(ASE 2001) Proceedings. Conference on. 16th Annual International CGIPUTER. Los Alamitos, California Washington Brussels Tokyo November 2001
|
|
- Ilene Ellis
- 5 years ago
- Views:
Transcription
1 Proceedings 16th Annual International Conference on n Automated Software Engineering (ASE 2001) November 2001 Loew s Coronado Bay Resort Coronado Island San Diego, California Sponsored by IEEE Computer Society Technical Committee on Software Engineering ACM SIGSoft ACM SIGArt CGIPUTER SOCIETY Los Alamitos, California Washington Brussels Tokyo
2 Copyright by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA Other copying, reprint, or republication requests should be addressed to: IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, P.O. Box 1331, Piscataway, NJ The papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. They reflect the authors opinions and, in the interests of timely dissemination, are published as presented and without change. Their inclusion in this publication does not necessarily constitute endorsement by the editors, the IEEE Computer Society, or the Institute of Electrical and Electronics Engineers, Inc. IEEE Computer Society Order Number PRO1426 ISBN X ISBN (bookbroker) ISBN (microfiche) ISSN Additional copies may be ordered from: IEEE Computer Society Customer Service Center Los Vaqueros Circle P.O. Box 3014 LOS Alamitos, CA Tel: Fax: csbooks@computer.org IEEE Service Center 445 Hoes Lane P.O. Box 1331 Piscataway, NJ Tel: Fax: customer-service@ieee.org IEEE Computer Society AsiaPacific Office Watanabe Bldg., Minami- Aoyama Minato-ku, Tokyo JAPAN Tel: Fax: tokyo.ofc@cornputer.org Editorial production by Randall Bilof and Lorretta Palagi Cover Artist - Joe DaigldStudio Productions Printed in the United States of America by The Printing House SOCIETY
3 Table of Contents 16th IEEE International Conference on Automated Software Engineering-ASE 2001 Preface Organizing and Steering Committees Program Committee Additional Reviewers Participating Countries Keynote Address xi xii xiii xiii xiv xv Regular Papers Session I-A: Testing I A New Way of Automating Statistical Testing Methods 5 S.-D. Gouraud, A. Denise, M.-C. Gaudel, and B. Marre Automatic Test Data Generation for Programs with Integer and Float Variables 13 N. Tran Sy and Y. Deville TesEra: A Novel Framework for Automated Testing of Java Programs 22 D. Marinov and S. Khurshid Session I-B: TransformatiodConstruction I Generating ED1 Message Translations from Visual Specifications 35 J. Grundy, R. Mugridge, J. Hosking, and P. Kendall The Synthesis of a Java-Card Tokenization Algorithm 43 E. Denney Wins and Losses of Algebraic Transformations of Software Architectures 51 H. Fahmy, R. Holt, and J. Cordy Session 11-A: Verification and ValidatiodHigh-Assurance Systems Acceptance-Based Assurance 63 C. O Hallorant V
4 Specification Modeling and Validation Applied to a Family of Network Security Products 71 R. Hall Certifying Domain-Specific Policies 81 M Lowly, T. Pressburger, and G. Roju Automated Validation of Software Models 91 S. Sims, R. Cleaveland, K. Butts, and S. Ranville Session 11-B: Structure Context-Aware Browsing of Large Component Repositories 99 Y. Ye and G. Fischer Identification of High-Level Concept Clones in Source Code 107 A. Marcus and.i. Maletic Static Consistency Checking for Distributed Specifications 115 C. Nentwich, W. Enzmerich, and A. Finkelstein Session 111-A: Testing I1 Test Purposes: Adapting the Notion of Specification to Testing 127 Y. Ledru, L. du Bousquet, P. Bontron, 0. Mnury, C. Oriat, and M.-L. Potet Monitoring Programs Using Rewriting 135 K. Havelund and G. Rop Program Execution-Based Module Cohesion Measurement 144 N. Gupta and P. Rao Session 111-B: TransformatiodConstruction I1 Composition and Refinement of Behavioral Specifications 157 D. Pavlovic and D. Smith Instantiating and Detecting Design Patterns: Putting Bits and Pieces Together 166 H. Albin-Atniot, P. Cointe, Y.-G. Gukhkneuc, and N. Jussien Connectors Synthesis for Deadlock-Free Component-Based Architectures 174 P. Inverardi and S. Scriboni vi
