Default Cover Image

Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering

Sept. 11 2000 to Sept. 15 2000

Grenoble, France

Table of Contents

ASE 2000 [front matter]Freely available from IEEE.pp. iii-viii
PrefaceFreely available from IEEE.pp. ix
ASE Steering CommitteeFreely available from IEEE.pp. x
ASE 2000 OrganizationFreely available from IEEE.pp. xi
SponsorsFreely available from IEEE.pp. xii
Programme CommitteeFreely available from IEEE.pp. xiii
Session 1: Verification
Model checking programsFull-text access may be available. Sign in or learn about subscription options.pp. 3-11
Session 1: Verification
Exploring the design of an intentional naming scheme with an automatic constraint analyzerFull-text access may be available. Sign in or learn about subscription options.pp. 13-22
Session 1: Verification
Management of change in structured verificationFull-text access may be available. Sign in or learn about subscription options.pp. 23-31
Session 2: Requirements
A comparison of questionnaire-based and GUI-based requirements gatheringFull-text access may be available. Sign in or learn about subscription options.pp. 35-43
Session 2: Requirements
CM-Builder: an automated NL-based CASE toolFull-text access may be available. Sign in or learn about subscription options.pp. 45-53
/spl pi/-SPACE: a formal architecture description language based on process algebra for evolving software systemsFull-text access may be available. Sign in or learn about subscription options.pp. 245-248
Session 2: Requirements
Finding comparatively important concepts between textsFull-text access may be available. Sign in or learn about subscription options.pp. 55-60
Session 3: Evolution
Upgrading legacy instances of reactive systemsFull-text access may be available. Sign in or learn about subscription options.pp. 63-72
Session 3: Evolution
Renaming detectionFull-text access may be available. Sign in or learn about subscription options.pp. 73-80
Session 3: Evolution
Mutation operators for specificationsFull-text access may be available. Sign in or learn about subscription options.pp. 81-88
Session 4: Synthesis and Code Generation
The use of abduction and recursion-editor techniques for the correction of faulty conjecturesFull-text access may be available. Sign in or learn about subscription options.pp. 91-99
Session 4: Synthesis and Code Generation
A DSL approach to improve productivity and safety in device drivers developmentFull-text access may be available. Sign in or learn about subscription options.pp. 101-109
Session 4: Synthesis and Code Generation
A declarative approach for designing and developing adaptive componentsFull-text access may be available. Sign in or learn about subscription options.pp. 111-119
Session 5: Algebraic Specification
Circular coinductive rewritingFull-text access may be available. Sign in or learn about subscription options.pp. 123-131
Session 5: Algebraic Specification
Formal construction of the Mathematically Analyzed Separation KernelFull-text access may be available. Sign in or learn about subscription options.pp. 133-141
Session 5: Algebraic Specification
Simultaneous checking of completeness and ground confluenceFull-text access may be available. Sign in or learn about subscription options.pp. 143-151
Session 6: Process
Using Little-JIL to coordinate agents in software engineeringFull-text access may be available. Sign in or learn about subscription options.pp. 155-163
Toward the automatic assessment of evolvability for reusable class librariesFull-text access may be available. Sign in or learn about subscription options.pp. 289-292
Session 6: Process
Practical large scale what-if queries: case studies with software risk assessmentFull-text access may be available. Sign in or learn about subscription options.pp. 165-173
Session 7: Design
Exploring and validating the contributions of real-world knowledge to the diagnostic performance of automated database design toolsFull-text access may be available. Sign in or learn about subscription options.pp. 177-185
Session 7: Design
Using graph rewriting to specify software architectural transformationsFull-text access may be available. Sign in or learn about subscription options.pp. 187-196
Session 7: Design
Specialization patternsFull-text access may be available. Sign in or learn about subscription options.pp. 197-206
Session 8: Testing
Identification of potentially infeasible program paths by monitoring the search for test dataFull-text access may be available. Sign in or learn about subscription options.pp. 209-218
Session 8: Testing
Generating test data for branch coverageFull-text access may be available. Sign in or learn about subscription options.pp. 219-227
Session 8: Testing
Test sequences generation from LUSTRE descriptions: GATELFull-text access may be available. Sign in or learn about subscription options.pp. 229-237
Short Papers
Automating the composition of middleware configurationsFull-text access may be available. Sign in or learn about subscription options.pp. 241-244
Short Papers
p-SPACE: A Formal Architecture Description Language Based on Process Algebra for Evolving Software SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 245
Short Papers
Towards explicit representation of architectural design assumptionsFull-text access may be available. Sign in or learn about subscription options.pp. 249-252
Index of authorsFreely available from IEEE.pp. 329-330
Short Papers
Java model checkingFull-text access may be available. Sign in or learn about subscription options.pp. 253-256
Short Papers
Non-interference analysis for mixed criticality code in avionics systemsFull-text access may be available. Sign in or learn about subscription options.pp. 257-260
Short Papers
Automated security checking and patching using TestTalkFull-text access may be available. Sign in or learn about subscription options.pp. 261-264
Short Papers
Controlled automation of consistency enforcementFull-text access may be available. Sign in or learn about subscription options.pp. 265-268
Short Papers
An overview of a method and its support tool for generating B specifications from UML notationsFull-text access may be available. Sign in or learn about subscription options.pp. 269-272
Short Papers
A transformational viewpoint on design patternsFull-text access may be available. Sign in or learn about subscription options.pp. 273-276
Short Papers
Issues for the automatic generation of safety critical softwareFull-text access may be available. Sign in or learn about subscription options.pp. 277-280
Short Papers
An experiment in scientific program understandingFull-text access may be available. Sign in or learn about subscription options.pp. 281-284
Short Papers
Representing technology to promote reuse in the software design processFull-text access may be available. Sign in or learn about subscription options.pp. 285-288
Short Papers
Towards the Automatic Assessment of Evolvability for Reusable Class LibrariesFull-text access may be available. Sign in or learn about subscription options.pp. 289
Short Papers
Translating use cases to sequence diagramsFull-text access may be available. Sign in or learn about subscription options.pp. 293-296
Short Papers
New visual interface for engineering use case modelsFull-text access may be available. Sign in or learn about subscription options.pp. 297-300
Short Papers
Semantic abstraction rules for class diagramsFull-text access may be available. Sign in or learn about subscription options.pp. 301-304
Short Papers
Automatic derivation of Petri net based distributed specification with optimal allocation of resourcesFull-text access may be available. Sign in or learn about subscription options.pp. 305-308
Short Papers
Combining the best attributes of qualitative and quantitative risk management tool supportFull-text access may be available. Sign in or learn about subscription options.pp. 309-312
Short Papers
A group critic system for object-oriented analysis and designFull-text access may be available. Sign in or learn about subscription options.pp. 313-316
Short Papers
Computing interfaces in JavaFull-text access may be available. Sign in or learn about subscription options.pp. 317-320
Short Papers
Extending UML to support domain analysisFull-text access may be available. Sign in or learn about subscription options.pp. 321-324
Short Papers
Systematic Generation of Dependable Change Coordination Plans for Automated Switching of Coordination PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 325
Short Papers
Index of AuthorsFreely available from IEEE.pp. 329
Showing 56 out of 56