제15회 한국 소프트웨어공학 학술대회 (kcse 2013) 논문집 다운로드

510
2013 15한국 소프트웨어공학 학술대회 논문집 Proceedings of the 15th Korea Conference on Software Engineering (KCSE 2013) 일시: 2013130() ~ 21() 장소: 강원도 평창 한화리조트(휘닉스파크점) 주최: 한국정보과학회, 한국정보처리학회 주관: 한국정보과학회 소프트웨어공학 소사이어티 한국정보처리학회 소프트웨어공학 연구회 한국전자통신연구원 후원: 정보통신산업진흥원 SW 공학센터, ㈜케이티, ㈜비트컴퓨터, ㈜다한테크, ㈜솔루션링크, 슈어소프트테크㈜, ㈜씽크포비엘, STA 테스팅컨설팅㈜, LG CNS, 이에스지㈜, ㈜인지소프트, 현대엠엔소프트㈜ 15 1 Vol. 15 No. 1

Upload: truonganh

Post on 14-Feb-2017

366 views

Category:

Documents


48 download

TRANSCRIPT

  • 2013

    15

    Proceedings of the 15th Korea Conference on

    Software Engineering (KCSE 2013)

    : 2013 1 30() ~ 2 1()

    : ()

    : , :

    : SW, ,

    , , ,

    , , STA,

    LG CNS, , ,

    15 1

    Vol. 15 No. 1

  • 2013 .

    ,

    , ,

    15 (KCSE 2013) .

    1 30 2 1

    , , 80

    .

    , , 6

    World Best Software(WBS) Software Visualization SW

    , Cyber-Physical Systems(CPS) .

    2 .

    , SW , , , SW , SW

    SPLE, SW, SW, SW, , , SW

    .

    ,

    .

    .

  • : (), ()

    : ()

    : (), (), (), (ETRI),

    (KAIST), (), (), (),

    (), (), (NIPA SW),

    (), (), (), (),

    (), (), (),

    ()

    : (KAIST)

    : (), (KAIST), (KAIST), (),

    (), (ETRI), (),

    (), (), (),

    (), (), (), (),

    (), (), (), (),

    (), (), (), (),

    (), ()

  • T1: 1

    Architecture for Cloud, Ucloud for Architecture

    (KT)

    Ucloud Academy Program

    (KT)

    T2:

    (KAIST)

    T3: 1

    Combinatorial Test Design and Its Applications

    (SUNY Korea)

    T4: 2

    (A journey to the Smart Working Era on the Cloud)

    (LGCNS)

    T5:

    ()

    T6: 2

    Towards Dependable and Secure Software: Requirements Engineering Approach

    ()

    CMMI GP SP []

    ()

    []

    , , , , , , (KAIST)

    SW , []

    (NIPA SW )

  • SI []

    , (NIPA SW )

    SW []

    (NIPA SW )

    (PBM)

    , (KAIST), (SK C&C)

    []

    (/KAIST), (/KAIST), (/KAIST),

    (/KAIST)

    []

    ()

    []

    , , (), ()

    ? []

    (/KAIST)

    []

    , ()

    Needs

    (), (TTA), , ()

    Social Network Service(SNS) []

    (/KAIST), (VMS Solutions/KAIST), (/KAIST),

    (LG /KAIST), (/KAIST)

    A []

    , , (LG /KAIST)

    AOP ISO/IEC 9126 []

    , ()

  • , ()

    , , (ETRI)

    Development of Decommissioning Engineering System []

    , (KAERI)

    , , , , ()

    UML 2.0 []

    , (N3Soft)

    []

    , ()

    []

    , ()

    SW SPLE

    , , (KAIST)

    []

    (/KAIST), , (LG /KAIST)

    OSGi []

    , ()

    []

    , , , , ()

    []

  • , , , (KAIST), ()

    SW

    A Bug Triage and Localization Technique based on Bug Reports Classification []

    Tao Zhang, ()

    []

    , ()

    . : []

    ()

    []

    , , Matt Staats, Gregg Rothermel(KAIST)

    []

    (LIG )

    SW []

    , ()

    []

    (LIG )

    , (KAIST)

    TMMi []

    , , (LIG )

    (fault localization) []

    , , (KAIST)

    - []

    , ()

    BPEL []

    , ()

  • , (KAIST)

    []

    , , (), (), ()

    []

    , Scott Uk-Jin Lee, Amna Al Dhaheri()

    , , ()

    (), (), ()

    ,

    , , ()

    []

    , ()

    , ()

    Specification By Example []

    , , (NTS)

    []

    , Matt Staats, , Gregg Rothermel(KAIST)

    []

    , , ()

    SW

    , , , , , ()

    A Method for Semantically Distributing Information Across Multiple Displays

    (KAIST IT )

    Hadoop MapReduce []

  • (), (), ()

    []

    , , , ()

    []

    (), (), ()

    []

    , , ()

    []

    , {}

    -

    , , , ()

    []

    (), , (), , ()

    []

    , , ()

    SW

    (KAIST)

    - ECML XMI

    (), (), , (ETRI), ()

    , , , (KAIST)

    UAV MANET []

    , ()

    TV IO []

    , , , ()

  • SW

    []

    , ()

    MVC

    , ()

    []

    , , ()

    []

    , ()

    []

    , (), ()

    , , (KAIST)

    SW

    []

    (), ()

    :

    RTOS []

    , , (ETRI)

    []

    , ()

    CPS []

    , ()

  • :

    , , ()

    , , (KAIST)

    , , , ()

    []

    , , , ()

  • KCSE 2013

    1 30 ()

    12:00-

    13:00

    : ()

    : 1

    13:00-

    13:20

    ( ),

    ( )

    13:20-

    13:30 KCSE 2013 (KAIST)

    : ()

    : 1

    13:30-

    14:15 Software Visualization (NIPA SW)

    14:15-

    14:30

    T1: 1

    : ()

    : 2

    T2:

    : ()

    : 1

    T3:

    1

    : ()

    : 2

    14:30-

    15:45

    Architecture for Cloud, Ucloud for

    Architecture (KT)

    Ucloud Academy Program

    (KT)

    (KAIST)

    Combinatorial Test Design and Its

    Applications

    (SUNY Korea)

    15:45-

    16:00

    A1: SW

    : ()

    : 2

    A2:

    1

    : (KAIST)

    : 1

    A3: SW

    1

    : ()

    : 2

    A4: SW 1

    : () :

    3

    16:00-

    17:50

    (KAIST)

    - ECML XMI (), (), , (ETRI), ()

    , , , (KAIST)

    UAV MANET [] , ()

    TV IO [] , , , ()

    CMMI GP SP [] ()

    [] , , , , , , (KAIST)

    SW, [] (NIPA SW)

    SI [] , (NIPA SW)

    A Bug Triage and Localization Technique based on Bug Reports Classification [] Tao Zhang, ()

    [] , ()

    . : [] ()

    [] , , Matt Staats, Gregg Rothermel(KAIST)

    , , , , , (

    )

    A Method for Semantically Distributing Information Across Multiple Displays

    (KAIST IT)

    Hadoop MapReduce [] (), (), ()

    [] , , , ()

    [] (), (), ()

  • [ 18:05 ] [] , , ()

    18:00-

    19:00

    1 31 ()

    07:00-

    09:00

    T4: 2

    : ()

    : 2

    T5:

    : ()

    : 1

    T6:

    2

    : (KAIST)

    : 2

    09:00-

    10:15

    (A journey to

    the Smart Working Era on the Cloud)

    (LGCNS)

    ()

    Towards Dependable and Secure Software:

    Requirements Engineering Approach

    ()

    10:15-

    10:30

    B1:

    : ()

    : 2

    B2:

    2

    : ()

    : 1

    B3: SW

    2

    : (KAIST)

    : 2

    B4: SW

    : ()

    : 3

    10:30-

    11:45

    , ()

    , , (ETRI)

    Development of Decommissioning Engineering System [] , (KAERI)

    SW 101 [] (NIPA SW)

    (PBM)

    , (KAIST), (SK C&C)

    [] (/KAIST), (/KAIST), (/KAIST), (/KAIST)

    [] (LIG)

    SW [] , ()

    [] (LIG)

    [] , ()

    MVC

    , ()

    [] , , ()

    11:45-

    13:00

    I1: World Best Software SW

    : (NIPA SW) : 2

    C1: 1 : () : 1

    C2: SW 3

    : () : 2

    C3: : () : 3

  • 13:00-

    14:30

    WBS SW

    (NIPA SW)

    WBS ()

    SW ()

    CI SW SW

    ()

    [] ()

    [] , , (), ()

    ? [] (/KAIST)

    [] , ()

    , (KAIST)

    TMMi [] , , (LIG)

    (fault localization) [] , , (KAIST)

    - [] , ()

    [] , ()

    [] , (),

    ()

    , , (KAIST)

    14:30-

    14:45

    I2: SW Visualization

    SW

    : (NIPA SW) : 2

    I3:

    : () : 1

    D1: SW 4

    : () : 2

    D2: SW : () : 3

    14:45-

    16:15

    SW Visualization (NIPA SW)

    ()

    () SW ()

    Firmware SW(Daily Build + ) ()

    IBM Rational ()

    ()

    1%, ()

    TMMi (LIG)

    (STA )

    ITscope : IT - ()

    BPEL [] , ()

    , (KAIST)

    [] , , ,

    , ()

    [] , Scott Uk-Jin Lee,

    Amna Al Dhaheri()

    [] (), ()

    : RTOS [] , , (ETRI)

    [] , ()

    CPS [] , ()

    16:15-

    16:30

    : ()

    : 2

    16:30-

    16:50 SW ( SW)

    16:50-

    17:30 SW (NIPA)

    17:45-

    21:00

    , , : (NIPA SW)

    : 1

  • 2 1 ()

    07:00-09:00

    V1: Cyber-Physical Systems

    : () : 2

    E1: 2

    : () : 1

    E2: SW 5

    : () : 2

    E3:

    : () : 3

    09:00-10:30

    CPS (ETRI)

    Software-based Fault Detection and Recovery for Cyber-Physical Systems ()

    IT

    ()

    Needs

    (), (TTA), , ()

    Social Network Service(SNS) [] (/KAIST), (VMS Solutions/KAIST), (/KAIST), (LG/KAIST), (/KAIST)

    A [] , , (LG/KAIST)

    AOP ISO/IEC 9126 [] , ()

    , , ()

    (), (), ()

    ,

    , , ()

    [] , ()

    : , , ()

    , , (KAIST)

    , , , (

    )

    [] , , , ()

    10:30-10:45

    F1: SW

    : () : 2

    F2: SW SPLE

    : () : 1

    F3: SW 6

    : (KAIST) : 2

    F4: SW 2

    : () : 3

    10:45-12:15

    , , , , ()

    UML 2.0 [] , (N3Soft)

    [] , ()

    [] , ()

    , , (KAIST)

    [] (/KAIST), , (LG/KAIST)

    OSGi [] , ()

    [] , , ,

    , ()

    [] , , , (KAIST),

    ()

    [ 12:20 ]

    , ()

    Specification By Example [] , , (NTS)

    [] , Matt Staats, ,

    Gregg Rothermel(KAIST)

    [] , , ()

    [] , {}

    -

    , , , ()

    [] (),

    , (), , ()

    [] , , ()

    12:20-12:30 - :

    () : 1

    .