5 Session IV-A: AnalysidReal Time Modeling and Verification of Distributed Real-Time Systems Based on CafeOBJ 185 K. Ogata and K. Futatsugi Generation of Distributed System Test-Beds from High-Level Software Architecture Descriptions 193 J. Grundy, Y. Cai, and A. Liu Tailoring a COTS Group Support System for Software Requirements Inspection 20 1 M. Halling, P. Griinbacher, and S. Bijjl Session IV-B: Reverse Engineering and Integration Automatically Restructuring Programs for the Web 21 1 P. Graunke, R. Findler, S. Krishnamurthi, and M. Felleisen Unfriendly COTS Integration-Instrumentation and Interfaces for Improved Plugability 223 A. Egyed and R. Balzer Adequate Reverse Engineering 232 S. Rugaber, T. Shikano, and R. Stirewalt Session V-A: Model Checking Enhancing Partial-Order Reduction via Process Clustering 245 T. Basfen and D. BoSnaEki Exploiting Heap Symmetries in Explicit-State Model Checking of Software 254 R. Iosif Combining Static Analysis and Model Checking for Software Analysis G. Bratand W. Visser Session V-B: Specification and Model Engineering Towards a Precise Definition of the OMG/MDA Framework 273 J. Btziviri and 0. Gerbk Shared Variables Interaction Diagrams 28 1 R. Alur and R. Grosu Modeling Class Operations in B: Application to UML Behavioral Diagrams 289 H. Le Dang and J. Souquikres Automated Software Engineering Using Concurrent Class Machines 297 R. Grosu, Y. Liu, S. Smolka, S. Stoller, and J. Yan vii
6 Short Papers Higher Order Function Synthesis Through Proof Planning 307 A. Cook, A. Ireland, and G. Michaelson AGATE, Access Graph-Based Tools for Handling Encapsulation 311 G. Ardourel and M. Huchard A UML Validation Toolset Based on Abstract State Machines 315 W. Shen, K. Compton, and J. Huggins Semi-Automated Verification of Erlang Code 319 L.-A. Fredlund, D. Gurov, and T. No11 Automatic Verification of Java Design Patterns 324 A. Blewitt, A. Bundy, and I. Stark Tracing Execution of Software for Design Coverage 328 R. Lencevicius, E. Metz, and A. Ran Model Checking for an Executable Subset of UML 333 F. Xie, V. Levin, and J. Browne A Technique for Mutation of Java Objects 337 J. Bieman, S. Ghosh, and R. Alexander Providing Early Feedback in the Development Cycle Through Automated Application of Model Checking to Software Architectures 34 1 K. Barber, T. Graser, and J. HoEt Automated Check of Architectural Models Consistency Using SPIN 346 P. Inverardi, H. Muccini, and P. Pelliccione Automating the Performance and Reliability Analysis of Enterprise Information Systems 350 A. Zarras and V. Issarny An Analysis-Revision Cycle to Evolve Requirements Specifications 354 A. d Avila Garcez, A. Russo, B. Nuseibeh, and J. Kramer Knowledge Base Approach to Consistency Management of UML Specifications 359 A. Zisman and A. Kozlenkov Strategies for Automated Specification-Based Testing of Synchronous Software 364 I. Parissis and J. Vassy Developing Generative Frameworks Using XML 368 I. McLaren and T. Wicks A Tool for Lazy Verification of Security Protocols 373 Y. Chevalier and L. Vigneron... Vlll
7 Generation of Functional Test Sequences from B Formal Specifications-Presentation and Industrial Case Study 377 B. Legeard and F. Peureux Action Language Verifier 382 T. Bultan and T. Yavuz-Kahveci Scalable Consistency Checking Between Diagrams-The ViewIntegra Approach 387 A. Egyed Better Reasoning About Software Engineering Activities 39 1 T. Menzies and J. Kiper AmphiodNAV: Deductive Synthesis of State Estimation Software 395 J. Whittle, J. Van Baalen, J. Schumann, P. Robinson, T. Pressburger, J. Penix, P. Oh, M. Lowry, and G. Brat Programs Are Abstract Data Types 400 M. Erwig An Automated Tool for Analyzing Petri Nets Using SPIN 404 G. Gannod and S. Gupta Formally Testing Fail-Safety of Electronic Purse Protocols 408 J. Jiirjens and G. Wirnmel Automata-Based Verification of Temporal Properties on Running Programs 412 D. Giannakopoulou and K. Havelund Towards an Evolutionary Formal Software Development 417 D. Hutter and A. Schairer A Concurrency Test Tool for Java Monitors 42 1 B. Long, D. Hoffman, and P. Strooper Enforcing Business Policies Through Automated Reconfiguration 426 L. Andrade, J. Fiadeiro, and M. Werrnelinger Doctoral Symposium Abstracts Design Rationale for Software Maintenance 433 J. Burge and D. Brown (Worcester Polytechnic Institute, USA) Security Specification and Verification 434 P. Fenkarn (Technical University of Vienna, Austria) Implementation of Specification Conjunction and Domain Interaction in Rosetta 435 C. Kong (University of Kansas, USA) ix
8 Automatic Translation from UML Specifications to B 436 H. Le Dang (University of Nancy 2, France) Automated Conversion from a Requirements Document to an Executable Formal Specification 431 B.3. Lee (University of Alabama at Birmingham, USA) Automated Test-Data Generation from Formal Models of Software 438 S. Rayadurgam (University of Minnesota, USA) Model-Checking Real-Time Concurrent Systems 439 I. Romanovsky (University of Durham, UK) Verify Properties of Mobile Code 440 S. Xia (Oregon Health and Science University, USA) Author Index 44 1 X
Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation
Proceedings Second IEEE International Workshop on Source Code Analysis and Manipulation Proceedings Second IEEE International Workshop on Source Code Analysis and Manipulation 1 October 2002 Montreal,
More informationSixth IEEE International Symposium on High Assurance Systems Engineering
Sixth IEEE International Symposium on High Assurance Systems Engineering Special Topic: Impact of Networking 22-24 October 2001 Boca Raton, Florida, USA Sponsored by the IEEE Computer Society Technical
More informationIEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003
IEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003 17 October 2003 Nice, France Los Alamitos, California Washington Brussels Tokyo Copyright 2003 by The Institute of Electrical
More informationProceedings. 14 th IEEE International Workshop on. Rapid Systems Prototyping RSP 2003
Proceedings 14 th IEEE International Workshop on Rapid Systems Prototyping RSP 2003 Proceedings 14 th IEEE International Workshop on Rapid Systems Prototyping San Diego, California, USA June 9 11, 2003
More informationProceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002)
Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002) Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce
More informationSoftware Reliability Engineering
Proceedings lzth International Symposium on Software Reliability Engineering ISSRE 2001 Proceedings lzfh International Symposium on Software Reliability Engineering ISSRE 2001 27-30 November Hong Kong,
More informationCOMPUTER PROCEEDINGS OF SOCIETY. THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program)
PROCEEDINGS OF THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program) 3-6 December 2001, Kyoto, Japan Organized by WISE Society Kyoto University, Japan EDITORS
More informationFuture Trends of Distributed Computing Systems
Proceedings The Eighth IEEE Workshop on Future Trends of Distributed Computing Systems FTDCS 2001 31 October 2 November 2001 Bologna, Italy Sponsored by IEEE Computer Society Los Alamitos, California Washington
More informationProceedings. Ninth International Conference on. Network Protocols ICNP 2001
Proceedings Ninth International Conference on Network Protocols ICNP 2001 Proceedings Ninth International Conference on Network Protocols ICNP 2001 11-14 November 2001 Riverside, California, USA Sponsored
More informationProceedings Pacific Rim International Symposium on Dependable Computing PRDC 2002
Proceedings 2002 Pacific Rim International Symposium on Dependable Computing PRDC 2002 i [blank page] ii Proceedings 2002 Pacific Rim International Symposium on Dependable Computing PRDC 2002 16-18 December
More informationFuture Trends of Distributed Computing Systems
Proceedings The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems FTDCS 2003 28-30 May 2003 San Juan, Puerto Rico Sponsored by IEEE Computer Society Los Alamitos, California Washington
More informationth International Conference on Telecommunications (ICT 2017)
2017 24th International Conference on Telecommunications (ICT 2017) Limassol, Cyprus 3-5 May 2017 IEEE Catalog Number: ISBN: CFP17530-POD 978-1-5386-0644-5 Copyright 2017 by the Institute of Electrical
More informationProceedings. Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing
Proceedings Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing ISORC 2003 Proceedings Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing
More information2017 International Conference on Communication Technologies (ComTech 2017)
2017 International Conference on Communication Technologies (ComTech 2017) Rawalpindi, Pakistan 19 21 April 2017 IEEE Catalog Number: ISBN: CFP17CMR-POD 978-1-5090-5985-0 Copyright 2017 by the Institute
More informationHome Inspection 2014
Home Inspection 2014 Home Inspection A fifteen hour continuing education course approved by the California Bureau of Real Estate (CalBRE) to meet the requirements of the Business and Professions Code Section
More informationDigital Signal Processing System Design: LabVIEW-Based Hybrid Programming Nasser Kehtarnavaz
Digital Signal Processing System Design: LabVIEW-Based Hybrid Programming Nasser Kehtarnavaz Digital Signal Processing System Design: LabVIEW-Based Hybrid Programming by Nasser Kehtarnavaz University
More informationPractical Database Programming with Visual Basic.NET
Practical Database Programming with Visual Basic.NET IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE Press Editorial Board Lajos Hanzo, Editor in Chief R. Abari M. El-Hawary S. Nahavandi J. Anderson
More informationMulti-Core Programming
