By Topic

Computer Software and Applications Conference, 1995. COMPSAC 95. Proceedings., Nineteenth Annual International

9-11 Aug. 1995

Filter Results

Displaying Results 1 - 25 of 62
  • Proceedings Nineteenth Annual International Computer Software and Applications Conference (COMPSAC'95)

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (735 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • Design and implementation of multiple type objects in a persistent programming language

    Publication Year: 1995, Page(s):70 - 76
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB)

    In general it takes a lot of time to decide the forms of classes, or types, in database design. This is because the forms of objects stored in a database can hardly be changed. If the objects can get and lose types dynamically, this may be solved. We describe design of multiple type objects in INADA, an object oriented persistent programming language. Any persistent objects in INADA may get any ty... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expressing JSD in Z

    Publication Year: 1995, Page(s):62 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    We propose the use of Z as the formal notation to express Jackson System Development (JSD) specifications where JSD is to serve as the mechanism to help the analysis of problem domains. A function process in JSD specifications is manifested by an operation schema. A model process is treated as an active entity that requires an operation on its data store to add a new instance to the collection of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mechanical synthesis of a unification algorithm in PowerEpsilon

    Publication Year: 1995, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    Programming in constructive type theory corresponds to theorem proving in mathematics: the specification plays the role of the proposition to be proved and the program is obtained from the proof. We present a proof development system called PowerEpsilon, based on a constructive type theory which can be used as a formal program development system for actually deriving a program from a specification... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for analyzing properties of hierarchical predicate transition nets

    Publication Year: 1995, Page(s):50 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    Hierarchical high level Petri nets have been proposed in recent years as a powerful formal method for modeling large concurrent and distributed systems but they are even more difficult to analyze than flat high level Petri nets, which are also lacking effective analysis methods themselves. A method for analyzing properties of hierarchical predicate transition Petri nets is proposed. The method emp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge reuse through the application of the object knowledge canonical form

    Publication Year: 1995, Page(s):40 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    The importance of software reuse has been widely recognized. The use of a canonical form to translate knowledge among expert system building tools (ESBTs) has been demonstrated effective. An object knowledge canonical form (OKCF) is proposed to represent and translate object knowledge in object oriented ESBTs: CLIPS 5.0, KAPPA, and KEE. OKCF and Knowledge Interchange Format are different in featur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A knowledge-based approach for worst-case timing analysis of microprocessor systems

    Publication Year: 1995, Page(s):32 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB)

    A diagnostic system for microprocessor systems is being designed and developed. In microprocessor system diagnosis, temporal reasoning of event changes occurring at imprecisely known time instants is an important issue. The concept of time range has been proposed to capture the notion of time imprecision in event occurrence. According to this concept, efficient temporal reasoning techniques for ti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid approach to object library classification and retrieval

    Publication Year: 1995, Page(s):278 - 283
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    A hybrid approach, which combines a faceted scheme and free test analysis, is proposed for classifying and retrieving reusable software components. In our approach, the facet scheme is extended by associating a set of index words, instead of just one, with each facet. The index words are extracted using free test analysis and are ranked by their significance. We also conducted two simple experimen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A horizontal approach for software process improvement

    Publication Year: 1995, Page(s):326 - 331
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    Software process improvement practice and research have predominantly assumed a vertical approach to definition and change. Our studies show that vertical approaches have inherent difficulties. We have developed a new approach called horizontal change (HOC-A) that provides a new environment for change in software development organizations. We describe some of the difficulties of the vertical proce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing Chinese typeface using components

    Publication Year: 1995, Page(s):416 - 421
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    We discuss a generic design scheme for constructing Chinese characters. We first highlight the demand for developing an automatic Chinese font design system. Then, we show that the structure of a Chinese character can be represented by a structured character description. The scheme for designing a character is presented in details. Our discussion includes stroke definition, building up components,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi-dimensional data visualization tool for knowledge discovery in databases

    Publication Year: 1995, Page(s):26 - 31
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    The paper describes a multidimensional visualization (MDV) technique, a refined and improved form of a computational geometry method known as parallel coordinates, that has been realized by WinViz. It shows how MDV differs significantly from parallel coordinates as originally conceived by Alfred Inselberg (T. Chomut, 1987). The paper also discusses WinViz's underlying design considerations. A prim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deriving distributed algorithms from a general predicate detector

    Publication Year: 1995, Page(s):268 - 273
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    Designing and debugging distributed systems requires the detection of conditions across the entire system. As an illustration, monitoring the status of an application requires detection of termination, and using virtual time requires the periodic calculation of the global virtual time. The generalized conjunctive predicate (GCP) detector offers a method to derive detection algorithms for these and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A test strategy for object-oriented programs

