Use case (UC) models describe functional requirements as a set of interactions between a software system and its environment. In essence, UC descriptions state a set of workflows that would allow a system's user to benefit from its services. It is critical that designers have a common and precise understanding of what these workflows are. Otherwise they are in danger of building the 'wrong' system. Traditionally, UC descriptions are authored using natural language, which as shown in this article, proves to be a poor vehicle, and insufficient, to describe the underlying workflows. Simply, the inherit ambiguity in natural language leads to misinterpretations and misunderstandings. UC diagrams do not provide any information about the dependencies between workflows spanning several UCs. In this paper, we present the process AGADUC, which systematically generate activity-like diagrams that represent the embedded workflows in the UC textual descriptions. A GADUC provides a great deal of information regarding how UCs are dependent on each other, without the need to iterate through several pages of UC descriptions. Using activity-like diagram ensures that all stakeholders have a precise and consistent understanding of the workflows. A case study conducted on a simplified Library case is presented and have shown that AGADUC overcomes many limitations in traditional UC models. The featured tool AREUCD automates the AGADUC process and it is demonstrated within the case study
{"title":"AGADUC: Towards a More Precise Presentation of Functional Requirement in Use Case Mod","authors":"M. El-Attar, James Miller","doi":"10.1109/SERA.2006.10","DOIUrl":"https://doi.org/10.1109/SERA.2006.10","url":null,"abstract":"Use case (UC) models describe functional requirements as a set of interactions between a software system and its environment. In essence, UC descriptions state a set of workflows that would allow a system's user to benefit from its services. It is critical that designers have a common and precise understanding of what these workflows are. Otherwise they are in danger of building the 'wrong' system. Traditionally, UC descriptions are authored using natural language, which as shown in this article, proves to be a poor vehicle, and insufficient, to describe the underlying workflows. Simply, the inherit ambiguity in natural language leads to misinterpretations and misunderstandings. UC diagrams do not provide any information about the dependencies between workflows spanning several UCs. In this paper, we present the process AGADUC, which systematically generate activity-like diagrams that represent the embedded workflows in the UC textual descriptions. A GADUC provides a great deal of information regarding how UCs are dependent on each other, without the need to iterate through several pages of UC descriptions. Using activity-like diagram ensures that all stakeholders have a precise and consistent understanding of the workflows. A case study conducted on a simplified Library case is presented and have shown that AGADUC overcomes many limitations in traditional UC models. The featured tool AREUCD automates the AGADUC process and it is demonstrated within the case study","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128408422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
During the rapid growth of World Wide Web in the recent past, 'usability' and 'navigation' have emerged as problems of concern to the research community. Large Web systems are being made so complex that often the users have to make excessive amount of 'navigational efforts' to complete their tasks. This inflicts a heavy 'navigational burden' upon the users. Current collection of usability guidelines and principles has on the order of thousand rules to follow but none of them directly and specifically addresses the problem of 'navigational burden'. Thus there exists no tool/validator that can measure the 'navigational burden' a user experiences while performing some task on a Web site. Some usability and accessibility guidelines do exist which are validated by current tools just by analyzing the HTML pages, CSS (cascading style sheets) and other contents that can be retrieved from a Web site. However, the implementation of checks for these guidelines often suffers from the problem that no model is available, i.e. no abstract description of certain properties of the Web page (or its parts). This way, the validators either fail to find certain usability problems in the pages or it outputs too many general warning messages. For instance, it is straightforward to check given HTML code for the use of a limited number of different font faces, but it is not possible to do this reliably for measuring the 'navigational burden' a user experiences, unless a model or a mechanism provides information regarding the aspects that aggravate the 'navigational burden'. In this paper we identify certain aspects which aggravate the 'navigational burden' of users. We then present a mechanism how to measure 'navigational burden', followed by a discussion to integrate this mechanism into currently available automated usability validators