  • KCSE 2013

    T1: 1

    - : 1 30 () 14:30-15:45

    - : 2

    - : Architecture for Cloud, Ucloud for Architecture

    - : (KT Cloud VPC)

    - :

    IT , ,

    1:1 .

    .

    - .

    . 2012 SSD

    . KT

    - :

    1993 ()

    1993~ KT

    - HAN/B-ISDN

    -

    - RFID/USN

    - BcN (BcN : Broadband Convergence Network)

    - KT-MBA

    Cloud Cloud VPC

    - : Ucloud Academy Program

    - : (KT Cloud Cloud)

    - :

    IT , CEO .

    () .

    .

    . ,

    kt . kt

  • ucloud academy .

    - :

    1996 University of Iowa,

    2006 IE Business School, MBA

    1997~ KT

    - , IR, ,

    Cloud Cloud Cloud

    T2:

    - : 1 30 () 14:30-15:45

    - : 1

    - :

    - : (KAIST)

    - :

    . ,

    , ,

    .

    - :

    2011.8.10~12: , SERA 2011 (Software Engineering Research,

    Management and Applications)

    2009.3 ~ : KAIST

    2003 ~ : MSE

    2001.10 ~ 2009.2: ,

    2001.8.28 ~ 31: , FORTE 2001 (Formal Techniques for Networked and

    Distributed Systems)

    1995.9 ~1996.9: (NIST)

    1993.12 ~ 2001.10: (KT)

    : , 2012.

    T3: 1 - : 1 30 () 14:30-15:45

    - : 2

    - : Combinatorial Test Design and Its Applications

    - : (SUNY Korea)

    - :

    Combinatorial test design is a test-case selection technique where each test case (called

    configuration) is a value combination of test input parameters. The main rationale behind this

  • design is that software faults are often caused by unintended or unexpected interactions between

    test input values. Since its rebirth as a software black-box testing technique, combinatorial test

    design has been applied to various problems in the Software Engineering discipline and the cost-

    effectiveness of the technique has been empirically proven by a large stack of studies carried out

    over the last two decades.

    In this tutorial, I will introduce a number of combinatorial test design techniques that use different

    strategies or coverage criteria for the value selection process, with the special focus given to the t-

    wise interaction coverage design. Two natural extensions to the base design will then be presented.

    The extensions are to improve test effectiveness by prioritizing test cases generated or to reduce

    the size of test suites while preserving test strength. Researches on the application of the

    techniques to address various problems in Software Engineering will also be presented to raise

    understanding of actual use-cases. The application areas may include fault characterization, software

    performance enhancement, web application testing, and GUI testing.

    - :

    Professor Ilchul Yoon received B.S. in Computer Science at Sogang University, M.S. in Computer

    Science at Korea Advanced Institute of Science and Technology, and Ph.D. in Computer Science at

    University of Maryland, College Park. As an assistant professor in the department of Computer

    Science, he is working for State University of New York, Korea, which is the first foreign university

    established on Korean soil. His research interests lie in the fields of software compatibility testing,

    interaction test design, and software process. He also has interests in distributed high-performance

    computing researches, and participated in the peer-review processes of major conferences in the

    discipline.

    T4: 2 - : 1 31 () 09:00-10:15

    - : 2

    - : (A journey to the Smart Working Era on the Cloud)

    - : (LG CNS )

    - :

    12 Chasm

    . / Commodity

    .

    , IaaS SW SaaS

    (PC)

    .

    .

    - :

    97 ~ 02 : LG-EDS( LG CNS) . SI / SM

    03 ~ 05 : LG CNS

    05 ~ 09 : LG CNS

  • 10 ~ : LG CNS

    : , ,

    LG CNS

    T5: - : 1 31 () 09:00-10:15

    - : 1

    - :

    - : ()

    - :

    .

    . IT

    .

    ,

    , .

    - :

    1982. ()

    1985. ()

    1993. Illinois Institute of Technology ()

    1985.

    1986~1988 ,

    1988. ()

    1992.

    19972004,

    2001~2005.

    2000. 2007 ()

    2002.

    1993,

    T6: 2 - : 1 31 () 09:00-10:15

    - : 2

    - : Towards Dependable and Secure Software: Requirements Engineering Approach

    - : ()

    - :

    Engineering a dependable software system that meets our needs is a challenging task and requires

    a variety of analysis and development techniques. Dependability has to be engineered into a system

    in its early stage of design and development task to build comprehensive understanding of its

    nature and purposeful behavior within the context of people, technology and the process. Among

  • many dependability attributes, we focus on the security attribute and its certification and

    accreditation process that aggregates evidences for multi-dimensional analysis to assure its level of

    acceptance. Security breaches most often occur due to a cascading effect of failure among security

    constraints that collectively contribute to overall secure system behavior in a socio-technical

    environment. Therefore, during security certification activities, analysts must systematically take into

    account the nexus of causal chains that exist among security constraints imposed by regulatory

    requirements. Numerous regulatory requirements specified in natural language documents or listed

    in spreadsheets/databases do not facilitate such analysis. We present a step-wise methodology to

    discover and understand the multi-dimensional correlations among regulatory requirements for the

    purpose of understanding the potential for risk due to non-compliance during system operation.

    Our lattice algebraic computational model helps estimate the collective adequacy of diverse security

    constraints imposed by regulatory requirements and their interdependencies with each other in a

    bounded scenario of investigation. Abstractions and visual metaphors combine human intuition

    with metrics available from the methodology to improve the understanding of risk based on the

    level of compliance with regulatory requirements. In addition, a problem domain ontology that

    classifies and categorizes regulatory requirements from multiple dimensions of a socio-technical

    environment promotes a common understanding among stakeholders during certification and

    accreditation activities. A preliminary empirical investigation of our theoretical propositions has

    been conducted in the domain of The United States Department of Defense Information Technology

    Security Certification and Accreditation Process (DITSCAP). This work contributes a novel approach

    to understand the level of compliance with regulatory requirements in terms of the potential for risk

    during system operation. This work has been partially supported by the grants from Space and

    Naval Warfare Systems Center (SPAWAR) US Department of Navy, Department of Defense, and

    National Science Foundation.

    - :

    Dr. Seok-Won Lee is currently the Head of Graduate School of Software and Associate Professor of

    Information & Computer Engineering at Ajou University since 2012. He has been an Assistant

    Professor of Information Security at the University of Texas at San Antonio, a Visiting Professor at

    the University of Nebraska Lincoln and an Assistant Professor of Software Engineering and a

    Director of Knowledge-intensive Software Engineering (NiSE) research group at the Univ. of North

    Carolina at Charlotte (2003- 2010). Prior to joining to the UNC Charlotte, he was affiliated with

    Science Applications International Corporation (SAIC) and IBM T.J. Watson Research Center as senior

    research scientists. He received his M.Sc. in Computer Science from University of Pittsburgh, and

    Ph.D. in Information Technology from George Mason University. His areas of specialization include

    software engineering with specific expertise in ontological requirements engineering and domain

    modeling, and knowledge engineering with specific expertise in knowledge acquisition, machine

    learning and knowledge-based systems. He serves as chairs, organizers, editors and the program

    committee members for numerous journals, conferences, and workshops in software requirements

    engineering, secure software engineering and other related areas such as information security and

    assurance, critical infrastructure protection, service-oriented computing, visual analytics and self-

    adaptive software systems. He has published more than 100 refereed articles. He is a professional

    member of IEEE, ACM and AAAI.

  • (Programmer Behavior Metrics, PBM)

    2 517-10

    2 517-10

    SK C&C

    25-1

    [email protected] [email protected] [email protected]

    : LOC(Line of Codes)

    ,

    , , ,

    .

    .

    . : (Programmer Behavior), (Programmer Behavior Metrics, PBM),

    (Programmer Behavior Measurement System, PBMS), Gamification in programming

    1.

    ,

    .

    ,

    .

    2.

    Shneiderman Mayer

    [3], Mohan God

    [4]. ,

    .

    Practical Software Measurement (PSM)

    , , ,

    [5], ISO 9126 (Metric)

    [6].

    , Causal Model

    [7,10,11,12].

    ( ,

    ) (, )

    [8]. [9]

    ,

    (PBMS)

    (), , , ,

    (Quest) .

    [ 1] PBM

    3.

    (Programmer

    Behavior, PB)

    ,

    (Programmer Behavior

    Metrics, PBM) . , LOC

    (Programmer Explicit Behavior),

    , ,

    (Programmer Implicit Behavior)

    [ 1].

    [ 2] Attributes and Measures In PBM

    2013 15 1

    -1-

  • [ 2] ,

    ,

    .

