Requirements engineering is an important area of software engineering concerned with the extraction and presentation of knowledge from user requirements. There is a considerable gap between the various types of presentation of the same kinds of knowledge - those of the user written in natural language (NL) and those of requirements engineering (RE) depicted using diagrams (de facto standard UML diagrams, for example). Our research is aimed at filling that gap. In this paper, we introduce a universal formalism based on the basic building unit of NL, which is the relation triad. Through the definition of these basic relations in NL, we create three RE models: the use case path model, the hybrid activity diagram model and the domain model. These models are abstractions of the knowledge contained in the text, and serve as the basis for deriving UML diagrams
{"title":"Models Derived from Automatically Analyzed Textual User Requirements","authors":"Magda Ilieva, O. Ormandjieva","doi":"10.1109/SERA.2006.51","DOIUrl":"https://doi.org/10.1109/SERA.2006.51","url":null,"abstract":"Requirements engineering is an important area of software engineering concerned with the extraction and presentation of knowledge from user requirements. There is a considerable gap between the various types of presentation of the same kinds of knowledge - those of the user written in natural language (NL) and those of requirements engineering (RE) depicted using diagrams (de facto standard UML diagrams, for example). Our research is aimed at filling that gap. In this paper, we introduce a universal formalism based on the basic building unit of NL, which is the relation triad. Through the definition of these basic relations in NL, we create three RE models: the use case path model, the hybrid activity diagram model and the domain model. These models are abstractions of the knowledge contained in the text, and serve as the basis for deriving UML diagrams","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121062161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Impact analysis predicts and determines the parts of a software system that can be affected by changes of the system. Before or after such changes are made, impact analysis helps reduce the risk and costs caused by unwanted impact from changes. Traditional static impact analysis techniques, based on static system information, tend to produce imprecise results that are hardly useful. Dynamic impact analysis techniques are based on dynamic system behaviors, thus produce more precise and useful results. Existing dynamic impact analysis techniques impose various amounts of overhead costs in time and space, and produce impact sets of different degree of precision. In this paper, we propose a new dynamic impact analysis technique that is less expensive in both time and space than existing techniques, and produce safe and precise impact set relative to the dynamic information used in calculation
{"title":"Dynamic Impact Analysis Using Execution Profile Tracing","authors":"Lulu Huang, Yeong-Tae Song","doi":"10.1109/SERA.2006.30","DOIUrl":"https://doi.org/10.1109/SERA.2006.30","url":null,"abstract":"Impact analysis predicts and determines the parts of a software system that can be affected by changes of the system. Before or after such changes are made, impact analysis helps reduce the risk and costs caused by unwanted impact from changes. Traditional static impact analysis techniques, based on static system information, tend to produce imprecise results that are hardly useful. Dynamic impact analysis techniques are based on dynamic system behaviors, thus produce more precise and useful results. Existing dynamic impact analysis techniques impose various amounts of overhead costs in time and space, and produce impact sets of different degree of precision. In this paper, we propose a new dynamic impact analysis technique that is less expensive in both time and space than existing techniques, and produce safe and precise impact set relative to the dynamic information used in calculation","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116237165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The objective of this study is to present the agent based process management model based on the tools needed for the process management of knowledge worker and service workers in order to establish the basis for the new knowledge management system. This study attempts to improve the process execution accuracy through process visualization and standardization and to accumulate the base data to improve the process through measuring the process execution. As such PSP is applied as the method for measuring time and flaw needed for process measurement, and an agent is also integrated to provide the accurate guideline during process execution
{"title":"Study of Agent Based Process Management Environment -Mercury","authors":"Jeong Ah Kim, YoungTaek Jin, Sun-myung Hwang","doi":"10.1109/SERA.2006.65","DOIUrl":"https://doi.org/10.1109/SERA.2006.65","url":null,"abstract":"The objective of this study is to present the agent based process management model based on the tools needed for the process management of knowledge worker and service workers in order to establish the basis for the new knowledge management system. This study attempts to improve the process execution accuracy through process visualization and standardization and to accumulate the base data to improve the process through measuring the process execution. As such PSP is applied as the method for measuring time and flaw needed for process measurement, and an agent is also integrated to provide the accurate guideline during process execution","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124254998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Shin, Soo-Hyun Park, Byeong-Hwa Jung, Changhwa Kim
As a 4G (generation) network architecture, IP based IMT network is the architecture which is based on a new concept and proposed to cope with large multimedia traffics generated by mobile communications in the near future as the backbone network for ubiquitous computing networks. During the paging process in IP based IMT network, location manager (LM) makes flooding the paging packets to every node in location area (LA) to which MN is belong. At a result of the defects, the overall network efficiency is significantly lowered to process the paging of one MN resulting in the waste of network resources. To resolve this problem, this paper proposed novel paging mechanism using a proxy concept
