Cover image for Software Technology and Engineering : Proceedings of the International Conference on ICSTE.
Software Technology and Engineering : Proceedings of the International Conference on ICSTE.
Title:
Software Technology and Engineering : Proceedings of the International Conference on ICSTE.
Author:
Mahadevan, Venkatesh.
ISBN:
9789814289986
Personal Author:
Physical Description:
1 online resource (415 pages)
Contents:
CONTENTS -- Organizing Committee -- Technical Committee -- Preface -- Session 1 -- Collaborative Web Based Construction Informatics - A Learning Sciences Perspective in an Indian Context. Shion Guha -- 1. Introduction -- 2. Literature Survey -- 3. Website Proposal -- 4. Data Analysis Software -- 5. Data Analysis Principles -- 6. Data Collaboration -- 7. Simulation Example -- 8. Time Cost Optimizing Example -- 9. Collaboration Benefits -- 10. Training Module -- 11. Conclusions -- Acknowledgments -- References -- Frame-Bust Problem & Bust-Protective Algorithm . Vishwas Raval, Amit R Thakkar, Amit P. Ganatra and Y. P. Kosta -- 1. Introduction -- 2. Problem Details -- 2.1. Yahoo -- 2.3. Google -- 3. The Reason -- 4. The Prohable Solution -- Acknowledgments -- References -- Application Computational Intelligence for Development of Synthetic Peptide Vaccine from Human Adenovirus-5 Virendra Gomase, Madhur Murti, Tejashri, Gandhi, Namrata Gagnani and Sunilkumar Dwivedi -- 1. Introduction -- 2. Methodology -- 3. Results and Interpretations -- 4. Conclusion -- 5. References -- Application of Role Activity Diagrams in Finding Problem Frames and Determination of Function Points Kavita Agrawal, Shyam Kishor Bajpai and Surya Prakash Tripathi -- 1. Introduction -- 1.1 Role activity diagrams -- 1.2 Problem Frames -- 1.3. Function point analysis -- 2.The mappings -- 3. The requirement statement for sluice gate -- 3.1 Role activity diagram for sluice gate. -- 3. 2. Problem frame for sluice gate -- 4.Conclusion: -- References -- Machine Intelligent Approach for Mapping of MHC Class Binding Nonamers Virendra Gomase, Archana Khade, Hanish Khatri, Anish Phadnis and Karbhari Kale -- 1. Introduction -- 2. Methodology -- 3. Results and Interpretations -- 4. Conclusion -- 5. References.

A System Modeling and Simulation Tools with Capability of Code Generation Using Color-Timed Petri Net Touraj Mohammad Pour, Mehdi Yadollahi and AboLJazl Toroghi Haghighat -- 1. Introduction -- 2. Petri net -- 3. SimCPN description -- 3.1. System modeling -- 3.2. System simulation and analysis -- 3.3. Code generation -- 4. Experimental results -- 5. Conclusion -- References -- Query Reformulation: An Interplay of User's Reformulation Behavior and Thematic Context in Original Query Akshi Kumar and MPS Bhatia -- 1. Introduction -- 1.1. Problems with Query Reformulation -- 1.2. The need of Context & the Search Process -- 1.2.1 Where do we need context? -- 1.2.2 Use of context at different stages of the IR process -- 2. Previous Work -- 3. Query Reformulation Approach -- 3.1. Multi-Term Query -- 3.2. Local Document Set Analysis -- 3.3. Co-information Metric -- 3.4. Thematic Context Detection -- 4. Query Transformation Statistics -- 5. Conclusion -- References -- BDL - Behavior Description Language Wan Li, Guoqing Wu and Huaiguang Wu -- 1. Introduction -- 2. Syntax of BDL -- 2.1. Behavior of software -- 2.2. Atom behavior -- 2.3. Compound behavior -- 3. Semantics of BDL -- 4. Case study -- 5. Conclusion -- Acknowledgments -- References -- Applying SOFL to Construct the Formal Specification of an Automatic Automobile Driving Simulation System A Rahman Mat and Shaoying Liu -- 1. Introduction -- 2. An Obstacle-Avoiding System -- 2.1. System Mechanism -- 2.2. Avoiding Functions -- 3. Brief Introdnction to SOFL -- 4. Specifications for the Obstacle-Avoiding System -- 4.1. Informal Specification -- 4.2. Semi-formal Specification -- 4.3. A Formal Design Specification -- 5. Discussion -- 6. Related Work -- 7. Conclusion and Future Work -- Acknowledgments -- References.