    PBM

    , ()

    [ 1].

    [ 1] PBM

    ( / )

    4. PBMS (PBMS, Programmer

    Behavior Measurement System)

    (, , )

    . PBMS

    PBM [ 3][ 4].

    [ 3] Software Architecture in PBMS

    [ 4] (Client Side)

    ,

    Event-Driven Architecture , RESTful,

    JSON, AJAX

    .

    9 16

    JAVA 2 .

    1 118,066 ,

    186 .

    LOC

    ,

    [ 5].

    [ 5]

    (LOC ,

    Checkstyle )

    5.

    (PBM)

    ( )

    .

    38

    [ 6] Causal Model

    . ,

    ( )

    ,

    .

    ( ) .

    .

    .

    [ 6] Causal Model

    2013 15 1

    -2-

  • [1] Norman E. Fenton, Shari Lawrence Pfleeger, Software Metrics(A Rigorous & Practical Approach), 2 edition, PWS, 1997

    [2] Mihaly Csikszentmihalyi, Flow: The Psychology of Optimal Experience, Harper Perennial Modern Classics; 1ST edition, July 1, 2008

    [3] Ben Shneiderman and Richard Mayer, Syntactic/Semantic Interactions in Programmer Behavior: A Model and Experimental Results, International Journal of Computer and Information Sciences, Vol. 8, No. 3, 1979

    [4] Andrew Mohan, Nicolas God, Programming Style Changes in Evolving Source Code, Proceedings of the 12th IEEE International Workshop on Program Comprehension, IEEE, 2004

    [5] John McGarry, David Card, Chery Jones, Beth Layman, Elizabeth Clark, Joseph Dean, Fred Hall, Practical Software Measurement: Objective Information for Decision Makers, Addison-Wesley Professional 1 edition, Oct. 27, 2001

    [6] ISO/IEC 9126(9126-1, 2, 3, and 4), Wikipedia, http://en.wikipedia.org/wiki/ISO/IEC_9126

    [7] Judea Pearl, Causality: Models, Reasoning, and Inference, Cambridge University Press, 2000

    [8] Tracy Hall, Helen Sharp, Sarah Beecham, Nathan Baddoo, Hugh Robinson, What Do We Know about Developer Motivations?, July/August 2008, IEEE SOFTWARE, 92-94, 2008, IEEE

    [9] , (Gamification)

    ,

    2011.09.15 [10] Norman Fenton, Paul Krause, Martin Neil, Software

    Measurement: Uncertainty and Causal Modeling, IEEE, July/August, 2002

    [11] John D. Sterman, System Dynamics Modeling: Tools For Learning in a Complex World, CALIFORNIA MANAGEMENT REVIEW VOL. 43, NO. 4, SUMMER 2001

    [12] Tarek K. Abdel-Hamid, Stuart E. Madnick, Lessons Learned from Modeling the Dynamics of Software Development, Communication of the ACM, Volume 32, Number 12, December 1989

    [13] Len Bass, Paul Clements, Rick Kazman, Software Architecture in Practice, second Edition, Addison-Wesley, 2003

    2013 15 1

    -3-

  • (Programmer Behavior Metrics, PBM)

    (1), (2), (3)

    2 517-10 (1) [email protected], (2) [email protected]

    25-1, SK C&C (3) [email protected]

    : LOC,

    ,

    .

    , (

    ), ,

    .

    ,

    (PBMS)

    .

    .

    : (Programmer Behavior),

    (Programmer Behavior

    Metrics, PBM), (Programmer

    Behavior Measurement),

    (Programmer Behavior Measurement System, PBMS), Gamification in programming

    1.

    ,

    .

    ()

    / ,

    .

    . LOC

    [1]

    (Programmer Explicit

    Behaviors) .

    ,

    , (flow)[2]

    .

    (Programmer Implicit Behaviors) .

    . 1

    , 3

    .

    4 (PBMS)

    , 5 1

    1

    .

    2.

    .

    2.1

    Shneiderman Mayer

    , ,

    ,

    [3].

    ,

    , --

    .

    .

    Mohan God

    (application)

    (individuals

    interpretations) ,

    , , ,

    [4].

    (coding standards) (coding

    convention) ,

    .

    2013 15 1

    -4-

  • 2.2

    ,

    . Practical Software Measurement (a.k.a.

    PSM)[5] (attribute),

    (base measure), (derived

    measure), (indicator) ,

    [ 1].

    [ 1] Practical Software Measurement [5]

    PSM .

    .

    .

    .

    ISO 9126 Quality Model[6]

    , , ,

    , , .

    .

    2.3

    ,

    .

    .

    ,

    .

    [ 2] ,

    , Causal Model

    [7,10,11,12]. 5

    1 Causal

    Model .

    [ 2] Nave Model vs. Causal Model [7]

    2.4

    .

    ,

    .

    [ 3] ,

    .

    , ,

    ,

    [8].

    [ 3] Developer Motivators [8]

    (mechanics)

    (gamification) [9].

    ,

    (PBMS)

    (), , ,

    , , (Quest)

    .

    2013 15 1

    -5-

  • 3.

    ,

    .

    3.1

    .

    ()

    .

    ,

    .

    ,

    . [ 4]

    (programmer behavior metrics, PBM)

    .

    [ 4] PBM

    ,

    .

    3.2 (Measures)

    PSM

    [5], , , ,

    .

    ( Eclipse

    ) ,

    (

    Subversion )

    .

    ,

    ,

    ( )

    .

    ,

    , (, )

    . LOC ,

    ,

    .

    [ 6] [ 7] ,

    .

    [ 5] Attributes and Measures In PBM ()

    [ 6] Measurement Information Model ()

    3.3 (PBM)

    [ 1] , PBM

    . ,

    2013 15 1

    -6-

  • ()

    . ,

    ,

    .

    , ,

    PBM .

    ,

    .

    [ 1] PBM

    4. PBMS

    4.1 Context Diagram

    PBMS(Programmer Behavior Measurement

    System)

    . [ 7] PBMS

    .

    PBMS ()

    ,

    , ,

    . (Code Collector)

    (subversion)

    (uploaded) .

    (Analyzer)

    (PSM)

    . (Controller)

    ( )

    .

    ,

    .

    .

    [ 7] Context Diagram in PBMS

    4.2 S/W Architecture Quality Attributes

    PBMS ,

    , .

    Len Bass, Paul Clements, Rick Kazman

    [13] .

    ,

    .

    Event-Driven

    . Event-Driven

    4.3 .

    , ,

    Eclipse

    .

    Log4J .

    .

    .

    , PBMS

    ,

    PBMS .

    PBMS ()

    .

    ,

    , ,

    . 15

    .

    , PBMS

    2013 15 1

    -7-

  • , .

    ,

    ,

    .

    [ 8] PBMS

    , [ 9]

    .

    [ 8] PBMS

    [ 9]

    4.3 S/W Architecture Runtime View

    PBMS Runtime View

    .

    .

    [ 10] , Event-Driven

    . ,

    Event-Driven

    .

    1) (Eclipse)

    . ,

    ( )

    ,

    (Apache ActiveMQ)

    .

    2)

    PBMS

    .

    ,

    .

    3)

    (PBM) .

    [ 10] Event-Driven

    Event-Driven

    ,

    .

    [ 11] RESTful, AJAX

    . (Eclipse)

    REST

    .

    AJAX/JSON

    .

    [ 11] RESTful, AJAX

    1) PBMS

    2013 15 1

    -8-

  • .

    . AJAX

    .

    2) PBMS JSON

    .

    /

    .

    , .

    , 3rd Party

    .

    5.

    PBMS

    . 2012 11

    12 2 ,

    1 .

    .

    5.1

    ,

    .

    .

    ,

    9 , (2 ),

    (3 ), (2 ), (2 )

    .

    16 JAVA

    , 4

    10 8 ~ 14 6

    .

    5.2 PBMS

    [ 12] PBMS .

    , ()

    .

    ,

    [ 13].

    , , ,

    15 .

    /

    .

    ,

    ( ) .

    [ 12] PBMS

    [ 13]

    5.3

    .

    , ,

    .

    , 1, 2

    .

    2013 15 1

    -9-

  • , [ 14] ,

    (Quest)

    .

    [ 14]

    ,

    .

    ,

    , .

    [ 15]

    [ 14]

    (marker)

    (tooltip) . [ 15]

    , ( ,

    ) .

    PBMS

    .

    5.4

    1 16 118,066

    , 186

    . LOC(Line of

    Code)

    ,

    Checkstyle .

    [ 16] [ 17] ,

    LOC LOC

    ,

    .

    [ 16] LOC

    [ 17]

    . ,

    2013 15 1

    -10-

  • [ 18] , 5 14

    1000 7 ~ 15

    . [ 19] ,

    .

    [ 18]

    [ 19]

    ,

    ,

    .

    5.5 Causal Model

    (PBM)

    ( )

    .

    38

    [ 20]

    Causal Model .

    +-0.6

    .

    LOC

    . [ 20] ,

    ,

    ( )

    .

    ,

    . 1

    ,

    .

    [ 20] Causal Model

    6.

    6.1

    (PBMS)

    .

    ,

    , ,

    ,

    .

    (LOC, )

    .

    6.2

    . (flow)

    .

    (

    ) , .

    .

    .

    .

