It is important and difficult for us to know the progress and quality of requirements analysis. We introduce chaos and software requirements complexity to the description of requirements decomposing, and get a method which can help us to evaluate the progress and quality. The model shows that requirements decomposing procedure has its own regular pattern which we can describe in a equation and track in a trajectory. The requirements analysis process of a software system can be taken as normal if its trajectory coincide with the model. We may be able to predict the time we need to finish all requirements decomposition in advance based on the model. We apply the method in the requirements analysis of homephone service management system, and the initial results show that the method is useful in the evaluation of requirements decomposition.
{"title":"Progress and Quality Modeling of Requirements Analysis Based on Chaos","authors":"Junwei Ge, Yiqiu Fang","doi":"10.1109/ASEA.2008.22","DOIUrl":"https://doi.org/10.1109/ASEA.2008.22","url":null,"abstract":"It is important and difficult for us to know the progress and quality of requirements analysis. We introduce chaos and software requirements complexity to the description of requirements decomposing, and get a method which can help us to evaluate the progress and quality. The model shows that requirements decomposing procedure has its own regular pattern which we can describe in a equation and track in a trajectory. The requirements analysis process of a software system can be taken as normal if its trajectory coincide with the model. We may be able to predict the time we need to finish all requirements decomposition in advance based on the model. We apply the method in the requirements analysis of homephone service management system, and the initial results show that the method is useful in the evaluation of requirements decomposition.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116249757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sohyang Ko, Seonsoo Jun, Kiyong Kim, Yeonseung Ryu
NAND flash memory based SSDs (solid state disks) have become an alternative storage device for future computer systems. Legacy operating system functionalities like file system and virtual memory system should be carefully re-designed since flash memory cannot be overwritten unless erased in advance. In this paper, we study the performance of garbage collection schemes when flash memory is used as the Linux swap storage. We have collected swap I/O traces from Linux kernel and performed trace-driven simulation. We found that Linux swap system must be re-designed in order to use flash memory as swap storage.
{"title":"Study on Garbage Collection Schemes for Flash-Based Linux Swap System","authors":"Sohyang Ko, Seonsoo Jun, Kiyong Kim, Yeonseung Ryu","doi":"10.1109/ASEA.2008.55","DOIUrl":"https://doi.org/10.1109/ASEA.2008.55","url":null,"abstract":"NAND flash memory based SSDs (solid state disks) have become an alternative storage device for future computer systems. Legacy operating system functionalities like file system and virtual memory system should be carefully re-designed since flash memory cannot be overwritten unless erased in advance. In this paper, we study the performance of garbage collection schemes when flash memory is used as the Linux swap storage. We have collected swap I/O traces from Linux kernel and performed trace-driven simulation. We found that Linux swap system must be re-designed in order to use flash memory as swap storage.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122083664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the software industry, an unsuccessful software development project bears the characteristics that it would have fewer features, be late, and be over budget. We participated in a project that suffered all the three characteristics. Looking back, we realized that we have made many wrong decisions. This paper, serving as a case study, discusses these mistakes, especially the major ones that contributed to the failure. The hope is that readers can benefit from the lessons we have learned in their future software development projects and have a better chance to make right decisions in similar situations.
{"title":"Factors Contribute to High Costs of Software Projects","authors":"Jie Liu, Xiaobin Li","doi":"10.1109/ASEA.2008.38","DOIUrl":"https://doi.org/10.1109/ASEA.2008.38","url":null,"abstract":"In the software industry, an unsuccessful software development project bears the characteristics that it would have fewer features, be late, and be over budget. We participated in a project that suffered all the three characteristics. Looking back, we realized that we have made many wrong decisions. This paper, serving as a case study, discusses these mistakes, especially the major ones that contributed to the failure. The hope is that readers can benefit from the lessons we have learned in their future software development projects and have a better chance to make right decisions in similar situations.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124747409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dynamic impact analysis produces more precise results than static impact analysis [1]. However, existing dynamic impact analysis techniques [2,3,4] do not consider the differences of object-oriented (OO) programs from procedural programs. We introduced a dynamic impact analysis approach [5] for OO programs that considers the unique features of OO programs compared to procedural ones and the dependency relationships of OO runtime program entities. In this paper, we present the further improved approach with the ability to identify runtime OO inheritance relationships. Furthermore, we present the implementation of our approach - a tool named Javatrade dynamic impact analyzer (JDIA) that can perform dynamic impact analysis for Java programs residing in a local or a remote Java virtual machine (JVM). Empirical studies of JDIA are presented to show that our approach produces more precise results than the existing dynamic impact analysis techniques by performing dependency analysis.
