Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Software Engineering

2005

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 66

Full-Text Articles in Physical Sciences and Mathematics

An Efficient And Robust Computational Framework For Studying Lifetime And Information Capacity In Sensor Networks, Enrique J. Duarte-Melo, Mingyan Liu, Archan Misra Dec 2005

An Efficient And Robust Computational Framework For Studying Lifetime And Information Capacity In Sensor Networks, Enrique J. Duarte-Melo, Mingyan Liu, Archan Misra

Research Collection School Of Computing and Information Systems

In this paper we investigate the expected lifetime and information capacity, defined as the maximum amount of data (bits) transferred before the first sensor node death due to energy depletion, of a data-gathering wireless sensor network. We develop a fluid-flow based computational framework that extends the existing approach, which requires precise knowledge of the layout/deployment of the network, i.e., exact sensor positions. Our method, on the other hand, views a specific network deployment as a particular instance (sample path) from an underlying distribution of sensor node layouts and sensor data rates. To compute the expected information capacity under this distribution-based …


Matrix: Adaptive Middleware For Distributed Multiplayer Games, Rajesh Krishna Balan, Maria Ebling, Paul Castro, Archan Misra Dec 2005

Matrix: Adaptive Middleware For Distributed Multiplayer Games, Rajesh Krishna Balan, Maria Ebling, Paul Castro, Archan Misra

Research Collection School Of Computing and Information Systems

Building a distributed middleware infrastructure that provides the low latency required for massively multiplayer games while still maintaining consistency is non-trivial. Previous attempts have used static partitioning or client-based peer-to-peer techniques that do not scale well to a large number of players, perform poorly under dynamic workloads or hotspots, and impose significant programming burdens on game developers. We show that it is possible to build a scalable distributed system, called Matrix, that is easily usable by game developers. We show experimentally that Matrix provides good performance, especially when hotspots occur.


Giving Users The Steering Wheel For Guiding Resource-Adaptive Systems, Joao Sousa, Rajesh Krishna Balan, Vahe Poladian, David Garlan, Mahadev Satyanarayanan Dec 2005

Giving Users The Steering Wheel For Guiding Resource-Adaptive Systems, Joao Sousa, Rajesh Krishna Balan, Vahe Poladian, David Garlan, Mahadev Satyanarayanan

Research Collection School Of Computing and Information Systems

Addressing resource variation plays an increasingly important role in engineering today's software systems. Research in resource-adaptive applications takes an important step towards addressing this problem. However, existing solutions stop short of addressing the fact that different user tasks often have specific goals of quality of service, and that such goals often entail multiple aspects of quality of service. This paper presents a framework for engineering software systems capable of adapting to resource variations in ways that are specific to the quality goals of each user task. For that, users are empowered to specify their task-specific preferences with respect to multiple …


And/Or Graph And Search Algorithm For Discovering Composite Web Services, Qianhui (Althea) Liang, Stanley Y. W. Su Oct 2005

And/Or Graph And Search Algorithm For Discovering Composite Web Services, Qianhui (Althea) Liang, Stanley Y. W. Su

Research Collection School Of Computing and Information Systems

This paper presents a formalization of the Web Service composition problem as a search problem in an AND/OR graph, and a search algorithm for searching the graph to identify composite service(s) that satisfies a Web Service request. Given a service request that can only be satisfied by a composition of Web Services, we identify the service categories that are relevant to the request and dynamically construct an AND/OR graph to capture the input/output dependencies among the Web Services of these service categories. The graph is modified, based on the information provided in the service request. The search algorithm is then …


Integration Of The Shel Model With The Flight Operational Quality Assurance (Foqa) Program, James T. Schultz, Scott Forn, Marian C. Schultz Oct 2005

Integration Of The Shel Model With The Flight Operational Quality Assurance (Foqa) Program, James T. Schultz, Scott Forn, Marian C. Schultz

Publications

The SHEL Model has been used to explore relationships between liveware, environmental, hardware and software factors. This study attempts to integrate Flight Operational Quality Assurance (FOQA) program data with the SHEL model. Aircraft record data that can be used to monitor the human interface within the entire system, plus identify faults and potential failures within the system before a major accident or incident occurs. These data have existed for over four decades, and FOQA offers a way to both analyze and act upon them. The relationships between the SHEL model and FOQA data can help to ensure our nation's skies …