{"title":"Cost Effective Location Management Scheme for Moving Objects in a Ubiquitous IP- Based Network Platform","authors":"S. Shin, Soo-Hyun Park, Byeong-Hwa Jung, Changhwa Kim","doi":"10.1109/SERA.2006.24","DOIUrl":"https://doi.org/10.1109/SERA.2006.24","url":null,"abstract":"As a 4G (generation) network architecture, IP based IMT network is the architecture which is based on a new concept and proposed to cope with large multimedia traffics generated by mobile communications in the near future as the backbone network for ubiquitous computing networks. During the paging process in IP based IMT network, location manager (LM) makes flooding the paging packets to every node in location area (LA) to which MN is belong. At a result of the defects, the overall network efficiency is significantly lowered to process the paging of one MN resulting in the waste of network resources. To resolve this problem, this paper proposed novel paging mechanism using a proxy concept","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122612985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Artificial neural networks (ANNs) are powerful predictors. ANNs, however, essentially function like 'black boxes' because they lack explanatory power regarding input contribution to the model. Various contributive analysis algorithms (CAAs) have been developed to apply to ANNs to illuminate the influences and interactions between the inputs and thus, to enhance understanding of the modeled function. In this study two CAAs were applied to an ANN modeling facial attractiveness. Conflicting results from these CAAs imply that more research is needed in the area of contributive analysis and that researchers should be cautious when selecting a CAA method
{"title":"A Comparison of Two Contributive Analysis Methods Applied to an ANN Modeling Facial Attractiveness","authors":"Karen L. Joy, D. Primeaux","doi":"10.1109/SERA.2006.2","DOIUrl":"https://doi.org/10.1109/SERA.2006.2","url":null,"abstract":"Artificial neural networks (ANNs) are powerful predictors. ANNs, however, essentially function like 'black boxes' because they lack explanatory power regarding input contribution to the model. Various contributive analysis algorithms (CAAs) have been developed to apply to ANNs to illuminate the influences and interactions between the inputs and thus, to enhance understanding of the modeled function. In this study two CAAs were applied to an ANN modeling facial attractiveness. Conflicting results from these CAAs imply that more research is needed in the area of contributive analysis and that researchers should be cautious when selecting a CAA method","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122782612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Intelligent search agent is popularly used for searching relative information in the Internet and there are a lot of tools that are used to satisfy the needs of the users. These intelligent agents are independent to each other and there is insufficient cooperation to make an efficient search of information in the distributed environment. Therefore, a typical search agent is difficult to use in the distributed environment and can contain irrelevant information for the users. To solve the problem in a distributed environment, we use the CORBA architecture to create an agency by the broker agent and provide more reliable information to the users. Also, the proposed intelligent information search system used the NFC and filtering technique by the multi-agents for a rapid and reliable searching of information
{"title":"Intelligent Retrieval Agent based on Distributed Environment","authors":"Haeng-Kon Kim","doi":"10.1109/SERA.2006.42","DOIUrl":"https://doi.org/10.1109/SERA.2006.42","url":null,"abstract":"Intelligent search agent is popularly used for searching relative information in the Internet and there are a lot of tools that are used to satisfy the needs of the users. These intelligent agents are independent to each other and there is insufficient cooperation to make an efficient search of information in the distributed environment. Therefore, a typical search agent is difficult to use in the distributed environment and can contain irrelevant information for the users. To solve the problem in a distributed environment, we use the CORBA architecture to create an agency by the broker agent and provide more reliable information to the users. Also, the proposed intelligent information search system used the NFC and filtering technique by the multi-agents for a rapid and reliable searching of information","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128586934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sundaram, Jong-Cheol Seo, A. Abdurakhmanov, Young-Tak Kim
In order to provide QoS-guaranteed differentiated service across multiple domain networks, network management with inter-AS (autonomous system) traffic engineering is essential. For the inter-AS traffic engineering among different network providers, the managed objects of inter-AS traffic engineering should be standardized in public domain, and should be easily accessible by other network operators. In this paper, we propose a design and implementation of WBEM-based network management system for inter-AS traffic engineering for QoS-guaranteed DiffServ provisioning. We designed the required MOF (managed object format) for inter-AS traffic engineering with inheritance from DMTF CIM MOF. The detailed design and implementation of required WBEM server/provider functions based on openpegasus are explained, and the performance is analyzed
