System-on-chip (SoC) plays a key role in building various embedded systems. With the advance of SoC technology, the complexity of SoC is sharply increasing. In addition, there is a great industry demand on technologies for producing reusable SoC components. However, conventional SoC approaches focus largely on designing the lower-level details of SoC at hardware level without going through model-level engineering. They also do not address the reusability issues of SoC. In this paper, we propose a solution framework for producing reusable SoC in a cost-effective way by adopting model-level engineering such as domain analysis, variability analysis, and component design. We first identify the three dimensions of reusing SoC, and analyze eight different cases of reusing SoC. Then, we present software engineering techniques that can be effectively utilized in developing reusing SoC. Finally, we define a methodology for a most demanding case. The key contribution of our research lies on three folds; identifying dimensions and feasible cases of reusing SoC, identifying effective software engineering techniques for developing reusable SoC, and defining a reuse-focused methodology of SoC
{"title":"Reuse-based Methodology in Developing System-on-Chip (SoC)","authors":"Soo-Ho Chang, Soo Dong Kim","doi":"10.1109/SERA.2006.59","DOIUrl":"https://doi.org/10.1109/SERA.2006.59","url":null,"abstract":"System-on-chip (SoC) plays a key role in building various embedded systems. With the advance of SoC technology, the complexity of SoC is sharply increasing. In addition, there is a great industry demand on technologies for producing reusable SoC components. However, conventional SoC approaches focus largely on designing the lower-level details of SoC at hardware level without going through model-level engineering. They also do not address the reusability issues of SoC. In this paper, we propose a solution framework for producing reusable SoC in a cost-effective way by adopting model-level engineering such as domain analysis, variability analysis, and component design. We first identify the three dimensions of reusing SoC, and analyze eight different cases of reusing SoC. Then, we present software engineering techniques that can be effectively utilized in developing reusing SoC. Finally, we define a methodology for a most demanding case. The key contribution of our research lies on three folds; identifying dimensions and feasible cases of reusing SoC, identifying effective software engineering techniques for developing reusable SoC, and defining a reuse-focused methodology of SoC","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125272244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the size of software is getting huge, it is difficult for testers to check out all parts of source code in white-box style during integration testing or system testing period. Therefore functional test methods based on requirements information are frequently used in system level test. There have been a lot of test methods based on requirement specification. Each method has a different approach to specify software requirements. Test engineer should consider those various aspects of approaches and select proper black-box testing method to be applied. This paper presents the empirical comparison of major black-box testing methods and shows the different results by applying them to test a certain software system. The result shows that black-box testing methods check different levels of code construct. Test planer should consider the combination for the efficient test methods which combine extended use case test method and OCL test method
{"title":"Comparison of Five Black-box Testing Methods for Object-Oriented Software","authors":"Kwang-Ik Seo, Eun-Man Choi","doi":"10.1109/SERA.2006.22","DOIUrl":"https://doi.org/10.1109/SERA.2006.22","url":null,"abstract":"As the size of software is getting huge, it is difficult for testers to check out all parts of source code in white-box style during integration testing or system testing period. Therefore functional test methods based on requirements information are frequently used in system level test. There have been a lot of test methods based on requirement specification. Each method has a different approach to specify software requirements. Test engineer should consider those various aspects of approaches and select proper black-box testing method to be applied. This paper presents the empirical comparison of major black-box testing methods and shows the different results by applying them to test a certain software system. The result shows that black-box testing methods check different levels of code construct. Test planer should consider the combination for the efficient test methods which combine extended use case test method and OCL test method","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126958533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Toyoshiro Nakashima, K. Iwata, Yoshiyuki Anan, N. Ishii
In a corporation or the division of a corporation where software is being developed, it is becoming very important to develop software efficiently while guaranteeing the quality, limiting the cost, and maintaining the development schedule. Therefore, the corporation and the division of the corporation that develop software are implementing various improvement methods, including process improvement. In this study we have analyzed data from a software development project and studied how to determine which software development project will fail because it takes more manpower that originally estimated. In addition, we have implemented project-management support tools by combining the project-monitoring and managing tools that are already in use. We have also developed a new model that uses the statistical method, by reviewing the tools that are already used to estimate manpower for new projects