Multi-Core Programming Increasing Performance through Software Multi-threading Shameem Akhter Jason Roberts Intel PRESS Copyright 2006 Intel Corporation. All rights reserved. ISBN 0-9764832-4-6 No part
More informationProceedings December 2001 New Orleans, Louisiana. Sponsored by. Applied Computer Security Associates. Los Alamitos, California
Proceedings 17th Annual Computer Security Applications Conference 10 14 December 2001 New Orleans, Louisiana Sponsored by Applied Computer Security Associates Los Alamitos, California Washington Brussels
More informationAgile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler
Agile Database Techniques Effective Strategies for the Agile Software Developer Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Agile Database Techniques
More informationCOMPONENT-ORIENTED PROGRAMMING
COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING ANDY JU AN WANG KAI QIAN Southern Polytechnic State University Marietta, Georgia A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2005 by John
More information2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015)
2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015) Bangalore, India 9-11 September 2015 IEEE Catalog Number: ISBN: CFP15604-POD 978-1-4673-9278-5 Copyright
More informationDESIGN AND VALIDATION OF COMPUTER PROTOCOLS
DESIGN AND VALIDATION OF COMPUTER PROTOCOLS Gerard J. Holzmann Bell Laboratories Murray Hill, New Jersey 07974 PRENTICE-HALL Englewood Cliffs, New Jersey 07632 Prentice Hall Software Series Brian W. Kernighan,
More informationStudy Guide. Robert Schmidt Dane Charlton
Study Guide Study Guide Robert Schmidt Dane Charlton Senior Acquisitions Editor: Kenyon Brown Development Editor: Candace English Technical Editors: Eric Biller and Brian Atkinson Production Editor: Christine
More informationLearning-Based Assume-Guarantee Verification (Tool Paper)
-Based Assume-Guarantee Verification (Tool Paper) Dimitra Giannakopoulou and Corina S. Păsăreanu NASA Ames Research Center, Moffett Field, CA 94035-1000, USA 1 Introduction Despite significant advances
More informationCOSO Enterprise Risk Management
COSO Enterprise Risk Management COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc. Copyright # 2007,
More informationMicroprocessor Theory
Microprocessor Theory and Applications with 68000/68020 and Pentium M. RAFIQUZZAMAN, Ph.D. Professor California State Polytechnic University Pomona, California and President Rafi Systems, Inc. WILEY A
More informationMODERN MULTITHREADING
MODERN MULTITHREADING Implementing, Testing, and Debugging Multithreaded Java and C++/Pthreads/Win32 Programs RICHARD H. CARVER KUO-CHUNG TAI A JOHN WILEY & SONS, INC., PUBLICATION MODERN MULTITHREADING
More informationTHE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING
FOURTH EDITION THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING AN INFORMATION TECHNOLOGY APPROACH Irv Englander Bentley University John Wiley & Sons, Inc. Vice President & Executive
More informationModeling Architecture for COBIT
Volume 3, July 2011 Modeling Architecture for COBIT By Reinhold Thurner, Ph.D. Models and frameworks are used as a means to describe the structure and properties of processes and to provide guidelines
More information"Charting the Course... MOC A Developing Microsoft SQL Server 2012 Databases. Course Summary
Course Summary Description This 5-day instructor-led course introduces SQL Server 2012 and describes logical table design, indexing and query plans. It also focuses on the creation of database objects
More informationFlight Systems are Cyber-Physical Systems
Flight Systems are Cyber-Physical Systems Dr. Christopher Landauer Software Systems Analysis Department The Aerospace Corporation Computer Science Division / Software Engineering Subdivision 08 November
More informationWIRELESS SENSOR NETWORKS A Networking Perspective Edited by Jun Zheng Abbas Jamalipour A JOHN WILEY & SONS, INC., PUBLICATION WIRELESS SENSOR NETWORKS IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE
More informationAn Introduction to Programming with IDL
An Introduction to Programming with IDL Interactive Data Language Kenneth P. Bowman Department of Atmospheric Sciences Texas A&M University AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN
More informationThis is a preview - click here to buy the full publication PUBLICLY AVAILABLE SPECIFICATION. Pre-Standard
PUBLICLY AVAILABLE SPECIFICATION Pre-Standard IEC PAS 61512-3 First edition 2004-11 Batch control Part 3: General and site recipe models and representation Reference number IEC/PAS 61512-3:2004(E) AMERICAN
More informationThis content has been downloaded from IOPscience. Please scroll down to see the full text.
