By Topic

[Proceedings] 1991 Symposium on Applied Computing

3-5 April 1991

Filter Results

Displaying Results 1 - 25 of 71
  • Logical vs. physical disk shadowing

    Publication Year: 1991
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    Summary form only given. Bitton and Gray (1988) have defined disk shadowing as a technique for maintaining a set of two or more identical disk images on separate disk drives. Its primary purpose is to enhance reliability and availability of secondary storage by providing multiple paths to redundant data. The current paper demonstrates how disk shadowing can be further improved if not physical page... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of A* and IDA*-a worst case analysis

    Publication Year: 1991
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (73 KB)

    Summary form only given. The paper presents a detailed comparison between algorithms A* and IDA*. A* is a best first search algorithm which at each node n in the graph uses a node evaluation function f(n)=g(n)+h(n), where g(n) is the cost of the currently known best path from the start node s to n and h(n) is an estimate of h*(n) (cost of the minimum cost path from n to a goal node). At each itera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 1991 Symposium on Applied Computing (Cat. No.91TH0355-8)

    Publication Year: 1991
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Feasibility-study of a multiplexing strategy in road transport informatics for short range MRNs

    Publication Year: 1991, Page(s):364 - 371
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    The study of special applications in the field of road transport informatics (RTI) leads to suitable multiplexing algorithms for the corresponding traffic load. Therefore the authors compare several different strategies for statistical multiplexers by means of simulation in real-time environment. According to special applications in the new field of road transport informatics (RTI) in short range ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analyst-oriented development approach for real-time Ada software

    Publication Year: 1991
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    An approach is given for developing real time Ada software systems, called interactive Ada development approach (IADA). The approach features automated translation of a graphic model to code and a unified, analyst-centered environment for software development. The IADA demonstrates an enhancement of the state of the process and supporting technologies which will allow Ada to be produced for delive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A linear algebraic approach to queueing theory

    Publication Year: 1991, Page(s):200 - 202
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (988 KB)

    A survey of the basic formulas of queueing theory is presented, indicating their limitations in dealing with non-exponential service time distributions and non-steady-state behavior. The authors then describe a linear algebraic formulation which is a complete procedure for dealing with non-exponential servers. The formulation is invariant to a class of similarity transformations and thus does not ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On flow control mechanisms and their impacts upon statistical databases

    Publication Year: 1991, Page(s):150 - 155
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    The effect of mixing two or more independently designed data security policies has not been well analyzed. There has been concern that it may create unexpected violations. The authors show that the widely used *-property flow control policy in multi-level data security systems can contribute to the compromise of statistical databases. They further conclude that additions of unclassified data into ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of database systems and Smalltalk

    Publication Year: 1991, Page(s):393 - 402
    Cited by:  Papers (2)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    The authors present an object-oriented data model, that allows uniform specification of database requests and application programs. The user interface is based on Smalltalk, and the object-oriented data model is represented in terms of classes and messages. Techniques are discussed for implementing such a model on top of an underlying relational database system. Those parts of application programs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A high-performance, modular design paradigm for teletraffic simulation with CSIM

    Publication Year: 1991
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    The simulator designed by the author provides a new design paradigm for simulating large-scale telecommunications systems. It is based on C and CSIM and has the features of dynamic memory allocation, modular design, interruptability, user-interface, verification and displaying run-time statistics. At present, it can be used to simulate CDRs or traffic matrix inputs; fixed hierarchical routing, or ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A public-key based dynamic password scheme

    Publication Year: 1991, Page(s):430 - 435
    Cited by:  Papers (7)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    A dynamic password authentication scheme based on public-key concept is proposed. The login password is changed dynamically and users can use this scheme within a remote login environment. Since we employ the public-key concept to bind each user's password to that user's identification, we eliminate the necessity for the system to store the encrypted password file. This approach has greatly reduce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • k-way merging and k-ary sorts

    Publication Year: 1991
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    A divide-and-conquer algorithm is given for merging k sorted lists, namely, recursively merge the first [k/2] lists, do likewise for the last [k/2] lists, then merge the two results. The author gets a tight bound for the expense of the worst case behavior of this merge. He shows the algorithm is cheapest among all similar divide-and-conquer approaches to k-way merging. He computes the expense of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An extended memoryless inference control model: partial-table level suppression

    Publication Year: 1991, Page(s):142 - 149
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    Memoryless inference controls are an important class of inference control methods for online statistical databases. Other inference controls are usually too complex to use in online systems. Cell level controls have been shown to provide a low level of indentification risk along with a relatively high level of release of nonsensitive statistics, but are also too complex. Table level controls have ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object-oriented design for automatic data acquisition

