERVASIVE/UBIQUITOUS COMPUTING
    Session Chair: Stephen Chen, Motorola, USA

Materializing Ubiquitous Computing Environments
Kimio Kuramitsu, Kogakuin University, Japan, and  Hideyuki Tokuda, Keio University, Japan

Context-based Access Control for Ubiquitous Service Provisioning
Antonio Corradi, Rebecca Montanari,  and Daniela Tibaldi , Universit?di Bologna, Italy

Development and Runtime Supports for Situation-Aware Application Software in Ubiquitous Computing Environments
Stephen S. Yau, Dazhi Huang, Haishan Gong, and Siddharth Seth, Arizona State University, USA

Testing Context-Sensitive Middleware-based Software Applications
T.H. Tse, The University of Hong Kong, Hong Kong, Stephen S. Yau, Arizona State University, USA, W.K. Chan, Heng Lu, The University of Hong Kong, Hong Kong, and T.Y. Chen, Swinburne University of Technology, Australia
3:30 - 5:00 SESSION 23:  INTERNET WEB SYSTEM
  Session Chair: Shing-Chi Cheung, Hong Kong University of Science and Technology, Hong Kong

AdapTIVE: An Intelligent Virtual Environment and its Application in E-Commerce
Cássia Trojahn dos Santos and Fernando Santos Osório, Unisinos University, Brazil

Identifying and Breaking Necessary Constraints to Web-Based Metacomputing
Wei Li, Daniel Pun, Central Queensland University, Australia, and Minjie Zhang, University of Wollongong, Australia

Multi-Dimension Browse
Tsung-Yuan Liu, National Chiao Tung University, Taiwan, and Yuh-Jzer Joung, National Taiwan University, Taiwan

Coordinating Web Services Using Channel Based Communication
Theophilos Lemniotes, George A. Papadopoulos, University of Cyprus, Cyprus, and Farhad Arbab, CWI, The Netherlands

Supporting Concept Assignment in the Comprehension of Web Applications
Giuseppe Antonio Di Lucca, University of Sannio, Italy, Anna Rita Fasolino, Porfirio Tramontana, and Ugo De Carlini, Universit?di Napoli Federico II, Italy

3:30 - 5:00 SESSION 24:  FAST ABSTRACT I -- SOFTWARE DESIGN AND ANALYSIS
  Session Chair: Weili Wu, University of Texas at Dallas, USA

Model Oriented Software Architecture
Hassan Reza and Emanuel Grant, University of North Dakota, USA

A Grid Services-Based Engineering Computation Architecture
Changqin Huang, Deren Chen, Guiyi Wei, and Hualiang Hu, Zhejiang University, China

A Generic OO Architecture Language for Semantics Analysis of OO Specification
Franck Xia, University of Missouri-Rolla, USA

An XML-based Framework for Language Neutral Program Representation and Generic Analysis
Raihan Al-Ekram and Kostas Kontogiannis, University of Waterloo, Canada

Quantitative Analysis of Symbolic Execution
Jian Zhang, The Chinese Academy of Sciences, China

Adaptive Time-Critical Resource Management Using Time/Utility Functions: Past, Present, and Future
Peng Li, Binoy Ravindran, Virginia Tech, USA, and E. Douglas Jensen, The MITRE Corporation, USA

Addressing: the Root of All Programming Evils
Conrad Mueller, The University of the Witwatersrand, South Africa
6:00 - CONFERENCE DINNER BANQUET
  Peking Garden Restaurant at the Star House, Tsimshatsui, Kowloon

THURSDAY, 30TH SEPTEMBER 2004
9:00 -10:00 KEYNOTE ADDRTESS III
  Formal Methods for Trustworthy Mobile Computing
Huimin Lin, The Chinese Academy of Sciences, China  
10:00 - 10:30 COFFEE BREAK
10:30 - 12:00 SESSION 25: SOFTWARE RE-ENGINEERING
  Session Chair: Giuseppe Di Lucca, University of Sannio, Itlay

JART: Grammar-Based Approach to Refactoring
Tomaz Kosar, Marjan Mernik, and Viljem Zumer, University of Maribor, Slovenia

