|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
SoftNet 2009 ICSNC 2009 // ICSEA 2009 // VALID 2009 // SIMUL 2009 // CENTRIC 2009 Conferences take place at Sunday, September 20
Monday, September 21
Tuesday, September 22
Wednesday, September 23
Thursday, September 24
Friday, September 25
DETAILED PROGRAM ICSEA 2009 ICSEA 1: Advances in Fundamentals for Software Development I Bridging the Gap between the Quality Requirements and Implementation Relating Security Requirements and Design Patterns: Reducing Security Requirements Implementation Impacts with Design Patterns Challenges in Deployment of Model Driven Development CMS-Based Web-Application Development Using Model-Driven Languages ICSEA 2: Advances in Fundamentals for Software Development II Deriving Normalized Systems Elements from Business Process Models Building a Service-Oriented ERP from an Open Source Software UML Specification and Correction of Object-Oriented Anti-patterns A Unification of the Essence of Goal-Oriented Requirements Engineering ICSEA 3: Advances in Fundamentals for Software Development III A Software Requirements Change Source Taxonomy Handling Non-functional Requirements in Information System Architecture Design Reuse-Oriented Deployment of Software Components: Congregation in Service-Oriented Development Virtualization Techniques for Cross Platform Automated Software Builds, Tests and Deployment ICSEA 4: Advances in Fundamentals for Software Development IV Symbolic Execution Techniques Extended to Systems Integrating Formal Methods with Model-Driven Engineering Incentive Systems in Software Organizations Requirements Engineering by Connecting Requirements Directly to Data and Operations during Modeling ICSEA 5: Advances in Software Testing I MFQ & PPDCS - Test Analysis and Test Design for Large Embedded Software Systems Program Comprehension for User-Assisted Test Oracle Generation Analysis of the Introduction of Testability Antipatterns during the Development Process Combinatorial Approach for Automated Platform Diversity Testing ICSEA 6: Advances in Software Testing II A Comparative Study on Automated Software Test Oracle Methods Mutation Analysis for SQL Database Applications Automatic Test Data Generation for Multiple Condition and MCDC Coverage Automation Test Method for Automotive Embedded Software Based on AUTOSAR ICSEA 7: Specialized Software Advanced Applications I Risk Management through Real-Time Wearable Services Testing of Image Processing Algorithms on Synthetic Data Building a Canonical Language for Distributed System Repository Software Requirements for Ubiquitous Ad Hoc Mobile Networks: An Example of a Bluetooth Application ICSEA 8: Open Source Software & Agile Software Techniques Model-Driven Open Source Software Development - The Open Models Approach A Case Study of Developing an IDE for Embedded Software Using Open Source Semantic Interoperability Problem of OSS Forges Goal Sketching and the Business Case ICSEA 9: Software Deployment and Maintenance Are There Language Specific Bug Patterns? Results Obtained from a Case Study Using Mozilla Automatic Software Bug Triage System (BTS) Based on Latent Semantic Indexing and Support Vector Machine Service System Development Based on Web Process Ontology An Anonymous Social Network Site to Share Pictures ICSEA 10: Software Engineering Techniques, Metrics, and Formalisms I Preserving Cohesive Structures for Tool-Based Modularity Reengineering Towards Effective Productivity Measurement in Software Projects Validation of Scenario-Based Business Requirements with Coloured Petri Nets Framework Characteristics - A Starting Point for Addressing Reuse Difficulties ICSEA 11: Software Engineering Techniques, Metrics, and Formalisms II Integration of PECOS into MARMOT for Embedded Real Time Software Component-Based Development Rule-Based Service Modeling Evaluation of Convertibility Issues between IFPUG and COSMIC Function Points Functional Size of Use Case Diagrams: A Fine-Grain Measurement ICSEA 12: Software Engineering Techniques, Metrics, and Formalisms III & Software Performance Historical Perspective of Two Process Transitions An Ontology Based Approach to Non-functional Requirements Conceptualization Frameworks for the Development of Adaptive Systems: Evaluation of Their Adaptability Feature through Software Metrics Flexible Persistence Support for State Machine-Based Workflow Engines ICSEA 13: Advanced Design Tools for Developing Software I Effective Recognition of Patterns in Object Oriented Designs An Emulator for Debugging Service Programs in Ad Hoc Networks