    Publication Year: 1991, Page(s):389 - 392
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    The authors discuss software development for automatic data acquisition in a resistivity measurement system, and use it as an example to examine the object-oriented design principle for scientific computation. The literature in software methodology for scientific computing is relatively scanty so far, this paper serves as a contribution to the exploration of this area View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of parallelism in a computer program by grammatical means

    Publication Year: 1991
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    A context sensitive grammar (CSG) is developed which selects the balanced tree most suitable for parallel execution. Also, a new parsing algorithm for this grammar has been considered. The grammar detects parallelism in arithmetic expressions by considering boundaries between subexpressions. The grammar can be extended to include all kinds of associative operators. The algorithm is an extension of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using handheld computers to improve efficiency in oil industry field operations

    Publication Year: 1991
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    Handheld computers are being used to improve efficiency in oil industry field operations. Field data is recorded electronically with the handheld unit rather than being written on a paper report. After the data is collected, it is uploaded into a PC database in the field office where timely reports and data analysis are produced that support the decision-making process in the field. Handheld compu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multispectral image analysis using artificial neural network system on a CRAY X-MP

    Publication Year: 1991
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    The authors have developed software simulation for ANN systems with two learning paradigms back-propagation and competitive learning on a CRAY X-MP computer system. They use the back-propagation network with three layers: the input layer, hidden layer and the output layer. They use seven, sixteen and four neurodes in input, hidden and output layers respectively. The seven units in the input layer ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A branch oriented key management solution to dynamic access control in a hierarchy

    Publication Year: 1991, Page(s):422 - 429
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    A branch oriented key management scheme whose security is based on solving discrete logarithms is proposed. The key management problems which exist in the multilevel security environment can be overcome. The authors scheme is elegant, simple, general and suitable for the dynamic access control in a hierarchy View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast `parsing' algorithm for conceptual clustering

    Publication Year: 1991
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    The notion of conceptual clustering was introduced by Michalski in 1980 where he used concepts at a more physical level such as (color=`red') and (height=`tall') and so on. Shankar et al. explored the possibility of using a knowledge base in the clustering process. They used concepts at one or more levels higher than the physical level. The author suggests a method which uses only integers during ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlled best-first search for near optimal solutions

    Publication Year: 1991, Page(s):109 - 118
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB)

    Many heuristic search algorithms are available for solving combinatorial optimization problems in artificial intelligence and operations research applications. However, most of these algorithms do not scale up in practice because of their time and/or storage limitations. The paper presents two algorithms, namely BDA* (breadth-depth-A*) and CA* (controlled A*), w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Creating user interfaces with Agentsheets

    Publication Year: 1991, Page(s):190 - 196
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    Building user interfaces with tool boxes has limitations. Most of them allow users to build basic interfaces efficiently on a high level of abstraction. However, when users have needs for new building blocks, which cannot be composed of existing ones, users have to fall back on the low level of abstraction provided by conventional programming languages. Agentsheets address this problem by introduc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel processing laboratory for optimal clustering methods

    Publication Year: 1991
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    Many clustering problems are highly dependent on optimization techniques and the use of Monte Carlo methods. A discussion is provided for providing a transputer based laboratory and how such a laboratory can be used to investigate optimal clustering methods View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inheritance and subtyping [object-oriented databases]

    Publication Year: 1991, Page(s):382 - 388
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    A method for implementing subtyping and inheritance, as independent features of object-oriented languages, is presented. There are at least two reasons for decoupling subtyping from inheritance: the negative influence on encapsulation and the different perspective of specification inheritance (subtyping) and implementation inheritance (code sharing). Subtyping and inheritance are defined in two in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recovery of shape and motion parameters for polyhedron-like objects

    Publication Year: 1991, Page(s):448 - 456
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB)

    A discussion is given on the problem of determining the shape of an object and the parameters that describe a rigid motion of the object, from an analysis of two noisy, and perhaps incomplete, perspective images of the object. One image is taken before and the other is taken after the rigid motion. The authors present a practical approach that applies to polyhedron-like objects. They compare the r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software metrics for parallel programs

    Publication Year: 1991
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    Software engineering has several fields one which is the study of static measurements of programs as indicators of their maintainability, reliability and clarity. There is a need to develop parallel software metrics. There are several ways to explore the feasibility and plausibility of parallel software metrics. One way is by proposing new metrics exclusively developed for parallel software. Anoth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decision support system for creativity management

    Publication Year: 1991, Page(s):350 - 359
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    The expert system for creativity management is designed to provide guidance for managers in R&D laboratories who need to nurture creativity in their technical staff. It is based on the Ginn model of management of creativity, which breaks these management problems down into a series of dichotomies. The expert system uses a blackboard architecture to simplify the software engineering and enhance... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.