This content has been downloaded from IOPscience. Please scroll down to see the full text. Download details: IP Address: 148.251.232.83 This content was downloaded on 22/11/2018 at 08:50 Please note that
More informationLEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS
More informationImplementing Security and Tokens: Current Standards, Tools, and Practices
Implementing Email Security and Tokens: Current Standards, Tools, and Practices Sean Turner Russ Housley Wiley Publishing, Inc. Implementing Email Security and Tokens: Current Standards, Tools, and Practices
More informationComputation Independent Model (CIM): Platform Independent Model (PIM): Platform Specific Model (PSM): Implementation Specific Model (ISM):
viii Preface The software industry has evolved to tackle new approaches aligned with the Internet, object-orientation, distributed components and new platforms. However, the majority of the large information
More informationEncyclopedia of Information Science and Technology
Encyclopedia of Information Science and Technology Second Edition Mehdi Khosrow-Pour Information Resources Management Association, USA Volume IV G-Internet INFORMATION SCIENCE REFERENCE Hershey New York
More informationJoin the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle
Join the discussion @ p2p.wrox.com Wrox Programmer to Programmer Beginning PHP 5.3 Matt Doyle Programmer to Programmer Get more out of WROX.com Interact Take an active role online by participating in our
More informationSwinburne Research Bank
Swinburne Research Bank http://researchbank.swinburne.edu.au Kamalrudin, M. & Grundy, J. (2011). Generating essential user interface prototypes to validate requirements. Originally published in Proceedings
More informationRelational Database Index Design and the Optimizers
Relational Database Index Design and the Optimizers DB2, Oracle, SQL Server, et al. Tapio Lahdenmäki Michael Leach A JOHN WILEY & SONS, INC., PUBLICATION Relational Database Index Design and the Optimizers
More informationJPF SE: A Symbolic Execution Extension to Java PathFinder
JPF SE: A Symbolic Execution Extension to Java PathFinder Saswat Anand 1,CorinaS.Păsăreanu 2, and Willem Visser 2 1 College of Computing, Georgia Institute of Technology saswat@cc.gatech.edu 2 QSS and
More informationPre-Standard PUBLICLY AVAILABLE SPECIFICATION IEC PAS Batch control. Part 3: General and site recipe models and representation
PUBLICLY AVAILABLE SPECIFICATION Pre-Standard IEC PAS 61512-3 First edition 2004-11 Batch control Part 3: General and site recipe models and representation Reference number IEC/PAS 61512-3:2004(E) Publication
More informationSELECTED TOPICS in APPLIED COMPUTER SCIENCE
A Tool for Detecting Detects on Class Implementation in Object Oriented Program on the Basis of the Law of Demeter: Focusing on Dependency between Packages RYOTA CHIBA, HIROAKI HASHIURA and SEIICHI KOMIYA
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 24744 Second edition 2014-11-15 Software engineering Metamodel for development methodologies Ingénierie du logiciel Métamodèle pour les méthodologies de développement Reference
More informationLEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS
More informationProfessional ASP.NET 2.0 Databases. Thiru Thangarathinam
Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Published by Wiley
More informationProceedings of The Second International Conference on Web Information Systems Engineering
Proceedings of The Second International Conference on Web Information Systems Engineering Volume 1 (Main Program) 3-6 December 2001 Kyoto, Japan Editors Tamer Ozsu Hans-Jorg Schek Katsumi Tanaka Yanchun
More informationProceedings Pacific Rim International Symposium on Dependable Computing PRDC 2001
Proceedings 2001 Pacific Rim International Symposium on Dependable Computing PRDC 2001 ~~ ~~~~~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ Proceedings 2001 Pacific Rim International Symposium on Dependable Computing 17-1 9 December
More informationMastering UNIX Shell Scripting
Mastering UNIX Shell Scripting Bash, Bourne, and Korn Shell Scripting for Programmers, System Administrators, and UNIX Gurus Second Edition Randal K. Michael Wiley Publishing, Inc. Mastering UNIX Shell
More informationFlorian Müller Jay Brown Jeff Potts. FOREWORDS BY Richard J. Howarth John Newton MANNING.