Extraction and Visualization of Architectural Structure Based on Cross References among Object Files
Qiming Teng, Xiangqun Chen, Xia Zhao, Wei Zhu, and Lu Zhang, Peking University, China

Agentification for Web Service
F Chen, De Montfort University, UK, H Guo, Dalian University of Technology, China, and H Yang, De Montfort University, UK

How does agility ensure quality?
Ming Huo, June Verner, Liming Zhu, and Muhammed Ali Babar, National ICT Australia Ltd. and University of New South Wales, Australia
10:30 - 12:00 SESSION 26: QUALITY ASSURANCE
    Session Chair: Bojan Cukic, West Virginia University, USA

Proof-Guided Testing: an Experimental Study
G. Lussier, H. Waeselynck, and K. Guennoun, LAAS-CNRS, France

An Approach for Software Reliability Model Selection
Ch. Ali Asad, Muhammad Irfan Ullah, and Muhammad Jaffar-Ur-Rahman, Mohammad Ali Jinnah University,Pakistan

An Integrated Software Development Environment with XML Internal Representation
Chih-Hung Chang, Feng Chia University, Taiwan, William C. Chu, Tunghai University, Taiwan, Chih-Wei Lu, Hsiuping Institute of Technology, Taiwan, and Dong Lin Yang, Feng Chia University, Taiwan

An Approach to Generate the Thin-threads from the UML Diagrams
Xiaoqing Bai, Guangxi University, China, C. Peng Lam, and  Huaizhong Li, Edith Cowan University, Australia
10:30 - 12:00 SESSION 27: NETWORK, DISTRIBUTED, AND EMBEDDED SYSTEM
  Session Chair: Dick Simmons, Texas A&M University, USA

Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed Computing
W. T. Tsai, Weiwei Song, Arizona State University, USA, Ray Paul, Department of Defense, USA, Zhibin Cao, and Hai Huang, Arizona State University, USA

A New Receiver-based Layered-Rate Estimator Algorithm for Fair Bandwidth Distribution
Kon Papazis, Naveen K Chilamkurti, and Ben Soh, La Trobe University, Melbourne, Australia

Study on Performance of IP-SWAN Based on Distributed NS-RAID
Baojiang Cui, Nankai University , China, Jun Liu, Tianjin University of Finance and Economics, China, Gang Wang, and Jing Liu,  Nankai University , China

A Dependable OS Kernel for Smart Sensors
Wang Lei and Wu Zhaohui, Zhejiang University, China
10:30 - 12:00 SESSION 28: FAST ABSTRACT II  -- SOFTWARE QUALITY ASSURANCE
  Session Chair: Amit Paradkar, IBM T.J.Watson Research Center, USA

Minimal Spanning Set for Coverage Testing of Interactive Systems
Christof J. Budnik and Fevzi Belli, University of Paderborn, Germany

A Neural Network Approach for Software Defect Fix Effort Estimation
Hui Zeng and David Rine, George Mason University, USA

A Change Impact Dependency Measure for Predicting the Maintainability of Source Code
Franck Xia and Praveen Srikanth, University of Missouri-Rolla, USA

Optimizing the Planning and Executing of Software Independent Verification and Validation (IV&V) in Mature Organizations
Christopher Fuhrman, Edgardo Palza, and Kim Loan Do, École de technologie supérieure, Canada.

A View-based Control Flow Metric
Stefan Gossens and Mario Dal Cin, University of Erlangen-Nuremberg, Germany

Early Robustness Analysis for Web-based Systems
Jianyun Zhou and Tor Stålhane, Norwegian University of Science and Technology, Norway

eXtreme Programming (XP) as a ‘Minimum?Software Process ?A Grounded Theory
Gerry Coleman, Dundalk Institute of Technology, Ireland

eXtreme Programming Support Tool in Distributed Environment
Satoshi Atsuta and Saeko Matsuura, Shibaura Institute of Technology, Japan

12:00 - 1:30 LUNCH
1:30 - 3:00 SESSION 29: Workshop on Geographic and Biological Data Management I
  Session Chair: Hongji Yang, De Montfort University, UK

