


default search action
17th ASWEC 2006: Sydney, Australia
- 17th Australian Software Engineering Conference (ASWEC 2006), 18-21 April 2006, Sydney, Australia. IEEE Computer Society 2006, ISBN 0-7695-2551-2

Introduction
- Message from the General Chair.

- Message from the Research Program Chairs.

- Organizing Committee.

- Steering Committee.

- Research Program Committee.

- Industry Program Committee.

- Additional Reviewers.

Keynotes
- Linda M. Northrop:

Software Product Lines: Reuse That Makes Business Sense. 3 - Julian Edwards:

State of the Art v State of the Practice: A Personal Perspective on the Changes in the Australian Software Engineering Landscape.. 4 - John G. Hosking

:
The Software Engineering Academy's Role in Industrial Innovation. 5
Software Requirements and Design
- Martín López Nores

, José Juan Pazos-Arias, Jorge García Duque, Ana Belén Barragáns-Martínez
:
An Agile Approach to Support Incremental Development of Requirements Specifications. 9-18 - Christine Choppy, Gianna Reggio:

Requirements Capture and Specification for Enterprise Applications: a UML Based Attempt. 19-28 - Oddleif Halvorsen, Øystein Haugen:

Proposed Notation for Exception Handling in UML 2 Sequence Diagrams. 29-40
Component Based Software Engineering
- Johannes Maria Zaha, Antonia Albani:

Compatibility Test for Coordination Aspects of Software Components. 41-48 - Lei Wang, Padmanabhan Krishnan:

A Framework for Checking Behavioral Compatibility for Component Selection. 49-60
Web Services and Service Oriented Systems
- Jun Shen

, Jun Yan
, Yun Yang:
SwinDeW-S: Extending P2P Workflow Systems for Adaptive Composite Web Services. 61-69 - Zheng Li, Yan Jin, Jun Han:

A Runtime Monitoring and Validation Framework for Web Service Interactions. 70-79 - Jenny Bhuiyan, Surya Nepal, John J. Zic:

Checking Conformance between Business Processes and Web Service Contract in Service Oriented Applications. 80-89 - Mohan Baruwal Chhetri

, Jian Lin, SukKeong Goh, Jian Ying Zhang, Ryszard Kowalczyk
, Jun Yan
:
A Coordinated Architecture for the Agent-based Service Level Agreement Negotiation ofWeb Service Composition. 90-99 - Alex Ng

:
Optimising Web Services Performance with Table Driven XML. 100-112
Software Patterns, Frameworks, and Architectures
- Ayodele Oluyomi, Shanika Karunasekera

, Leon Sterling:
Design of Agent-Oriented Pattern Templates. 113-121 - Feras T. Dabous, Fethi A. Rabhi

:
A Framework for Evaluating Alternative Architectures and its Application to Financial Business Processes. 122-131 - Therese Helland, John C. Grundy

, John G. Hosking
:
A Service-Oriented Architecture for Software Process Technology. 132-141 - Minh Hong Tran, Yun Yang, Gitesh K. Raikundalia:

The Transparent Adaptation Approach to the Development of Awareness Mechanisms for Groupware. 142-151 - Anders Magnus Andersen, Torab Torabi:

A Holistic Framework for Mobile Environments. 152-158 - Tore Fjellheim:

Over-the-air Deployment of Applications in Multi-Platform Environments. 159-170
Software Security
- Benjamin W. Long, Colin J. Fidge

:
Formally Analysing a Security Protocol for Replay Attacks. 171-180 - Elankayer Sithirasenan, Saad Zafar

, Vallipuram Muthukkumarasamy:
Formal Verification of the IEEE 802.11i WLAN Security Protocol. 181-190 - Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kothari:

Preventing SQL Injection Attacks in Stored Procedures. 191-198 - Khaled M. Khan

, Jun Han:
Assessing Security Properties of Software Components: A Software Engineer's Perspective. 199-210
Formal Methods
- Brijesh Dongol

:
Derivation of Java Monitors. 211-220 - Judy Bowen, Steve Reeves

:
Formal Refinement of Informal GUI Design Artefacts. 221-230 - Lin Wang, Gillian Dobbie, Jing Sun

, Lindsay Groves:
Validating ORA-SS Data Models using Alloy. 231-242
Software Analysis
- Andreas Bauer, Martin Leucker

, Christian Schallhart:
Model-based runtime analysis of distributed reactive systems. 243-252 - Phil Cook, Colin J. Fidge

:
Well-Measuring Programs. 253-261 - David J. A. Cooper, Mun Wai Chan, Gautam Mehra, Peter Woodward, Brian R. von Konsky, Michael C. Robey, Michael Harding:

Using Dependence Graphs to Assist Manual and Automated Object Oriented Software Inspections. 262-269 - Junhua Wang, Soon-Kyeong Kim, David A. Carrington:

Verifying Metamodel Coverage of Model Transformations. 270-282
Software Testing
- Ossi Taipale, Heikki Kälviäinen

, Kari Smolander
:
Factors Affecting Software Testing Time Schedule. 283-291 - Tafline Murnane, Karl Reed, Richard Hall:

Tailoring of Black-Box Testing Methods. 292-299 - Tsong Yueh Chen

, Robert G. Merkel
:
Efficient and Effective Random Testing Using the Voronoi Diagram. 300-299
Software Maintenance and Evolution
- Khanh Hoa Dam

, Michael Winikoff, Lin Padgham
:
An agent-oriented approach to change propagation in software evolution. 309-318 - Lugang Xu, Greg Butler:

Cascaded Refactoring for Framework Development and Evolution. 319-330
Software Engineering Tools
- Erica Mealy, Paul A. Strooper

:
Evaluating software refactoring tool support. 331-340 - Abdelsalam Shanneb

, John Potter:
Lock Selection Made Easy. 341-350 - Ming-Yang (Jerry) Lin, Robert Amor

, Ewan D. Tempero:
A Java Reuse Repository for Eclipse using LSI. 351-362
Software Measurement and Experimentation
- Dror G. Feitelson, Gillian Z. Heller

, Stephen R. Schach:
An Empirically-Based Criterion for Determining the Success of an Open-Source Project. 363-368 - Blair Neate, Warwick Irwin, Neville Churcher:

CodeRank: A New Family of Software Metrics. 369-378 - Muhammad Ali Babar, Barbara A. Kitchenham

, Piyush Maheshwari:
The Value of Architecturally Significant Information Extracted from Patterns for Architecture Evaluation: A Controlled Experiment. 379-390
Software Process
- He Zhang, Ming Huo, Barbara A. Kitchenham

, D. Ross Jeffery:
Qualitative Simulation Model for Software Engineering Process. 391-400 - Jean-Guy Schneider

, Rajesh Vasa
:
Agile Practices in Software Development - Experiences from Student Projects. 401-410 - Diana Kirk, Ewan D. Tempero:

Identifying Risks in XP Projects through Process Modelling. 411-420

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














