Accepted Papers

The following papers have been accepted for inclusion in the proceedings of APSEC 2007. The hilighted [#XXX] indicates the identification number (paper ID)

  • [#24] Experiment-driven approach to building support for distributed agile teams
  • [#30] Function Call Flow based Fitness Function Design in Evolutionary Testing
  • [#32] Statechart-based Verification of Object-Oriented Design Models
  • [#37] Requirements Engineering for Reactive Systems: Coloured Petri Nets for an Elevator Controller
  • [#41] Applying a Code Clone Detection Method to Domain Analysis of Device Drivers
  • [#44] Conformance Checking of Running Programs in Dynamic Aspect-Oriented Systems
  • [#46] Figure Out the Current Software Requirements Engineering - What Practitioners Expect to Requirements Engineering? -
  • [#51] A Method for Early Requirements Triage and Selection Utilizing Product Strategies
  • [#55] An Approach for Specifying Access Control Policy in J2EE Applications
  • [#56] Early Validation and Verification of a Distributed Role-Based Access Control Model
  • [#58] An Executable UML with OCL-based Action Semantics Language
  • [#64] A Survey on the Business Relationship between Chinese Outsourcing Software Suppliers and Their Outsourcers
  • [#69] Improving Data Integrity with a Java Mutability Analysis
  • [#70] Field Escape Analysis for Data Confidentiality in Java Components
  • [#75] Compositional Verification of UML Dynamic Models
  • [#85] Quantitative Analysis of Value-Based Software Processes Using Decision-Based Stochastic Object Petri-Nets
  • [#86] MKtrace: An innovative debugging tool for multi-threaded programs on multiprocessor systems
  • [#88] Deriving Software Process Simulation Model from SPEM-based Software Process Model
  • [#89] ezContract: Using Marker Library and Bytecode Instrumentation to Support Design by Contract in Java
  • [#90] Toward Efficient Aspect Mining for Linux
  • [#91] Developing an Insulin Pump System Using the SOFL Method
  • [#94] E-AoSAS++ and its Software Development Environment
  • [#96] Pseudo Software: a New Concept for Iterative Requirement Development and Validation
  • [#104] Injecting security as aspectable NFR into Software Architecture
  • [#106] Use of Agile Methods and Practices in the Philippines
  • [#107] Visualization for software evolution based on logical coupling and module coupling
  • [#112] Coordination-Policy Based Composed System Behavior Derivation
  • [#117] Approximation Algorithms for Software Component Selection Problem
  • [#118] Checking Distributed Programs with Partially Ordered Atoms
  • [#125] An Investigation into Concurrency Control Mechanisms in Data Service Layers
  • [#133] Extraction of Viewpoints for Eliciting Customer's Requirements based on Analysis of Specification Change Records
  • [#134] Construction Method of a High-Order Markov Chain Usage Model
  • [#135] Optimising Project Feature Weights for Analogy-based Software Cost Estimation using the Mantel Correlation
  • [#137] Enhancing the ESIM (Embedded Systems Improving Method) by Combining Information Flow Diagram with Analysis Matrix for Efficient Analysis of Unexpected Obstacles in Embedded Software
  • [#143] A Six Sigma Framework for Software Process Improvements and its Implementation
  • [#145] Simultaneous Modification Support based on Code Clone Analysis
  • [#147] A Middleware-based Approach to Model Refactoring at Runtime
  • [#149] Static Call Graph Generator for C++ using Debugging Information
  • [#151] Reducing Unnecessary Conservativeness in Access Rights Analysis with String Analysis
  • [#153] An Approach to Probabilistic Effort Estimation for Military Avionics Software Maintenance by Considering Structural Characteristics
  • [#155] A Large-Scale Empirical Comparison of Object-Oriented Cohesion Metrics
  • [#157] Secure Behavior of Web Browsers to Prevent Information Leakages
  • [#162] Towards Instant Automatic Model Refinement Based on OCL
  • [#163] Tailoring the Domain Engineering Process of the PLUS Method
  • [#172] The Validation and Verification of WSCDL
  • [#176] Enterprise Assets Security Requirements Construction from ESRMG Grammar based on Security Patterns
  • [#181] Aligning the Map Requirements Modelling with the B-method for Formal Software Development
  • [#182] Disk Based Software Verification via Bounded Model Checking
  • [#184] A methodological framework for SysML: a Problem Frames-based approach
  • [#186] Automatic Extraction and Verification of Page Transitions in aWeb Application
  • [#194] Methodology Support for the Model Driven Architecture
  • [#196] Modeling and Learning Interaction-based Accidents for Safety-Critical Software Systems
  • [#206] Definition of an Executable SPEM 2.0
  • [#207] Using B to verify the weaving of aspects
  • [#208] Improving Effort Estimation Accuracy by Weighted Grey Relational Analysis During Software Development
  • [#212] Deriving Product Line Requirements: the RED-PL Guidance Approach
  • [#216] An Empirical Study of Class Sizes for Large Java Systems
  • [#235] Are size measures better than expert judgement? An industrial case study on requirements volatility
  • [#237] Incentive Compatible Mechanisms for Group Ticket Allocation in Software Maintenance Services
  • [#244] A Novel Approach of Prioritizing Use Case Scenarios
  • [#252] Identifying key requirements for a new product line
  • [#258] Aspect-Oriented Modeling for Embedded Software Design
  • [#264] Finding A Test Order using Object-Oriented Slicing Technique
  • [#270] A Synchronization Flow Analysis of Concurrent Objects in AIBO OPEN-R Programs based on Communicating Processes
  • [#273] Realizability of Collaboration-based Service Specifications
  • [#286] A Process Pattern Language for Agile Methods
  • [#290] Using Genetic Algorithms to Aid Test-Data Generation for Data-Flow Coverage