Florian Müller Jay Brown Jeff Potts FOREWORDS BY Richard J. Howarth John Newton MANNING CMIS and Apache Chemistry in Action CMIS and Apache Chemistry in Action FLORIAN MÜLLER JAY BROWN JEFF POTTS MANNING
More informationCOMMUNICATION PROTOCOL ENGINEERING
COMMUNICATION PROTOCOL ENGINEERING COMMUNICATION PROTOCOL ENGINEERING SECOND EDITION PALLAPA VENKATARAM Professor Department of Electrical Communication Engineering Indian Institute of Science Bangalore
More informationIntroduction to Software Engineering p. 1 The Scope of Software Engineering p. 3 Historical Aspects p. 4 Economic Aspects p. 7 Maintenance Aspects p.
Preface p. xv Introduction to Software Engineering p. 1 The Scope of Software Engineering p. 3 Historical Aspects p. 4 Economic Aspects p. 7 Maintenance Aspects p. 8 Specification and Design Aspects p.
More informationEnterprise - Control System Integration Part 2: Object Model Attributes
ISA Draft 95.00.02 Draft Standard Enterprise - Control System Integration Part 2: Object Model Attributes Draft 9 May 2001 Deleted: 8 Deleted: April This document is a draft that represents work being
More informationDIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING
DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING ORDINARY DIFFERENTIAL EQUATION APPLICATIONS WITH R William E. Schiesser
More informationProgramming Practices By Joe Feliu in conjunction with Harris Kern s Enterprise Computing Institute
Programming Practices By Joe Feliu in conjunction with Harris Kern s Enterprise Computing Institute Description: Is programming an art or a science? This debate, dating back to the early days of software
More informationFunctional Programming in R
Functional Programming in R Advanced Statistical Programming for Data Science, Analysis and Finance Thomas Mailund Functional Programming in R: Advanced Statistical Programming for Data Science, Analysis
More information7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak
Take control of Windows 7 Unlock hidden settings Rev up your network Disable features you hate, for good Fine-tune User Account control Turbocharge online speed Master the taskbar and start button Customize
More informationLinux Command Line and Shell Scripting Bible
Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing, Inc. Linux Command Line and Shell Scripting Bible Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing,
More informationAn Approach to the Generation of High-Assurance Java Card Applets
An Approach to the Generation of High-Assurance Java Card Applets Alessandro Coglio Kestrel Institute 3260 Hillview Avenue, Palo Alto, CA 94304, USA Ph. +1-650-493-6871 Fax +1-650-424-1807 http://www.kestrel.edu/
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationACH Audit Guide Step-by-Step Guidance and Interactive Form For Internal ACH Audits Audit Year 2018
Publications ACH Audit Guide Step-by-Step Guidance and Interactive Form For Internal ACH Audits Audit Year 2018 Price: $399 Member Price: $199 (Publication #500-18) A new approach to payments advising
More informationMapping Bug Reports to Relevant Files and Automated Bug Assigning to the Developer Alphy Jose*, Aby Abahai T ABSTRACT I.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 1 ISSN : 2456-3307 Mapping Bug Reports to Relevant Files and Automated
More informationAlgorithms and Parallel Computing
Algorithms and Parallel Computing Algorithms and Parallel Computing Fayez Gebali University of Victoria, Victoria, BC A John Wiley & Sons, Inc., Publication Copyright 2011 by John Wiley & Sons, Inc. All
More informationINTRUSION DETECTION AND CORRELATION. Challenges and Solutions
INTRUSION DETECTION AND CORRELATION Challenges and Solutions Advances in Information Security Sushil Jajodia Consulting editor Center for Secure Information Systems George Mason University Fairfax, VA
More informationMeredith Lichtenstein Cone, MPH Manager, Surveillance and Informatics Program May 8, 2018
Meredith Lichtenstein Cone, MPH Manager, Surveillance and Informatics Program May 8, 2018 Overview POSITION STATEMENTS Position Statements Purpose To document and analyze policy and/or standardized surveillance
More informationModern Experimental Design
Modern Experimental Design THOMAS P. RYAN Acworth, GA Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Copyright C 2007 by John Wiley & Sons, Inc. All rights reserved.