    Publication Year: 1995, Page(s):239 - 244
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    The complexity and interdependencies of an object oriented program makes testing of such programs difficult. We present a reverse engineering based model called Object Relation Diagram (ORD), which is generated from analyzing the C++ source code of an object oriented program. An ORD is a directed graph in which the vertices represent the object classes and the edges represent the relationships amo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the effectiveness of process improvements on software development cycle time via system dynamics modelling

    Publication Year: 1995, Page(s):318 - 325
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    Reducing software development cycle time without sacrificing quality is crucial to the continued success of most software development organizations. Software companies are investing time and money in reengineering processes incorporating improvements aimed at reducing their cycle time. Unfortunately, the impact of process improvements on the cycle time of complex software processes is not well und... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software support for asynchronous computing across networks

    Publication Year: 1995, Page(s):376 - 382
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    The paper describes the design and implementation of asynchronous communication library routines for distributed computing across networks of workstations. The new system is based on modifications of the existing PVM message-passing environment. An intensive and comparative study of synchronous, asynchronous and non-blocking communication protocols is addressed in terms of their design, implementa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A policy independent metric for process selection in distributed systems

    Publication Year: 1995, Page(s):212 - 217
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    Process migration is a means of achieving load sharing and load balancing in distributed systems. The research to date either seeks to minimize networked interprocess communication or to create process migration mechanisms which require a minimum of residual dependencies, minimize migration latency, or a compromise of the two. Unfortunately, most of the former research relies on process placement,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A general approach to evaluation of secure systems

    Publication Year: 1995, Page(s):396 - 401
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    As we know, current composable security properties are logically pessimistic, particularly when they are applied to security analysis of a system in a modular way. To overcome this problem we present a general approach to properly dealing with composition of components or modules by using matrices that describe operational properties of the components. The matrices of an entire system can be gener... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for designing safe software systems

    Publication Year: 1995, Page(s):409 - 414
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    The paper describes a framework for designing safety-critical software systems, in the context of a software safety analysis process that is based on fault tree analysis. This software design process has four steps: 1) software design fault tree generation, 2) fault tree verification, 3) safe software design, and 4) design safety verification. Approaches to safe software design, and verification o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on developing a distributed problem solving system

    Publication Year: 1995, Page(s):122 - 127
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    I propose a distributed problem solving (DPS) model where a complex artificial intelligence problem is solved by multiple distributed agents, each agent solves a part of a larger problem in parallel and cooperates and communicates through `virtual shared memory(VSM)'. Also, in order to develop the DPS systems based on the proposed model, I have designed a DPS system development environment called ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to animating Z specifications

    Publication Year: 1995, Page(s):108 - 113
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    This paper presents the ZANS approach to animating a large subset of Z specifications. Unlike most other animation approaches that are based on functional or logical programming paradigms, the approach presented transforms the specifications into an imperative intermediate language, which can also serve as the basis of code synthesis from Z specifications. ZANS is showing promise of being an effec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirement specification in pseudo-natural language in PROMIS

    Publication Year: 1995, Page(s):96 - 101
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    PROMIS, a knowledge-based tool for automatically prototyping MIS provided by us, is intended to deliver over the task of the requirement specification to the end users. It provides a pseudo-natural language for the end users to describe their own needs. PROMIS can then convert their requirements into an internal schema and then a MIS prototype automatically with the help of an internal domain know... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic generation of C++ code from an ESCRO2 specification

    Publication Year: 1995, Page(s):18 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    ESCRO2 is a specification language for real time systems. The paper describes the capabilities of the ESCRO2 processor to generate C++ code from an ESCRO2 specification. A traffic light control system is used to illustrate the concepts. The control system is specified and the code generation process is described. Each generated portion of the specification is discussed: intervals, events, devices ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving software process to implement a wireless mobile network

    Publication Year: 1995, Page(s):91 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB)

    In the future, computer networks will consist of multiple personal computing devices connected by wired and wireless links. The system will operate in a peer-to-peer mode, allowing the network of computers to act as one large server, providing information to each node as needed. In addition, the computers will be mobile, connecting and disconnecting from networks at will, to meet the needs of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Creating a distributed environment using object oriented technology

    Publication Year: 1995, Page(s):262 - 267
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    The paper gives a detailed description of the development of a distributed environment. A brief description of an object oriented technology used in the development of the environment is also presented. The environment described is suitable for rapid prototyping of distributed applications and complete development of distributed software systems. This environment was used in the development of cli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.