{"title":"Studies on Project Management Models for Embedded Software Development Projects","authors":"Toyoshiro Nakashima, K. Iwata, Yoshiyuki Anan, N. Ishii","doi":"10.1109/SERA.2006.64","DOIUrl":"https://doi.org/10.1109/SERA.2006.64","url":null,"abstract":"In a corporation or the division of a corporation where software is being developed, it is becoming very important to develop software efficiently while guaranteeing the quality, limiting the cost, and maintaining the development schedule. Therefore, the corporation and the division of the corporation that develop software are implementing various improvement methods, including process improvement. In this study we have analyzed data from a software development project and studied how to determine which software development project will fail because it takes more manpower that originally estimated. In addition, we have implemented project-management support tools by combining the project-monitoring and managing tools that are already in use. We have also developed a new model that uses the statistical method, by reviewing the tools that are already used to estimate manpower for new projects","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127023916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It has been highlighted and spread that the cutting edge system and intelligence home system raised from dramatic development of IT technology. Through the progressed application of home networking tech. and diverse multi-media, there are plenty of efforts to pursue the realization of human convenience. As a home networking services is on the increase, so is the demand for context-aware services, utilizing a profile of users as well as various context information, a sensor, and other environmental information in order to recognize a pattern of users' activities. And more enhanced services that can analyze users' pattern of behaviors and reflect individual tendency in the service should be offered so that users can obtain the information they want much faster. Thus, an intellectual control model is discussed, which can offer active service based on a pattern of users' behaviors, in order to suggest a device that predicts users' activities and operates in a more intelligent way
{"title":"Active Intelligent Service Offer System Addition Environment variable and Local variable","authors":"Kyung-Sang Sung, H. Oh","doi":"10.1109/SERA.2006.9","DOIUrl":"https://doi.org/10.1109/SERA.2006.9","url":null,"abstract":"It has been highlighted and spread that the cutting edge system and intelligence home system raised from dramatic development of IT technology. Through the progressed application of home networking tech. and diverse multi-media, there are plenty of efforts to pursue the realization of human convenience. As a home networking services is on the increase, so is the demand for context-aware services, utilizing a profile of users as well as various context information, a sensor, and other environmental information in order to recognize a pattern of users' activities. And more enhanced services that can analyze users' pattern of behaviors and reflect individual tendency in the service should be offered so that users can obtain the information they want much faster. Thus, an intellectual control model is discussed, which can offer active service based on a pattern of users' behaviors, in order to suggest a device that predicts users' activities and operates in a more intelligent way","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114590048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Traceability between hazards and countermeasures is important for hazard analysis to give confidence and help justify whether relevant hazards have been considered and sufficiently mitigated. However, use case modeling, the current de facto standard technique for requirements elicitation lacks negative modeling constructs for representing hazards. This paper presents a case study to apply a goal-oriented method for car security related hazard analysis where hazards are represented as operationalizations with negative contribution toward system non-functional requirements (NFRs). In turn, countermeasures are represented as operationalizations with negative contribution toward the respective hazards to negate their negative effect on the NFRs. The study finds that using the goal-oriented approach is most suitable for risk-driven applications, but also compatible and complementary to other applications