{"title":"Measuring Navigational Burden","authors":"R. Ahmad, Li Zhang, F. Azam","doi":"10.1109/SERA.2006.46","DOIUrl":"https://doi.org/10.1109/SERA.2006.46","url":null,"abstract":"During the rapid growth of World Wide Web in the recent past, 'usability' and 'navigation' have emerged as problems of concern to the research community. Large Web systems are being made so complex that often the users have to make excessive amount of 'navigational efforts' to complete their tasks. This inflicts a heavy 'navigational burden' upon the users. Current collection of usability guidelines and principles has on the order of thousand rules to follow but none of them directly and specifically addresses the problem of 'navigational burden'. Thus there exists no tool/validator that can measure the 'navigational burden' a user experiences while performing some task on a Web site. Some usability and accessibility guidelines do exist which are validated by current tools just by analyzing the HTML pages, CSS (cascading style sheets) and other contents that can be retrieved from a Web site. However, the implementation of checks for these guidelines often suffers from the problem that no model is available, i.e. no abstract description of certain properties of the Web page (or its parts). This way, the validators either fail to find certain usability problems in the pages or it outputs too many general warning messages. For instance, it is straightforward to check given HTML code for the use of a limited number of different font faces, but it is not possible to do this reliably for measuring the 'navigational burden' a user experiences, unless a model or a mechanism provides information regarding the aspects that aggravate the 'navigational burden'. In this paper we identify certain aspects which aggravate the 'navigational burden' of users. We then present a mechanism how to measure 'navigational burden', followed by a discussion to integrate this mechanism into currently available automated usability validators","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131197311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper formally defines a role-driven security and access control model of a business process in order eventually to provide a theoretical basis for realizing the secured business process management systems. That is, we propose a graphical representation and formal description of the mechanism that generates a set of role-driven security and access control models from a business process modeled by the information control net (ICN) modeling methodology that is a typical business process modeling approach for defining and specifying business processes. Based upon the mechanism, we are able to design and accomplish a secured business process management system that provides an unified resource access control mechanism of the business process management engine domains and the application domains. Finally, we strongly believe that the secured access control policies from the role-driven security and access control model can be easily transformed into the RBAC (role-based access control) model that is a standardized security technology for computer and communications systems of commercial and civilian government organizations
{"title":"Frameworks for Secured Business Process Management Systems","authors":"Haeng-Kon Kim, R. Lee, Hae-Sool Yang","doi":"10.1109/SERA.2006.38","DOIUrl":"https://doi.org/10.1109/SERA.2006.38","url":null,"abstract":"This paper formally defines a role-driven security and access control model of a business process in order eventually to provide a theoretical basis for realizing the secured business process management systems. That is, we propose a graphical representation and formal description of the mechanism that generates a set of role-driven security and access control models from a business process modeled by the information control net (ICN) modeling methodology that is a typical business process modeling approach for defining and specifying business processes. Based upon the mechanism, we are able to design and accomplish a secured business process management system that provides an unified resource access control mechanism of the business process management engine domains and the application domains. Finally, we strongly believe that the secured access control policies from the role-driven security and access control model can be easily transformed into the RBAC (role-based access control) model that is a standardized security technology for computer and communications systems of commercial and civilian government organizations","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132351773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes the outline of integrated electronic service guide (IESG) system and service. IESG service is designed to compose electronic program guide (EPG), interactive TV service information such as TV portal service and genre information in ATSC-ACAP (advanced television system committee-advanced common application platform). ACAP is a Java based data broadcasting standard for interactive TV service through digital TV set-top boxes. To make it possible, broadcasters have to transmit program scheduling information and interactive TV service information. However, terrestrial broadcasters adopting ATSC standard transmit only their own program guides, not those of other broadcasters because of lack of bandwidth and other business issues. This paper suggests an effective way of IESG service implementation in which, based on ACAP, PSIP standard is used to display a broadcaster's own channel program guide, and return channel is used for the program guide, genre information and interactive TV service of other broadcasters
{"title":"Xlet-based, IESG(Integrated Electronic Service Guide) in ATSC-ACAP","authors":"Hoyeon Jang, Nammee Moon","doi":"10.1109/SERA.2006.70","DOIUrl":"https://doi.org/10.1109/SERA.2006.70","url":null,"abstract":"This paper describes the outline of integrated electronic service guide (IESG) system and service. IESG service is designed to compose electronic program guide (EPG), interactive TV service information such as TV portal service and genre information in ATSC-ACAP (advanced television system committee-advanced common application platform). ACAP is a Java based data broadcasting standard for interactive TV service through digital TV set-top boxes. To make it possible, broadcasters have to transmit program scheduling information and interactive TV service information. However, terrestrial broadcasters adopting ATSC standard transmit only their own program guides, not those of other broadcasters because of lack of bandwidth and other business issues. This paper suggests