More information"Charting the Course... MOC C: Developing SQL Databases. Course Summary
Course Summary Description This five-day instructor-led course provides students with the knowledge and skills to develop a Microsoft SQL database. The course focuses on teaching individuals how to use
More informationMastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications
Mastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications Gregory Nyberg Robert Patrick Paul Bauerschmidt Jeffrey McDaniel Raja Mukherjee Mastering BEA WebLogic Server
More informationImpact of Dependency Graph in Software Testing
Impact of Dependency Graph in Software Testing Pardeep Kaur 1, Er. Rupinder Singh 2 1 Computer Science Department, Chandigarh University, Gharuan, Punjab 2 Assistant Professor, Computer Science Department,
More informationDistributed Systems Programming (F21DS1) Formal Verification
Distributed Systems Programming (F21DS1) Formal Verification Andrew Ireland Department of Computer Science School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh Overview Focus on
More informationAn Overview of Integration Testing Techniques for Object-Oriented Programs
To appear in Proceedings of the 2nd ACIS Annual International Conference on Computer and Information Science (ICIS 2002), International Association for Computer and Information Science, Mt. Pleasant, Michigan
More informationTHE DESIGNER S GUIDE TO VERILOG-AMS
THE DESIGNER S GUIDE TO VERILOG-AMS THE DESIGNER S GUIDE BOOK SERIES Consulting Editor Kenneth S. Kundert Books in the series: The Designer s Guide to Verilog-AMS ISBN: 1-00-80-1 The Designer s Guide to
More informationInformation Technology Programming languages, their environments, and system software interfaces Floating-point extensions for C.
TECHNICAL SPECIFICATION ISO/IEC TS 18661-4 First edition 2015-10-01 Information Technology Programming languages, their environments, and system software interfaces Floating-point extensions for C Part
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO 10160 Third edition 2015-05-01 Information and documentation Open Systems Interconnection Interlibrary Loan Application Service Definition Information et documentation Interconnexion
More informationINFORMATION RETRIEVAL SYSTEMS: Theory and Implementation
INFORMATION RETRIEVAL SYSTEMS: Theory and Implementation THE KLUWER INTERNATIONAL SERIES ON INFORMATION RETRIEVAL Series Editor W. Bruce Croft University of Massachusetts Amherst, MA 01003 Also in the
More informationISO INTERNATIONAL STANDARD. Financial services Universal financial industry message scheme Part 8: ASN.1 generation
INTERNATIONAL STANDARD ISO 20022-8 First edition 2013-05-01 Financial services Universal financial industry message scheme Part 8: ASN.1 generation Services financiers Schéma universel de messages pour
More informationJohn Clements Department of Computer Science Cal Poly State University 1 Grand Street San Luis Obispo, CA (805)
Curriculum Vitae Contact Information Education John Clements Department of Computer Science Cal Poly State University 1 Grand Street San Luis Obispo, CA 93407 (805)756-6528 clements@brinckerhoff.org 2005
More informationSummary of Contents LIST OF FIGURES LIST OF TABLES
Summary of Contents LIST OF FIGURES LIST OF TABLES PREFACE xvii xix xxi PART 1 BACKGROUND Chapter 1. Introduction 3 Chapter 2. Standards-Makers 21 Chapter 3. Principles of the S2ESC Collection 45 Chapter
More informationSpecification Centered Testing
Specification Centered Testing Mats P. E. Heimdahl University of Minnesota 4-192 EE/CS Building Minneapolis, Minnesota 55455 heimdahl@cs.umn.edu Sanjai Rayadurgam University of Minnesota 4-192 EE/CS Building
More informationDesigning Security Architecture Solutions Jay Ramachandran Wiley Computer Publishing John Wiley & Sons, Inc. Designing Security Architecture Solutions Designing Security Architecture Solutions Jay Ramachandran
More informationGSAW Software Architectures: What are we Building? March 1999
GSAW 1999 Software Architectures: What are we Building? March 1999 Roger J. Dziegiel, Jr AFRL/IFTD 525 Brooks Rd Rome, NY 13441-4505 (315)330-2185 dziegielr@rl.af.mil Arch1 Architecture & Generation Parameterized
More informationSEMI 4845 NEW STANDARD:
Background Statement for SEMI Draft Document 4845 NEW STANDARD: Specification for Identification by Digital Certificate Issued from CSB(Certificate Service Body ) for Anti-Counterfeiting Traceability in