{"title":"Applying a Goal-Oriented Method for Hazard Analysis: A Case Study","authors":"Sam Supakkul, L. Chung","doi":"10.1109/SERA.2006.16","DOIUrl":"https://doi.org/10.1109/SERA.2006.16","url":null,"abstract":"Traceability between hazards and countermeasures is important for hazard analysis to give confidence and help justify whether relevant hazards have been considered and sufficiently mitigated. However, use case modeling, the current de facto standard technique for requirements elicitation lacks negative modeling constructs for representing hazards. This paper presents a case study to apply a goal-oriented method for car security related hazard analysis where hazards are represented as operationalizations with negative contribution toward system non-functional requirements (NFRs). In turn, countermeasures are represented as operationalizations with negative contribution toward the respective hazards to negate their negative effect on the NFRs. The study finds that using the goal-oriented approach is most suitable for risk-driven applications, but also compatible and complementary to other applications","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134381213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In ubiquitous environments, which involve an even greater number of computing devices, with more informal modes of operation, this type of problem have rather serious consequences. In order to solve these problems when they arise, effective reliable systems are required. Also, system management is changing from a conventional central administration, to autonomic computing. However, most existing research focuses on healing after a problem has already occurred. In order to solve this problem, a prediction model is required to recognize operating environments and predict error occurrence. In this paper, a hybrid prediction model through four algorithms supporting self-healing in autonomic computing is proposed. This prediction model adopts a selective healing model, according to system situations for self-diagnosing and prediction of problems using four algorithms. In this paper, a hybrid prediction model is adopted to evaluate the proposed model in a self-healing system. In addition, prediction is compared with existing research and the effectiveness is demonstrated by experiment
{"title":"Hybrid Prediction Model for improving Reliability in Self-Healing System","authors":"Giljong Yoo, Jeongmin Park, Eunseok Lee","doi":"10.1109/SERA.2006.40","DOIUrl":"https://doi.org/10.1109/SERA.2006.40","url":null,"abstract":"In ubiquitous environments, which involve an even greater number of computing devices, with more informal modes of operation, this type of problem have rather serious consequences. In order to solve these problems when they arise, effective reliable systems are required. Also, system management is changing from a conventional central administration, to autonomic computing. However, most existing research focuses on healing after a problem has already occurred. In order to solve this problem, a prediction model is required to recognize operating environments and predict error occurrence. In this paper, a hybrid prediction model through four algorithms supporting self-healing in autonomic computing is proposed. This prediction model adopts a selective healing model, according to system situations for self-diagnosing and prediction of problems using four algorithms. In this paper, a hybrid prediction model is adopted to evaluate the proposed model in a self-healing system. In addition, prediction is compared with existing research and the effectiveness is demonstrated by experiment","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131615257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile appliances are getting used in many areas. The explosive growth of the mobile appliance markets and requests of a lot of demands in mobile-related services lead many researches to apply for wired network environment services to mobile appliances. However, there are too many restrictions like connection failures to apply service that requires large scales of multimedia data, or services that require block unit I/O like large scale database to mobile devices. Using fail-over channel for the error recovery without any consideration of load processing status in each connection leads inefficient usage in wireless networks then it makes the quality of whole remote storage service down. In this paper, we propose an efficient load balancing method for iSCSI-based remote storage system to efficiently distribute data to valid connections when the established connection is failed in large scale data transmission of mobile applicant which supports multi-connection
{"title":"Efficient Load Balancing Method for Mobile Applicable iSCSI-based Remote Storage Service","authors":"J. Kang, Wonil Choi, Myong-Soon Park","doi":"10.1109/SERA.2006.31","DOIUrl":"https://doi.org/10.1109/SERA.2006.31","url":null,"abstract":"Mobile appliances are getting used in many areas. The explosive growth of the mobile appliance markets and requests of a lot of demands in mobile-related services lead many researches to apply for wired network environment services to mobile appliances. However, there are too many restrictions like connection failures to apply service that requires large scales of multimedia data, or services that require block unit I/O like large scale database to mobile devices. Using fail-over channel for the error recovery without any consideration of load processing status in each connection leads inefficient usage in wireless networks then it makes the quality of whole remote storage service down. In this paper, we propose an efficient load balancing method for iSCSI-based remote storage system to efficiently distribute data to valid connections when the established connection is failed in large scale data transmission of mobile applicant which supports multi-connection","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130684815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a semantic management framework providing the ubiquitous application field-independent interoperability. The goal of the proposed framework is to provide a consistent and independent semantic usability to ubiquitous applications. The proposed framework uses the merits of the metadata registry that has been developed for exchanging and sharing between databases by ISO/IEC JTC 1/SC 32. The proposed framework allows application field free semantic management and enables the practical and ideal ubiquitous application development