{"title":"A Dynamic Impact Analysis Approach for Object-Oriented Programs","authors":"Lulu Huang, Yeong-Tae Song","doi":"10.1109/ASEA.2008.62","DOIUrl":"https://doi.org/10.1109/ASEA.2008.62","url":null,"abstract":"Dynamic impact analysis produces more precise results than static impact analysis [1]. However, existing dynamic impact analysis techniques [2,3,4] do not consider the differences of object-oriented (OO) programs from procedural programs. We introduced a dynamic impact analysis approach [5] for OO programs that considers the unique features of OO programs compared to procedural ones and the dependency relationships of OO runtime program entities. In this paper, we present the further improved approach with the ability to identify runtime OO inheritance relationships. Furthermore, we present the implementation of our approach - a tool named Javatrade dynamic impact analyzer (JDIA) that can perform dynamic impact analysis for Java programs residing in a local or a remote Java virtual machine (JVM). Empirical studies of JDIA are presented to show that our approach produces more precise results than the existing dynamic impact analysis techniques by performing dependency analysis.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115044822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to construct the most suitable embedded software development environment, we design and implements the Retargetable Tool Suite for Embedded Software (RTS-ES) composed of target code generator, low power/energy optimizer, system simulator and debugger through the proposed Embedded Processor Description Language (EPDL).
{"title":"Development of the Retargetable Tool Suite for Embedded Software","authors":"K. Kwangman","doi":"10.1109/ASEA.2008.10","DOIUrl":"https://doi.org/10.1109/ASEA.2008.10","url":null,"abstract":"In order to construct the most suitable embedded software development environment, we design and implements the Retargetable Tool Suite for Embedded Software (RTS-ES) composed of target code generator, low power/energy optimizer, system simulator and debugger through the proposed Embedded Processor Description Language (EPDL).","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132767549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Choi, Jin Seok Park, Kyeong-hyo Lee, Byeong-Kyun Oh
A low-power sensor node in WSN requires minimum consumption of energy. It is essential to establish key to reduce the effect when the sensor node is revealed. This paper propose the protocol of pairwise key establishment between sensor node. The proposed method increases the availability by clustering the network in three dimensional, which has smaller number of path and better energy efficiency than the plane allocation. This paper discusses the key management for secure communication between sensor nodes after sensor allocation. We propose the protocol of pairwise key establishment scheme using bivariate polynomial based on cluster in order to safety against attack by revealing of node. The proposed method guarantee the availability by clustering the network in three dimensional, which has smaller number of path and better energy efficiency.
{"title":"The Three Dimensional Node Deployment for Sensor Network","authors":"I. Choi, Jin Seok Park, Kyeong-hyo Lee, Byeong-Kyun Oh","doi":"10.1109/ASEA.2008.63","DOIUrl":"https://doi.org/10.1109/ASEA.2008.63","url":null,"abstract":"A low-power sensor node in WSN requires minimum consumption of energy. It is essential to establish key to reduce the effect when the sensor node is revealed. This paper propose the protocol of pairwise key establishment between sensor node. The proposed method increases the availability by clustering the network in three dimensional, which has smaller number of path and better energy efficiency than the plane allocation. This paper discusses the key management for secure communication between sensor nodes after sensor allocation. We propose the protocol of pairwise key establishment scheme using bivariate polynomial based on cluster in order to safety against attack by revealing of node. The proposed method guarantee the availability by clustering the network in three dimensional, which has smaller number of path and better energy efficiency.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116886181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A series of business processes, based on Wf-XML, executing cooperatively and sharing information among customers, suppliers and business partners are used in electronic commerce. Wf-XML (Workflow-XML) is an asynchronous Web service protocol. A language defining XML-based protocol is suggested for the mutual linkage of the workflow engine. In this paper, the model is proposed to model the UML diagram on the resource model provided in Wf-XML to link different workflow engines. It facilitates understanding workflow for links and cooperation between enterprises.
{"title":"UML Modeling for the Workflow Engine Using Wf-XML Resource","authors":"Hyejin Jeong, Myung-Ju Shin, Yong-Sung Kim","doi":"10.1109/ASEA.2008.50","DOIUrl":"https://doi.org/10.1109/ASEA.2008.50","url":null,"abstract":"A series of business processes, based on Wf-XML, executing cooperatively and sharing information among customers, suppliers and business partners are used in electronic commerce. Wf-XML (Workflow-XML) is an asynchronous Web service protocol. A language defining XML-based protocol is suggested for the mutual linkage of the workflow engine. In this paper, the model is proposed to model the UML diagram on the resource model provided in Wf-XML to link different workflow engines. It facilitates understanding workflow for links and cooperation between enterprises.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115857209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hand-held devices are rapidly becoming a common technology at work, school, and play. The technologies related with hand-held devices have widely applied to the areas of ubiquitous computing or embedded computing. In recent years, context-aware computing is rapidly developing and can bring important benefits such as interaction with computation by explicit acts of communication and implicit context. In this paper, we present CAWET (Context-Aware Workflow Editor Tool), a context-aware, adaptive and personalized development tool that can edit userpsilas current context information in ubiquitous computing environment through hand-held devices. In order to enhance the support offered by hand-held devices to users, enhanced convenience, more services and functionalities will be added into an initial workflow scenario without interfering workflow services. CAWET architecture provides context-aware information by using uWDL document as the context, which is not only used to express context data but also relation information among services into the fields of its nodes. The suggested CAWET uses an algorithm for context comparison between context sub-tree and userpsilas situation information. The algorithm selects a context that has values and types entirely equal to those of the userpsilas contexts.