{"title":"Design and Implementation of WBEM-based Network Management System for Inter-AS Traffic Engineering","authors":"S. Sundaram, Jong-Cheol Seo, A. Abdurakhmanov, Young-Tak Kim","doi":"10.1109/SERA.2006.26","DOIUrl":"https://doi.org/10.1109/SERA.2006.26","url":null,"abstract":"In order to provide QoS-guaranteed differentiated service across multiple domain networks, network management with inter-AS (autonomous system) traffic engineering is essential. For the inter-AS traffic engineering among different network providers, the managed objects of inter-AS traffic engineering should be standardized in public domain, and should be easily accessible by other network operators. In this paper, we propose a design and implementation of WBEM-based network management system for inter-AS traffic engineering for QoS-guaranteed DiffServ provisioning. We designed the required MOF (managed object format) for inter-AS traffic engineering with inheritance from DMTF CIM MOF. The detailed design and implementation of required WBEM server/provider functions based on openpegasus are explained, and the performance is analyzed","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125281486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Software development methodology has been being developed for the goal of improvement in productivity and reduction in time-to-market through the reuse of component asset, and software product line is designed for the effective management and use of the asset through the separation of commonality and variability. The existing methods that implement software product line interfere massively with the core asset, which require high cost in assembling level reducing the effectiveness. This paper introduces aspect-oriented programming (AOP) as the method for the improvement of the assembling process in software product line. The method that assembles core asset and variabilities is described by grammar elements such as Join point, pointcut and advice without code-change. We analyze the requirements of the mini-system as an example adapting AOP and show its practicality by the implementation of aspect-oriented language, AspectJ
{"title":"Representation of Variability in Software Product Line Using Aspect-Oriented Programming","authors":"Seung-hyun Heo, Eun-Man Choi","doi":"10.1109/SERA.2006.57","DOIUrl":"https://doi.org/10.1109/SERA.2006.57","url":null,"abstract":"Software development methodology has been being developed for the goal of improvement in productivity and reduction in time-to-market through the reuse of component asset, and software product line is designed for the effective management and use of the asset through the separation of commonality and variability. The existing methods that implement software product line interfere massively with the core asset, which require high cost in assembling level reducing the effectiveness. This paper introduces aspect-oriented programming (AOP) as the method for the improvement of the assembling process in software product line. The method that assembles core asset and variabilities is described by grammar elements such as Join point, pointcut and advice without code-change. We analyze the requirements of the mini-system as an example adapting AOP and show its practicality by the implementation of aspect-oriented language, AspectJ","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125437840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
RosettaNet standards are industry standards for B2B integration. Although it has been adopted by many companies in informational technology, electronic components, and semiconductor manufacturing industries, etc., there are still many questions need to be answered. The paper introduces the typical scenario and benefits of using RosettaNet standards, provides a survey on the architectures supporting RosettaNet. We also provide a comparison of these architectures, and propose an architecture supporting RosettaNet using Web services architecture
{"title":"Architectures Supporting RosettaNet","authors":"Jing Wang, Yeong-Tae Song","doi":"10.1109/SERA.2006.18","DOIUrl":"https://doi.org/10.1109/SERA.2006.18","url":null,"abstract":"RosettaNet standards are industry standards for B2B integration. Although it has been adopted by many companies in informational technology, electronic components, and semiconductor manufacturing industries, etc., there are still many questions need to be answered. The paper introduces the typical scenario and benefits of using RosettaNet standards, provides a survey on the architectures supporting RosettaNet. We also provide a comparison of these architectures, and propose an architecture supporting RosettaNet using Web services architecture","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125901624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kyung-Lang Park, Joo-Kyoung Park, Changhoon Kang, Hoon-Ki Lee, Eui-Hyun Baek, Shin-Dug Kim
User-centrism is one of the most important things in ubiquitous computing. Previously, lots of researches have addressed issues for ubiquitous computing, but most of them oversimplified a personal space as a set of devices in a fixed location or in a communication-ranged space. Thus, they have had a problem to describe sophisticated user-centric services. In this paper, we propose an effective personal space model called VPW (virtual personal world) for providing ubiquitous services. VPW includes various objects over several locations, tasks in progress, and proxies of other users. Thus, service provision based on VPW supports more delicate user-centric adaptation, use of multiple devices spread over locations, and harmony between multiple users and multiple services. Eventually, it increases user satisfaction in providing ubiquitous services. Experimental results show the VPW-based approach increase user satisfaction by around 20% compared to the location-based approach and by around 15% compared to the range-based approach
{"title":"VPW: An Effective Personal Space Model for Providing Ubiquitous","authors":"Kyung-Lang Park, Joo-Kyoung Park, Changhoon Kang, Hoon-Ki Lee, Eui-Hyun Baek, Shin-Dug Kim","doi":"10.1109/SERA.2006.69","DOIUrl":"https://doi.org/10.1109/SERA.2006.69","url":null,"abstract":"User-centrism is one of the most important things in ubiquitous computing. Previously, lots of researches have addressed issues for ubiquitous computing, but most of them oversimplified a personal space as a set of devices in a fixed location or in a communication-ranged space. Thus, they have had a problem to describe sophisticated user-centric services. In this paper, we propose an effective personal space model called VPW (virtual personal world) for providing ubiquitous services. VPW includes various objects over several locations, tasks in progress, and proxies of other users. Thus, service provision based on VPW supports more delicate user-centric adaptation, use of multiple devices spread over locations, and harmony between multiple users and multiple services. Eventually, it increases user satisfaction in providing ubiquitous services. Experimental results show the VPW-based approach increase user satisfaction by around 20% compared to the location-based approach and by around 15% compared to the range-based approach","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121691824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}