Informal Animation Sketching With K-Sketch, Richard C. Davis Oct 2005

Informal Animation Sketching With K-Sketch, Richard C. Davis

Research Collection School Of Computing and Information Systems

Animation is a powerful medium that is accessible to few, because current animation tools are extremely complex. This complexity arises partially from current tools’ focus on precise, often unnecessary details and partially from the difficulty of finding a small but sufficiently powerful set of tool features. We are designing K-Sketch, an informal 2D animation tool that uses sketching and demonstration to radically reduce the time needed to create an animation. Our field studies investigating the needs of current anima-tion tool users and would-be users are helping us to mini-mize complexity by showing us how to prioritize the many possible tool …


Forms Of Expression For Designing Visual Languages For Animation, Richard C. Davis, James A. Landay Sep 2005

Forms Of Expression For Designing Visual Languages For Animation, Richard C. Davis, James A. Landay

Research Collection School Of Computing and Information Systems

We present further steps in our research into visual languages for animation. Animation is a rich mode of communication that is currently accessible to few, because animation systems are complex. Some systems try to make animation simple but put severe limits on users’ creative expression. Our field studies are demonstrating that would-be animators need to express animation in a wide variety of ways. We are developing a taxonomy of forms of expression for animation that will help the designers of visual languages for animation to determine which expressive forms to support. Our end goal is to build animation sketching systems …


Low Latency Multimedia Broadcast In Multi-Rate Wireless Meshes, Chun-Tong Chou, Archan Misra Sep 2005

Low Latency Multimedia Broadcast In Multi-Rate Wireless Meshes, Chun-Tong Chou, Archan Misra

Research Collection School Of Computing and Information Systems

In a multi-rate wireless network, a node can dynamically adjust its link transmission rate by switching between different modulation schemes. For the current IEEE802.11a/b/g standards, this rate adjustment is limited to unicast traffic only while multicast and broadcast traffic is always transmitted at the lowest possible rate. In this paper, we consider a novel type of multi-rate mesh networks where a node can dynamically adjust its link layer multicast rates to its neighbours. In particular, we consider the problem of realising low latency network-wide broadcast in this type of multi-rate wireless meshes. We will first show that the multi-rate broadcast …


A Framework To Ensure Trustworthy Web Services, Jia Zhang, Liang-Jie Zhang Aug 2005

A Framework To Ensure Trustworthy Web Services, Jia Zhang, Liang-Jie Zhang

Jia Zhang

No abstract provided.


Making Decision In Requirement Change Management, Saffena Ramzan, Naveed Ikram Aug 2005

Making Decision In Requirement Change Management, Saffena Ramzan, Naveed Ikram

International Conference on Information and Communication Technologies

Requirement change management a significant activity, which is performed through out the development of the software and even during the maintenance phase. It is the core activity to obtain one of the main objectives of software development, which is to satisfy the evolving needs of the customers. Software requirements are linked and dependent on other requirements and changing one requirement definitely affects interlinked requirements. Impact analysis is the crux of requirement change management which is to obtain with the change of requirements, so that the scope of that change is identified. Traceability is the pre-requisite to acquire proper impact analysis. …


Enhancement Of Software Engineering By Shifting From Software Product To Software Service, Muhammad Saeed, Muhammad Jaffar-Ur- Rehman Aug 2005

Enhancement Of Software Engineering By Shifting From Software Product To Software Service, Muhammad Saeed, Muhammad Jaffar-Ur- Rehman

International Conference on Information and Communication Technologies

Software development has always been a supply side affair, in which domain experts were the main requirement providers. Software engineers have been creating new technologies, frameworks and methodologies but this has made the software engineering job more complex. Recently all this has been looked at from demand-side prospective. So a new concept of Service Based Software Engineering is shaping up which look at the software as a service rather then a product. This paper is going to analysis the fundamental requirements of such a paradigm shift, by first gathering the concept and then translating this to a workable solution. Different …


An Investigation Into The Skills Gap In The Software Industry Of Pakistan, Zareen Sharf, Dr. Wasim A. Khan Aug 2005

An Investigation Into The Skills Gap In The Software Industry Of Pakistan, Zareen Sharf, Dr. Wasim A. Khan

International Conference on Information and Communication Technologies

Software Industry workers require an adequate skill set to gain maximum output from the effective use of technology. The purpose of this study is to explore the nature of actual and desired software developer, jobs skill set. Survey methodology will be used to obtain reports of actual skill level and those desired to define common dimensions of the software developer skill set. Anticipated results will add to the existing body of IT job skills knowledge and may provide practice with job development and career planning guidance. We also intend to propose a skill standard for the software industry of Pakistan …