Application of Data Mining for Development of Synthetic Vaccine from Scorpion Toxin Virendra Gomase, Yash Parekh, Subin Koshy, Siddesh Lakhan and Archana Khade -- 1. Introduction -- 2. Methodology -- 3. Results and Interpretation -- 4. Conclusion -- 5. References -- Randomized Multi-Level Encryption: A Promise to Better Computer Security Sudipto Sarkar and Abhishek Kumar -- 1. Introduction -- 2. Password Cracking Techniques -- 2.1. Dictionary attack -- 2.2. Brute force attack -- 2.3. Rainbow tables -- 3. Randomized Mu.lti-Ievel Encryption -- 3.1. Introduction to the technique -- 3.2 Working -- 3.3. Feasibility -- 3.4. Implementation -- 4. Conclusion -- References -- Simulation of Fire Spread Based on Multi-Level Particle System Model Yun Kuang, Dehui Kong, Yong Zhang and Yanfeng Sun -- 1. Introduction -- 2. Related Work -- 3. MLPSM: Multi-level Particle System Model -- 3.1. Definition and Structure of MLPSM -- 3.1.1. Particle -- 3.1.2. Particle Set -- 3.1.3. Particle System -- 3.1.4. Particle System Group -- 3.1.5. Particle System Scene -- 3.2. Management of MLPSM -- 3.3. Implementation of MLPSM -- 4. Fire Spreading Simulation Based on MLPSM -- 4.1. Structured Definition of Fire Spreading System -- 4.1.1. Sparkling particle and smoky particle (Particle) -- 4.1.2. Flame, smoke column and smoky flame (Particle system) -- 4.1.3. Flame system (flames), smoke system (smoke) and fire system (Particle System Group) -- 4.l.4. Fire Scene (Particle System Scene) -- 4.2. Initialization -- 4.3. Fire System Dynamic -- 4.4. Simplified Model of Fire Spread -- 4.4.1. Initialization and Calculation -- 4.4.2. Extension of flame spreading path -- 4.4.3. Smoke Generation -- 5. Results -- 5.1. Simulation Examples -- 5.1.1. Spread-burning of flames -- 5.1.2. Fixed-burnung of flames -- 5.1.3. Fire systems -- 5.1.4. Fire in the gymnaasium -- 5.2. Analysis of Visual Effects.

5.3. Performance -- 6. Conclusion and Future Work -- Acknowledgments -- References -- Session 2 -- Evaluating Usability of E-Commerce Systems for End-User Adoption Roshanak Safavi -- 1. Introduction -- 2. Objectives of Study: -- 2.1. Objective one- Investigation of both technical and human/social aspects on usability of ecommerce websites -- 2.2. Objective two- study the influence of website usability factors on online users -- 3. Findings -- 4. Conclusions -- 5. NOMENCLATURE -- Acknowledgments -- 6. References -- Using Graph Transformation to Analyze Concurrent Reconfigurations of Dynamic Software Architecture Yu Zhou, Shutian Lit, Xiaoxing Ma and Jian Lit. -- 1. Introduction -- 2. Reconfiguration Modeling and Analysis -- 2.1. Critical pair and dependency -- 2.2. Architectural reconfiguration analysis -- 3. Case Study -- 4. Discussion -- 5. Related Work -- 6. Conclusions and Future Research -- References -- Secure Multi-Party Computation Protocol for Statistical Computation on Encrypted Data Rohit Pathak and Satyadhar Joshi -- 1. Introduction -- 1.1. Recent Works -- 1.2. Problem Statement -- 2. Virtual Party Protocol -- 2.1. Informal description -- 2.2. Formal description -- 3. Application -- 3.1. A secure Average -- 3.2. A secure Root Mean Square -- 4. Statistical Computations -- Conclusion -- References -- Event Driven Architecture Through Nano Computing Models Joby Joseph and A. Clementking -- 1. Introduction -- 2. UNDERSTANDING THE EVENT DRIVEN ARCHITECTURE -- 2.1. Event Processing -- 2.2. Event Processing Styles -- 2.2.1. Simple Event Processing -- 2.2.2. Stream Event Processing -- 2.2.3. Complex Event Processing -- 2.3. Event Flow Layers -- 2.3.1. Event Generator -- 2.3.2. Event Channel -- 2.3.3. Event Processing -- 3. Nano Computer Architecture -- 3.1. Event Driven Nano Architecture -- 3.2. Defect Tolerant Reconfigurable Architecture.

