By Topic

[1992] Proceedings. The Sixteenth Annual International Computer Software and Applications Conference

21-25 Sept. 1992

Filter Results

Displaying Results 1 - 25 of 63
  • Proceedings. The Sixteenth Annual International Computer Software and Applications Conference

    Publication Year: 1992
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • The management of uncertainty in software development

    Publication Year: 1992, Page(s):381 - 386
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    There are at least two different kinds of uncertainty in software development. Both are centered around software specification. The first type has to do with the uncertainty as to whether or not a given description is truly a specification of the software to be developed. The second type of uncertainty has to do with the lifetime of a valid specification. Most programs have parts that are a mixtur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enforcement of integrity constraints against transactions with transition axioms

    Publication Year: 1992, Page(s):162 - 167
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    The authors address an enforcement technique of integrity constraints against transaction updates in a relational database system. Transition axioms have been used effectively in checking integrity constraints for single update statements. The authors extend the idea of transition axioms to a transaction which is a sequence of read and update statements. Integrity constraints in this scheme are si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Highly available atomic objects

    Publication Year: 1992, Page(s):168 - 175
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (780 KB)

    The author describes an approach to implement highly available atomic objects in a distributed system. The approach uses the semantics of an object's type to increase availability and concurrency. The increase comes at the expense of writing a layer of type-specific code for concurrency control. The type-specific code can be written without making any assumption of any underlying replication or th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental evaluation of certification trails using abstract data type validation

    Publication Year: 1992, Page(s):300 - 305
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    The authors report on an attempt to assess the performance of algorithms utilizing certification trails on abstract data types. Specifically, they have applied this method to the following problems: heapsort, Huffman tree, shortest path, and skyline. Previous results used certification trails specific to a particular problem and implementation. The approach allows certification trails to be locali... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of a neural network to human tasting

    Publication Year: 1992, Page(s):277 - 282
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    The authors describe the application of an artificial neural network (ANN) to represent the sense of taste. A taste sensor has been developed recently. Though the taste sensor responds to various taste substances, it was very difficult to map the responses to a concentration of each substance. The attempt to recognize the sensor response and map them to the concentration of the substances is descr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software diversity metrics and measurements

    Publication Year: 1992, Page(s):69 - 78
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    The authors define and formalize the concept of software diversity which characterizes N-Version software (NVS) from four different points of view that are designated as structural diversity, fault diversity, tough-spot diversity, and failure diversity. The goals are to find a way to quantify software diversity and to investigate the measurements which can be applied during the life cycle of NVS t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ORL: an object retrieval language interface to an object algebra

    Publication Year: 1992, Page(s):176 - 181
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    The authors present the design of ORL, an object retrieval language interface to the EQUAL object algebra. ORL has an extended SQL syntax and is implemented on top of the ONTOS object-oriented database system. The complete system provides an interactive query facility as an alternative to the programatic OSQL interface provided by ONTOS. In general, ORL provides a more concise, user-friendly appro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structured analysis using hierarchical predicate transition nets

    Publication Year: 1992, Page(s):212 - 217
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    In previous work, a methodology for constructing hierarchical and structured high-level Petri net specifications has been developed. The authors further explore and refine the methodology for using hierarchical high-level Petri nets in systems analysis. The approach has adapted the results from the data flow diagram method and its application to modern systems analysis. The major steps and the ass... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stack simulation for set-associative V/R-type caches

    Publication Year: 1992, Page(s):332 - 339
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    Efficient stack simulation has been successfully applied in physically indexed caches with physical or real tags to generate the number of misses and write backs for various cache configurations in a single run. The authors devise a stack simulation algorithm for virtually indexed caches with real tags. Using markers with a valid range for synonym lines, the algorithm is able to keep track of stac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A neural network for fast inferencing on a fuzzy knowledge base

    Publication Year: 1992, Page(s):369 - 374
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    The authors discuss a framework where fast inferences could be made from a fuzzy knowledge base of examples using neural networks. They sketch a scheme for defuzzifying the example base into a set of similarity vectors using a trait-adjusted similarity measure between a pair of fuzzy terms, and then training a neural network with these similarity vectors. A multilayer feedforward neural network wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Support tool and strategy for type error correction with polymorphic types

    Publication Year: 1992, Page(s):287 - 293
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    The authors focus on strongly typed functional programming languages with polymorphic types, type inference facilities, and higher-order functions, i.e. functional programming languages whose type checkers infer types in programs including polymorphic types and higher-order functions types from the context before execution programs. They examine effective approaches to support type error correctio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The area-wide real-time traffic control system (ARTC): a distributed computing system

    Publication Year: 1992, Page(s):263 - 268
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    The authors present an efficient software application of a distributed system for area-wide traffic control. This system, called area-wide real-time traffic control (ARTC), can provide orderly movement of traffic, shorten average vehicle delay, prevent congestion, and improve road utilization. The signal controllers in ARTC, which are microcomputers, are interconnected through a computer network. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What does a public data Internet do?

