Computer Software and Applications Conference, 1995. COMPSAC 95. Proceedings., Nineteenth Annual International

9-11 Aug. 1995

Filter Results

Displaying Results 1 - 25 of 62
  • Proceedings Nineteenth Annual International Computer Software and Applications Conference (COMPSAC'95)

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (735 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • Knowledge reuse through the application of the object knowledge canonical form

    Publication Year: 1995, Page(s):40 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    The importance of software reuse has been widely recognized. The use of a canonical form to translate knowledge among expert system building tools (ESBTs) has been demonstrated effective. An object knowledge canonical form (OKCF) is proposed to represent and translate object knowledge in object oriented ESBTs: CLIPS 5.0, KAPPA, and KEE. OKCF and Knowledge Interchange Format are different in featur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A knowledge-based approach for worst-case timing analysis of microprocessor systems

    Publication Year: 1995, Page(s):32 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB)

    A diagnostic system for microprocessor systems is being designed and developed. In microprocessor system diagnosis, temporal reasoning of event changes occurring at imprecisely known time instants is an important issue. The concept of time range has been proposed to capture the notion of time imprecision in event occurrence. According to this concept, efficient temporal reasoning techniques for ti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi-dimensional data visualization tool for knowledge discovery in databases

    Publication Year: 1995, Page(s):26 - 31
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    The paper describes a multidimensional visualization (MDV) technique, a refined and improved form of a computational geometry method known as parallel coordinates, that has been realized by WinViz. It shows how MDV differs significantly from parallel coordinates as originally conceived by Alfred Inselberg (T. Chomut, 1987). The paper also discusses WinViz's underlying design considerations. A prim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multiparadigm programming approach for developing knowledge-based systems

    Publication Year: 1995, Page(s):362 - 368
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB)

    Knowledge-based systems are large and complex software systems which are difficult to understand and design. A multiparadigm programming approach, based on an integration of the object-oriented programming paradigm and the logic programming paradigm, is reported for the development of these systems. Such an approach promotes both the analysis and synthesis processes which are essential in understa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User interface design: the WHO, the WHAT, and the HOW revisited

    Publication Year: 1995, Page(s):178 - 183
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    As soon as user interface design is seen as an integral part of business- and user-oriented software development, a framework and a methodology are required for development support. The hereby introduced TADEUS-approach provides both, and is currently being implemented, in order to provide developers with a corresponding environment. The approach is dedicated to the integration of the specificatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The multimedia desktop conference system adaptability in network traffic on LAN

    Publication Year: 1995, Page(s):334 - 338
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    In this paper, we describe the design and implementation of a desktop conference system, called DeskShare, which provides a distributed and real-time conferencing facility for cooperative work. The main objective of our research is to bring users of remote systems together to collaborate in group work using readily available commodity audio and video technology, and currently used networks based o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic generation of C++ code from an ESCRO2 specification

    Publication Year: 1995, Page(s):18 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    ESCRO2 is a specification language for real time systems. The paper describes the capabilities of the ESCRO2 processor to generate C++ code from an ESCRO2 specification. A traffic light control system is used to illustrate the concepts. The control system is specified and the code generation process is described. Each generated portion of the specification is discussed: intervals, events, devices ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transformation of relational schemas to object-oriented schemas

    Publication Year: 1995, Page(s):356 - 361
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    We present an algorithm that transforms schemas of relational databases to schemas of object-oriented databases (OODB). This algorithm has the following special features: (1) it transforms schemas between two commercial database systems, i.e., from Sybase relational schemas to O2 OODB schemas; (2) it initiates limited interactive sessions between the schema transformer and its user when... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Object-Inferencing Framework: a Prolog-based approach for extracting structure from computer graphics

    Publication Year: 1995, Page(s):172 - 177
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    Advances in computer graphics, database, and knowledge-based systems have created opportunities for the sophisticated management of engineering information. Many industries have incorporated information about critical systems into a computer-graphic environment. However, most of the data captured by these systems contains implicit information in that semantic relationships and structure conveyed b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying dynamic buffer allocation to predictive load control

    Publication Year: 1995, Page(s):150 - 155
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    Previous works on buffer management in the database area paid little attention to the dynamic buffer allocation involving reallocation of buffers of queries while exploiting the known access patterns of the database operations. This paper proposes a new buffer allocation technique to improve the system's global performance. The main idea is to maximize the effectiveness of the buffer allocation. F... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A horizontal approach for software process improvement

    Publication Year: 1995, Page(s):326 - 331
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    Software process improvement practice and research have predominantly assumed a vertical approach to definition and change. Our studies show that vertical approaches have inherent difficulties. We have developed a new approach called horizontal change (HOC-A) that provides a new environment for change in software development organizations. We describe some of the difficulties of the vertical proce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FunZ designs-a bridge between Z specifications and Haskell implementations