A New Approach to Representing Continuously Moving Regions
Peiquan Jin, Lihua Yue, and Yuchang Gong, University of Science and Technology of China (USTC), China

Evaluating GML Support for Spatial Databases
Lakshmi N Sripada, Chang-Tien Lu, Virginia Tech, USA, and Weili Wu, The University of Texas at Dallas, USA

A spatial SQL Extension for Continuous Field Querying
Laurini Robert, Research Center for Images and Information Systems, INSA of Lyon, France, Luca Paolino, Monica Sebillo, Genoveffa Tortora, and Giuliana Vitiello, University of Salerno, Italy

Spatial Data Query Support in Peer-to-Peer System
Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang, University of Southern California, USA

Protein Functional Motion Query and Visualization
Xiong Liu, Hassan Karimi, Lee-Wei Yang, and Ivet Bahar, University of Pittsburgh, USA
1:30 - 3:00 SESSION 30: WORKSHOP ON SOFTWARE CYBERNETICS I
  Session Chair: Aditya Mathur, Purdue University, USA

Self-adaptive Software: Cybernetic Perspective and an Application Server Supported Framework
Junrong Shen, Qianxiang Wang, and Hong Mei, Peking University, China,

Adaptive Software Testing with Fixed-Memory Feedback
Kai-Yuan Cai, Bo Gu, Hai Hu, and Yong-Chao Li, Beihang University,China

Adaptive Random Testing with CG Constraint
F. T. Chan,  K. P. Chan, The University of Hong Kong, Hong Kong, T. Y. Chen, Swinburne University of Technology, Australia,  and S. M. Yiu, The University of Hong Kong, Hong Kong

Adaptive Control Software: Can We Guarantee Safety?
Sampath Yerramalla, Yan Liu, Edgar Fuller, Bojan Cukic, and Srikanth Gururajan, West Virginia University, USA
1:30 - 3:00 SESSION 31: Workshop on Quality Assurance and Testing of Web-Based Applications I
  Session Chair: Dave Kung, University of Texas at Arlington, USA

Web Application Bypass Testing
Jeff Offutt, Ye Wu, Xiaochen Du, and Hong Huang, George Mason University, USA

Cooperative Agent Approach to Quality Assurance and Testing Web Software
Hong Zhu, Oxford Brookes University, UK

Data Flow Analysis and Testing of Java Server Pages
Chien-Hung Liu, National Taipei University of Technology, Taiwan

WS-FIT: A Tool for Dependability Analysis of Web Services
Nik Looker, Malcolm Munro, University of Durham, UK, and Jie Xu, University of Leeds, UK
1:30 - 3:00 SESSION 32: FAST ABSTRACT III  -- SECURITY, INFORMATION RETRIEVAL AND AGENT-BASED SOFTWARE
  Session Chair: Jeff Lei, University of Texas at Arlington, USA

Towards an Authentication Middleware to Support Ubiquitous Web Access
N. Zhang, J. Chin, A. Rector, and C. Goble, The University of Manchester, Uk

An Efficient Distributed Intrusion Detection Scheme
Thomas Holz, PACE Aerospace Engineering and Information Technology GmbH, Germany

N-gram-based Detection of New Malicious Code
Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, and Ray Sweidan, Dalhousie University, Canada

A Decision-making Model for Intelligent Agent with Internal State
Shanli Hu and Haiyan Wu, Fuzhou University, China

Goal Autonomous Agent Architecture
Zhiqi Shen, Chunyan Miao, and Robert Gay, Nanyang Technological University, Singapore

An Intelligent Component Retrieval System Using Conversational CBR
Mingyang Gu and Xin Tong, Norwegian University of Science and Technology, Norway

Excalibur: A Personalized Meta Search Engine
Leo Yuen, Matthew Chang, Ying Kit Lai, and Chung Keung Poon, City University of Hong Kong, Hong Kong

