By Topic

# [Proceedings] 1991 Symposium on Applied Computing

## Filter Results

Displaying Results 1 - 25 of 71
• ### Logical vs. physical disk shadowing

Publication Year: 1991
| | PDF (88 KB)

Summary form only given. Bitton and Gray (1988) have defined disk shadowing as a technique for maintaining a set of two or more identical disk images on separate disk drives. Its primary purpose is to enhance reliability and availability of secondary storage by providing multiple paths to redundant data. The current paper demonstrates how disk shadowing can be further improved if not physical page... View full abstract»

• ### Performance of A* and IDA*-a worst case analysis

Publication Year: 1991
| | PDF (73 KB)

Summary form only given. The paper presents a detailed comparison between algorithms A* and IDA*. A* is a best first search algorithm which at each node n in the graph uses a node evaluation function f(n)=g(n)+h(n), where g(n) is the cost of the currently known best path from the start node s to n and h(n) is an estimate of h*(n) (cost of the minimum cost path from n to a goal node). At each itera... View full abstract»

• ### 1991 Symposium on Applied Computing (Cat. No.91TH0355-8)

Publication Year: 1991
| PDF (30 KB)
• ### Feasibility-study of a multiplexing strategy in road transport informatics for short range MRNs

Publication Year: 1991, Page(s):364 - 371
| | PDF (512 KB)

The study of special applications in the field of road transport informatics (RTI) leads to suitable multiplexing algorithms for the corresponding traffic load. Therefore the authors compare several different strategies for statistical multiplexers by means of simulation in real-time environment. According to special applications in the new field of road transport informatics (RTI) in short range ... View full abstract»

• ### An analyst-oriented development approach for real-time Ada software

Publication Year: 1991
| | PDF (100 KB)

An approach is given for developing real time Ada software systems, called interactive Ada development approach (IADA). The approach features automated translation of a graphic model to code and a unified, analyst-centered environment for software development. The IADA demonstrates an enhancement of the state of the process and supporting technologies which will allow Ada to be produced for delive... View full abstract»

• ### A linear algebraic approach to queueing theory

Publication Year: 1991, Page(s):200 - 202
Cited by:  Papers (3)
| | PDF (988 KB)

A survey of the basic formulas of queueing theory is presented, indicating their limitations in dealing with non-exponential service time distributions and non-steady-state behavior. The authors then describe a linear algebraic formulation which is a complete procedure for dealing with non-exponential servers. The formulation is invariant to a class of similarity transformations and thus does not ... View full abstract»

• ### On flow control mechanisms and their impacts upon statistical databases

Publication Year: 1991, Page(s):150 - 155
| | PDF (420 KB)

The effect of mixing two or more independently designed data security policies has not been well analyzed. There has been concern that it may create unexpected violations. The authors show that the widely used *-property flow control policy in multi-level data security systems can contribute to the compromise of statistical databases. They further conclude that additions of unclassified data into ... View full abstract»

• ### Integration of database systems and Smalltalk

Publication Year: 1991, Page(s):393 - 402
Cited by:  Papers (2)  |  Patents (8)
| | PDF (636 KB)

The authors present an object-oriented data model, that allows uniform specification of database requests and application programs. The user interface is based on Smalltalk, and the object-oriented data model is represented in terms of classes and messages. Techniques are discussed for implementing such a model on top of an underlying relational database system. Those parts of application programs... View full abstract»

• ### A high-performance, modular design paradigm for teletraffic simulation with CSIM

Publication Year: 1991
Cited by:  Papers (1)
| | PDF (84 KB)

The simulator designed by the author provides a new design paradigm for simulating large-scale telecommunications systems. It is based on C and CSIM and has the features of dynamic memory allocation, modular design, interruptability, user-interface, verification and displaying run-time statistics. At present, it can be used to simulate CDRs or traffic matrix inputs; fixed hierarchical routing, or ... View full abstract»

• ### A public-key based dynamic password scheme

Publication Year: 1991, Page(s):430 - 435
Cited by:  Papers (7)  |  Patents (2)
| | PDF (380 KB)

A dynamic password authentication scheme based on public-key concept is proposed. The login password is changed dynamically and users can use this scheme within a remote login environment. Since we employ the public-key concept to bind each user's password to that user's identification, we eliminate the necessity for the system to store the encrypted password file. This approach has greatly reduce... View full abstract»

• ### k-way merging and k-ary sorts

Publication Year: 1991
Cited by:  Patents (1)
| | PDF (80 KB)

A divide-and-conquer algorithm is given for merging k sorted lists, namely, recursively merge the first [k/2] lists, do likewise for the last [k/2] lists, then merge the two results. The author gets a tight bound for the expense of the worst case behavior of this merge. He shows the algorithm is cheapest among all similar divide-and-conquer approaches to k-way merging. He computes the expense of t... View full abstract»

• ### An extended memoryless inference control model: partial-table level suppression

Publication Year: 1991, Page(s):142 - 149
| | PDF (508 KB)

Memoryless inference controls are an important class of inference control methods for online statistical databases. Other inference controls are usually too complex to use in online systems. Cell level controls have been shown to provide a low level of indentification risk along with a relatively high level of release of nonsensitive statistics, but are also too complex. Table level controls have ... View full abstract»

• ### Object-oriented design for automatic data acquisition

Publication Year: 1991, Page(s):389 - 392
| | PDF (256 KB)