Implementation And Analysis Of Cmmi's Configuration Management Process Area; Applicable To "Defined" Level - 3, Ahmad Luqman Aug 2005

Implementation And Analysis Of Cmmi's Configuration Management Process Area; Applicable To "Defined" Level - 3, Ahmad Luqman

International Conference on Information and Communication Technologies

Enterprise Resource Planner (ERP) is a strategically important tool as integrated business application for long-term success in an increasingly competitive global market. This system requires the integration of data and business processes across the whole enterprise. In order to develop a good quality product there is a need of applying proper model. It becomes more costly in terms of training, appraisals, and improvement activities while applying multiple models that are not integrated within and across an organization. Where as Capability Maturity Model Integration is a set of integrated models that successfully addresses multiple disciplines and has integrated training support. Objective …


Enhanced Risk Analysis-Relative Impact Factorization, Basit Shahzad, Tanveer Afzal, Rizwana Irfan Aug 2005

Enhanced Risk Analysis-Relative Impact Factorization, Basit Shahzad, Tanveer Afzal, Rizwana Irfan

International Conference on Information and Communication Technologies

Software engineering is an area of development which always has the risk factor present and software engineering can hardly be done on some straight line. So, the manager has to handle the dynamically changing circumstances in order to complete the job. The target of development team is to develop the software according to the requirements within specified time. Wide variety of risks I are present that may grab the development effort. A good manager must ensure that all measures have been taken against the risks that may possibly come. This paper focuses on determining the relative impact of risk factors …


Mapping Ogc Prince 2 To Sei Cmmi 1.1, Ahmad Luqman, Fida Hussain, Dr. S. Tauseef -Ur- Rehman Aug 2005

Mapping Ogc Prince 2 To Sei Cmmi 1.1, Ahmad Luqman, Fida Hussain, Dr. S. Tauseef -Ur- Rehman

International Conference on Information and Communication Technologies

The Capability Maturity Model Integration (CMMI) version 1.1, developed by the Software Engineering Institute (SEI), USA and the PRoject IN Controlled Environment (PRINCE) version 2 developed by Central Computing and Telecommunications Agency (CCTA) now Office of Government Commerce (OGC) as UK Government standard for IT Project Management, share a common concern with Project and Quality management by improved process management. Both are driven by similar concerns and intuitively correlated. Organizations concerned with PRINCE 2 certification often question its overlap with the CMMI. We have looked into OGC PRINCE 2 process/components and map it to the different goals/practices in the SEI …


Towards Knowledge Morphing: A Triangulation Approach To Link Tacit And Explicit Knowledge, Fehmida Hussain, Syed Sibte Raza Abidi, Syed Ali Raza Aug 2005

Towards Knowledge Morphing: A Triangulation Approach To Link Tacit And Explicit Knowledge, Fehmida Hussain, Syed Sibte Raza Abidi, Syed Ali Raza

International Conference on Information and Communication Technologies

Current knowledge management systems are largely designed to deal with a single knowledge modality. Given the diversity of knowledge modalities that encompass any given topic/problem it is reasonable to demand access and use of all available knowledge, irrespective of their representation modality, to derive a knowledge-mediated solution. This calls for selecting all knowledge elements (represented in different modalities) that are relevant to the solution of the problem at hand. Thus here we pursue the specification and implementation of such a knowledge-mediated solution using a triangulation approach leading to Knowledge Morphing. In this paper we present a tacit-explicit knowledge morphing (TEKM) …


Using Software Engineering Principles To Develop Reusable Business Rules, Saqib Ali, Ben Soh, Torab Torabi Aug 2005

Using Software Engineering Principles To Develop Reusable Business Rules, Saqib Ali, Ben Soh, Torab Torabi

International Conference on Information and Communication Technologies

Nowadays, businesses need a system that can provide flexibility, reusability and simplicity for their business solutions. However, if business logics or rules are implemented using procedural paradigms, then the business systems will become more complex. In this paper we treat business logics separate from system logics, whereby we analyse a business by describing its rules and developing a set of rule statements. These business rules will be treated as a separate component in the design and implementation of the system. We have found that our proposed method leads to a system, which is more customisable, flexible, efficient, and reusable, in …


A Dynamic Weight Assignment Approach For Ir Systems, M. Shoaib, Prof Dr. Abad Ali Shah, A. Vashishta Aug 2005

A Dynamic Weight Assignment Approach For Ir Systems, M. Shoaib, Prof Dr. Abad Ali Shah, A. Vashishta

International Conference on Information and Communication Technologies

Weights are assigned to the extracted keywords for partial matching and computing ranking in an IR system. Weight assignment technique is suggested by the IR model that is used for an IR system. Currently suggested weight assignment techniques are static which means that once weight is assigned a keyword it remains unchanged during life-span of an IR system. In this paper, we suggest a dynamic weight assignment technique. This technique can be used by any IR model that supports partial matching.