    2013 15 1

    -11-

  • [1] Norman E. Fenton, Shari Lawrence Pfleeger, Software Metrics(A Rigorous & Practical Approach), 2 edition, PWS, 1997

    [2] Mihaly Csikszentmihalyi, Flow: The Psychology of Optimal Experience, Harper Perennial Modern Classics; 1ST edition, July 1, 2008

    [3] Ben Shneiderman and Richard Mayer, Syntactic/Semantic Interactions in Programmer Behavior: A Model and Experimental Results, International Journal of Computer and Information Sciences, Vol. 8, No. 3, 1979

    [4] Andrew Mohan, Nicolas God, Programming Style Changes in Evolving Source Code, Proceedings of the 12th IEEE International Workshop on Program Comprehension, IEEE, 2004

    [5] John McGarry, David Card, Chery Jones, Beth Layman, Elizabeth Clark, Joseph Dean, Fred Hall, Practical Software Measurement: Objective Information for Decision Makers, Addison-Wesley Professional 1 edition, Oct. 27, 2001

    [6] ISO/IEC 9126(9126-1, 2, 3, and 4), Wikipedia, http://en.wikipedia.org/wiki/ISO/IEC_9126

    [7] Judea Pearl, Causality: Models, Reasoning, and Inference, Cambridge University Press, 2000

    [8] Tracy Hall, Helen Sharp, Sarah Beecham, Nathan Baddoo, Hugh Robinson, What Do We Know about Developer Motivations?, July/August 2008, IEEE SOFTWARE, 92-94, 2008, IEEE

    [9] , (Gamification)

    ,

    2011.09.15 [10] Norman Fenton, Paul Krause, Martin Neil, Software

    Measurement: Uncertainty and Causal Modeling, IEEE, July/August, 2002

    [11] John D. Sterman, System Dynamics Modeling: Tools For Learning in a Complex World, CALIFORNIA MANAGEMENT REVIEW VOL. 43, NO. 4, SUMMER 2001

    [12] Tarek K. Abdel-Hamid, Stuart E. Madnick, Lessons Learned from Modeling the Dynamics of Software Development, Communication of the ACM, Volume 32, Number 12, December 1989

    [13] Len Bass, Paul Clements, Rick Kazman, Software Architecture in Practice, second Edition, Addison-Wesley, 2003

    2013 15 1

    -12-

  • : S/W Architecture Runtime View

    2013 15 1

    -13-

  • , ,

    373-1 {siner7, hmkoo, iko}@kaist.ac.kr

    :

    .

    ,

    (Network-Centric War, NCW)

    (System of System) .

    .

    ,

    .

    : , , ,

    1.

    ,

    (Network-Centric War, NCW)

    [1]. NCW

    ,

    (SOA)[2,3]

    (SOC)

    . SOA

    ,

    ,

    .

    ,

    ,

    ,

    .

    , ,

    ,

    .

    .

    :

    .

    ,

    ,

    .

    :

    .

    .

    ,

    [4].

    (Context-dependent):

    .

    2013 15 1

    -14-

  • .

    (Flexibility) (Real-time):

    .

    ,

    .

    .

    .

    .

    ,

    .

    ,

    .

    .

    ,

    .

    . 2

    . 3

    4

    Match-Making

    . 5

    . 6

    .

    2.

    (Mission Planning)

    [5,6,7]. [5]

    ,

    .

    ,

    .

    ,

    .

    [2] C4ISR(Command & Control, Computer, Communication, Surveillance, Reconnaissance)

    .

    3 (meta/domain/ application)

    , (Semantic)

    .

    .

    .

    3.

    .

    .

    . / ,

    , [8]. 1

    (Mission Description Model)

    .

    (Syntactic)

    .

    (Semantic)

    .

    .

    2013 15 1

    -15-

  • [ 1]

    (Mission Statement)

    ()

    (Who), (When), (Where),

    (What), (Why)

    ,

    (How)

    .

    (Purpose)

    (Desired effect) (Intention)

    (Constraint) .

    (Enemy Situation)

    .

    ,

    .

    (Friendly Situation)

    .

    ,

    .

    .

    (Environment information)

    (: , ) (: ,

    )

    ,

    ()

    .

    ,

    .

    ,

    .

    .

    4.

    4.1 2 (Task), (Service),

    (Resource) 3

    .

    .

    2013 15 1

    -16-

  • (Restate)

    .

    .

    [ 2]

    (UJTL: Universal Joint Task List)

    , (What)

    [9].

    (SoS)

    3

    4 ((SN), (ST),

    (OP) (ST))

    .

    [ 3] [9]

    .

    , , , , ,

    ,

    (Decomposer).

    (Match Making)

    ,

    .

    .

    ,

    .

    (Capability)

    .

    .

    (DOTMLPF) (Way)

    (Mean)

    (Desired Effect)

    (Ability)[8] .

    (Optimality) .

    ()

    ,

    (: :, , ),

    .

    Optimality Evaluation (Requirement, Service) =

    [ 4]

    2013 15 1

    -17-

  • 4

    n R

    C .

    .

    .

    .

    .

    4.2

    5

    .

    4.

    3 .

    (service Repository)

    .

    .

    (Mission Profile)

    .

    , (Preference)

    .

    (Context information)

    .

    3 DB

    (Mission Context Manager)

    4 .

    ,

    (Mediation) .

    (Synchronization) .

    (Aggregation)

    .

    (Mapping)

    (Interpretation).

    (Mission Analyzer)

    .

    :

    .

    .

    :

    .

    (Execution

    manager)

    .

    ,

    .

    (Reasoner)

    (Service Match-Maker)

    2013 15 1

    -18-

  • (Decision Maker)

    .

    (Service Performer)

    (Execution Path)

    Information Manager

    .

    (Service Match Maker)

    .

    .

    [ 5]

    , ,

    . 5 , ,

    .

    (Sub Class) (capability)

    .

    .

    . PCC(Sea

    Platform (Instance)) Anti-Surface

    Warfare Capability

    Gun(Anti-Ship Weapon )

    PCC Anti-Surface

    Warfare

    .

    Anti-Surface Warfare

    PCC

    . , ,

    (Protg)

    ,

    5

    . 6 ,

    .

    A) Mission B) Task C) Resource

    [ 6] (Mission), (Task), (Resource)

    2013 15 1

    -19-

  • 5.

    . [5]

    ,

    1 .

    [ 1]

    Who Joint group of Navy and Marine Forces

    Where

    landing beaches north, south - road leading from the north beach to the

    seaport - road leading from the south beach to the

    airport

    Why capturing a seaport and airport to allow for the introduction of follow-on forces

    When Before Amphibious operation

    What Destroy Enemy force and Block follow forces

    7

    10 .

    [ 7]

    T2 T3

    T1 T10

    ( ) (

    )

    .

    ,

    .

    2 3

    .

    .

    [ 2]

    1 2 3

    T1

    T2

    T3

    T4 -

    T5 -

    T6 -

    T7 -

    T8

    T9

    T10 - -

    [ 3]

    , , ,

    , , , , ,

    , , ,

    , , , , ,

    , ,

    , , ,

    , ,

    , ,

    T10

    .

    .

    =

    = {, , }

    . 4

    T10

    . (History Data)

    ,

    . T10

    .

    2013 15 1

    -20-

  • [ 4] 10

    90% 95% )

    55% 95%

    95% 80% -

    [ 5]

    1 (3)

    2 , , ,

    3 , ,

    4 ,

    5 ,

    6 , , (2)

    7 , , (1)

    8 , , (2)

    9 , , (1)

    10

    5 .

    2, 3 ,

    . 6

    .

    [ 6]

    1 (3)

    2 , , ,

    3 , ,

    4 , , ,

    5 ,

    6 , , (2)

    7 , , (1)

    8 , , (2)

    9 , , (1)

    10

    ( )

    ,

    .

    6.

    .

    .

    ( )

    .

    .

    NP-Hard [9]

    .

    Acknowledgement

    .

    [1] Albert D.D., Garstka, J.J, Stein, F.P, Network Centric Warfare : Developing and Leveraging Information

    Superiority, CCRP Publ, 2nd Edition Aug 1999

    [2] Zhang, Y., Liu, X., Wang, Z., & Chen, L. A Service-Oriented Method for System-of-Systems

    Requirements Analysis and Architecture Design.

    Journal of Software, 7(2), 358365. 2012

    [3] D. Russell, N. Looker, L. Liu, and J. Xu, "Service-Oriented Integration of Systems for Military

    Capability," in Proc. of IEEE International

    Symposium on Object / component / service-oriented

    Real-time distributed Computing, Orlando, Florida,

    May 2008 [4]

    Lee Whitt Wht is C4I Software Hard to Develop?

    12 ICCRT June 2007

    [5] Levchuk, G.M., Y. N. Levchuk, Jie Luo, K.R. Pattipati, and D.L. Kleinman, Normative Design of

    Organizations - Part I: Mission Planning, in IEEE

    Transactions on Systems, Man, and Cybernetics, Vol.

    2013 15 1

    -21-

  • 32, No. 3, May 2002, pp. 346-359.

    [6] Lamia Belfares, Walid Klibi, Nassirou Lo, Adel Guitouni. Multi-objectives Tabu Search based

    algorithm for progressive resource allocation.

    European Journal of Operational Research 177

    (2007) 17791799

    [7] Luohao Tang, Cheng Zhu, Weiming Zhang, Jincai

    Huang Multi-Platform Coordinated Mission

    Planning Under Uncertainties in Proc. of IEEE 11th International Conference on Hybrid Intelligent

    Systems, 2011.12.

    [8] FM 101-5 Staff Organization and Operations, Headquarters, Department of the Army, 1997,

    www.dtic.mil/doctrine/jel/service_pubs/101_5.pdf

    [9] CJCS, Universal Joint Task List, p. A-1, 2005 [10] , (

    793 2006 )

    2013 15 1

    -22-

  • MVC *

    ,

    99 {yjseo082, hskim401}@cnu.ac.kr

    :

    (Time-to-Market)

    .

    .

    . ,

    ,

    .

    (Best Practice)

    , .

    ,

    .

    .

    ,

    .

    : , MVC ,

    1.

    ,

    .

    .

    (Software Distribution Platform)

    [1].

    ,

    .

    * 2010 () (No. 2010-0025329)

    (AppStore), (PlayStore),

    (Market Place)

    .

    ,

    .

    , ,

    .

    .

    ,

    .

    (Time-to-Market)

    [27]. ,

    .

    .

    ,

    .

    .

    . ,

    . PC

    [2].

    , P2P ,

    . ,

    .

    .

    ,

    .

    2013 15 1

    -23-

  • .

    .

    .

    ,

    . ,

    .

    [3]

    .

    [3] [4]

    .