The authors discuss software development for automatic data acquisition in a resistivity measurement system, and use it as an example to examine the object-oriented design principle for scientific computation. The literature in software methodology for scientific computing is relatively scanty so far, this paper serves as a contribution to the exploration of this area View full abstract»

• ### Detection of parallelism in a computer program by grammatical means

Publication Year: 1991
| | PDF (84 KB)

A context sensitive grammar (CSG) is developed which selects the balanced tree most suitable for parallel execution. Also, a new parsing algorithm for this grammar has been considered. The grammar detects parallelism in arithmetic expressions by considering boundaries between subexpressions. The grammar can be extended to include all kinds of associative operators. The algorithm is an extension of... View full abstract»

• ### Using handheld computers to improve efficiency in oil industry field operations

Publication Year: 1991
| | PDF (76 KB)

Handheld computers are being used to improve efficiency in oil industry field operations. Field data is recorded electronically with the handheld unit rather than being written on a paper report. After the data is collected, it is uploaded into a PC database in the field office where timely reports and data analysis are produced that support the decision-making process in the field. Handheld compu... View full abstract»

• ### Multispectral image analysis using artificial neural network system on a CRAY X-MP

Publication Year: 1991
| | PDF (96 KB)

The authors have developed software simulation for ANN systems with two learning paradigms back-propagation and competitive learning on a CRAY X-MP computer system. They use the back-propagation network with three layers: the input layer, hidden layer and the output layer. They use seven, sixteen and four neurodes in input, hidden and output layers respectively. The seven units in the input layer ... View full abstract»

• ### A branch oriented key management solution to dynamic access control in a hierarchy

Publication Year: 1991, Page(s):422 - 429
Cited by:  Papers (3)
| | PDF (384 KB)

A branch oriented key management scheme whose security is based on solving discrete logarithms is proposed. The key management problems which exist in the multilevel security environment can be overcome. The authors scheme is elegant, simple, general and suitable for the dynamic access control in a hierarchy View full abstract»

• ### A fast parsing' algorithm for conceptual clustering

Publication Year: 1991
| | PDF (84 KB)

The notion of conceptual clustering was introduced by Michalski in 1980 where he used concepts at a more physical level such as (color=red') and (height=`tall') and so on. Shankar et al. explored the possibility of using a knowledge base in the clustering process. They used concepts at one or more levels higher than the physical level. The author suggests a method which uses only integers during ... View full abstract»

• ### Controlled best-first search for near optimal solutions

Publication Year: 1991, Page(s):109 - 118
Cited by:  Papers (1)
| | PDF (680 KB)

Many heuristic search algorithms are available for solving combinatorial optimization problems in artificial intelligence and operations research applications. However, most of these algorithms do not scale up in practice because of their time and/or storage limitations. The paper presents two algorithms, namely BDA* (breadth-depth-A*) and CA* (controlled A*), w... View full abstract»

• ### Creating user interfaces with Agentsheets

Publication Year: 1991, Page(s):190 - 196
Cited by:  Papers (2)
| | PDF (532 KB)

Building user interfaces with tool boxes has limitations. Most of them allow users to build basic interfaces efficiently on a high level of abstraction. However, when users have needs for new building blocks, which cannot be composed of existing ones, users have to fall back on the low level of abstraction provided by conventional programming languages. Agentsheets address this problem by introduc... View full abstract»

• ### Parallel processing laboratory for optimal clustering methods

Publication Year: 1991
| | PDF (72 KB)

Many clustering problems are highly dependent on optimization techniques and the use of Monte Carlo methods. A discussion is provided for providing a transputer based laboratory and how such a laboratory can be used to investigate optimal clustering methods View full abstract»

• ### Inheritance and subtyping [object-oriented databases]

Publication Year: 1991, Page(s):382 - 388
Cited by:  Papers (1)
| | PDF (520 KB)

A method for implementing subtyping and inheritance, as independent features of object-oriented languages, is presented. There are at least two reasons for decoupling subtyping from inheritance: the negative influence on encapsulation and the different perspective of specification inheritance (subtyping) and implementation inheritance (code sharing). Subtyping and inheritance are defined in two in... View full abstract»

• ### Recovery of shape and motion parameters for polyhedron-like objects

Publication Year: 1991, Page(s):448 - 456
| | PDF (684 KB)

A discussion is given on the problem of determining the shape of an object and the parameters that describe a rigid motion of the object, from an analysis of two noisy, and perhaps incomplete, perspective images of the object. One image is taken before and the other is taken after the rigid motion. The authors present a practical approach that applies to polyhedron-like objects. They compare the r... View full abstract»

• ### Software metrics for parallel programs

Publication Year: 1991
| | PDF (84 KB)

Software engineering has several fields one which is the study of static measurements of programs as indicators of their maintainability, reliability and clarity. There is a need to develop parallel software metrics. There are several ways to explore the feasibility and plausibility of parallel software metrics. One way is by proposing new metrics exclusively developed for parallel software. Anoth... View full abstract»

• ### Decision support system for creativity management

Publication Year: 1991, Page(s):350 - 359
| | PDF (584 KB)

The expert system for creativity management is designed to provide guidance for managers in R&D laboratories who need to nurture creativity in their technical staff. It is based on the Ginn model of management of creativity, which breaks these management problems down into a series of dichotomies. The expert system uses a blackboard architecture to simplify the software engineering and enhance... View full abstract»