Sciweavers

COMPSAC
2000
IEEE
13 years 9 months ago
Selection of Melody Lines for Music Databases
Michael Tang, Chi Lap Yip, Ben Kao
COMPSAC
2000
IEEE
13 years 10 months ago
Automating Scenario-Driven Structured Requirements Engineering
Scenario analysis is a vehicle of separating concerns in the elicitation of users' requirements. It is also a means of requirements validation and verification. In the practi...
Hong Zhu, Lingzi Jin
COMPSAC
2000
IEEE
13 years 10 months ago
Transforming Legacy Energy Management System (EMS) Modules into Reusable Components: A Case Study
: A two-layer adaptive wrapping technique is proposed in this paper to migrate legacy Energy Management System (EMS) modules into reusable components, and therefore transforming th...
Qing Zhao, Hoh In, Xiaowei Wu, Garng M. Huang
COMPSAC
2000
IEEE
13 years 10 months ago
Dependence Analysis of Java Bytecode
Understanding program dependencies in a computer program is essential for many software engineering tasks such as program understanding, testing, debugging, reverse engineering, a...
Jianjun Zhao
COMPSAC
2000
IEEE
13 years 10 months ago
Reliable Transaction Design Using MTS
Il-Chul Yoon, Hyung-Ho Kim, Doo-Hwan Bae, Cheong Y...
COMPSAC
2000
IEEE
13 years 10 months ago
Integration in Component-Based Software Development Using Design Patterns
Components-based development is promising in improving software development productivity and software quality by re-using existing well-tested software components. However, one of...
Stephen S. Yau, Ning Dong
COMPSAC
2000
IEEE
13 years 10 months ago
Network Management with Intelligent Trader
Shinichi Matsumoto, Makoto Amamiya
COMPSAC
2000
IEEE
13 years 10 months ago
Firewall Security: Policies, Testing and Performance Evaluation
This paper explores the firewall security and performance relationship for distributed systems. Experiments are conducted to set firewall security into seven different levels and ...
Michael R. Lyu, Lorrien K. Y. Lau
COMPSAC
2000
IEEE
13 years 10 months ago
A Practical Method for Watermarking Java Programs
Java programs distributed through Internet are now suffering from program theft. It is because Java programs can be easily decomposed into reusable class files and even decompiled...
Akito Monden, Hajimu Iida, Ken-ichi Matsumoto, Koj...