Keynote: Hexagonal Structure For Intelligent Vision, Xiangjian He, Wenjing Jia Aug 2005

Keynote: Hexagonal Structure For Intelligent Vision, Xiangjian He, Wenjing Jia

International Conference on Information and Communication Technologies

Using hexagonal grids to represent digital images have been studied for more than 40 years. Increased processing capabilities of graphic devices and recent improvements in CCD technology have made hexagonal sampling attractive for practical applications and brought new interests on this topic. The hexagonal structure is considered to be preferable to the rectangular structure due to its higher sampling efficiency, consistent connectivity and higher angular resolution and is even proved to be superior to square structure in many applications. Since there is no mature hardware for hexagonal-based image capture and display, square to hexagonal image conversion has to be done …


Goods Movement Security: An Information Technology Problem, Jens G. Pohl Aug 2005

Goods Movement Security: An Information Technology Problem, Jens G. Pohl

Collaborative Agent Design (CAD) Research Center

This paper discusses the security problems associated with the movement of goods across international in-land borders and at ocean ports. The author proposes an information technology solution approach that is based on the profiling of international shipments. The collection of data describing the end-to-end movement of a shipment from the initial acquisition transactions, throughout the various transshipment stages, to the final delivery, allows intelligent software to assist customs and homeland security officials to determine the risks associated with the shipment long before it reaches the inspection point. The technical basis and architecture of the SecureOrigins™ software system is described. Designed …


Using Containers To Enforce Smart Constraints For Performance In Industrial Systems, Scott A. Hissam, Gabriel A. Moreno, Kurt C. Wallnau Jul 2005

Using Containers To Enforce Smart Constraints For Performance In Industrial Systems, Scott A. Hissam, Gabriel A. Moreno, Kurt C. Wallnau

Gabriel A. Moreno

Today, software engineering is concerned less with individual programs than with large-scale networks of interacting programs. For large-scale networks, engineering problems emerge that go well beyond functional correctness (the purview of programming) and encompass equally crucial nonfunctional qualities such as security, performance, availability, and fault tolerance. A pivotal challenge, then, is to provide techniques to routinely construct systems that have predictable nonfunctional quality. These techniques impose constraints on the problem being solved and on the form solutions can take. This technical note shows how smart constraints can be embedded in software infrastructure, so that systems conforming to those constraints are …


Descriptive Naming Of Context Data Providers, Norman H. Cohen, Paul Castro, Archan Misra Jul 2005

Descriptive Naming Of Context Data Providers, Norman H. Cohen, Paul Castro, Archan Misra

Research Collection School Of Computing and Information Systems

Much context data comes from mobile, transient, and unreliable sources. Such resources are best specified by descriptive names identifying what data is needed rather than which source is to provide it. The design of descriptive names has important consequences, but until now little attention has been focused on this problem. We propose a descriptive naming system for providers of context data that provides more flexibility and power than previous naming systems by classifying data providers into “provider kinds” that are organized in an evolving hierarchy of subkinds and superkinds. New provider kinds can be inserted in the hierarchy not only …


Synthesis Of Distributed Processes From Scenario-Based Specifications, Jun Sun, Jin Song Dong Jul 2005

Synthesis Of Distributed Processes From Scenario-Based Specifications, Jun Sun, Jin Song Dong

Research Collection School Of Computing and Information Systems

Given a set of sequence diagrams, the problem of synthesis is of deciding whether there exists a satisfying object system and if so, synthesize one automatically. It is crucial in the development of complex systems, since sequence diagrams serve as the manifestation of use cases and if synthesizable they could lead directly to implementation. It is even more interesting (and harder) if the synthesized object system is distributed. In this paper, we propose a systematic way of synthesizing distributed processes from Live Sequence Charts. The basic idea is to first construct a CSP specification from the LSC specification, and then …


