Despite advances in hardware and software technologies, it remains challenging to develop Web services software that are correct, efficient, and flexible. Some challenges arise from increasingly demanding end user requirements for itpsilas quality and functionality. Other challenges arise from complexities associated with integrating embedded systems composed of modular components. Web services represent an evolution of the Web to allow the open and flexible interaction of applications over the Internet. XML Web services are the fundamental building blocks in the move to distributed computing on the Internet. In this paper, we focuses on integrating Component based development and Web Services to enable the development and usage of components through the Web by dynamically creating Web services for the functionalities of the components. XML Web services standards, which include SOAP, XML, and WSDL, provide a high level of interoperability across platforms, programming languages and applications and hence these facets of Web services have been used to integrate the best aspects of component based development and the Web.
{"title":"Applying CBD to Web Services","authors":"Youn-ky Chung","doi":"10.1109/ASEA.2008.52","DOIUrl":"https://doi.org/10.1109/ASEA.2008.52","url":null,"abstract":"Despite advances in hardware and software technologies, it remains challenging to develop Web services software that are correct, efficient, and flexible. Some challenges arise from increasingly demanding end user requirements for itpsilas quality and functionality. Other challenges arise from complexities associated with integrating embedded systems composed of modular components. Web services represent an evolution of the Web to allow the open and flexible interaction of applications over the Internet. XML Web services are the fundamental building blocks in the move to distributed computing on the Internet. In this paper, we focuses on integrating Component based development and Web Services to enable the development and usage of components through the Web by dynamically creating Web services for the functionalities of the components. XML Web services standards, which include SOAP, XML, and WSDL, provide a high level of interoperability across platforms, programming languages and applications and hence these facets of Web services have been used to integrate the best aspects of component based development and the Web.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125222335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O-Hoon Choi, Jung-Eun Lim, Hong-Seok Na, Kwan-Jae Seong, D. Baik
This paper proposes MDRDP (Metadata Registry based on Data Profiling) to minimize the time and human resource for analyzing and extracting metadata as criteria standard for data profiling. MDRDP is based on MDR (Metadata Registry) which is used for an international standard of standardizing and managing metadata for information sharing in various fields. By MDRDP, we can evaluate data quality with authorize metadata using methodology of data profiling. MDR can guarantee the quality of metadata so that results of quality evaluation would improve.
本文提出基于数据剖析的元数据注册表(Metadata Registry based on Data Profiling, MDRDP)作为数据剖析的标准,以最大限度地减少元数据分析和提取的时间和人力资源。MDRDP是在元数据注册表(Metadata Registry, MDR)的基础上建立的,MDR是一个标准化和管理元数据的国际标准,用于各个领域的信息共享。通过MDRDP,我们可以使用数据分析方法对授权元数据进行数据质量评估。MDR可以保证元数据的质量,从而提高质量评价的结果。
{"title":"An Efficient Method of Data Quality Evaluation Using Metadata Registry","authors":"O-Hoon Choi, Jung-Eun Lim, Hong-Seok Na, Kwan-Jae Seong, D. Baik","doi":"10.1109/ASEA.2008.46","DOIUrl":"https://doi.org/10.1109/ASEA.2008.46","url":null,"abstract":"This paper proposes MDRDP (Metadata Registry based on Data Profiling) to minimize the time and human resource for analyzing and extracting metadata as criteria standard for data profiling. MDRDP is based on MDR (Metadata Registry) which is used for an international standard of standardizing and managing metadata for information sharing in various fields. By MDRDP, we can evaluate data quality with authorize metadata using methodology of data profiling. MDR can guarantee the quality of metadata so that results of quality evaluation would improve.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"383 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120881127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we introduce the elementary UCONABC models for usage control (UCON), which integrate Authorizations (A), oBligations (B), and Conditions (C). We call these core models because they address the essence of UCON. UCONABC covers traditional access controls such as mandatory, discretionary, role-based access control, digital rights management (DRM) and other modern access controls. In the later part of the paper, the example of DRM application in UCONABC model is given to support the feasibility of UCONABC in real computer and information security world.