4. Putting It Together -- 4. Conclusion -- References -- Visualization of Wireless Ad-Hoc Network in 3D from Multiple Views Honglei Liu, Xiaocui Li, Hongyu Zhang and Zhe Li -- 1. Introduction -- 2. Design of the simulation system -- 2.1 Architecture of the simulation system -- 2.2. Design of the functions -- 2.2. Design of the functions -- 3. Implementation of the simulation system -- 3.1 Data processing module -- 3.2 Three-dimensional Display in Multi-view -- 3.3 Dynamic Display -- Conclusion -- References -- Optimization of the Production Costs by Simulation Vazan Pavel, Tanuska Pavol and Schreiber Peter -- 1. Introduction -- 2. Problem definition -- 3. Costs structure and their calculation -- 4. Production costs optimization -- 4.1. Method -- 4.2. Definition of objective function -- S. Demonstration of solution -- 6. Simulation optimization -- 7. Conclusion -- References -- Dynamic Bandwidth Allocation Algorithm Using Fuzzy Logic for Ethernet Passive Optical Network Nurul Asyikin bt Mohd Radzi, Norashidah bt Md. Din, Intan Shafinaz bt Mustafa and Sajaa Kh. Sadon -- I. INTRODUCTION -- II. MIN'S DBA ALGORITHM -- III. KERIS DBA ALGORITHM -- IV. PERFORMANCE EVALUATION -- REFERENCES -- The Applications of Data Mining in Tax Data Warehouse Tao Wang and Ning Guo -- Abstract -- 1. Introduction -- 2. Tax Data Warehouse -- 2.1 The concept of data warehouse -- 2.2 Data warehouse features -- 2.3 The source of tax data warehouse -- 3. Building of the Tax Data Warehouse -- 3.1 The establishment of uniform standards -- 3.2 Determine the subject -- 3.3 Tax data warehouse architecture -- 3.3.1 The tax data acquisition -- 3.3.2 The tax data storage -- 3.3.3 The tax information transfer -- 4. Applications of Data Mining -- 4.1 Data mining -- 4.2 Application in the tax data warehouse -- 5. Conclusion -- References:.

Policy based Negotiation for Attracting New Web Services in a Community Sattanathan Subramanian and Guttorm Sindre.
Abstract:
The 2009 International Conference on Software Technology and Engineering (ICSTE 2009) will be held in Chennai, India during July 24-26, 2009. The objective of the ICSTE 2009 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in Software Technology and Engineering. This conference provides opportunities for the delegates to exchange new ideas and application experiences, to establish business or research relations and to find global partners for future collaboration. Submitted conference papers will be reviewed by technical committees of the conference. Sample Chapter(s). Chapter 1: Colla Bora Tive Web Based Construction Informatics - A Learning Sciences Perspective in an Indian Context (509 KB). Contents: Frame-Bust Problem and Bust-Protective Algorithm (V Raval et al.); BDL - Behavior Description Language (W Li et al.); Evaluating Usability of E-Commerce Systems for End-User Adoption (R Safavi); Event Driven Architecture Through Nano Computing Models (J Joseph & A Clementking); Optimization of the Production Costs by Simulation (V Pavel et al.); and other papers. Readership: Advanced undergraduates and graduate students, academia and researchers in software technology, software engineers.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: