Volume 4, Number 1, March 2003


 

 

Title:

Implementing Requirements Verification Heuristics with XML and XSLT

 

Author & Affiliation:

Amador Durán, Antonio Ruiz–Cortés, Rafael Corchuelo, Miguel Toro

University of Seville

 

Abstract:

It is widely acknowledged within the software community that requirements quality is one of the most important factors in the success of software projects. In this article, we show how XML and XSLT can be used to implement requirements verification heuristics that can help to discover hidden conflicts and defects in requirements expressed in natural language. This approach is based on the representation of requirements in XML and in the usage of XSLT stylesheets (i.e. XML to XML, XML to HTML or XML to text transformation stylesheets) not only to automatically generate requirements documents, but also to provide some verification heuristics based on requirements–oriented metrics. These ideas have been implemented in REM, an experimental XML–based requirements management tool also described in this article.

 

Title:

Parallel Computing Operating System

Author & Affiliation:

Bhushan Balani and Gongzhu Hu

Central Michigan University

 

Abstract:

 An important aspect of parallel computing is the synchronization and communication between all the pieces involved in the computation that may be carried out across multiple processors or computers on a network. In this paper we present a prototype of a simple operating system that support parallel computing.  Although a lot of research in this area has been conducted, most are sophisticated large-scale projects involving multi-year efforts of multi-person research teams. Simple, robust, cost effective small-scale operating systems are still needed to support most every-day parallel computing tasks. The operating system discussed in this paper is such an attempt.  It uses a reliable message transmission protocol for communications between machines over a network.  A simulated version of the operating system is designed and implemented.

the connected blocks of characters. 

Title:

3D User Interface for Object Manipulation using Selection Tree Traversal in Non-immersive Virtual Environment

Author & Affiliation:

Deok-Soo Han, Yoon-Ho Lim, Yoon-Chul Choy, Soon-Bum Lim

Yonsei University, Korea, Soon-Bum Lim,Sookmyung Women’s University, Korea

 

Abstract:

Nowadays, PC and 3D graphics technology are developing rapidly. Rapid progress of hardware technology enabled anybody to assort 3D graphics environment, with functions matching those of workstations few years before, in moderate prices. 3D graphics is no longer an exclusive property of few professionals. However, specialized input devices for manipulation in 3D graphics environment is too expensive for users to purchase and this is the main reason why 3D input devices are not widely used. Also, 3D object manipulation interface in existing desktop environment lack accuracy and correction of error is cumbersome. To overcome these shortcomings, study for effective 3D interface using basic 2D based input devices in popularized desktop environment is required. Hence, an interface that helps accurate selection and manipulation of objects in 3D virtual environment using 2D mouse is proposed in this paper. When user selects a certain object, a selection tree internally composed of the selected object and selectable candidate objects are built and following the traversal of users of the selection tree, exact object selection and manipulation become possible. We design 2D mouse based 3D object manipulation interface that supports translation and rotation of objects connected to the new object selection method and a prototype is built. This technique can contribute to improving manipulation in areas that need exquisite 3D object manipulation such as IETM and animation tools.

 

Title:

Secure Consolidated Authorization Mechanism

for Supply Chain Management

 

Author & Affiliation:

Seung-Phil Hong 1 Gail-Joon Ahn 2 MyungChul Kim 3

LG CNS Co, Ltd.1 Korea, University of North Carolina-Charlotte2, ICU, Korea3

 

Abstract:

Procurement of production goods and services has been the subject of automation for the past decade. Retailers have implemented supply chain management (SCM) systems in the 1960s. SCM applications have expanded the scope of traditional SCM systems as the advent of Internet enables enterprises to perform their business transactions ubiquitously. That is, e-SCM (electronic-SCM) eliminates the constraints of time and distance in operating a business, managing the cooperation of system components in a supply chain. Access control mechanisms in e-SCM are one of important security concerns to enable each system component to access sensitive information in a secure manner. In this paper, we propose a consolidated access control mechanism for e-SCM. This mechanism ensures that system components in e-SCM systems can access resources based on their role information.

 

Title:

 

A Method of Scenario-based GUI Prototype Generation and Its Evaluation

 

Author & Affiliation:

Junko Shirogane ,Yoshiaki Fukazawa

Waseda University, Japan

Abstract:

In developing application software, it is important to pay attention to end-users' viewpoints. In particular, in designing Graphical User Interfaces (GUIs), it is effective to develop a prototype and to show it to end-users in order to reflect end-users' viewpoints, because the GUI design strongly affects the usability of the application. Use case diagrams and scenarios in Unified Modeling Language (UML) can be described from end-users' viewpoints. Therefore, it is considered that GUIs reflecting end-users' viewpoints can be developed based on the use case diagrams. In this paper, we propose a method for extracting GUI-based control structures from given use case diagrams and scenarios and generating prototypes of GUIs, and show the results of its evaluation.

 

Title:

Distributed Web-Based Computing (DWBC) Models with Caching   Resource Utilization (CRU)

 

Author & Affiliation:

N.-J. Park, K.M. George, N. Park1, M. Choi2, R. Lee3Oklahoma State University1, University of Missouri-Rolla2, Central Michigan University3

 

Abstract:

Interoperability of heterogeneous applications is defined as the ability for multiple software applications written in different programming languages running on different platforms with different operating systems to communicate and interact with one another over different computer networks. The emerging middleware technologies, including CORBA, COM/DCOM, and Enterprise JavaBeans offer an industrial de facto standard communication infrastructure to support the development of heterogeneous components. However, the implementation of a component suffers from high interaction complexities in the component that seriously degrades the component independence. We designed an adapter to isolate, encapsulate, and manage a component’s interactions outside the component. The dynamic interface binding was designed to allow an adapter to examine the signature of the requested services at runtime such as operation names, parameters orders, parameters types, and parameters sizes. The interfaces of interconnecting components are bound at runtime. In addition, the interface language mapping allows an interface in a specific programming language to be automatically generated from an IDL interface. The use of adapters increases the reusability of components and also simplifies the integration of the components to an application

 

 

Title :

UML-based Performance Analysis Techniques Applied toSoftware Multiprojects Management

Author & Affiliation

F. Basanieri, A. Bertolino, E. Marchetti1 ,  R. Mirandola2

Istituto di Scienza e Tecnologie dell'Informazione1, Università di Roma TorVergata2                                

 

Abstract

Performance engineering techniques have been traditionally applied to computer devices and networks and more recently also to software systems. In this paper we propose to use them in an unusual context, i.e., in multiproject software development environment to support manager’s decisions. The basic idea is that project teams correspond to the processing elements of a performance model, and project intermediate phases to the tasks to be performed within established time intervals.

The workflows and organization structures are modelled by annotated UML diagrams, so that managers do not need be expert in performance engineering modelling notations. In fact, a tool transforms such diagrams into queueing network models, solving which the predicted completion times for the modelled processes can automatically be obtained. As we use performance analysis techniques, our method can naturally take into account people multitasking on several contemporaneous projects, as well as delays and inefficiencies due to meetings, communications, and personnel overutilization. An example is used to illustrate the approach.