Accepted and Invited Papers List

 

 

Invited papers

  • Application and network Security

    Mourad Debbabi, Concordia University, Canada

  • Theory on Software Diagnosis for Program Code Validation

    Fumio Negoro, ISD, Ltd, Japan

  • Retrospective on Software Specification

    David Parnas, Software Quality Research Laboratory, University of Limerick, Ireland

  • On specifying systems that connect to the physical world

    Tom MAIBAUM, Department of Computing and Software, McMaster University,Canada

 

Tutorial (abstract)

  • Description and Analysis of Software System Families using Feature Algebra

Ridha Khedri, Department of Computing and Software, Faculty of Engineering, McMaster University



Accepted papers

·         Common Criteria Approach to J2ME CLDC Security Requirements

M. Debbabi, M. Saleh, C. Talhi, and S. Zhioua, Concordia University, Canada 

·         Towards Autonomic Computing: Injecting Self-Organizing and Self Healing Properties into Java Programs

M.J. Oudshoorn, M.M. Fuad, and D. Deb, Montana State University, USA

·         Unified OTP Cryptosystem with Authentication and Secrecy

Osamu Atsumi , Shogo Hayashida and Rikio Maruta, Sangikyo Corporation, Yokohama Japan

·         A Decision Procedure for Structured Cryptographic protocols

Francois Gagnon, Carleton University, Canada

Mohamed Mejri, Laval University, Canada

·         Calculus for Distributed Firewall Specification and Verification

Liviu Pene and Kamel Adi, Université du Québec en Outaouais, Canada

·         Enforcing Security Policies on Programs

Hakima Ould-Slimane, Mohamed Mejri, Laval University, Cananda

Adi, Université du Québec en Outaouais, Canada

·         Verification Tools for Software Security Bugs

Frédéric Michaud and Frédéric Painchaud, DRDC Valcartier, Canada

·         Information processing and the recovery of asymmetric relations

Anna Maria Di Sciullo, Université du Québec à Montréal, Canada

·         How to Create the Magic Wand? Currently Implementable Formulation of the Problem

Victor Malyshkin, Supercomputer Software Department(SSD), Institute of Computational Mathematics and Mathematical Geophysics, Russian Academy of Sciences, Novosibirsk, Russia

·         Visualization Techniques for Program Comprehension: A Literature Review

François Lemieux and Martin Salois, Defence R & D Canada – Valcartier, Québec, Canada

·         Supporting Program Comprehension for Refactoring Operations with Annotations

Klaus Meffert and Ilka Philippow, Technical University Ilmenau, Germany

·         A Formal Translation from an Imperative Language with Array to a Declarative Language

D. Godbout, B. Ktari and M. Mejri, Laval University, Canada

·         A Framework to Support Non-fragile Agile Agent-Oriented Software Development

Asif Qumer and  Brian Henderson -SELLERS, University of Technology, Australia

·         Transforming a Non-Software Company to a Software Company by Exploiting the LYEE Methodology

Rikio Maruta and Noriko Taniguchi, Sangikyo Coperatio, Yokohama, Japan

·         System Development Life-Cycle Support for Service-Oriented Applications

George Feuerlicht, Faculty of Information Technology, University of Technology, Sydney, Australia

·         Theory on Software Diagnosis for Program Code Validation

Fumio Negoro, ISD, Ltd, Japan 

·         Software Profiling for Deterministic Replay Debugging of User Code

Satish Narayanasamy, Cristiano Pereira and Brad Calder, Department of Computer Science and Engineering, University of California, San Diego, USA

·         Towards Developing Adjustable Software: A Case Study with the Lyee Approach

Sergei GORLATCH, Univeristy of Münster, Germany

Tae KAMEDA, Soka Women’s College, Japan

Issam Hamido FUJITA, Iwate Prefectural University, Japan

Yutaka FUNYU Iwate Prefectural University, Japan

Michiru TANAKA, Iwate Prefectural University, Japan

Osamu ARA, Arai Professional Engineer’s Office, Japan

·         Verification of Lyee Requirement

Osamu ARAI and Hamido FUJITA,  Iwate Prefectural University, Japan

·         A New Way of Automatic Design of Software (Simulating Human Intentional Activity)

Zenya Koono,Creation Project, Kanagawa,Japan

Hui Chen, Information Science Center, Kokushikann University,Tokyo, Japan

Hassan Abolhassani,Computer Engineering Dept.,Sharif University of Technology, Teheran, Iran

·         Enhancing and Parallelizing Legacy Software for Medical Imaging - A Case Study

Jürgen Vörding, Maraike Schellmann, and Sergei Gorlatch, University of Münster, Germany

·         A Framework for predicting Person Effort on Requirements Changes

Bee Bee CHUA,Department of Information Systems, University of Technology,  Sydney

June M. VERNER, Empirical Software Engineering, National ICT Australia, Sydney

·         Improving Software Test Processes

Tanja Toroi, University of Kuopio, Department of Computer Science

·         FOOD: An Intermediate Model for Automated Refactoring

Nicolas Juillerat and Béat Hirsbrunner, University of Fribourg, Department of Computer Sciences, Fribourg, Switzerland

·         Comparing Approaches in AORE through ISO/IEC 9126

Luciana de Paiva SILVA, André L. M. SANTOS,

Centro de Informática – Universidade Federal de Pernambuco (UFPE), Brazil

Elisa H. M. HUZITA , Tania F. Calvi TAIT, Universidade Estadual de Maringá (UEM), Brazil