Model-based error location in Java programs. The construction of modern software requires extensive testing and
debugging in addition to using appropriate specification, design, and
verification techniques. Testing and debugging are very time-consuming
and costly, drawing - according to recent articles - "typically 50%
or more of the resources for software projects''. By providing a new,
flexible approach to the debugging of complex software, this project
offers the potential of significant cost ....Model-based error location in Java programs. The construction of modern software requires extensive testing and
debugging in addition to using appropriate specification, design, and
verification techniques. Testing and debugging are very time-consuming
and costly, drawing - according to recent articles - "typically 50%
or more of the resources for software projects''. By providing a new,
flexible approach to the debugging of complex software, this project
offers the potential of significant cost savings, highly beneficial to
the ICT industry. Lessons learned from the demonstration prototype,
can be directly carried over into commercial tool development. In
addition, the project strengthens links to high quality European
research laboratories.Read moreRead less
Model-based error location in concurrent software. The construction of modern software requires extensive testing and debugging in addition to using appropriate specification, design, and verification techniques. Testing and debugging are very time-consuming and costly, drawing - according to recent articles - ``typically 50\% or more of the resources for software projects''. By extending the power of a new, flexible debugging approach, this project offers the potential of significant cost savin ....Model-based error location in concurrent software. The construction of modern software requires extensive testing and debugging in addition to using appropriate specification, design, and verification techniques. Testing and debugging are very time-consuming and costly, drawing - according to recent articles - ``typically 50\% or more of the resources for software projects''. By extending the power of a new, flexible debugging approach, this project offers the potential of significant cost savings, highly beneficial to any industry with a significant ICT component, e.g., defense. Lessons learned from the demonstration prototype, can be directly carried over into commercial tool development. The project strengthens links to high quality European research laboratories.Read moreRead less
Managing Knowledge in Web-Driven Organisational Evolution. Organisations are increasingly concerned with the effective utilisation of Web technologies, and especially the ways in which these technologies can be used to improve their business. Effective management of knowledge about the interplay between the organisation and technical drivers of this technology adoption will enable a much-enhanced process for leveraging emerging information and communication technologies. This project aims to li ....Managing Knowledge in Web-Driven Organisational Evolution. Organisations are increasingly concerned with the effective utilisation of Web technologies, and especially the ways in which these technologies can be used to improve their business. Effective management of knowledge about the interplay between the organisation and technical drivers of this technology adoption will enable a much-enhanced process for leveraging emerging information and communication technologies. This project aims to link related research at UTS and Southampton University to understand how tools might support this knowledge management. Outcomes will include the creation of specific tools (and techniques for using them) within the context of managing organisational uptake of new technologies.Read moreRead less
Creating and Assessing Processes for Object-Oriented and Component-Based Software Development. This project is based on the principles of both theoretical and empirical software engineering. It focuses on the processes, technology and quality of software systems produced using component-based development (CBD) which is achieving substantial software re-use. Among the main objectives of this project are the creation of a unified CBD process metamodel and associated family of reference processes t ....Creating and Assessing Processes for Object-Oriented and Component-Based Software Development. This project is based on the principles of both theoretical and empirical software engineering. It focuses on the processes, technology and quality of software systems produced using component-based development (CBD) which is achieving substantial software re-use. Among the main objectives of this project are the creation of a unified CBD process metamodel and associated family of reference processes together with a closely linked CBD assessment methodology.Read moreRead less
Fault-tolerant CORBA-based distributed systems. The focus of this research is Fault-Tolerant CORBA-based Distributed Systems. An implementation of the CORBA Fault Tolerance specification will be produced and evaluated against performance, interoperability and compliance criteria. A model for the management of degradation behaviour in distributed systems will be developed and an implementation produced. Novel algorithms, models and approaches to fault tolerance and degradation management will be ....Fault-tolerant CORBA-based distributed systems. The focus of this research is Fault-Tolerant CORBA-based Distributed Systems. An implementation of the CORBA Fault Tolerance specification will be produced and evaluated against performance, interoperability and compliance criteria. A model for the management of degradation behaviour in distributed systems will be developed and an implementation produced. Novel algorithms, models and approaches to fault tolerance and degradation management will be developed. Convincing demonstration applications will be produced to illustrate the widespread relevance of fault-tolerant and degradable systems to real-world domains such as telecommunications, commercial systems and defence.Read moreRead less
Design-Driven Requirements for Internet-Enabled System Development. The nature of Web system development is significantly different from conventional, software and IT development. Amongst other factors, there is substantial uncertainty in both clients' understanding of their needs and developers' understanding of the systems domain. We will develop an uncertainty model relevant to the development model relevant to the development of internet-enabled systems, and then use this model to adapt th ....Design-Driven Requirements for Internet-Enabled System Development. The nature of Web system development is significantly different from conventional, software and IT development. Amongst other factors, there is substantial uncertainty in both clients' understanding of their needs and developers' understanding of the systems domain. We will develop an uncertainty model relevant to the development model relevant to the development of internet-enabled systems, and then use this model to adapt the design process to support elicitation of requirements, as well as developing support for this adapted process. This will facilitate the development of systems that more accurately reflect clients' needs, and result in an understanding of what would be involved in reducing development costs.Read moreRead less
Supporting co-evolution of business processes and Web systems. This research will provide significant benefit to the Australian Internet and e-commerce industries (valued by the ABS as in excess of $11b/year). It will result in improved products that better satisfy specific business needs (and hence improved competitiveness in a global market). Development cycles will shorten (as the likelihood of redevelopment decreases) and costs of development will fall. Finally, the models and tools to be ....Supporting co-evolution of business processes and Web systems. This research will provide significant benefit to the Australian Internet and e-commerce industries (valued by the ABS as in excess of $11b/year). It will result in improved products that better satisfy specific business needs (and hence improved competitiveness in a global market). Development cycles will shorten (as the likelihood of redevelopment decreases) and costs of development will fall. Finally, the models and tools to be developed will facilitate the transition of traditional organisations into the new economy, as the outcomes of this research will provide a transparent cost-effective approach for identifying and clarifying the evolving business domain and the requirements of companies.Read moreRead less
Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider a ....Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider attacks. The outcomes of the project will incorporate new security constraints and policies raised by emerging technologies to enable better protection of sensitive information. Read moreRead less
An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastru ....An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity. The outcomes of this project can be directly used in Australian research communities and adopted by industry and government agencies.Read moreRead less
Privacy preserving and data utility in outsourced systems. Making the best tradeoff between data privacy and utility is a vital challenge in privacy-preserving outsourcing environments. This project aims to develop a balanced distributed framework to achieve the best utility of outsourced data while protecting private information. The framework consists of general structure of distributed evolutionary algorithms and a predefined topology for high optimization efficiency and a dynamic groupin ....Privacy preserving and data utility in outsourced systems. Making the best tradeoff between data privacy and utility is a vital challenge in privacy-preserving outsourcing environments. This project aims to develop a balanced distributed framework to achieve the best utility of outsourced data while protecting private information. The framework consists of general structure of distributed evolutionary algorithms and a predefined topology for high optimization efficiency and a dynamic grouping recombination model. The project outcomes will be beneficial to applications in the nation as it incorporates new privacy constraints and utility requirements raised by emerging technologies to enable better protection of sensitive information and maximal data utility in outsourced systems. Read moreRead less