Developing Aspect-Oriented Software Architectures: A Framework Definition Towards a Meta-model for Problem Frames: Conceptual Issues and Tool Building Support ICSEA 14: Advanced Design Tools for Developing Software II A Monolithic Program vs. Modifiability: Enhancing a Visual Data Flow Program with Object-Oriented Techniques Process-Based Approach for Developing Automotive Embeded Software Supporting Tool Wiki-Based Tool for Requirements Engineering According to the ProjectIT Approach Integrating Quality Modeling with Feature Modeling in Software Product Lines ICSEA 15: Specialized Software Advanced Applications II & Software Economics, Adoption, and Education Enhancements in the Orphan Process for Wireless Personal Area Networks: Real Implementation Scenarios Ontology Driven E-Government Teaching Software Engineering Principles Using Micro Project with Eclipse (MPE) Activity: An Evaluation A Practical Course on Mobile-Software Engineering: Mobile Solutions Laboratory ICSEA 16: Software Security, Privacy and Safeness Enhancement of Use Case Diagram to Capture Authorization Requirements Polymorphic Worm Detection Using Double-Honeynet Identifying Security Requirements Hybrid Technique A Methodological Tool for Asset Identification in Web Applications: Security Risk Assessment Introducing Vulnerability Awareness to Common Criteria's Security Targets ICSEA 17: Advanced Mechanisms for Software Development I Comparative Evaluation of the State-of-the Art on Approaches to Software Adaptation Exploiting Adaptive Mechanisms to Enhance Functionalities: ABC4All - A Case Study Scenario-Based Genetic Synthesis of Software Architecture Discussing the Difference between Model Driven Architecture and Model Driven Development in the Context of Supporting Tools ICSEA 18: Advanced Mechanisms for Software Development II Towards Simulation-Based Design of the Software Systems BIRF: Keeping Software Development under Control across the Organization Towards End-to-End Traceability: Insights and Implications from Five Case Studies Integrating Context-Aware and Fuzzy Rule to Data Mining Model for Supply Chain Finance Cooperative Systems ICSEA 19: Advanced Facilities for Accessing Software & Work InProgress Evaluation and Optimisation of e-Learning Software Packages: Learning Object Repositories Goal-Oriented Service Selection in Business Processes Towards Resource Consumption-Aware Programming Checking Component Assembly in Acme: An Approach Applied on UML 2.0 Components Model SEDES 2009 SEDES 1: Software Engineering I Development of CMS-Based Web-Applications Using a Model-Driven Approach Managing Features and Aspect Interactions in Software Product Lines Software Process Improvement in Multimodel Environments SEDES 2: Software Engineering II A Controlled Natural Language Approach for Integrating Requirements and Model-Driven Engineering Patterns and Tools for Improving Framework Understanding: A Collaborative Approach Adaptive Object-Modelling: Patterns, Tools and Applications SEDES 3: Software Engineering III Inception of Software Validation and Verification Practices within CMMI Level 2 Software Knowledge Capture and Acquisition: Tool Support for Agile Settings Testing for Unexpected Interactions in AOP SEDES 4: Software Engineering IV Integrating IT Service Management within the Enterprise Architecture An Ontology-Based Approach to Model-Driven Software Product Lines Multistage Model Transformations in Software Product Lines Strengthening Refactoring: Towards Software Evolution with Quantitative and Experimental Grounds Exploring and Overcoming Major Challenges in IT Infrastructures Faced by IT Executives CENTRIC 2009 CENTRIC 1: User-Centric Advanced Applications Elder Care Modular Solution Survey of Assistive Technology Devices and Applications for Aging in Place Cultural Heritage Experience with Virtual Reality According to User Preferences Generating User Interface from Task, User and Domain Models CENTRIC 2: User-Centric Networking and Services & Centric Views A Framework for Serving Inclusive Web Forms to Disabled and Elderly Individuals Towards Dynamic Representation of Rich Internet Applications through Web Service Invocation RIA Optimization to Support Web Service Invocations on Mobile Safari for iPhone The Citizen's Role in National Electronic Identity Management - A Case-study on Austria CENTRIC 3: Work in Progress Otorob (Ortho Robot) with Docmata (Doctor's Eye): Role of Remote Presence in Developing Countries Individual Access to IT Resources Using User Context Towards Mobile Collaborative Exergaming CENTRIC 4: User-Centric Supporting Mechanisms Fuzzy Modeling of Resource Consumption for Service Composition Evaluation A User-Oriented Web Retrieval Summarization Tool Use of Granularity and Coverage in a User Profile Model to Personalise Visual Content Retrieval CENTRIC 5: Privacy and Anonymity & Technologies for Personalized Services Ad Hoc Privacy Management in Ubiquitous Computing Environments Personalized Systems Need Adaptable Privacy Statements! How to Make Privacy-related Legal Aspects Usable and Retraceable Semantic Personalization Framework for Connected Set-Top Box Environment Context Sensitive Personalization Utilizing User Profiles: Standardization Work at European Telecommunications Standards Institute (ETSI) ICSNC 2009 ICSNC 1: VENET & POSYS Relaying Controller Area Network Frames over Wireless Internetworks for Automotive Testing Applications The Optimal Radio Propagation Model in VANET Sensitivity Analysis on Flexray Dynamic Segment Design Parameters Managing QoS in a NGN Using a PBM Approach ICSNC 2: MHNET I MA-AODV: Mobility Aware Routing Protocols for Mobile Ad Hoc Networks Immuning Routing Protocols from the Wormhole Attack in Wireless Ad Hoc Networks Performance Analysis of Fast Handover Schemes for Proxy Mobile IPv6 ICSNC 3: MHNET II A Geographic Scheme with Location Update for Ad Hoc Routing Route Optimization Mechanisms Performance Evaluation in Proxy Mobile IPv6 Multi-point Relaying Techniques with OSPF on Ad Hoc Networks Extending the Ad Hoc Horizon in Dense 802.11 Networks Using Fountain Codes ICSNC 4: WINET I Regulatory Approach to Introduction of WiMAX in Bosnia and Herzegovina Wireless Channel Model Based on SoC Design Methodology Performance Assessment of Single and Multiple Antenna Relays for the Uplink OFDM Systems Error Rate of DS-IR with RAKE Reception in Frequency Selective Channels ICSNC 5: WINET II Maximum SINR Circular Weight Design of Multiple Transmitter Multiple Receiver System 802.21-MPA-IMS Architecture Wireless Networks Interoperability - Wifi Wimax Handover Performance Evaluation of Routing Protocols for MANET ICSNC 6: MCSYS I A Proposed Model for QoS Provisioning in IMS-Based IPTV Subsystem Experiments with and Enhancements to Echo Hiding Effect of Buffer Placement on Performance When Communicating Over a Rate-Variable Channel Generic Application Level Rate Control for Scalable Video Using Shadow Probing ICSNC 7: MCSYS II & PESYS A Key Distribution Method Based on an Adaptive Combined Coding and Cryptographic System Sliding Window-Based Erasure Correction Using Biased Sampling Towards Understanding the Evolution of Wars in Virtual and Real Worlds Development and Enhancement of RLab - A Remote Laboratory System ICSNC 8: RFID A Short Overview of the RFID Technology in Healthcare RFID Authentication of Academic Transcripts: In the Context of a RFID Rationale and Deployment Methodology A Decentralized RFID Authentication Solution for Embedded Systems ICSNC 9: HSNET I A Novel Applicable Model for IMS Network Based on Proposed Physical Components Optical Transport Network Design for Inverse-Multiplexed 100 Gb/s Ethernet Services with Minimum Capacity and Buffer Requirements Data Symbol Phase Synchronizers of Mixed Loop Using Wavelets for Compression and Detecting Events in Anomalous Network Traffic ICSNC 10: SESYS Novel Speech Secure Communication System Based on Information Hiding and Compressed Sensing FSS-Id/A Fast Safe Identity-Based Multi Signature Scheme Credible BGP - Extensions to BGP for Secure Networking Study on a Disaster Recovery Network Mechanism by Using Widely Distributed Client Nodes A Dynamic Conditional Access System for IPTV Multimedia Systems ICSNC 11: SENET I A Novel Multi Channel Sensor Network MAC Protocol 230 Relation Between Gradients and Geographic Distances in Dense Sensor Networks with Greedy Message Forwarding Robustness in Autonomous and Central Wireless Sensor Network: The Orchard Example Enhanced Location Based Sleep Scheduling for Target Tracking Applications in Travel Constrained Smart Space Environments ICSNC 12: SENET II & HSNET II A Simple Pheromone Based On-Demand Routing Protocol for Wireless Sensor Networks Wireless Monitoring of a Computerized City Using SafeMobile Units Performance Evaluation of Multisatge Service System Using Matrix Geometric Method Data Symbol Phase Synchronizers of Closed Loop Primitive Operations for Prioritized Data Reduction in Wireless Sensor Network Nodes SIMUL 2009 SIMUL 1: Simulation Models An Index Based Threat Modeling Method for Path Planning A Monte Carlo Based Procedure for Analyzing Discrete-Time, Nonstationary