    Publication Year: 1995, Page(s):12 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    FunZ, an intermediate specification language, is part of a complete methodology designed to facilitate the derivation of purely functional programs from Z specifications. FunZ is actually an extension of Haskell, yet the language also retains a Z-like flavor in that it contains notational conventions similar to those of standard Z or several object oriented variants. By combining features from bot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IPCC++: a C++ extension for interprocess communication with objects

    Publication Year: 1995, Page(s):205 - 210
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    Presents the language model InterProcess Communication with C++ (IPCC++), which is C++ extended with interprocess communication objects that support distributed memory models. The model represents an extension of the C++ programming language that introduces primitives of concurrency to C++ as objects. The model supports: the principle of orthogonality, explicit concurrency, C++'s inheritance featu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using constraints for distributed query processing

    Publication Year: 1995, Page(s):128 - 133
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    Constraints are combined with join operations to minimize the amount of data transmission required for distributed query processing. We identify and exploit two important concepts: reducers and abstractors. A constraint can serve as a reducer if it is a sufficient and/or necessary condition for a query. Through replacing a distributed query by a reducer, the query is converted to be processed only... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HyperDisco: an object-oriented hypermedia framework for flexible software system integration

    Publication Year: 1995, Page(s):298 - 305
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    Software development environments are examples of complex computer applications characterized by heterogeneity; they are composed of diverse information repositories, user interfaces, services and tools. This paper presents an approach for providing hypermedia linking services as a means for integration in these heterogeneous settings. The overall goal of the HyperDisco project is to provide a hyp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Checking program proofs made easy

    Publication Year: 1995, Page(s):102 - 107
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    To generate reliable software, it must be shown that a program meets its specifications. This can be done using program verification techniques. Assertions are made about the expected behavior of a program, and intermediate program states are examined to ensure that the program specifications are never violated. However,proving that the intermediate program steps lead to the conclusion and, theref... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural framework for developing concurrent applications

    Publication Year: 1995, Page(s):256 - 261
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    The goal of the work reported is to construct a framework that supports the development of concurrent applications. The paper presents the operational structure of an object based architectural system, illustrates the different kinds of relationships that may exist between the objects in an operational structure and how communication between the objects in such relationships is solved by message p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FFU: far-future-using replacement algorithms for continuous media storage system

    Publication Year: 1995, Page(s):346 - 351
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    It is true that some conventional algorithms do not fit in continuous media (CM) environments because of their different properties. A typical example is the buffer replacement algorithms such as least recently used (LRU) and most recently used (MRU) strategies. These replacement policies are based on the referencing history for replacing buffered page with lower priority because it is not always ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple tree pattern matching algorithm for code generator

    Publication Year: 1995, Page(s):162 - 167
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    This paper describes a simple tree pattern matching algorithm for the code generator of compilers. The intermediate code (Register Transfer Language) is matched with the tree-rewriting rules of the instruction description which describes the target architecture to generate the assembly code. The hashing function is used in our system to transform a tree pattern matching problem into a simple numbe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of dynamic signature file methods

    Publication Year: 1995, Page(s):144 - 149
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    With rapid increase of information requirements from various application areas, there has been much research on dynamic information storage structures that effectively support insertions, deletions and updates. We evaluate the performance of the existing dynamic signature file methods such as the S-tree, Quid Filter and HS file, and provide guidelines for the most effective usage to a given operat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the effectiveness of process improvements on software development cycle time via system dynamics modelling

    Publication Year: 1995, Page(s):318 - 325
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    Reducing software development cycle time without sacrificing quality is crucial to the continued success of most software development organizations. Software companies are investing time and money in reengineering processes incorporating improvements aimed at reducing their cycle time. Unfortunately, the impact of process improvements on the cycle time of complex software processes is not well und... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deriving distributed algorithms from a general predicate detector

    Publication Year: 1995, Page(s):268 - 273
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    Designing and debugging distributed systems requires the detection of conditions across the entire system. As an illustration, monitoring the status of an application requires detection of termination, and using virtual time requires the periodic calculation of the global virtual time. The generalized conjunctive predicate (GCP) detector offers a method to derive detection algorithms for these and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Temporal event analysis and program understanding

    Publication Year: 1995, Page(s):4 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    A temporal event analysis approach to program understanding is described. Program understanding is viewed as a sequence of episodes in which the programmer concludes that an informal event occurs that corresponds to some part of the code. This can be viewed as accepting that the code is an adequate definition of the meaning of the informal event. Often, such a definition is contingent upon working... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.