    ,

    .

    . ,

    .

    .

    .

    .

    MVC ,

    . MVC

    .

    2. MVC

    .

    MVC

    .

    MVC .

    MVC , MVC

    .

    2.1 MVC ? MVC [5]

    ,

    .

    , MVC

    .

    (Processing), (Output),

    (Input), (Model), (View),

    (Controller) .

    [ 1] .

    [ 1] MVC

    ,

    .

    ,

    .

    . ,

    .

    . ,

    .

    ,

    .

    2.2 MVC

    MVC

    .

    MVC

    .

    MVC ,

    .

    MVC

    .

    iOS,

    (Android), (Windows

    Phone) .

    2013 15 1

    -24-

  • 2.2.1 iOS[6-7]

    MVC

    ,

    . iOS MVC

    . MVC

    iOS MVC

    . MVC , MVP(Model-

    View-Presenter) .

    (Presenter) ,

    . MVC

    . MVP iOS

    [ 2] .

    [ 2] iOS

    iOS Composite

    MVC

    [5].

    2.2.2 [8]

    MVC

    .

    MVC

    .

    GUI .

    , Composite

    . ,

    (Activity)

    .

    , iOS

    UIViewController .

    (Layout)

    ,

    . ,

    ,

    .

    iOS

    MVC .

    2.2.3 [9]

    MVC MVVM(Model-View-

    ViewModel) . MVVM

    .

    ,

    . MVVM [ 3]

    , Command

    .

    [ 3] MVVM

    MVVM

    ,

    . , MVC

    MVVM ,

    .

    MVC

    .

    ,

    MVC

    .

    MVC .

    MVC

    .

    , .

    .

    , , ,

    .

    ,

    2013 15 1

    -25-

  • .

    3.

    . ,

    .

    3.1

    ,

    .

    ,

    .

    ,

    .

    3.1.1

    . .

    .

    , ,

    . ,

    .

    .

    iOS, ,

    .

    .

    . ,

    . ,

    .

    .

    .

    .

    3.1.2

    (Flexibility) .

    , MDA(Model-driven

    Architecture) [10] . MDA

    OMG(Object Management Group)

    , ,

    (PIM)

    , (PSM)

    .

    ,

    . ,

    .

    3.2

    .

    ,

    ,

    ,

    .

    (Testability) (Robustness)

    .

    ,

    . ,

    .

    [11].

    .

    . ,

    . [12]

    . ,

    ,

    .

    .

    .

    2013 15 1

    -26-

  • [ 4]

    4.

    MVC ,

    , , .

    [ 4] .

    . ,

    .

    4.1

    4.1.1

    . .

    .

    .

    .

    .

    . ,

    , .

    2.2

    .

    .

    .

    MDA

    .

    PIM ,

    PIM PSM

    .

    .

    .

    .

    .

    .

    .

    .

    .

    ,

    .

    2013 15 1

    -27-

  • , ,

    . ,

    ,

    , , ,

    .

    .

    ,

    . ,

    . .

    ,

    .

    GUI ,

    . ,

    ,

    . ,

    .

    GUI

    .

    .

    GUI

    4.1.2

    .

    (Validation Rule)

    ,

    . , 4.1

    .

    ?

    .

    .

    (UI, )

    .

    ,

    .

    .

    . MVC

    Closed Model [13] . Closed Model

    .

    . Closed Model

    .

    . ,

    ,

    .

    ,

    .

    .

    4.1.3

    .

    ,

    .

    .

    .

    .

    .

    2013 15 1

    -28-

  • , .

    .

    .

    .

    GUI .

    GUI

    .

    .

    .

    .

    . ,

    .

    .

    .

    .

    .

    .

    ,

    .

    .

    ?

    ?.

    .

    .

    4.2

    4.1

    .

    ,

    .

    4.2.1

    (Portability) .

    , .

    JVM

    .

    .

    .

    HTML5, CSS,

    JavaScript

    . ,

    .

    . WAC(Wholesale Application

    Community)

    API

    [14]. , OpenAppMkt[15]

    .

    .

    .

    ,

    .

    . ,

    Appcelerator[16], PhoneGap[17], Rhodes[18]

    .

    . ,

    ,

    .

    .

    2013 15 1

    -29-

  • .

    MDA

    . , MDA

    ,

    .

    ,

    .

    ,

    MDA .

    [19-21] MVC

    .

    [22] MVC

    (

    , ) MDA

    , UML [23-

    25]. [26]

    , (

    ), .

    ,

    .

    [19-21]

    . [22] [26]

    MDA ,

    MDA .

    MDA ,

    . ,

    PIM .

    MDA

    .

    4.2.2

    TDD(Test-driven Development)

    . [27]

    . TDD

    ,

    .

    TDD

    .

    ,

    . ,

    ,

    .

    .

    , [27]

    .

    TDD

    . ,

    . OCUnit UIAutomation

    [7],

    JUnit Monkey Runner [8].

    OCUnit JUnit

    , UIAutomation Monkey Runner

    .

    Record and Playback

    Squish[28], TestDroid[29] ,

    GHUnit[30], Robotium[31] .

    , .

    ,

    . [32] GUI

    ,

    [33] [34]

    . [35]

    iOS ,

    .

    TDD

    .

    TDD

    .

    .

    5.

    .

    .

    . ,

    .

    .

    , .

    2013 15 1

    -30-

  • PIM

    .

    , ,

    .

    . , ,

    .

    PIM PSM

    . ,

    ,

    .

    .

    .

    . ,

    PIM PSM

    .

    .

    ,

    .

    :

    .

    .

    :

    PIM ,

    . , ,

    ,

    .

    MDA :

    .

    .

    : PIM PSM .

    .

    , MDA

    . , MDA

    GUI

    ,

    .

    .

    ,

    .

    6.

    .

    ,

    .

    ,

    .

    .

    .

    MVC

    , , ,

    .

    5 ,

    .

    .

    , MDA

    . ,

    . ,

    , ,

    .

    [1] List of mobile software distribution platforms, http://en.wikipedia.org/wiki/List_of_mobile_software

    _distribution_platforms

    [2] A. Holzer, J. Ondrus, "Mobile application market: a developers perspective," Telematics and Informatics, vol. 28, no. 1, pp 22-31, 2010.

    [3] R. Bareiss, T. Sedano, Improving Mobile Application Development, MSE workshop of MobiCASE 2011.

    [4] T. Wasserman, Software Engineering Issues for Mobile Application Development," http://works.bepress.com/tony_wasserman/4.

    2013 15 1

    -31-

  • [5] F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, M. Stal, Pattern-Oriented Software Architecture Volume 1: A System of Patterns, Willey, 1996.

    [6] Apple, Concepts in Objective-C Programming, 2012.

    [7] Apple, iOS App Programming Guide, 2012.

    [8] Android Developer, http://developer.android.com/develop/index.html

    [9] Microsoftware, XAML concepts for Windows Phone, http://msdn.microsoft.com/en-us/library/windowsphone/develop/jj206948(v=vs.105).aspx.

    [10] OMG, Developing in OMGs Model Driven Architecture, ftp://ftp.omg.org/pub/docs/omg/01-12-01.pdf

    [11] B. Pettichord, Design for Testability, in Proc. of Pacific Northwest Software Quality Conference, Oct 2002.

    [12] , , , iOS

    GUI

    , [13] S. Alpaev, Applied MVC Patterns Aptterm

    language, VIkingPLoP 2005 conference, 2005 [14] WAC, http://www.wacapps.net/wac-apis

    [15] OpenAppMkt, http://openappmkt.com

    [16] Appcelerator, http://www.appcelerator.com

    [17] PhoneGap, http://phonegap.com

    [18] Rhomobile, Rhodes Developer Reference, http://docs.rhomobile.com/rhodes/introduction

    [19] Woo Yeol Kim, Hyun Seung Son, Robert Young Chul Kim, Design of Code Template for Automatic Code Generation of Heterogeneous Smartphone Application, Advanced Communication and Networking Communication in Computer and Information Science, Volume 199, 2011

    [20] Woo Yeol Kim, Hyun Seung Son, Robert Young Chul Kim, Adapting Model Transformation Approach for Android Smartphone Application, Advanced Communication and Networking Communication in Computer and Information Science, Volume 199, 2011

    [21] , , , ,

    , :

    , vol. 16, no. 11, 2010. [22] , ,

    MDA ,

    2010

    , vol. 37, no. 2(A), pp 40-41, 2010. [23] , , , ,

    UML ,

    2011 , 2011.06 [24] , , , , iOS

    UML , 2011

    , 2011.06 [25] , , , 7

    UML , 2011

    , 2011.06 [26] S. Roychoudhury, V. Kulkarni, Mobile-

    Enabling Enterprise Business Applications using Model-Driven Engineering Techniques, MSE workshop of MobiCASE 2011.

    [27] P. Abrahamsson, A. Hanhineva, et al, "Mobile-D: An agile approach for mobile application

    development," in OOPSLA 2004, Poster session,

    Vancouver, Canada, 2004.

    [28] Squish, http://www.froglogic.com/squish/ gui-testing/

    [29] TestDroid, http://testdroid.com/

    [30] GHUnit, GHUnit Reference, http://gabriel.github.com/gh-unit/

    [31] Robotium, http://code.google.com/p/robotium/

    [32] C. Hu, I. Neamtiu, Automating GUI Testing for Android Applications, in Proc. of the 6th Int. Workshop on Automation of Software Test, pp 77-83, 2011.

    [33] , , , , Record-

    Playback

    , 2011

    , vol. 38, no.

    1(B), pp 171-174, 2011. [34] , , , ,

    , 2011 , vol. 38, no. 1(A), pp 198-201, 2011.

    [35] , , ,

    iOS GUI

    , 2012 , vol. 39, no. 2(B), pp 61-63, 2012.

    2013 15 1

    -32-

  • , ,

    373-1

    {jinlooks, sungwon.kang, younghun.han}@kaist.ac.kr

    : (Source)

    (Target)

    .