an effective way of IESG service implementation in which, based on ACAP, PSIP standard is used to display a broadcaster's own channel program guide, and return channel is used for the program guide, genre information and interactive TV service of other broadcasters","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134377459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Precedence grammar, a special kind of EBNF with precedence between its operators, is introduced in this paper. Programming languages defined in precedence grammars often look simpler, more compact and readable than those defined in other grammars. Actually, this kind of grammar was used early when IEEE published ATLAS - a large test language in 1995, which lead to a great decrease in language size compared to BNF notation, so sometime precedence grammar may be a good choice for defining large programming languages. For the sake of convenient compiler design from these grammars, two algorithms converting precedence grammars to other forms and their correctness discussions are also given in section 3 and section 4
{"title":"Precedence Grammar and Its Transformation","authors":"Guo Degui, Liu Lei, Wang Shengjun","doi":"10.1109/SERA.2006.53","DOIUrl":"https://doi.org/10.1109/SERA.2006.53","url":null,"abstract":"Precedence grammar, a special kind of EBNF with precedence between its operators, is introduced in this paper. Programming languages defined in precedence grammars often look simpler, more compact and readable than those defined in other grammars. Actually, this kind of grammar was used early when IEEE published ATLAS - a large test language in 1995, which lead to a great decrease in language size compared to BNF notation, so sometime precedence grammar may be a good choice for defining large programming languages. For the sake of convenient compiler design from these grammars, two algorithms converting precedence grammars to other forms and their correctness discussions are also given in section 3 and section 4","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121678750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The sensors in a ubiquitous network are limited because of the low electricity and because they are ultra light, so many studies have revolved around the sensor. This study suggests a way to improve the registration and authorization processes of a sensor node based on an alias for privacy. We introduce RA (relay agent) for the restrict function of sensor node, and improve anonymity for private information of each sensor node by assigning alias from SM (service manager) in procedure of registration and authentication. The private information in each sensor node should be secured during every procedure. In the results of the analysis, safe communication between nodes was guaranteed with the only partial increment of computation power of RA and SM without an increase in the amount of sensor nodes
{"title":"Privacy for Low-Power Sensor Node based on Alias in Ubiquitous Network","authors":"Dong Myung Kim, ByeongHo Oh, Sang Ho Lee","doi":"10.1109/SERA.2006.55","DOIUrl":"https://doi.org/10.1109/SERA.2006.55","url":null,"abstract":"The sensors in a ubiquitous network are limited because of the low electricity and because they are ultra light, so many studies have revolved around the sensor. This study suggests a way to improve the registration and authorization processes of a sensor node based on an alias for privacy. We introduce RA (relay agent) for the restrict function of sensor node, and improve anonymity for private information of each sensor node by assigning alias from SM (service manager) in procedure of registration and authentication. The private information in each sensor node should be secured during every procedure. In the results of the analysis, safe communication between nodes was guaranteed with the only partial increment of computation power of RA and SM without an increase in the amount of sensor nodes","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125554492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Component-based software engineering is a powerful paradigm for building large applications. However, our experience with building application of components is that the existing advanced component models (such as those offering component nesting, behavior specification and checking, dynamic reconfiguration to some extent, etc.) are subject to a lot of limitations and issues which prevent them from being accepted more widely (by industry in particular). We claim that these issues are specifically related to (a) the lack of support for dynamic reconfigurations of hierarchical architectures, (b) poor support for modeling and extendibility of the control part of a component, and (c) the lack of support for different communication styles applied in inter-component communication. In this paper, we show how these problems can be addressed and present an advanced component system SOFA 2.0 as a proof of the concept. This system is based on its predecessor SOFA, but it incorporates a number of enhancements and improvements