{"title":"CAWET: A Tool of Context-Aware Workflow with Hand-Held Devices","authors":"Peng Li, Yongyun Cho, Jaeyoung Choi","doi":"10.1109/ASEA.2008.44","DOIUrl":"https://doi.org/10.1109/ASEA.2008.44","url":null,"abstract":"Hand-held devices are rapidly becoming a common technology at work, school, and play. The technologies related with hand-held devices have widely applied to the areas of ubiquitous computing or embedded computing. In recent years, context-aware computing is rapidly developing and can bring important benefits such as interaction with computation by explicit acts of communication and implicit context. In this paper, we present CAWET (Context-Aware Workflow Editor Tool), a context-aware, adaptive and personalized development tool that can edit userpsilas current context information in ubiquitous computing environment through hand-held devices. In order to enhance the support offered by hand-held devices to users, enhanced convenience, more services and functionalities will be added into an initial workflow scenario without interfering workflow services. CAWET architecture provides context-aware information by using uWDL document as the context, which is not only used to express context data but also relation information among services into the fields of its nodes. The suggested CAWET uses an algorithm for context comparison between context sub-tree and userpsilas situation information. The algorithm selects a context that has values and types entirely equal to those of the userpsilas contexts.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130383532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In computer crimes, even in general crimes, important evidence or clues are increasingly stored in a variety of electronic media, such as computer or mobile devices. The digital data is easily duplicated and it is difficult to discriminate the original from a copy. Further, the digital data can be easily falsified, changed, or deleted from the original data. Therefore, criminal investigations need high level forensic technologies to get better evidences from digital data in suspectspsila computers. This paper is about forensic analyses for digital evidences including a lot of images like pictures and photos. Usually forensic examiners open to check every image files included at hard disks of suspectspsila computers or memory cards. If they have huge amount of images, it takes too much time to check and analyze them. Therefore we use an image filter applying a learning model to divide them into some categories automatically. Through this way, forensic examiners can check out only related image files and then reduce analyzing time. Since, in advance, forensic examiners make some categories for classifying images and input and learn huge amount of image samples to this image filter, accuracy for classifying image files could be improved.
{"title":"A Forensic Investigation for Suspects' Digital Evidences Using Image Categorization","authors":"Youngsoo Kim, Dowon Hong, Dong-Hyun Won","doi":"10.1109/ASEA.2008.19","DOIUrl":"https://doi.org/10.1109/ASEA.2008.19","url":null,"abstract":"In computer crimes, even in general crimes, important evidence or clues are increasingly stored in a variety of electronic media, such as computer or mobile devices. The digital data is easily duplicated and it is difficult to discriminate the original from a copy. Further, the digital data can be easily falsified, changed, or deleted from the original data. Therefore, criminal investigations need high level forensic technologies to get better evidences from digital data in suspectspsila computers. This paper is about forensic analyses for digital evidences including a lot of images like pictures and photos. Usually forensic examiners open to check every image files included at hard disks of suspectspsila computers or memory cards. If they have huge amount of images, it takes too much time to check and analyze them. Therefore we use an image filter applying a learning model to divide them into some categories automatically. Through this way, forensic examiners can check out only related image files and then reduce analyzing time. Since, in advance, forensic examiners make some categories for classifying images and input and learn huge amount of image samples to this image filter, accuracy for classifying image files could be improved.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131775464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A.A.A. Jilanic, A. Nadeem, Tai-hoon Kim, Eun-suk Cho
Structured analysis and design methodology has now been replaced by object oriented analysis and design software development techniques. A major design artifact in structured approach is the data flow diagram (DFD). DFD is very important for the modernization of old legacy systems. It is also very useful in requirement elicitation. However, DFD lacks formalism and by representing DFD formally, ambiguity and inconsistencies can be removed. Formal representation of DFD and its formal semantics help in better understanding of requirements and design. In this paper, we present a survey of techniques that formally represent or give formal semantics to the data flow diagram. We analyze formal representation techniques using analysis parameters. On the basis of identified parameters, we present an analysis table, which describes the strengths and weaknesses of representation techniques.
{"title":"Formal Representations of the Data Flow Diagram: A Survey","authors":"A.A.A. Jilanic, A. Nadeem, Tai-hoon Kim, Eun-suk Cho","doi":"10.1109/ASEA.2008.34","DOIUrl":"https://doi.org/10.1109/ASEA.2008.34","url":null,"abstract":"Structured analysis and design methodology has now been replaced by object oriented analysis and design software development techniques. A major design artifact in structured approach is the data flow diagram (DFD). DFD is very important for the modernization of old legacy systems. It is also very useful in requirement elicitation. However, DFD lacks formalism and by representing DFD formally, ambiguity and inconsistencies can be removed. Formal representation of DFD and its formal semantics help in better understanding of requirements and design. In this paper, we present a survey of techniques that formally represent or give formal semantics to the data flow diagram. We analyze formal representation techniques using analysis parameters. On the basis of identified parameters, we present an analysis table, which describes the strengths and weaknesses of representation techniques.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134219817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}