201 research outputs found

    Specifying Downloadable Properties for Reusing Software Components : A Case Study of Java

    Get PDF
    In this paper, we propose a specification of software components which can be loaded not only from your local system but also from the other systems over the computer network. Because components from the other system are not always enough reliable or safe to act freely in your own system, you should limit their activities to a certain context. Because some existing systems like Java RMI and an Applet provide a mechanism for such limitation implicitly, users sometimes lose sight of the abilities and limitations of such components. Therefore, they fail to reuse the components in the right way. We provide a way to specify such properties, so that component users can precisely understand the abilities and limitations.ArticleKnowledge-based software engineering : proceedings of the fourth joint Conference on Knowledge-Based Software Engineering, Brno, Czech Republic, 2000. 123-128 (2000)conference pape

    Specifying Runtime Environments and Functionalities of Downloadable Components under the Sandbox Model

    Get PDF
    ISPSE, Kanazawa, Japan, Nov. 2000In this paper, we propose a specification of both runtime environments and software components which can be loaded not only from your local system but also from the other systems over the computer network. Because components from the other system are not always enough reliable or safe to act freely in your own system, you should limit their activities to a certain context. Such assumption is based on the sandbox security model. Because such components are largely influenced by the runtime environments, users sometimes lose sight of the abilities and limitations of such components. Therefore, they fail to reuse the components in the right way. We provide a way to specify such properties, so that component users can precisely understand the abilities and limitations.ArticleProceedings of the International Symposium on Principles of Software Evolution. 138-142 (2000)conference pape

    Conducting Requirements Evolution by Replacing Components in the Current System

    Get PDF
    As new software components become available for an existing system, we can evolve not only the system itself but also its requirements based on the new components. In this paper, we propose a method to support requirements evolution by replacing a component with another component, and by changing the current requirements so as to adapt to the new component. To explore the possibilities of such a replacement, we use the technique of specification matching. To change the current requirements, we modify the structure by following the concept of Design by Contract.ArticleProceedings : sixth Asia-Pacific Software Engineering Conference. 224-227 (1999)conference pape

    VDM over PSP: A Pilot Course for VDM Beginners to Confirm its Suitability for Their Development

    Get PDF
    COMPSAC 2003, Dallas, Texas, November 03 - November 06. 2003Although formal methods seem to be useful, these is no clear way for beginners to know whether the methods are suit for them and for their problem domain, before using the methods in practice. We propose a method to confirm the suitability of a formal method. The method is realized as a pilot course based on the PSP. A course mentioned in this paper is designed for a typical formal method, VDM. Our course also helps beginners of VDM to learn VDM gradually and naturally. During the course, they can confirm its suitability as follows; First, they practice several exercises for software development, while techniques of VDM are introduced gradually. Second, process data and product data of software development are recorded in each exercise. Third, by evaluating these data by several metrics, they can confirm the suitability of VDM for their work.ArticleProceedings, 27th Annual International Computer Software and Applications Conference. 327-334 (2003)conference pape

    SECURITY POLICY CHECKER AND GENERATOR FOR JAVA MOBILE CODES

    Get PDF
    The original publication is available at www.springerlink.comJava is one of the most famous mobile code systems, and its components can be dynamically downloaded from the other computers over the internet. Because such downloaded components are not always reliable, behaviors of each component are restricted according to the application’s policy. However, it is not so easy for the application users or developers to decide the suitable policy. In this paper, we introduce a tool for generating and checking the security policies for Java application. As we deploy Java components spatially on a window of our tool, we can check which component can be executed or not with respect to a set of security policies. In addition, our tool can generate the minimal set of policies to execute all the deployed components.ArticleEngineering Information Systems in the Internet Context. 255-264 (2002)conference pape

    A Web-Based VOD Clipping Tool for Efficient Private Review

    Get PDF
    In this paper, we present a web-based tool for learners, to review the parts of the lecture contents that the learners have already attended. Each learner can efficiently review what they want to learn again independent of the scenario in each lecture. We assume that the contents of the lectures are stored in the internet based video streaming systems. The objects are automatically arranged on a screen of this tool, so that each object gets closer to its similar objects.ArticleKnowledge-based software engineering : proceedings of the fifth Joint Conference on Knowledge-Based Software Engineering. 313-316 (2002)conference pape

    FC method: A Practical Approach to Improve Quality and Efficiency of Software Processes for Embedded System Revision

    Get PDF
    COMPSAC 2004, Hong Kong, September 28 - September 30. 2004We introduce a design method for revising embedded software system. Engineers can accept requirements changes of hardware components and functions reasonably because design documents are managed in small unit. We can apply this method stepwise because this method can be coped with a development process that heavily depends on the hardware structure. We report an application of this method in our company so as to validate it. From the application, we can confirm that the quality of software was improved about in twice, and that efficiency of development process was also improved over three times.ArticleProceedings of the 28th Annual International Computer Software and Applications Conference. 286-292 (2004)conference pape

    Fine-grained Recording and Streaming Lectures

    Get PDF
    There are several lecture recording systems (commercial and non-commercial) based on VOD technology. These systems record only slides or WWW images statically, so the fine-grained events are missed. For example, scrolling and/or mouse focusing are not recorded. We developed a fine-grained lecture recording system which records mouse movement during lectures, and also records lectures using Microsoft PowerPoint® and WWW.ArticleProceedings of the International Conference on Computers in Education (ICCE’04). 1957-1962 (2004)conference pape

    Modeling Software Characteristics and Their Correlations in A Specific Domain by Comparing Existing Similar Systems

    Get PDF
    QSIC 2005, Melbourne, Australia, Sep. 2005Software in a specific domain has several characteristics and each characteristic should be fixed when the software requirements are specified. In addition, these characteristics sometimes correlate with each other. However, we sometimes forget to specify several characteristics and/or to take their correlations into account during requirements elicitation. In this paper, we propose a meta-model for representing such characteristics and their correlations, and also propose a method to build a model for a specific domain by using documents about existing software systems. By using our model for a domain, a requirements specification for a system in the domain could be complete and unambiguous because requirements analysts can check the characteristics that should be decided. The specification could be also correct and consistent because the analysts can know side effects of a requirement change by using correlation among the characteristics. We have applied our methods to a case study for confirming the usefulness of such model and the methods.ArticleProceedings : the Fifth International Conference on Quality Software. 215-222 (2005)conference pape
    • …
    corecore