Simulation Responses Using Classical Time Series Models Comparison of Monte Carlo and Quasi Monte Carlo Sampling Methods in High Dimensional Model Representation Two Level Approach for Validation of Microscopic Simulation Models SIMUL 2: Process Simulation Simulation Model of a Single-Server Order Picking Workstation Using Aggregate Process Times Modeling for Web Services Composition System with Restricted Resources Priority Cycle Time Behavior Modeling for Semiconductor Fabs A Simulation of the Pharmaceutical Supply Chain to Provide Realistic Test Data SIMUL 3: Simulation Methodologies Modelling of the Uncertainty of Nuclear Fuel Thermal Behaviour Using the URANIE Framework Toward a Collection of Principles, Techniques, and Elements of Modeling and Simulation Software Experiments with Single Core, Multi-core, and GPU Based Computation of Cellular Automata SIMUL 4: Simulation Tools and Platforms I An Ontology for Aircraft Route Planning A Design of Network Simulation Environment Using SSFNet A Review of Available Software for the Creation of Testbeds for Internet Security Research G-Sense - A Graphical Interface for SENSE Simulator SIMUL 5: Simulation Tools and Platforms II & Simulations in Advanced Environments Uncertainty Assessments in Severe Nuclear Accident Scenarios Numerical Study of the Metamodel Validation Process Guided Uncertainty Reduction in Automatically Generated Business Simulations The Simulation of DARC (Dynamic Architecture for Reconfiguration of Web Servers Clusters) in Petri Nets SIMUL 6: Experience Report on Ready-to-Use Tools & Simulation Mechanisms System Simulation Tools for Data Acquisition in High Energy Physics Experiments FlashSim: A Simulator for NAND Flash-Based Solid-State Drives Two-Stage Process Modeling for Simulation in BPR TIB: A Time Management Algorithm of PDES for Automatically Detecting Concurrency SIMUL 7: Social Simulation & Work in Progress Real-Time Computation of the System Behaviour of Lightweight Machines An Agent-Based Simulation Model to Analyze Team Performance on Jobs with a Stochastic Structure Crowd Psychology Simulation Incorporating Psychometrics and Intervention of Relationship Spaces VALID 2009 VALID 1: Testing Techniques and Mechanisms I Reusing Component Test Cases for Integration Testing of Retarding Embedded System Components Fault Models for Neural Hardware A Web-Based Application to Verify Open Mobile Alliance Device Management Specifications Towards Automated Test Practice Detection and Governance VALID 2: Testing Techniques and Mechanisms II & Work in Progress SAT-Based On-Line Fault Isolation in Serial Systems Agile Testing Scenario-Based Test Case Generation Using Event-B Models An Open Real Time Test System Approach VALID 3: Robust Design Methodologies & Defects and Debugging Is Depth of Inheritance Tree a Good Cost Prediction for Branch Coverage Testing? Improving TTCN-3 Test System Robustness Using Software Fault Tolerance Verification and Validation in the Recommended Practice for Integrated Software-Dependent Systems A High-Level Language and Compiler to Configure the Multi-core Debug Solution (MCDS) VALID 4: Software Verification and Validation I Security Inspection Scenarios - A Facet of Security An Aspect-Oriented Approach for Assertion Verification Integration Test Order Strategies to Consider Test Focus and Simulation Effort Using the Testability Analysis Methodology for the Validation of AIRBUS Systems VALID 5: Software Verification and Validation II Quality of Code Can Be Planned and Automatically Controlled Stress Testing the Logical Decision Making Server of a Surveillance System Automated Refactoring Suggestions Using the Results of Code Analysis Tools Time-Optimal Real-Time Test Case Generation Using Prioritized Time Petri Nets VALID 6: Software Verification and Validation III & Domain Oriented Testing Validating the Behavioral Equivalence of TTCN-3 Test Cases Tracing Requirements in a Model-Based Testing Approach Model-Based Development and Testing of Process-Aware Information Systems FPGA-Accelerated Baseband Design and Verification of Broadband MIMO Wireless Systems VALID 7: Diagnosis & System and Feature Testing A Low-Cost FPGA-Based Test and Diagnosis Architecture for SRAMs Diagnosability of Input Output Symbolic Transition Systems Using TMR Architectures for SoC Yield Improvement Problem Space and Special Characteristics of Security Testing in Live and Operational Environments of Large Systems Exemplified by a Nationwide IT Infrastructure |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006-2010, IARIA