Middleware Architecture For Evaluation And Selection Of 3rd Party Web Services For Service Providers, Dipanjan Chakraborty, Suraj K. Jaiswal, Archan Misra, Amit A. Nanavati Jul 2005

Middleware Architecture For Evaluation And Selection Of 3rd Party Web Services For Service Providers, Dipanjan Chakraborty, Suraj K. Jaiswal, Archan Misra, Amit A. Nanavati

Research Collection School Of Computing and Information Systems

This paper presents an architecture to facilitate efficient evaluation and selection of 3rd party Web services for service providers. Most service provider architectures have primarily focused on providing Web service front ends to legacy systems, aggregating and delivering services via workflows. These architectures primarily considered static business contracts between the service provider and its (Web-service enabled) business partners. This approach makes these architectures inflexible to variations in business requirement, partners' performance and customer requirements. Our architecture provides a flexible means for service providers to optimize business performance. Based on the historical performance, extant context, and optimising business rules, the appropriate …


Criteria Analysis And Validation Of The Reliability Of Web Services-Oriented Systems,, Jia Zhang, Liang-Jie Zhang Jun 2005

Criteria Analysis And Validation Of The Reliability Of Web Services-Oriented Systems,, Jia Zhang, Liang-Jie Zhang

Jia Zhang

No abstract provided.


C# Traceability System, Luiz Fernando Capretz, Michael Kernahan, Miriam Capretz Jun 2005

C# Traceability System, Luiz Fernando Capretz, Michael Kernahan, Miriam Capretz

Electrical and Computer Engineering Publications

Traceability information is a valuable asset that software development teams can leverage to minimise their risk during production and maintenance of software projects. When maintainers are added to a software project post-production, they have to learn the system from scratch and understand its dynamics before they can begin making appropriate modifications to the source code. The system outlined in this paper extracts traceability information directly from the source code of C# projects, and presents it in such a way that it can be easily used to understand the logic and validate changes to the system.


Automatically Discovering The Number Of Clusters In Web Page Datasets, Zhongmei Yao Jun 2005

Automatically Discovering The Number Of Clusters In Web Page Datasets, Zhongmei Yao

Computer Science Faculty Publications

Clustering is well-suited for Web mining by automatically organizing Web pages into categories, each of which contains Web pages having similar contents. However, one problem in clustering is the lack of general methods to automatically determine the number of categories or clusters. For the Web domain in particular, currently there is no such method suitable for Web page clustering. In an attempt to address this problem, we discover a constant factor that characterizes the Web domain, based on which we propose a new method for automatically determining the number of clusters in Web page data sets. We discover that the …


Web Services Quality Testing, Jia Zhang, Liang-Jie Zhang May 2005

Web Services Quality Testing, Jia Zhang, Liang-Jie Zhang

Jia Zhang

No abstract provided.


Minimum Energy Reliable Paths Using Unreliable Wireless Links, Qunfeng Dong, Suman Banerjee, Micah Adler, Archan Misra May 2005

Minimum Energy Reliable Paths Using Unreliable Wireless Links, Qunfeng Dong, Suman Banerjee, Micah Adler, Archan Misra

Research Collection School Of Computing and Information Systems

We address the problem of energy-efficient reliable wireless communication in the presence of unreliable or lossy wireless link layers in multi-hop wireless networks. Prior work [1] has provided an optimal energy efficient solution to this problem for the case where link layers implement perfect reliability. However, a more common scenario --- a link layer that is not perfectly reliable, was left as an open problem. In this paper we first present two centralized algorithms, BAMER and GAMER, that optimally solve the minimum energy reliable communication problem in presence of unreliable links. Subsequently we present a distributed algorithm, DAMER, that approximates …


Mindshare: A Collaborative Peer-To-Peer System For Small Groups, Gareth Charles Farrington May 2005

Mindshare: A Collaborative Peer-To-Peer System For Small Groups, Gareth Charles Farrington

Theses and Dissertations

We present Mindshare, a system for small group collaboration using Peer to Peer networking technology. This paper details the motivation behind its design, how it benefits users and details of its construction and operation. The solution focuses on the needs of small collaborating groups with limited computing experience and resources. Mindshare allows the group to share an unlimited number of files and visualize them in unified hierarchical file system. Mindshare synchronizes the files between users without user input. Its robust design allows files to be shared even when the owner is offline and allows users to work with files from …