{"title":"DRM Application in UCONABC","authors":"Yonggang Ding, Junhua Zou","doi":"10.1109/ASEA.2008.14","DOIUrl":"https://doi.org/10.1109/ASEA.2008.14","url":null,"abstract":"In this paper, we introduce the elementary UCONABC models for usage control (UCON), which integrate Authorizations (A), oBligations (B), and Conditions (C). We call these core models because they address the essence of UCON. UCONABC covers traditional access controls such as mandatory, discretionary, role-based access control, digital rights management (DRM) and other modern access controls. In the later part of the paper, the example of DRM application in UCONABC model is given to support the feasibility of UCONABC in real computer and information security world.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"605 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123254744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we argue for the need for research in the area of aspect-oriented middleware for mobile real-time systems, covering concepts, principles, methods supporting the development of aspect-oriented middleware for mobile real-time systems. We give an overview of the state of the art in this area and show some of the research directions that have been considered up to now and describe ongoing efforts. We discuss the aspect-oriented middleware development method for mobile real-time systems, identify promising research directions and pose a number of research questions that could help to advance the state of the art in aspect-oriented middleware for mobile real-time systems.
{"title":"Aspect Oriented Middleware for Mobile Real-Time Systems","authors":"Qian Zhang, Lichen Zhang","doi":"10.1109/ASEA.2008.59","DOIUrl":"https://doi.org/10.1109/ASEA.2008.59","url":null,"abstract":"In this paper we argue for the need for research in the area of aspect-oriented middleware for mobile real-time systems, covering concepts, principles, methods supporting the development of aspect-oriented middleware for mobile real-time systems. We give an overview of the state of the art in this area and show some of the research directions that have been considered up to now and describe ongoing efforts. We discuss the aspect-oriented middleware development method for mobile real-time systems, identify promising research directions and pose a number of research questions that could help to advance the state of the art in aspect-oriented middleware for mobile real-time systems.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116111055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently much attention is paid to privacy issue in biometrics. In this paper, biometrics security technique using wavelet based watermarking is proposed. We present two kinds of methods that increase privacy protection level. First method is to embed ID watermark data to biometric image like fingerprint, face for backtracking when image missing. Second, as multi bio watermarking, fingerprint feature data are embedded to face image for hiding private biometric information. The proposed method for bio watermarking is based on the wavelet transform and minimizes recognition performance loss owing to watermark data embedding.
{"title":"Biometrics Security Scheme for Privacy Protection","authors":"Jong Gook Ko, Kiyoung Moon","doi":"10.1109/ASEA.2008.53","DOIUrl":"https://doi.org/10.1109/ASEA.2008.53","url":null,"abstract":"Recently much attention is paid to privacy issue in biometrics. In this paper, biometrics security technique using wavelet based watermarking is proposed. We present two kinds of methods that increase privacy protection level. First method is to embed ID watermark data to biometric image like fingerprint, face for backtracking when image missing. Second, as multi bio watermarking, fingerprint feature data are embedded to face image for hiding private biometric information. The proposed method for bio watermarking is based on the wavelet transform and minimizes recognition performance loss owing to watermark data embedding.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"27 15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127771211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a tool, named Static UML Model Generator from Analysis of Requirements (SUGAR), which generates both use-case and class models by emphasizing on natural language requirements. SUGAR aims at integrating both requirement analysis and design phases by identifying use-cases, actors, classes along with its attributes and methods with proper association among classes. This tool extends the idea of previously existing tools and implemented with the help of efficient natural language processing tools of Stanford NLP Group, WordNet and JavaRAP using the modified approach of Rational Unified Process with better accuracy. SUGAR has added new features and also able to incorporate solution for those problems existed in previous tools by developing both analysis and design class models. SUGAR generates all static UML models in Java in conjunction with Rational Rose and provides all functionalities of the system even though the developer is having less domain knowledge.
{"title":"Static UML Model Generator from Analysis of Requirements (SUGAR)","authors":"D. D. Kumar, R. Sanyal","doi":"10.1109/ASEA.2008.25","DOIUrl":"https://doi.org/10.1109/ASEA.2008.25","url":null,"abstract":"In this paper, we propose a tool, named Static UML Model Generator from Analysis of Requirements (SUGAR), which generates both use-case and class models by emphasizing on natural language requirements. SUGAR aims at integrating both requirement analysis and design phases by identifying use-cases, actors, classes along with its attributes and methods with proper association among classes. This tool extends the idea of previously existing tools and implemented with the help of efficient natural language processing tools of Stanford NLP Group, WordNet and JavaRAP using the modified approach of Rational Unified Process with better accuracy. SUGAR has added new features and also able to incorporate solution for those problems existed in previous tools by developing both analysis and design class models. SUGAR generates all static UML models in Java in conjunction with Rational Rose and provides all functionalities of the system even though the developer is having less domain knowledge.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131515468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Non-termination analysis of loop programs plays a central role in many applications, especially in the field of safety critical softwares. This paper presents a method to analyze non-termination of linear programs with conditionals. We transform the linear loop programs with conditionals into the nested linear loop programs, and then check whether the inner loop terminates or not by the positive eigenvalues and their corresponding eigenvectors. If one of the inner loop in the nested linear loop is non-terminating, then the linear loop is non-terminating. Otherwise, we need to use ranking function or finite differences of expressions over transition systems to analyze the termination of the outer loop.
