The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Supporting dynamic attributes is critical in high quality Web service discovery. Presently, the methods used for service discovery assume that the world is static and, therefore, do not support attributes that are dynamic in nature. It is important to note that a service is characterized by both static and dynamic attributes. High quality Web service discovery requires detailed service context models...
In this paper we argue that policies are an increasing concern for organizations that are operating a web site. Examples of policies that are relevant in the domain of the web address issues such as privacy of personal data, accessibility for the disabled, user conduct, e-commerce, and intellectual property. Web site policies-and the overarching concept of web site governance-are cross-cutting concerns...
Building of tools-from simple prototypes to industrial-strength applications-is a pervasive activity in academic research. When proposing a new technique for software maintenance, effective tool support is typically required to demonstrate the feasibility and effectiveness of the approach. However, even though tool building is both pervasive and requiring significant time and effort, it is still pursued...
Autonomic computing has become more prevalent in recent years for its vision of developing applications with self-adaptive and self-managing behavior. Due to the inherent complexity of such applications and the nature of the built-in closed-loop feedback control, maintainability issues of autonomic systems are emerging as significant concerns in autonomic system designs. This paper identifies and...
We have developed a fully-featured graph editor based on scalable vector graphics (SVG) that can be customized for different application domains. Our SVG editor is an interactive SVG document (implemented in JavaScript) that can be embedded into other applications such as web browsers and office suites. As a result, maintenance documents now can be interactively explored, more easily integrated, and...
The objective of the 2nd international workshop on advanced software development tools and techniques (WASDeTT) is to provide interested researchers with a forum to share their tool building experiences and to explore how tools can be built more effectively and efficiently. This workshop specifically focuses on tools for software maintenance and comprehension and addresses issues such as tool-building...
This paper addresses policy challenges of complex virtual environments such as virtual worlds, social network sites, and massive multiplayer online games. The complexity of these environments--apparent by the rich user interactions and sophisticated user-generated content that they offer - poses unique challenges for policy management and compliance. These challenges are also impacting the life cycle...
This paper describes our implementation of a fact extractor for J2EE Web applications. Fact extractors are part of each reverse engineering toolset; their output is used by reverse engineering analyzers and visualizers. Our fact extractor has been implemented on top of IBM's Websphere Application Developer (WSAD). The extractor's schema has been defined with the Eclipse Modeling Framework (EMF) using...
There are subtle differences between automated and autonomic software systems with respect to the observability of information that supports trust between the system and its operators (designers, administrators, and users). Applying conceptual models of trust developed for human relationships with automated systems directly to autonomic systems is simply inadequate. An autonomic system can, however,...
Our objective is to identify requirements (i.e., quality attributes and functional requirements) for software visualization tools. We especially focus on requirements for research tools that target the domains of visualization for software maintenance, reengineering, and reverse engineering. The requirements are identified with a comprehensive literature survey based on relevant publications in journals,...
In this paper we report on our results for the VISSOFT tool demo challenge. In order to understand the architecture of Azureus, a BitTorrent client written in Java, we use the Rigi reverse engineering tool to visualize and explore dependency relations at the class and package level.
The objective of the SEAMS (Software Engineering for Adaptive and Self-managing Systems) workshops is to consolidate the interest in the software engineering community on autonomic, self-managing, self-healing, self-optimizing, self-configuring, and self-adaptive systems. SEAMS provides a forum for researchers to share new results, raise awareness, and promote collaboration within the community. The...
Autonomic computing has become more prevalent and hence its evaluation is becoming more important. This paper addresses the issue of evaluating the software architecture of self-healing applications with respect to the changes and adaptation over long periods of time. To facilitate this evaluation, we developed an analysis and reasoning framework for the architecture of self-healing systems. The framework...
In this paper we propose a taxonomy to characterize component-based systems. The criteria of our taxonomy have been selected as a result of constructing a number of component-based software engineering tools within the Adoption-Centric Software Engineering project at the University of Victoria. We have applied the taxonomy in our work to characterize the resulting tools and to define the design space...
There are two basic approaches to migrating a particular subsystem: reengineering and wrapping. The author considers coarse-grained object wrapping. In wrapping, the original subsystem is essentially integrated into the new setting using infrastructure technologies. Legacy systems that have evolved over many years are notoriously difficult to decompose. Wrapping is most effective if the legacy system...
This paper describes the SHriMP visualization technique for seamlessly exploring software structure and browsing source code, with a focus on effectively assisting hybrid program comprehension strategies. The technique integrates both pan+zoom and fisheye-view visualization approaches for exploring a nested graph view of software structure. The fisheye-view approach handles multiple focal points,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.