By Topic

Proceedings of the Seventh Israeli Conference on Computer Systems and Software Engineering

12-13 June 1996

Filter Results

Displaying Results 1 - 18 of 18
  • Proceedings of the Seventh Israeli Conference on Computer Systems and Software Engineering

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (219 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1996, Page(s): 151
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Performance of PVM with the MOSIX preemptive process migration scheme

    Publication Year: 1996, Page(s):38 - 45
    Cited by:  Papers (9)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (744 KB)

    With the increased interest in workstation networks for parallel and high performance computing it is necessary to reexamine the use of process migration algorithms, to improve the overall utilization of the system, to achieve high performance and to allow flexible use of idle workstations. Currently, almost all programming environments for parallel systems do not use process migration for task as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GEO-WASA-combining GIS technology with workflow management

    Publication Year: 1996, Page(s):129 - 139
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1148 KB)

    Geoprocessing environments require the cooperation of experts in different fields, using heterogeneous, distributed data, by means of specialized tools, among which GIS-geographic information systems-play a prominent role. However the coordination of such work is time-consuming and error-prone, since a considerable amount of data is processed in parallel, and tools are not integrated, requiring hu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining function points software estimation model with ADISSA methodology for systems analysis and design

    Publication Year: 1996, Page(s):3 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    The study proposes a combination of the function points model for software estimation with the ADISSA methodology for systems analysis and design. This combined approach, which is supported by a software tool, enables one to estimate various software metrics, such as size, effort, and duration, in the early stages of systems development, by basing them on the products of a thorough system analysis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A C++/Linda model for distributed objects

    Publication Year: 1996, Page(s):30 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    Distributed systems have many advantages over centralized systems. The authors focus on the novel Linda Tuple Space (TS) model designed for generative coordination in a distributed shared memory model. Currently, the object-oriented programming (OOP) model is considered a most suitable model for handling complex computer-based systems. Among the OOP languages, the C++ language is a de-facto standa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing concurrent programs: a formal evaluation of coverage criteria

    Publication Year: 1996, Page(s):119 - 126
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB)

    While the literature on testing sequential programs is rich, there has been very little work on testing concurrent programs. One major trend in testing sequential code is to define program-based, test data adequacy criteria. Different criteria are often evaluated using a set of properties which are intended to capture the intuition of what constitutes good testing. The work considers the adaptatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer science apprenticeship

    Publication Year: 1996, Page(s):77 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1040 KB)

    One of the old and effective ways of training is the apprenticeship way. The effectiveness of training people in the workplace comes from different reasons. One reason may be the engagement of the apprentice in real-world problems. Another reason may be the close presence of the supervisor who provides the apprentice with scaffolding along the training process. Typically, at the beginning of the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating groupware activities into workflow management systems

    Publication Year: 1996, Page(s):140 - 149
    Cited by:  Papers (7)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (924 KB)

    Computer supported cooperative work (CSCW) has been recognized as a crucial enabling technology for multi-user computer-based systems, particularly in cases where synchronous human-human interaction is required between geographically dispersed users. Workflow is an emerging technology that supports complex business processes in modern corporations by allowing to explicitly define the process, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic jazz accompaniment computation: an open advice-based approach

    Publication Year: 1996, Page(s):67 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    Music systems are based on always partial, sometimes default, knowledge. In order to meet this essential character we need open systems that can constantly adapt their music assumptions. Ideally, the system should provide the naive end-user with the ability to manipulate the music knowledge on a user-understandable level. The paper presents a computer tool, entitled JOINME, that composes a jazz ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardware timing verification using KRONOS

    Publication Year: 1996, Page(s):23 - 29
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    In this paper we describe the KRONOS system, a tool for verifying real-time properties based on the model of timed-automata. As an example, we show how KRONOS is applied to the verification of a MOS circuit under various delay assumptions View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ePASS-a software-based POWER simulator

    Publication Year: 1996, Page(s):46 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (780 KB)

    The latest RISC computer chips provide very high performance though complex pipelined implementations, using independent integer and floating point units, branch prediction mechanisms, multiple instruction dispatch per clock cycle and more. For a chosen hardware configuration to deliver optimized performance, various design aspects, resulting in many possible configurations, need to be thoroughly ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improvement and ISO9001 certification in BVR

    Publication Year: 1996, Page(s):9 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    The paper describes the improvement process that was implemented in BVR in order to be certified as an ISO9001 software and hardware development company, and the associated effort, methodology and benefits. The predefined methodology, of involving the whole organization in the process including management, proved that an improvement process can take place without affecting work plans and resulted ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systematic derivation of operational requirements using the ECSAM method

    Publication Year: 1996, Page(s):96 - 108
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (724 KB)

    ECSAM is a method for modeling and analysis of embedded computer systems and their software and the generation of their requirements. Previous ECSAM papers described its application to the conceptual modeling of systems' internals, providing white box models. The paper extends the use of ECSAM to the systematic derivation of systems' external specifications taking into consideration the behaviour ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A System for Document Reuse

    Publication Year: 1996, Page(s):83 - 94
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1452 KB)

    The paper is concerned with issues and methods for reusing document pieces in the process of constructing other document. Asserting that the practice of reuse deserves a central role in the process of document creation, the authors present a document reuse model (DRM) that captures the essential aspects of document reuse. In order to explore and demonstrate the basic functions necessary to impleme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tool and method reciprocity: a case study in requirements management

    Publication Year: 1996, Page(s):109 - 118
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (908 KB)

    The paper examines the reciprocal influence of method, process and tool as evidenced in a case study in which a requirements management method and process were defined, evolved and applied on projects. Although a tool is primarily a means of implementing a defined method, it is inevitable that the evolution of the method and process will be influenced by the chosen tool. In the case study two tool... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Creating transient hypertextual access structures for C programs

    Publication Year: 1996, Page(s):56 - 65
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (972 KB)

    The paper describes how hypertextual access structures can be formed to support the maintenance of C programs. The access structures are formed automatically based on the HyperSoft model and method developed earlier. The automatic creation is based on syntactical fragmentation of program text and on relationships between these fragments. The access structures are transient, meaning that instead of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling an industrial software process using a commercially available tool

    Publication Year: 1996, Page(s):14 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB)

    Although there has been much interest in process modelling and automation within the software industry, there have been few independent reports of experience gained an the application of this technology to industrial software processes. The paper describes the experience gained modelling an extract from a large industrial software process using a commercially available tool. The purpose of the pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.