{"title":"Non-termination Analysis of Linear Loop Programs with Conditionals","authors":"Zhongqin Bi, Meijing Shan, Bin Wu","doi":"10.1109/ASEA.2008.18","DOIUrl":"https://doi.org/10.1109/ASEA.2008.18","url":null,"abstract":"Non-termination analysis of loop programs plays a central role in many applications, especially in the field of safety critical softwares. This paper presents a method to analyze non-termination of linear programs with conditionals. We transform the linear loop programs with conditionals into the nested linear loop programs, and then check whether the inner loop terminates or not by the positive eigenvalues and their corresponding eigenvectors. If one of the inner loop in the nested linear loop is non-terminating, then the linear loop is non-terminating. Otherwise, we need to use ranking function or finite differences of expressions over transition systems to analyze the termination of the outer loop.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132200963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper an embedded, automated health-care monitoring service is presented. The proposed service is based on multi-agent system, which is usable for mobile computing environment. In proposed a modified (i.e., two-way handshaking) iSCSI protocol applied for higher transmission rate. The proposed system compared with resource constrained devices, and conventional system.
{"title":"A Health-Care Service for Mobile Computing","authors":"A. Md, Hyoung-Joong Kim","doi":"10.1109/ASEA.2008.28","DOIUrl":"https://doi.org/10.1109/ASEA.2008.28","url":null,"abstract":"In this paper an embedded, automated health-care monitoring service is presented. The proposed service is based on multi-agent system, which is usable for mobile computing environment. In proposed a modified (i.e., two-way handshaking) iSCSI protocol applied for higher transmission rate. The proposed system compared with resource constrained devices, and conventional system.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"24 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129215945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The traditional Architectural Description Languages ADLs lack the ability to describe the crosscutting concerns and crosscutting interactions in the software architecture, which result in the design of the system difficulty in comprehension, evolution and reuse. This paper proposes a new Aspect-Oriented ADL-AC2-ADL to provide a formal basis for representation of the tangling and scattering concerns and establish the software architecture with higher dependability.
{"title":"AC2-ADL: Architectural Description of Aspect-Oriented Systems","authors":"Wen Jing, Ying Shi, LinLin Zhang, YouCong Ni","doi":"10.1109/ASEA.2008.11","DOIUrl":"https://doi.org/10.1109/ASEA.2008.11","url":null,"abstract":"The traditional Architectural Description Languages ADLs lack the ability to describe the crosscutting concerns and crosscutting interactions in the software architecture, which result in the design of the system difficulty in comprehension, evolution and reuse. This paper proposes a new Aspect-Oriented ADL-AC2-ADL to provide a formal basis for representation of the tangling and scattering concerns and establish the software architecture with higher dependability.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125388391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aspect-oriented programming technology implements the software systems using crosscutting. Aspect-orientation can be modeled by extending UML, and AOSD model profile can be designed in the meta -model. The profile builds the aspect models from structural model, behavioral model, aspect and aspect weaving. Timing requirements could be separated from the system according the separation of concerns techniques, expressed as a time-aspect independence of the system, the real-time systems could be modeled from the static structure, dynamic behaviors and weaving of the time-aspect.
{"title":"Aspect-Oriented Analysis for Embedded Real-Time Systems","authors":"Lichen Zhang","doi":"10.1109/ASEA.2008.60","DOIUrl":"https://doi.org/10.1109/ASEA.2008.60","url":null,"abstract":"Aspect-oriented programming technology implements the software systems using crosscutting. Aspect-orientation can be modeled by extending UML, and AOSD model profile can be designed in the meta -model. The profile builds the aspect models from structural model, behavioral model, aspect and aspect weaving. Timing requirements could be separated from the system according the separation of concerns techniques, expressed as a time-aspect independence of the system, the real-time systems could be modeled from the static structure, dynamic behaviors and weaving of the time-aspect.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"975 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123079387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}