By Topic

Information Technology, 1990. 'Next Decade in Information Technology', Proceedings of the 5th Jerusalem Conference on (Cat. No.90TH0326-9)

Date 22-25 Oct. 1990

Filter Results

Displaying Results 1 - 25 of 91
  • Road transport informatics in Europe-a summary of current developments

    Publication Year: 1990, Page(s):702 - 715
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1080 KB)

    There has been significant progress in Europe toward the widespread implementation of road transport informatics (RTI), or intelligent vehicle highway systems (IVHS). A brief summary is offered of the more significant developments. These include route guidance system implementations in Berlin and London along with the major research programs DRIVE and PROMETHEUS. The goal of the DRIVE program, an ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proceedings of the 5th Jerusalem Conference on Information Technology (JCIT). Next Decade in Information Technology (Cat. No.90TH0326-9)

    Publication Year: 1990
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Using information technology

    Publication Year: 1990, Page(s):586 - 587
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB)

    A brief status report is presented on the technologies that are coming, the ways in which users plan to use them, and what is likely to happen as technologies and users meet in the workplace. It is predicted that the next few years will once again see more new technology than anyone can absorb, making it necessary to sort it out, select the useful pieces, and implement them in ways that are meanin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer innovation in higher education

    Publication Year: 1990, Page(s):647 - 649
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    In the absence of an extensive and intensive causal science of learning, computer applications for education have most often been shaped by external factors. Programming for the manipulation of numbers came first, followed by word processing and the manipulation of text. These are briefly discussed, and the potential of electronic mail and multimedia, which have not found much educational applicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SQL query modification algorithms

    Publication Year: 1990, Page(s):551 - 559
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB)

    Algebra rules and a query modification algorithm that enable modifications of SQL queries considered hitherto as nonmodifiable are introduced. Cases where aggregates are involved are emphasized. Also introduced is a technique to translate a view with DISTINCT keyword into an equivalent grouped view without DISTINCT; as a result some queries that were not modifiable on the DISTINCT view become modi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New directions in database management systems

    Publication Year: 1990, Page(s):500 - 506
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    The important concepts concerning object-oriented databases (OODBs) are reviewed. The shortcomings of the relational model in supporting nontraditional applications are outlined. OO features are explained and how they can be used to overcome the above mentioned shortcomings is indicated. The issue of developing a declarative query language for OODBs is briefly discussed. Some practical and theoret... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A combinatorial approach to temporal reasoning

    Publication Year: 1990, Page(s):774 - 780
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    It is described how representation structures for counting the number of endpoint sequences associated with a given interval order or interval graph can be used in temporal reasoning. Efficient algorithms for constructing such structures from temporal data are designed and analyzed. The endpoint sequence closure problem for temporal (interval) data is defined here as the problem of determining all... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer assisted instruction and students' social orientations

    Publication Year: 1990, Page(s):660 - 664
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    The relationship between computer-assisted instruction (CAI) and students' social orientations was investigated. Social orientations that have been shown to have a significant relationship with student's success in the academic and social areas were examined regarding their relationship to students' attitudes toward CAI. Results indicate a significant relationship between high-level social image a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concurrency control in distributed databases through dummy locks

    Publication Year: 1990, Page(s):576 - 585
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB)

    An optimistic scheme, called ODL, that uses dummy locks to test the validity of a transaction for concurrency control in distributed database systems is suggested. The dummy locks are long-term locks; however, they do not conflict with any other lock. By the use of long-term dummy locks, the need for the information about the write sets of validated transactions is eliminated, and during the valid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trends in using computers in education

    Publication Year: 1990, Page(s):644 - 646
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    Increased computer utilization in primary and secondary education since the early 1960s is discussed, focusing on the broad range of new equipment available. The motivational effect of technology is examined. The importance of using the technology properly is emphasized View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TAPIOCA: OCCAM rapid prototyping from Petri-net

    Publication Year: 1990, Page(s):184 - 190
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    A prototyping tool that implements the control flow of a parallel application is presented. The method is used to produce an OCCAM program from ordinary Petri nets semiautomatically. The method involves three steps. First, the model is analyzed in order to extract the basic objects (processes, shared resources, and synchronizations between processes). The linear invariants obtained by the model va... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Programming the data structure accelerator

    Publication Year: 1990, Page(s):65 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB)

    A fine-grained, massively parallel SIMD (single-instruction-stream, multiple-data-stream) architecture, called the data structure accelerator, is presented, and its use in a number of problems in computational geometry is demonstrated. This architecture is extremely dense and highly scalable. Systems of 106 processing elements can be feasibly embedded in workstations. It is proposed tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some simple models of CASE tool integration