    ,

    (Heterogeneous)

    . , (Semantic

    Information)

    .

    ,

    .

    ,

    .

    (Text)

    , (Word Matching)

    .

    .

    ,

    . 1

    : , ,

    , ,

    1.

    [8].

    (Source) (Target)

    .

    [8, 12],

    (Heterogeneous)

    .

    [8],

    (Semantic Information)

    .

    ,

    .

    ,

    . ,

    ,

    .

    (Automatic Schema Matching)

    ,

    [3, 4, 5, 6, 9, 10, 11, 13, 14, 15, 16, 17, 18, 19,

    21]

    (Mapping Cardinality) , [8]

    .

    , [8] ,

    . (Text)

    , (Word

    Matching)

    .

    .

    ,

    .

    . 2

    . 3

    . 4

    . 5

    .

    2.

    (Field Level

    Translation) (Message Level

    2013 15 1

    -33-

  • Translation) [8].

    ,

    ,

    .

    ,

    .

    , Yang et

    al. [21]

    . ,

    (Homogeneous)

    , 1:1 1:n

    .

    ,

    (Heterogeneous Schema Integration),

    (Data Warehousing), (E-Commerce),

    (Semantic Query

    Processing) , SemInt [9, 10, 11], Learning Source Description (LSD) [5, 6], Semantic Knowledge Articulation Tool (SKAT) [15, 16], TransScm [14], DIKE

    [17, 18, 19], ARTEMIS [3, 4], Cupid [13]

    .

    Li et al. [9] SemInt . SemInt

    (Relational) DBMS

    (Element)

    . , SemInt

    (Schema-level) . ,

    . , SemInt 1:1

    [9, 10, 11]. Doan et al. [5] LSD

    . LSD (Global Schema)

    , -(Machine-Learning)

    . ,

    LSD , 1:1

    [5, 6]. Mitra et al.

    [15] SKAT . SKAT

    (Ontology)

    First-order Logic .

    , SKAT

    , 1:1 1:n

    [15, 16]. Milo Zohar [14] TransScm

    . TransScm

    Labeled Graph , Edge

    Edge

    . , TransScm 1:1

    [14]. Palopoli et al. [17] DIKE

    . DIKE

    . ,

    DIKE 1:1

    [17, 18, 19]. Castano et al. [3]

    ARTEMIS . ARTEMIS

    , MOMIS (Mediator envirOment for Multiple

    Information Sources)[1, 2] . MOMIS

    (Mediator),

    . ARTEMIS

    1:1

    [3, 4]. Cupid [13] Microsoft Research

    , Cupid

    Tree . Cupid

    Tree ,

    ,

    1:1 [13].

    . [8],

    ,

    , 7

    . ,

    .

    3.

    . 1

    . 1 ,

    3 .

    :

    1)

    .

    ,

    .

    2013 15 1

    -34-

  • 1.

    2.

    3.

    2013 15 1

    -35-

  • 2) (Field Mapping

    Description Table) .

    1 ,

    .

    3) (Field Data

    Conversion Function) .

    2

    (Pseudo Code) .

    .

    [8] 2

    3

    1 . 2 3

    ,

    2 3

    .

    3.1 Recommending field mapping

    2 1

    . 1 4

    Step : (1) (Word Grouping),

    (2) (Preparation), (3) (Mapping

    Analysis), (4) (Composing & Recommendation).

    Step 1) :

    ,

    .

    Step 2) : Step 3 4

    Substep .

    Substep 1: .

    Substep 2: .

    Substep 3: .

    Substep 4:

    (: Field, this, that, be, ) .

    Step 3) :

    . S1

    =

    T1 =

    , .

    -1) (Name Matching):

    ,

    .

    Name Matching = {

    -2) (Similarity Matching):

    (Synonym)

    (Aggregation Relationship),

    .

    Similarity Matching = {

    , Speed Velocity

    , , Kilometer, Mile, Hour, Minute

    .

    -3) (Mapping Establishment):

    1 2 ,

    .

    Mapping Establishment = {

    Rahm Bernstein [20] ,

    (Data Matching Technology) (Structure)

    , (Constraint) ,

    (Linguistic) .

    -

    (Sub-Schema)

    .

    .

    (Linguistic Atom)

    .

    (Data Set)

    [8]. ,

    . ,

    ,

    .

    Step 4) :

    .

    . , S

    T , S = {T}

    1:1 . 3

    2013 15 1

    -36-

  • . 1:1 , S

    T . n:1

    , 1:1

    S T n:1

    . 1:n

    , S T .

    n:m , 1:n

    S T

    , n:m .

    3.2 Creating field mapping description table

    2

    . ,

    .

    (Template),

    ,

    , , , ,

    , [8].

    3.3 Generating field data conversion function

    3

    .

    ,

    [8].

    4.

    .

    .

    [8]

    .

    1:1, 1:n, n:1, n:m

    .

    1:1, 1:n, n:1, n:m

    . 4

    .

    ,

    (VMF Position Report Link-16

    Enemy Identification )[7] .

    VMF Position Report Link-16 Enemy

    Identification 12 VMF

    14 Link-16

    . 5

    .

    , (Recommendation

    Coverage), (Recommendation Accuracy),

    (False Recommendation)

    .

    ,

    . ,

    .

    (False Positive Recommendation)

    (False Negative Recommendation) .

    (Irrelevant)

    ,

    ,

    . 1

    .

    1. 1st case study 2nd case study

    False positive recommendation

    0% 26.32%

    False negative recommendation

    0% 0%

    Recommendation coverage

    100% 100%

    Recommendation accuracy

    100% 73.68%

    , 12

    . , 5

    ,

    . , ,

    .

    , 19

    , 14 (73.68%)

    .

    ,

    ,

    . ,

    .

    2013 15 1

    -37-

  • (a) The recommended field mapping cardinalities

    (b) A field mapping recommendation in a n:1 mapping cardinality

    4.

    5.

    .

    [8]

    .

    ,

    ,

    . ,

    .

    2013 15 1

    -38-

  • (a) The recommended field mapping cardinalities

    (b) A field mapping recommendation in a 1:n mapping cardinality

    5.

    ,

    ,

    .

    ,

    , .

    ,

    ,

    .

    ,

    .

    2013 15 1

    -39-

  • [1] Bergamaschi, S., Castano, S., Vincini, M., Semantic integration of semi-structured and structured data

    sources, ACM SIGMOD Record, Vol. 28, No.1,

    pp.5459, 1999.

    [2] Bergamaschi, S., Castano, S., Vincini, M., Beneventano, D., Semantic integration of

    heterogeneous information sources, Data

    Knowledge Engineering, Vol. 36, No.3, pp.215249,

    2001.

    [3] Castano, S., De, Antonellis V., A schema analysis and reconciliation tool environment, In: Proceeding

    of International Database Engineering Application

    Symposium (IDEAS), IEEE Computer Society, New

    York, pp.5362, 1999. [4] Castano, S., De, Antonellis V., De, Capitani di

    Vemercati, S., Global viewing of heterogeneous data sources, IEEE Transaction on Data Knowledge Engineering, Vol. 13, No.2, pp.277297, 2001.

    [5] Doan, A. H., Domingos, P., Levy, A., Learning source descriptions for data integration, In:

    Proceeding of Web DB Workshop, pp. 8192, 2000, [6] Doan, A. H., Domingos, P., Halevy, A., Reconciling

    schemas of disparate data sources: a machine-

    learning approach, In: Proceeding of ACM

    SIGMOD Conference, pp. 509520, 2001

    [7] DoD (Department of Defense), Interface Standard Data forwarding between Tactical Data Links

    (TDLs), MIL-STD- 6020, Appendix D-Link-16 and

    VMF, USA, 2005.

    [8] Kim, Jingyu, Kang, Sungwon, Lee, J., and Choi, B. W., A semantic translation method for data

    communication protocols, Journal of Systems and

    Software, Vol. 85, Issue 12, pp.2876-2898, 2012.

    [9] Li, W., Clifton, C., Semantic integration in heterogeneous database using neural networks, In:

    Proceeding of 20th

    International Conference On Very

    Large Data Bases, pp. 112, 1994.

    [10] Li, W., Clifton, C., SemInt: a tool for identifying attributes correspondences in heterogeneous

    databases using neural network, Data Knowledge

    Engineering, Vol. 33, No.1, pp.4984, 2000.

    [11] Li, W., Clifton, C., Liu, S., Database integration using neural network: implementation and

    experiences, Knowledge Information Systems, Vol.

    2, No.1, pp.7396, 2000.

    [12] Lv, Y., Yu, H.b., Wang, T.R., Yang, Z.j., Fieldbus Interoperation Technologies, Proceedings of the 5th

    World Congress on Intelligent Control and

    Automation, pp. 3620-3623, 2004.

    [13] Madhavan, J., Bernstein, P. A., Rahm, E., Generic schema matching with Cupid, In: Proceeding of the

    27th International Conference On Very Large Data

    Bases, pp.4958, 2001.

    [14] Milo, T., Zohar, S., Using schema matching to

    simplify heterogeneous data translation, In:

    Proceeding of 24th International Conference On

    Very Large Data Bases, pp. 122133, 1998.

    [15] Mitra, P., Wiederhold, G., Jannink, J., Semi-automatic integration of knowledge sources, In:

    Proceeding of Fusion 99, Sunnyvale, USA, 1999.

    [16] Mitra, P., Wiederhold, G., Kersten, M., A graph-oriented model for articulation of ontology

    interdependencies, In: Proceeding of Extending

    DataBase Technologies, Lecture Notes in Computer

    Science, vol. 1777. Springer, Berlin Heidelberg New

    York, pp. 86100, 2000.

    [17] Palopoli, L., Sacca, D., Ursino, D., Semi-automatic, semantic discovery of properties from database

    schemas, In: Proceeding of International Database

    Engineering and Applications Symposium. (IDEAS),

    IEEE Computer Society, pp. 244253, 1998.