    Publication Year: 1992, Page(s):283 - 284
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    Public data Internets (PDIs) provide the capability for their customers to exchange information with other firms, government agencies, and research institutions throughout the world via the Internet. The author provides an overview of the PDI industry and current status. Although the percentage of PDI traffic over the Internet is small, PDI use will grow as more and more corporations and instituti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A partitioning approach for object-oriented software development for parallel processing systems

    Publication Year: 1992, Page(s):251 - 256
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    A partitioning approach for object-oriented software development in parallel processing systems is presented. The objective of the partitioning approach is to improve the overall performance of a software system by minimizing communication cost among objects. The software system is modeled by a graph, and a bottom-up clustering technique is presented to partition the objects into a set of clusters... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The identification and use of properties and relationships between properties of the software development

    Publication Year: 1992, Page(s):10 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    The identification of the properties that users require computer applications to hold is essential for the development of software systems. The author analyzes how properties are related amongst each other and proposes one method to identify collections of properties and relationships between properties. He advocates that prior to the development of computer-based systems, it is necessary to ident... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reuse engineering: software construction from reusable components

    Publication Year: 1992, Page(s):79 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    The authors describe a comprehensive approach that supports reuse in the software development process, especially the production of software from reusable components. For this purpose well-known strategies like reverse engineering and design recovery are combined with a generalization mechanism to develop the reuse engineering process. This process includes both the phase of isolating reusable mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault-tolerant concurrent branch and bound algorithms derived from program verification

    Publication Year: 1992, Page(s):182 - 187
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    One approach for providing fault tolerance is through examining the behavior and properties of the application and deriving executable assertions that detect faults. This paper focuses on transforming the assertions of a verification proof of a program to executable assertions. These executable assertions may be embedded in the program to create a fault-tolerant program. It is also shown how the n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Industrial strength software engineering training programs

    Publication Year: 1992, Page(s):155 - 161
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    Includes presentations on industry training programs for software engineers and project managers that range from new hires through continuing education programs. Software engineering education in an academic setting is addressed as a precursor to a discussion of three approaches in industry to software engineering training. The introduction of a cross-functional technical training team and a proje... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A metalanguage based on a theory of specification

    Publication Year: 1992, Page(s):218 - 223
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    A specification metalanguage is presented for the purpose of describing and analyzing specifications written in existing specification languages. Specification theory-based metalanguage (STM) was developed to describe specifications in terms of components defined within a theory of specification. STM constitutes the application of theoretical definitions and analyses to individual specifications. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software re-engineering process model

    Publication Year: 1992, Page(s):25 - 30
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    A descriptive process model of software re-engineering is presented. The overall structure of the process model is defined by the re-engineering approach. Three re-engineering approaches are described: lump sum, incremental, and evolutionary. The focus is on the breadth of possible tasks View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A view of the GDMO interface definition language

    Publication Year: 1992, Page(s):88 - 89
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB)

    Large distributed systems require increased facilities for distributed management. Common interfaces for accessing remote resources are critical for such facilities. GDMO is a management interface definition language that is an international standard for defining management interfaces. GDMO is object oriented. Interfaces are defined as classes, which may be inherited by other class definitions. Mu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software fault-tolerance in functional programming

    Publication Year: 1992, Page(s):194 - 199
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    Handing exceptions in functional languages has always been a problem, due to the inherent conflict between the control-flow-oriented approach of exception handlers and the functional style evaluation. The author proposes an approach that discards the conventional view of treating exceptions as a means of effecting control transfer. Instead, exceptions are used to change the state of an object: A t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agents to guide operators with recognition of time series

    Publication Year: 1992, Page(s):312 - 319
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    A practical distributed artificial intelligence (AI) system is proposed for the guidance of plant operations in a steel galvanizing plant. The system includes three autonomous agents for guidance. Each agent records data sampled every moment in an appropriate form for a task assigned to it. The data correspond to states of a monitored entity. Each agent recognizes not only a current state but also... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FM2: a simulator for fine-grained message-passing multicomputers in k-ary n-cube networks

    Publication Year: 1992, Page(s):340 - 345
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    A simulation tool, called FM2, for analyzing low-dimensional k-ary n-cube networks and their processor/router architecture is presented. The simulator helps to evaluate the network performance in fine-grained, scalable multicomputers by using a predefined simulation language. The language can be used to specify network parameters such as system configuration, flow cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.