    Publication Year: 1990, Page(s):247 - 250
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    Some key aspects of CASE tool integration are explored using simple models. Data integration, control integration, and the interrelationship of control and data are examined. Examples are given of proposed standards and commercially available products that illustrate different approaches to tool integration View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heuristic-based semantic query optimization

    Publication Year: 1990, Page(s):541 - 550
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (780 KB)

    An implementation of a heuristic-based semantic query optimizer generator that uses a set of semantic transformation heuristics to produce an executable optimizer is described. This generator can also be used to construct optimizers that perform both semantic and conventional optimization. The use of contradictions and tautologies to provide solutions to queries without accessing the database is e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overlapping B+trees for temporal data

    Publication Year: 1990, Page(s):491 - 498
    Cited by:  Papers (3)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB)

    A structure based on B+trees is proposed, and some procedures for manipulating it are given. Analytical estimates of the extra space needed each time some records are updated are obtained. Experimental results that agree with the analytical results are reported. Overlapping structures can be used for backup and recovery, for storing variations of a standard file or text files, and for temporal dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deducing linguistic structure from the statistics of large corpora

    Publication Year: 1990, Page(s):380 - 389
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB)

    Two experiments that strongly suggest that largely distributional techniques might be developed to automatically provide both a set of part of speech tags for English and a skeletal parsing of free English text are described. In one experiment the authors have developed a constituent boundary parsing algorithm that derives an (unlabeled) bracketing, given text annotated for part of speech as input... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Functional C: an extended functional programming language

    Publication Year: 1990, Page(s):298 - 302
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    An extended functional programming language, the Functional C language is proposed. The language provides a granularity-controlling feature that helps to reduce the communication overhead in the program execution. In addition, a programmer can impose several evaluation schemes on program segments for efficient evaluation. The language can be regarded as an extension of the C language in the sense ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The current status of copyright and patent protection for computer software

    Publication Year: 1990, Page(s):617 - 629
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1228 KB)

    Copyright law continues to provide the favored protection for software, including programs of all kinds, microcode and the screen imagery of video games and computer interfaces. However, patent protection for nonobvious software inventions is increasingly available as additional or alternative protection in many industrial countries. In countries other than the US, patent protection for computer p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A temporal proof methodology for reactive systems

    Publication Year: 1990, Page(s):757 - 773
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1024 KB)

    A minimal proof theory that is adequate for proving the main important temporal properties of reactive programs is presented. The properties considered consist of the classes of invariance and response properties. For each of these classes a small set of rules that is complete for verifying properties belonging to the class is given. The application of these rules is illustrated by several example... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safety first [data security]

    Publication Year: 1990, Page(s):593 - 595
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    The author discusses how companies can protect their valuable data and computing systems against unforeseen disasters such as fire, flood, and even employee sabotage. He compares the cost and feasibility of available technologies used for data and system backup and examines particular product types that have proved to be cost-effective in disaster recovery applications. One of the newest technolog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating courseware with lessonware [computers in education]

    Publication Year: 1990, Page(s):657 - 659
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    An approach that integrates the advantages of structured courseware, whereby student monitoring provides feedback to students and teachers, with free interaction lessonware, which may raise student motivation and lends itself to exploratory and self-guided activities, is discussed. The efforts of the Centre for Educational Technology in this direction are described View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation and improvement of query processing methods in wide and local area network

    Publication Year: 1990, Page(s):565 - 575
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (876 KB)

    An accurate cost model of query processing, designed for distributed conventional query optimizers in an extensible database, is introduced. The model can also be used by extensible query optimizers, namely in select-project-join queries. The cost model is used for qualitative comparison of the effectiveness of distributed query processing strategies as a function of relation sizes and joining att... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The making of an information retrieval interface

    Publication Year: 1990, Page(s):787 - 795
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    The design for three information retrieval interfaces, or `front ends,' are reviewed. The interfaces, IIDA, OAK and OAK II, were intended to assist end-users, the infrequent users who are not expected to learn or retain knowledge of a full command language, yet who want to perform database searches on their own. The principal design features, reasons for most design decisions, user reaction and pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Desktop research-information management for the scholar

    Publication Year: 1990, Page(s):639 - 642
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    A model workstation that allows searching of bibliographic databases or library catalogs, the assembly of bibliographies, the ordering and acquisition of documents, and the preparation of manuscripts is discussed. It is based on the concept of software connectivity, which is defined as the ability of various software packages to work together to make the whole greater than the sum of the parts View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation and comparison of text-manipulation systems

    Publication Year: 1990, Page(s):456 - 466
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1052 KB)

    A formal approach to the evaluation and comparison of text-manipulation systems is discussed. It is based on T-spaces, a class of transitive mathematical models, in terms of which the editable sets are exactly the recursively enumerable ones. Evaluation relies on the associated time/space complexity measures, some of which reflect the complexity of a system as a unity, while others are independent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.