{"title":"A Framework for Application-Independent Semantic Management for Ubiquitous Computing Environment","authors":"Dongwon Jeong, Yixin Jing, Jinhyung Kim, D. Baik","doi":"10.1109/SERA.2006.3","DOIUrl":"https://doi.org/10.1109/SERA.2006.3","url":null,"abstract":"This paper proposes a semantic management framework providing the ubiquitous application field-independent interoperability. The goal of the proposed framework is to provide a consistent and independent semantic usability to ubiquitous applications. The proposed framework uses the merits of the metadata registry that has been developed for exchanging and sharing between databases by ISO/IEC JTC 1/SC 32. The proposed framework allows application field free semantic management and enables the practical and ideal ubiquitous application development","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115910327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Web services are software systems that enable applications serving various functions through the Web. Extensible markup language (XML) is used in the integration of applications which makes data sharing and communication within applications easier and uniform. Security is an important aspect of Web services. Securing XML data is critical to the success of any Web based applications or Web services. In this research work we have designed and implemented a single-point rule-based security engine for Apache Axis. Apache Axis is an open source Web services development and deployment platform. By doing this we reuse the same security engine for more than one Web service so that applications need not to implement separate security logic. The security engine provides support for authentication, authorization, decryption and signature verification. A test application is also implemented to validate the design and implementation of the rule-based security engine
{"title":"Design and Implementation of a Rule-based Security Engine for XML Web Services","authors":"Priyanka Vasudevan, Lan Yang","doi":"10.1109/SERA.2006.25","DOIUrl":"https://doi.org/10.1109/SERA.2006.25","url":null,"abstract":"Web services are software systems that enable applications serving various functions through the Web. Extensible markup language (XML) is used in the integration of applications which makes data sharing and communication within applications easier and uniform. Security is an important aspect of Web services. Securing XML data is critical to the success of any Web based applications or Web services. In this research work we have designed and implemented a single-point rule-based security engine for Apache Axis. Apache Axis is an open source Web services development and deployment platform. By doing this we reuse the same security engine for more than one Web service so that applications need not to implement separate security logic. The security engine provides support for authentication, authorization, decryption and signature verification. A test application is also implemented to validate the design and implementation of the rule-based security engine","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122147592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dong-uk Cho, U. Chang, Bong-hyun Kim, Se Hwan Lee, Younglae Bae, Soo Cheol Ha
A new low-dimensional feature representation technique is presented in this paper. Linear discriminant analysis is a popular feature extraction method. However, in the case of high dimensional data, the computational difficulty and the small sample size problem are often encountered. In order to solve these problems, we propose two dimensional direct LDA algorithm named 2D-DLDA, which directly extracts the image scatter matrix from 2D image and uses direct LDA algorithm for face recognition. The ORL face database is used to evaluate the performance of the proposed method. The experimental results indicate that the performance of the proposed method is superior to DLDA
{"title":"2D Direct LDA Algorithm for Face Recognition","authors":"Dong-uk Cho, U. Chang, Bong-hyun Kim, Se Hwan Lee, Younglae Bae, Soo Cheol Ha","doi":"10.1109/SERA.2006.1","DOIUrl":"https://doi.org/10.1109/SERA.2006.1","url":null,"abstract":"A new low-dimensional feature representation technique is presented in this paper. Linear discriminant analysis is a popular feature extraction method. However, in the case of high dimensional data, the computational difficulty and the small sample size problem are often encountered. In order to solve these problems, we propose two dimensional direct LDA algorithm named 2D-DLDA, which directly extracts the image scatter matrix from 2D image and uses direct LDA algorithm for face recognition. The ORL face database is used to evaluate the performance of the proposed method. The experimental results indicate that the performance of the proposed method is superior to DLDA","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"65 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129702758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}