{"title":"SOFA 2.0: Balancing Advanced Features in a Hierarchical Component Model","authors":"T. Bures, P. Hnetynka, F. Plášil","doi":"10.1109/SERA.2006.62","DOIUrl":"https://doi.org/10.1109/SERA.2006.62","url":null,"abstract":"Component-based software engineering is a powerful paradigm for building large applications. However, our experience with building application of components is that the existing advanced component models (such as those offering component nesting, behavior specification and checking, dynamic reconfiguration to some extent, etc.) are subject to a lot of limitations and issues which prevent them from being accepted more widely (by industry in particular). We claim that these issues are specifically related to (a) the lack of support for dynamic reconfigurations of hierarchical architectures, (b) poor support for modeling and extendibility of the control part of a component, and (c) the lack of support for different communication styles applied in inter-component communication. In this paper, we show how these problems can be addressed and present an advanced component system SOFA 2.0 as a proof of the concept. This system is based on its predecessor SOFA, but it incorporates a number of enhancements and improvements","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130557936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this research, we suggested a traffic accident detection model and installed a system for automatically detecting, recording, and reporting traffic accidents at intersections. A system with these properties would be beneficial in determining the cause of accidents and the features of the intersection that impact safety. Additionally, we suggested and designed the metadata registry for the system to improve the interoperability. In a field test, the suggested model achieved a false alarm rate (FAR) of 0.34 times 10-6 percent. Considering that a California #7a algorithm (expressway incident detection algorithm) showed a FAR of 0.08 ~ 0.34 percent, our result is a remarkable achievement
{"title":"A Traffic Accident Detection Model using Metadata Registry","authors":"Yong-Kul Ki, Jin-Woo Kim, D. Baik","doi":"10.1109/SERA.2006.8","DOIUrl":"https://doi.org/10.1109/SERA.2006.8","url":null,"abstract":"In this research, we suggested a traffic accident detection model and installed a system for automatically detecting, recording, and reporting traffic accidents at intersections. A system with these properties would be beneficial in determining the cause of accidents and the features of the intersection that impact safety. Additionally, we suggested and designed the metadata registry for the system to improve the interoperability. In a field test, the suggested model achieved a false alarm rate (FAR) of 0.34 times 10-6 percent. Considering that a California #7a algorithm (expressway incident detection algorithm) showed a FAR of 0.08 ~ 0.34 percent, our result is a remarkable achievement","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121223772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we present the six sigma DMAIC approach which is used for software quality improvement. The goal was to identify and establish tactical changes that substantially increase the software quality of all software products over the next 2 years. We analyzed the data and based on the analysis expert decisions were made to determine which new technologies (tools, methods, standards, training) should be implemented and institutionalized in order to reach our goals. To measure the improvement from six sigma process changes we calculated our process capability baselines based on tactical changes, and we tracked and evaluated ongoing software product quality on a regular basis against these baselines to ensure that the software product quality goals were being achieved as planned
{"title":"Six Sigma Approach in Software Quality Improvement","authors":"Cvetan Redzic, Jongmoon Baik","doi":"10.1109/SERA.2006.61","DOIUrl":"https://doi.org/10.1109/SERA.2006.61","url":null,"abstract":"In this paper, we present the six sigma DMAIC approach which is used for software quality improvement. The goal was to identify and establish tactical changes that substantially increase the software quality of all software products over the next 2 years. We analyzed the data and based on the analysis expert decisions were made to determine which new technologies (tools, methods, standards, training) should be implemented and institutionalized in order to reach our goals. To measure the improvement from six sigma process changes we calculated our process capability baselines based on tactical changes, and we tracked and evaluated ongoing software product quality on a regular basis against these baselines to ensure that the software product quality goals were being achieved as planned","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122344113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Test driven development uses unit tests for driving the design of the code. Mock object is an object that imitates the behavior of an object with which class under test has an association to assist the unit testing. Although many tools for mock object are used in practice, there has been few research on defining the mock object model. For the comparisons of the testing capability of the tools, it is important to define the models. In this paper we represent the models of the existing mock object tools and indicate the limitations of them. In addition we propose a new model to overcome the limitations of the existing tools. With this model, more general behavior of the class under test related to the mock object can be expressed and tested
{"title":"Mock Object Models for Test Driven Development","authors":"Taeksu Kim, Chanjin Park, Chisu Wu","doi":"10.1109/SERA.2006.49","DOIUrl":"https://doi.org/10.1109/SERA.2006.49","url":null,"abstract":"Test driven development uses unit tests for driving the design of the code. Mock object is an object that imitates the behavior of an object with which class under test has an association to assist the unit testing. Although many tools for mock object are used in practice, there has been few research on defining the mock object model. For the comparisons of the testing capability of the tools, it is important to define the models. In this paper we represent the models of the existing mock object tools and indicate the limitations of them. In addition we propose a new model to overcome the limitations of the existing tools. With this model, more general behavior of the class under test related to the mock object can be expressed and tested","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114571086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}