Rich Media Retrieval in an Object XML Framework: a Case Study with Flash Movies using Structural Join Index Hierarchy
Hon Chung Mak Edmund, Hong Kong Institute of Education, Hong Kong, Chi-wai Fung, Hong Kong Institute of Vocational Education (Tuen Mun), Hong Kong, and Qing Li, City University of Hong Kong, Hong Kong
3:00 - 3:30 COFFEE BREAK
3:30 - 5:00 SESSION 33: Workshop on Geographic and Biological Data Management II
    Session Chair: Roger Zimmermann, University of Southern California, USA

On the Complexity of Finding Emerging Patterns
Lusheng Wang, Hao Zhao, and Guozhu Dong, City University of Hong Kong, Hong Kong

Web Service and Geographical Information Integration
Yingwei Luo, Xinpeng Liu, Wenjun Wang, Xiaolin Wang,  and Zhuoqun Xu, Peking University, China

An Algorithm Based on Improved Bayesian Inference Network Model for Prediction of Protein Secondary Structure
Guohui Yang, Chunguang Zhou, Chengquan Hu, Zhezhou Yu, and Hongji Yang, Jilin University, China

Spatiotemporal Helixes for Modeling Environmental Data
Kristin Eickhorst, Arie Croitoru, Peggy Agouris, and Tony Stefanidis, University of Maine,  USA

Mining Complex Relationships in the SDSS SkyServer Spatial Database
Bavani Arunasalam, Sanjay Chawla, Pei Sun, and Robert Munro, University of Sydney, Australia

Mining Dynamic Interdimension Association Rules for Local-scale Weather Prediction
Zhongnan Zhang, Weili Wu, and Yaochun Huang, The University of Texas at Dallas, USA
3:30 - 5:00 SESSION 34:  WORKSHOP ON SOFTWARE CYBERNETICS II
  Session Chair: Kai-Yuan Cai, Beijing University of Aeronautics and Astronautics, China

Linking Software Process Modeling with Markov Decision Theory
Frank Padberg, Universit¨at Karlsruhe, Germany

Modeling and Controlling the Incremental Software Test Process
Scott D. Miller, Aditya P. Mathur, and Raymond A. DeCarlo, Purdue University, USA

Software Test Process Control: Status and Future Directions
Ghaffari Abu, Leeny Chacko, and Joao W. Cangussu, The University of Texas at Dallas, USA
3:30 - 5:00 SESSION 35: Workshop on Quality Assurance and Testing of Web-Based Applications II
  Session Chair: Hong Zhu, Oxford Brookes University, UK

Online Testing of Web-Based Applications
Qianxiang Wang, Lining Quan, and Fuchen Ying, Peking University, China

Application of Group Testing in Verification of Dynamic Composite Web Services
W. T. Tsai, Ning Liao, Hai Huang, Arizona State University, USA and Ray Paul, Department of Defense, USA

Agent-Based Framework for Testing Web Applications
David Kung, The University of Texas at Arlington, USA

Code-Coverage Guided Prioritized Test Generation for Web Applications
J. Jenny Li, Howell Yee,  and Dave Weiss, Avaya Labs Research, USA
3:30 - 5:00 SESSION 36:  FAST ABSTRACT IV  -- SOFTWARE APPLICATIONS
  Session Chair: Baowen Xu, Southeast University, China

A New e-Shopping System Using High Performance Custom Computers
Yuk Ying Chung, The University of Sydney, Australia

Development of a Hybrid Automotive Wireless Harness
Kiumi Akingbehin and Nilesh Patel, University of Michigan-Dearborn, USA

Lessions Learned from the Practice of Mobile Health Application Development
Ping Yu, The University of Wollongong, Australia and Hui Yu, Chongqing Institute of Technology, China

Compressing an Inverted File with LCS
Fang-Yie Leu  and Yao-Chung Fan, Tung-Hai University, Taiwan

An Imprecise Computation Model in Reducing Power Consumption of Flash Memory for Portable Devices
Li-Ping Tung, Jia-Ming Chen, Wei-Fen Hsu, and Wei-Kuan Shih, National Tsing Hua University, Taiwan

Robustness Study of an Embedded Operating System for Industrial Applications
J. Pardo, J.C. Campelo, and J.J. Serrano., Polytechnic University of Valencia, Spain