    [18] Palopoli., L., Sacca, D., Ursino, D., An automatic technique for detecting type conflicts in database

    schemas In: Proceeding of the 7th International

    Conference On Information and Knowledge

    Management (CIKM), pp. 306313, 1998.

    [19] Palopoli, L., Sacca, D., Terracina, G., Ursino, D., A unified graph-based framework for deriving nominal

    inter scheme properties, type conflicts and object

    cluster similarities, In: Proceeding of the 4th IFCIS

    International Conference On Cooperative

    Information Systems (CoopIS), IEEE Computer

    Society, pp.3445, 1999.

    [20] Rahm, E., Bernstein, P. A., A survey of approaches to automatic schema matching, The VLDB Journal,

    Vol. 10, pp.334-350, 2001.

    [21] Yang, W., Li, J., Wang, K., Transforming Hetero-geneous Messages Automatically in Web Service

    Composition, Proceedings of 8th Asia-Pacific Web

    Conference (APWeb 2006), Lecture Notes in

    Computer Science (LNCS), Vol. 3841, pp. 145-156,

    2006.

    2013 15 1

    -40-

  • BPEL

    ,

    410

    [email protected], [email protected]

    : . . . WS-BPEL . : , WS-BPEL, 1. . . . , . , . , . WS-BPEL(Web Service Business Process Execution Language)[1] (Mutant) . BPEL

    Juan Jose Dominguez-Jimenez[2], Panya Boonyakuls- rirung[3], Estero-Botaro[4]

    . BPEL . . . , . 2.

    BPEL XML XML . XML 1 . 1 . .

    1 XML

    ? (0 or 1) * (0 or more) + (1 or more)

    > &lt . < &gt .

    & &amp AND = &eq

    2.1.

    .

    . . .

    2.2.

    .

    2013 15 1

    -41-

  • . ifelse else . . . .

    2.3.

    . . . . .

    2.4. . . .

    2.5. . . . . .

    SW . SW , . , .

    3.

    2 BPEL . &gt &lt .

    [ ] $itemsShipped > bpel:getVariableProperty() [ ] $itemsShipped < bpel:getVariableProperty()

    4.

    . BPEL . , BPEL . . Acknowledgement () -(No. 2011-0020523) (2011-0010396)

    [1]

    [2]

    http://en.wikipedia.org/wiki/Business_Process_Execution_Language Dominguez-Jimenez, J.J. et al. , "GAmera: An Automatic Mutant Generation System for WS-BPEL Compositions", Seventh IEEE European Conference on, 2009

    [3] Panya Boonyakulsrirung et al. , "A weak mutation testing framework for WS-BPEL", Computer Science and Software Engineering (JCSSE), 2011

    [4] A. Estero-Botaro, F. Palomo-Lozano, and I. Medina-Bulo, Mutation operators for WS-BPEL 2.0, the 21th International Conference on Software & Systems Engineering and their Applications, 2008

    2013 15 1

    -42-

  • ,

    , ,

    1 {atang34, ldalove, jbyoo}@konkuk.ac.kr

    :

    .

    .

    .

    .

    (Safety Critical System) ,

    .

    .

    .

    : , , , ,

    1.

    .

    ()

    , (

    , )

    .

    , (Translator),

    (Code Generator), (Compiler).

    . (Safety Critical System)

    .

    .

    ,

    .

    ,

    PLC(Programmable Logic Controller)

    , FPGA(Field-Programmable Gate

    Array) .

    PLC FPGA PLC

    C FPGA

    Verilog . C

    C Compiler

    , Verilog

    .

    .

    , FBD(Function Block

    Diagram) Verilog FBDtoVerilog

    FBD C FBDtoC

    [1]. FBD PLC

    function block

    PLC

    . FBDtoC

    FBDtoVerilog

    FBD C Verilog .

    .

    .

    .

    .

    4

    , 3

    . , FBDtoC

    FBDtoVerilog

    .

    . 2

    2013 15 1

    -43-

  • . 3 2

    . 4 2

    . 5

    .

    2.

    .

    ,

    . (, , )

    (, , )

    (, )

    .

    4

    [ 1]. [ 1]

    3 (, ,

    ) , ~

    4 .

    [ 1] 4

    : safety

    .

    :

    rule

    .

    :

    ,

    .

    :

    proof proof

    .

    [ 1] ~

    3 (correctness,

    soundness, safety) [ 2].

    [ 2]

    Safety - Proof-Carrying Code(PPC)

    . PPC

    safety police

    , safety

    police .

    Safety - Typed Assembly Language(TAL)

    . TAL

    coding rule . ,

    type type

    type checking

    .

    .

    Correctness - Theorem proving, Model checking

    correctness

    .

    .

    Soundness Testing, Simulation, Translation validation, Credible compilation

    , , proof

    soundness

    .

    2013 15 1

    -44-

  • 3.

    3.1 Correctness Property 3.1.1 Theorem proving

    Theorem proving

    (correctness)

    .

    ,

    [

    3].

    [ 3] Theorem proving

    Theorem proving (Denotational

    semantic) ,

    , .

    hoares logic, first-order logic, higher-order

    logic .

    . ,

    . (, ,

    )

    . ,

    ,

    .

    .

    . FBDtoC FBDtoVerilog ,

    ,

    .

    Theorem proving natural

    sematic Mini_ML CAM

    [2]. Natural semantic

    (Axiom)

    (Interface Rule)

    . Natural semantic

    P .

    P .

    P .

    natural semantic dynamic

    semantic translation ,

    .

    [ 4] Natural semantic

    [ 4] natural semantic

    . T ,

    t semantic value . L1 semantic

    domain SD(L1) value L2

    semantic domain SD(L2) Value .

    Theorem proving

    . Abstract interpretation

    Source-to-Source

    [3], basic block abstract interpretation

    register allocation

    [4], logical framework

    [5].

    3.2 Soundness Property

    3.2.1 Testing & Simulation

    Testing & Simulation

    (test case)

    .

    ,

    ,

    .

    2013 15 1

    -45-

  • [ 5] Individual modules Integrated modules Equivalence [6]

    .

    .

    (test case) (Soundness)

    .

    .

    theorem proving

    .

    . .

    .

    . FBDtoC FBDtoVerilog

    , FBD

    .

    .

    , .

    (Development Lifecycle)

    .

    .

    .

    (ex: Simulink [7],

    Stateflow [8]) ,

    .

    Testing & Simulation

    numerical

    equivalence testing(comparative testing back-to-

    back testing) [6].

    [ 6] Numerical equivalence [6]

    [ 5] [ 6] numerical

    equivalence testing

    .

    Numerical equivalence

    (Test vectors)

    (Result vectors) .

    .

    (Compiler Optimization)

    [9], [10].

    scheme equivalence trace

    . [ 7] trace

    . [ 7]

    P trace , T1, . . . , Tk

    . P

    Mi Ti( ) Mi , Mi+1 Mi

    .

    2013 15 1

    -46-

  • [ 7] Trace [9]

    3.2.2 Translation validation

    .

    . Translation validation

    Credible compilation

    .

    Translation validation black box

    .

    theorem proving, symbolic execution, simulation &

    testing .

    .

    proof (Soundness)

    .

    proof

    ,

    . FBDtoC FBDtoVerilog

    FBDtoC FBDtoVerilog

    .

    [ 8] Translation validation [11]

    Translation validation 1998

    [11]. Translation validation

    proof proof . [ 8]

    .

    proof analyzer

    , analyzer

    proof ,

    Proof Script ,

    Counter Example . Counter Example

    . Counter Example

    . Proof checker theorem proving,

    model checking, simulation

    .

    3.2.3 Credible compilation

    Translation validation Proof

    credible compilation

    [12], [13]. Credible compilation

    Proof proof

    .

    ,

    .

    translation validation .

    [ 9] Credible compilation

    Credible compilation

    .

    proof proof checker

    2013 15 1

    -47-

  • . [ 9]

    .

    [ 10] [12] [ 11] [12]

    .

    1) : [ 10] [ 11]

    , 5

    x 1 y 2

    . 5 x +

    y 3 .

    2) :

    x + y 3

    .

    Proof checker

    proof .

    3.3 Safety Property

    3.3.1 Proof-carrying code

    Proof-carrying code(PCC)

    . PCC

    ,

    Spec safety policy

    verified condition

    . ,

    . Code

    producer native code safety proof

    . Code consumer safety policy

    safety proof .

    , safety

    policy

    . safety policy

    ,

    . , safety proof

    . FBDtoC

    FBDtoVerilog safety policy

    safety policy .

    [ 12] PCC [14]

    Proof carrying code(PCC)

    spec (H/W spec,

    Standard )

    [14], [15]. [ 12]

    . [ 12] safety policy

    safety rule interface

    . PCC

    safety policy .

    3.3.2 Typed-Assembly Language

    TAL type

    type safety . Typing

    rule Memory safety, control flow safety, type

    safety . TAL

    bytecode .

    ,

    theorem proving

    rule .

    2013 15 1

    -48-

  • FBDtoC FBDtoVerilog , FBDtoC

    FBDtoVerilog assembly language

    .

    TAL Strong typed assembly

    languages F TAL

    [16]. [ 13] Strong typed

    assembly languages F TAL

    .

    [ 13] F TAL

    F TAL

    , , ,

    type type

    .

    6 F code

    code . CPS

    (Continuation-passing style)

    code .

    [ 14] ,,

    [ 15] .

    [ 16] .

    type . Type

    .

    Code1

    (fix f(n:int):int: if0(n; 1; n f(n 1))) 6

    Code2

    (fix f (n:int; k:(int) void): if0(n, k(1),

    let x = n 1 in f(x, (y:int): let z = n y in k(z))))

    (6; (n:int): halt[int]n)

    [ 14] [16]

    [ 15] [16]

    [ 16] [16]

    4.

    register

    stack, loop error

    . Register allocation error

    [17], [18], [19]. Loop distribution,

    loop fusion, loop tiling, and loop interchange

    loop [20], [21], [22]. Heap

    stack allocation

    safety [23], [24], [25] .