More informationTASK SCHEDULING FOR PARALLEL SYSTEMS
TASK SCHEDULING FOR PARALLEL SYSTEMS Oliver Sinnen Department of Electrical and Computer Engineering The University of Aukland New Zealand TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL
More informationCruiseSmarter PRIVACY POLICY. I. Acceptance of Terms
I. Acceptance of Terms This Privacy Policy describes CRUISE SMARTER policies and procedures on the collection, use and disclosure of your information. CRUISE SMARTER LLC (hereinafter referred to as "we",
More informationModeling, Testing and Executing Reo Connectors with the. Reo, Eclipse Coordination Tools
Replace this file with prentcsmacro.sty for your meeting, or with entcsmacro.sty for your meeting. Both can be found at the ENTCS Macro Home Page. Modeling, Testing and Executing Reo Connectors with the
More informationIMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING
IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING Pardeep kaur 1 and Er. Rupinder Singh 2 1 Research Scholar, Dept. of Computer Science and Engineering, Chandigarh University, Gharuan, India (Email: Pardeepdharni664@gmail.com)
More informationXRay Views: Understanding the Internals of Classes
XRay Views: Understanding the Internals of Classes Gabriela Arévalo, Stéphane Ducasse, Oscar Nierstrasz Software Composition Group University of Bern (Switzerland) {arevalo, ducasse, oscar}@iam.unibe.ch
More informationPublications. ACH Audit Requirements. A new approach to payments advising SM. Sound Practices Checklists
Publications ACH Audit Requirements Sound Practices Checklists Price: $150 Member Discounted Price: $75 (489) Revised: 02/2019 A new approach to payments advising SM Purpose of this Document WesPay Advisors
More informationDISTRIBUTED SYSTEMS. Second Edition. Andrew S. Tanenbaum Maarten Van Steen. Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON.
DISTRIBUTED SYSTEMS 121r itac itple TAYAdiets Second Edition Andrew S. Tanenbaum Maarten Van Steen Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON Prentice Hall Upper Saddle River, NJ 07458 CONTENTS
More informationPRINCIPLES AND PRACTICE
PRINCIPLES AND PRACTICE OF ENGINEERING Architectural Engineering Sample Questions and Solutions SECOND EDITION SPONSORED BY Professional Exam Development Subcommittee, Architectural Engineering Institute
More informationBoolean Reasoning. The Logic of Boolean Equations. Frank Markham Brown Air Force Institute of Technology
Boolean Reasoning The Logic of Boolean Equations by Frank Markham Brown Air Force Institute of Technology ff Kluwer Academic Publishers Boston/Dordrecht/London Contents Preface Two Logical Languages Boolean
More informationMASSiVE, Unità di Torino
MASSiVE, Unità di Torino Personalization, verification and conformance for logic-based communicating agents M. Baldoni, C. Baroglio, A. Martelli, V. Mascardi, V. Patti, C. Schifanella, L. Torasso 1 Main
More informationBusiness Intelligence Roadmap HDT923 Three Days
Three Days Prerequisites Students should have experience with any relational database management system as well as experience with data warehouses and star schemas. It would be helpful if students are
More informationCopyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see
TOGAF 9 Certified Study Guide 4th Edition The Open Group Publications available from Van Haren Publishing The TOGAF Series: The TOGAF Standard, Version 9.2 The TOGAF Standard Version 9.2 A Pocket Guide
More informationThesis Defense: Developing Real-Time Collaborative Editing Using Formal Methods
Thesis Defense: Developing Real-Time Collaborative Editing Using Formal Methods Lars Tveito September 9th, 2016 Department of Informatics, University of Oslo Outline Introduction Formal Semantics of Editing
More informationISO INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO 20022-1 First edition 2004-12-15 Financial services UNIversal Financial Industry message scheme Part 1: Overall methodology and format specifications for inputs to and outputs
More informationA Model-Based Reference Workflow for the Development of Safety-Related Software
A Model-Based Reference Workflow for the Development of Safety-Related Software 2010-01-2338 Published 10/19/2010 Michael Beine dspace GmbH Dirk Fleischer dspace Inc. Copyright 2010 SAE International ABSTRACT
More information