default search action
5th SoMeT 2006: Quebec, Canada
- Hamido Fujita, Mohamed Mejri:
New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Fifth SoMeT 2006, October 25-27, 2006, Quebec, Canada. Frontiers in Artificial Intelligence and Applications 147, IOS Press 2006, ISBN 978-1-58603-673-7
Chapter 1. Software Specification and Comprehension Models
- David Lorge Parnas:
Component Interface Documentation: What do we Need and Why do we Need it? 3-21 - François Lemieux, Martin Salois:
Visualization Techniques for Program Comprehension - A Literature Review. 22-47 - Klaus Meffert, Ilka Philippow:
Supporting Program Comprehension for Refactoring Operations with Annotations. 48-67
Chapter 2. Software Development and Related Methodologies
- T. S. E. Maibaum:
On specifying systems that connect to the physical world. 71-83 - Asif Qumer, Brian Henderson-Sellers:
A Framework to Support Non-fragile Agile Agent-Oriented Software Development. 84-100 - Anna Maria Di Sciullo:
Information Processing and the Recovery of Argument Structure Asymmetries. 101-115 - George Feuerlicht:
System Development Life-Cycle Support for Service-Oriented Applications. 116-126 - Victor Malyshkin:
How to Create the Magic Wand? - Currently Implementable Formulation of the Problem. 127-132 - Rikio Maruta, Noriko Taniguchi:
Transforming a Non-Software Company to a Software Company by Exploiting the LYEE Methodology. 133-145 - Luciana de Paiva Silva, Elisa Hatsue Moriya Huzita, Tania Fatima Calvi Tait:
Comparing Approaches in AORE through ISO/IEC 9126. 146-156
Chapter 3. Network Security and Applications
- Ali Reza Arasteh, Mourad Debbabi, Assaad Sakha:
A Formal Approach for the Forensic Analysis of Logs. 159-176 - Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua:
Common Criteria Approach to J2ME CLDC Security Requirements. 177-194 - Hakima Ould-Slimane, Mohamed Mejri, Kamel Adi:
Enforcing Security Policies on Programs. 195-207
Chapter 4. Software Security and Program Bugs
- Satish Narayanasamy, Cristiano Pereira, Brad Calder:
Software Profiling for Deterministic Replay Debugging of User Code. 211-230 - Frédéric Michaud, Frédéric Painchaud:
Source Code Verification Tools for Software Security Bugs. 231-241
Chapter 5. Validation and Diagnosis and Practical Artefacts on Software Security
- Fumio Negoro, Hamido Fujita:
Theory on Software Diagnosis for Program Code Validation. 245-271 - François Gagnon, Mohamed Mejri:
A Decision Procedure for Structured Cryptographic Protocols. 272-286 - Osamu Atsumi, Shogo Hayashida, Rikio Maruta:
Unified OTP Cryptosystem with Authentication and Secrecy. 287-300 - Liviu Pene, Kamel Adi:
A Calculus for Distributed Firewall Specification and Verification. 301-315
Chapter 6. Program Conversion and Related Software Validation
- Daniel Godbout, Béchir Ktari, Mohamed Mejri:
A Formal Translation From an Imperative Language With Array to a Declarative Language. 319-339 - Osamu Arai, Hamido Fujita:
Verification of the Lyee requirement. 340-361
Chapter 7. Intelligent Software Design and Maintenance
- Jürgen Vörding, Maraike Schellmann, Sergei Gorlatch:
Enhancing and Parallelizing Legacy Software for Medical Imaging - A Case Study. 365-383 - Michael J. Oudshoorn, M. Muztaba Fuad, Debzani Deb:
Towards Autonomic Computing: Injecting Self-Organizing and Self-Healing Properties into Java Programs. 384-406 - Zenya Koono, Hassan Abolhassani, Hui Chen:
A New Way of Automatic Design of Software (Simulating Human Intentional Activity). 407-420
Chapter 8. End User Requirement Engineering and Testing
- Sergei Gorlatch, Tae Kameda, Hamido Fujita, Michiru Tanaka, Yutaka Funyu, Osamu Arai:
Towards Developing Adjustable Software: A Case Study with the Lyee Approach. 423-438 - Bee Bee Chua, June M. Verner, Darren Dalcher:
A Framework for Predicting Person-Effort on Requirements Changes. 439-451 - Nicolas Juillerat, Béat Hirsbrunner:
FOOD: An Intermediate Model for Automated Refactoring. 452-461 - Tanja Toroi:
Improving Software Test Processes. 462-473
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.