    2013 15 1

    -49-

  • 1 FBDtoC & FBDtoVerilog

    Theorem Proving

    & Correctne

    ss ( ) Formal

    Testing &

    Simulation & Soundness (input)

    Translation validation

    & Soundness (proof) Proof

    Certifying

    Compiler & Soundness (proof)

    Proof

    PCC Safety ,

    (safety

    policy) Safety policy

    TAL Safety ,

    (rule)

    ,

    .

    ,

    .

    [26], [27] .

    Model checking

    [28], [29], [30], [31]. Theorem proving model

    checking [31].

    FBD verilog c

    [29] .

    [32], [33].

    5.

    4

    ,

    3 .

    , , , FBDtoC

    FBDtoVerilog .

    1 .

    FBDtoC FBDtoVerilog FBDtoC

    FBDtoVerilog

    . ,

    ,

    , ,

    .

    .

    .

    .

    .

    FBDtoC FBDto-

    Verilog .

    ,

    .

    Acknowledge

    (KETEP-2010-

    T1001-01038), 2012 ()

    (2012-0003619),

    ,

    .

    [1]

    [2]

    [3]

    [4]

    [5]

    Junbeom Yoo, Jong-Hoon Lee, Sehun Jeong and Sungdeok Cha, "FBDtoVerilog: A Vendor-Independent Translation from FBDs into Verilog Programs," The Twenty-Third International Conference on Software Engineering and Knowledge Engineering (SEKE 2011), pp.48-51, July 7-9, Miami Beach, USA, 2011. J. Despeyroux, Proof of translation in natural semantics, 1986. P. Cousot and R. Cousot, "Systematic Design of Program Transformation Frameworks by Abstract Interpretation," ACM SIGPLAN Notices, vol. 1, no. 37, pp. 178-190, 2002. S. M. Timothy, Verifying the correctness of compiler Transformations on Basic Block using Abstract Interpretation, In Symposium on Partial Evaluation and Semantics-Based Program Manipulation (PEPM'91, pp. 106-115, 1991. J. Hannan and F. Pfenning, "Compiler Verification in LF," Logic in Computer Science, 1992. LICS'92., Proceedings of the Seventh

    2013 15 1

    -50-

  • [6]

    [7]

    [8]

    [9]

    [10]

    [11]

    [12]

    [13]

    [14]

    [15]

    [16]

    [17]

    [18]

    [19]

    [20]

    Annual IEEE Symposium on, pp. 407-418, 1992. M. Staats and M. Heimdahl, "Partial translation verification for untrusted code-generators," Formal Methods and Software Engineering, pp. 226-237, 2008. The MathWorks, Inc: Stateflow product page. www.mathworks.com/products/stateflow The MathWorks, Inc: Simulink product page. www.mathworks.com/products/simulink A. Kanade, A. Sanyal and U. Khedker, "A PVS based Framework for Validating Compiler Optimizations," Software Engineering and Formal Methods, 2006. SEFM 2006. Fourth IEEE International Conference on, pp. 108-117, 2006. A. Kanade, A. Sanyal and U. Khedker, "Structuring optimizing transformations and proving them sound," Electronic Notes in Theoretical Computer Science, vol. 3, no. 176, pp. 79-95, 2007. A. Pnueli, M. Siegel and E. Singerman, "Translation validation," Tools and Algorithms for the Construction and Analysis of Systems, pp. 151-166, 1998. M. Rinard, Credible compilation, MIT Laboratory for Computer Science, Technical Report MIT-LCS-TR-776, 1999. M. Rinard and D. Marinov, "Credible Compilation with Pointers," s, in: Proceedings of the FLoC Workshop on Run-Time Result Verification, Trento, 1999. G. C. Necula, "Proof-carrying code," Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 106-119, 1997. G. C. Necula, "Compiling with Proofs," Carnegie Mellon University, 1998. G. Morrisett, K. Crary, N. Glew and D. Walke, "Stack-based typed assembly language," Types in Compilation, pp. 28-52, 1998. Y. Huang, B. Childers and M. Soffa, "Catching and Identifying Bugs in Register Allocation," Static Analysis, pp. 281-300, 2006. M. Poletto and V. Sarkar, "Linear Scan Register Allocation," ACM Transactions on Programming Languages and Systems (TOPLAS), vol. 21, no. 5, pp. 895-913, 1999. A. Ohori, "Register Allocation by Proof Transformation," Science of Computer Programming, vol. 50, no. 1, pp. 161-187, 2004. L. Zuck, A. Pnueli, B. Goldberg, C. Barrett, Y. Fang and Y. Hu, "Translation and Run-Time Validation of Loop Transformations," Formal Methods in System Design, vol. 27, no. 3, pp. 335-360, 2005.

    [21]

    [22]

    [23]

    [24]

    [25]

    [26]

    [27]

    [28]

    [29]

    [30]

    [31]

    [32]

    [33]

    L. Zuck, A. Pnueli, Y. Fang and B. Goldberg, "VOC: A Translation Validator for Optimizing Compilers," j. ucs, vol. 9, no. 3, pp. 223-247, 2003. B. Goldberg, "Translation Validation of Loop Optimizations and Software Pipelining in the TVOC Framework," Static Analysis, pp. 6-21, 2011. X. Feng, Z. Shao, A. Vaynberg, S. Xiang and Z. Ni, "Modular Verification of Assembly Code with Stack-Based Control Abstractions," ACM SIGPLAN Notices, vol. 41, no. 6, pp. 401-414, 2006. L. Jia, F. Spalding, D. Walker and N. Glew, "Certifying compilation for a language with stack allocation," Logic in Computer Science, 2005. LICS 2005. Proceedings. 20th Annual IEEE Symposium on, pp. 407-416, 2005. G. Morrisett, K. Crary, N. Glew and D. Walke, "Stack-based typed assembly language," Types in Compilation, pp. 28-52, 1998. S. Lerner, T. Millstein and C. Chambers, "Automatically Proving the Correctness of Compiler Optimizations," ACM SIGPLAN Notices, vol. 5, no. 38, pp. 220-231, 2003. D. Lacey, N. D. Jones, E. Van Wyk and C. C. Frederiksen, "Proving Correctness of Compiler Optimizations by Temporal Logic," ACM SIGPLAN Notices, vol. 37, no. 1, pp. 283-294, 2002. M. Staats and M. Heimdahl, "Partial translation verification for untrusted code-generators," Formal Methods and Software Engineering, pp. 226-237, 2008. Dong-Ah Lee, Junbeom Yoo and Jang-Soo Lee, "Equivalence Checking between Function Block Diagrams and C Programs using HW-CBMC," The 30th International Conference on Computer Safety, Reliability and Security (SAFECOMP 2011), LNCS 6894, pp.397-408, Sept. 19-21, Naples, Italy, 2011 S. Jorges, T. Margaria and B. Steffen, "Assuring property conformance of code generators via model checking," Formal aspects of computing, vol. 23, no. 5, pp. 589-606, 2011. S. Owre, S. Rajan, J. Rushby, N. Shankar and M. Srivas, "PVS: Combining specification, proof checking, and model checking," Computer Aided Verification, pp. 411-414, 1996. Unknown Authors, Compiler Optimization Verification and Maintenance. M. A. Dave, "Compiler Verification - A Bibliography," ACM SIGSOFT Software Engineering Notes, vol. 28, no. 6, pp. 2-2, 2003.

    2013 15 1

    -51-

  • * " IT " (NIPA-2012-(H0301-12-

    4014))

    *

    , , , ,

    2 {sjbaek, pjs50, kaluas , cks.egg, yeom}@pusan.ac.kr

    : ,

    .

    ,

    .

    ,

    .

    ,

    .

    .

    .

    ,

    .

    : , ,

    1.

    .

    .

    ,

    [1].

    .

    .

    .

    .

    ,

    , , CO

    .

    .

    .

    .

    , CO

    .

    , ,

    .

    ,

    .

    .

    ,

    .

    . RFID

    .

    ,

    2013 15 1

    -52-

  • ,

    .

    . 2

    , 3

    . 4

    . 5

    . 6

    .

    2.

    .

    .

    ,

    .

    (APC: Agricultural Products Center)

    .

    ,

    ,

    .

    SMS .

    . A

    A B

    B

    .

    .

    .

    .

    ,

    , .

    .

    .

    2.1 RFID/USN

    RFID(Radio Frequency Identification)

    USN(Ubiquitous Sensor Network)

    [2].

    RFID/USN .

    .

    .

    . ,

    ,

    .

    2.2

    RFID

    DBMS(Database Management System)

    [3].

    ,

    .

    RFID

    ,

    .

    .

    2.3

    .

    ,

    .

    .

    .

    ,

    .

    RFID

    . , ,

    .

    2013 15 1

    -53-

  • 3.

    .

    .

    .

    3.1

    . -

    -- - [4].

    , ,

    , .

    .

    ,

    .

    (Precooling)

    .

    ,

    3~5 .

    .

    .

    ,

    .

    , ,

    .

    .

    3.2

    .

    , CO .

    /

    .

    .

    1

    ,

    /

    ,

    /

    CO , CO

    , ,

    ,

    , CO

    ,

    1

    .

    .

    .

    3.3

    .

    RFID

    /

    , ,

    RFID RFID

    . RFID

    ,

    .

    2 .

    2013 15 1

    -54-

  • 2 RFID

    /

    RFID

    /

    RFID RFID

    , /

    RFID

    RFD /,

    1. RFID RFID

    2. RFID RFID

    3. RFID

    4.

    5. /

    /

    .

    ,

    .

    ,

    .

    .

    .

    ,

    .

    .

    .

    .

    .

    , CO .

    4.

    4.1

    ,

    .

    , , ,

    .

    1 .

    1

    ,

    , ,

    .

    .

    ,

    .

    ,

    , .

    , , CO

    . RFID

    ,

    ,

    / .

    ,

    2013 15 1

    -55-

  • .

    , ,

    .

    .

    ,

    .

    .

    xml

    .

    2

    2

    .

    .

    .

    . ,

    .

    ,

    .

    .

    .