By Topic

Chilean Computer Science Society, 2008. SCCC '08. International Conference of the

Date 10-14 Nov. 2008

Filter Results

Displaying Results 1 - 25 of 27
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (613 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • [Title page iv - Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2008, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (96 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2008, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2008, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2008, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • A Domain Specific Language for the Development of Collaborative Systems

    Publication Year: 2008, Page(s):3 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (437 KB) | HTML iconHTML

    Domain-specific languages (DSLs) are high level languages defined for combining expressivity and simplicity by means of constructs which are close to the problem domain and distant from the intricacies of underlying software implementation constraints. This paper presents a language to graphically document the analysis and design decisions embodied in collaborative system development. The language... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework of Composable Access Control Definition, Enforcement and Assurance

    Publication Year: 2008, Page(s):13 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (571 KB) | HTML iconHTML

    This paper proposes an approach for secure software design and coding; and, it provides a formal underpinning for security assurance, i.e., a proof that the generated code correctly realizes security specifications. The base of the proposed approach is a set of security features by J. Pavlich-Mariscal et al (2007) that separate security concerns from the main design. To create specific access cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Experimental Study of the FIB Framework Driven by the PDCA Cycle

    Publication Year: 2008, Page(s):23 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    In this paper, we present an experimental study of a framework for construction of graphical interfaces, conducted from the perspective of a tool of quality, the PDCA cycle. The steps related to the implementation of an experimental study, since its planning until the analysis of results are described. The paper aims to show how the PDCA can be used to provide continuous improvement in the conduct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavior Specification of Product Lines via Feature Models and UML Statecharts with Variabilities

    Publication Year: 2008, Page(s):32 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (503 KB) | HTML iconHTML

    The study of variability in software development has become increasingly important in recent years. The research areas in which this is involved range from software specialization to product lines. A common mechanism to represent the variability in a product line is by means of feature models. However, the relationship between these models and UML design models is not straightforward. The contribu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deconstructing Agile Processes: Would Planned Design Be Helpful in XP Projects?

    Publication Year: 2008, Page(s):42 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    Extreme programming (XP) suggests replacing planned up-front design with evolutionary design, which advises implementing the simplest solution that satisfies the current iteration's requirements. However, the literature records several instances where development teams have argued for the naturalness of, and need for, planned design. This paper describes two experimental studies that compared both... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GeoMergeP: Supporting an Ontological Approach to Geographic Information Integration

    Publication Year: 2008, Page(s):52 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    Since 90's, several new approaches providing solutions to integrated or federated systems have been defined. In particular, with respect to geographic information systems, proposals of integration did not take long time to appear. However, applicability of many of those approaches is still unlikely. In this context, we introduce an ontology-based approach - the GeoMergeP system - aiming at improvi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Weak Constraint Programming to Identify Alternative Composite COTS-Based Software Systems from Imperfect Information

    Publication Year: 2008, Page(s):62 - 69
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    Component-based software development must deal with the fact that in practical settings, components information may be incomplete, imprecise and uncertain. Architects wanting to evaluate candidate architectures regarding requirements satisfaction need to use whatever information be available about components, however imperfect. This article introduces constraint programming as a formal technique t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Scheduling Algorithm to Optimize Parallel Processes

    Publication Year: 2008, Page(s):73 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    In this paper we present a scheduling algorithm that assigns tasks of medium size grain. The behavior of the proposed algorithm, called extended latency time (ELT), is compared with the dominant sequence clustering (DSC) algorithm. One of the inputs values required by the ELT algorithm is the maximum number of processors available in the architecture. This value corresponds to the number of proces... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a Cluster-Based Peer to Peer Architecture for MANETs

    Publication Year: 2008, Page(s):79 - 84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    During the last years, peer to peer (P2P) networks are becoming more and more popular because of their inherent properties that allow users to exchange information and also to collaborate between them with a tremendous easiness.In parallel to this evolution, the use of MANETs has been increased due to the low effort needed to their deployment.Nowadays every user equipped with a mobile device like ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mapping Tasks to Processors in Heterogeneous Multiprocessor Architectures: The MATEHa Algorithm

    Publication Year: 2008, Page(s):85 - 91
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    An automatic task-to-processor mapping algorithm is analyzed in parallel systems that run over loosely coupled distributed architectures. This research is based on the TTIGHa model that allows predicting parallel application performance running over heterogeneous architectures. In particular, the heterogeneity of both processors and communications is taken into consideration. From the results obta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • One-Shot Time Management Analysis in EPOS

    Publication Year: 2008, Page(s):92 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    One of the tasks of an operating system is to handle time events. Traditionally, time management is based on periodic interrupts from one of the system's hardware timers (ticks). However, this approach has some limitations, as lack of precision, large overhead, and large power consumption. These limitations have motivated the use of non-periodic timers (e.g. one-shot timers), specially in specific... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PALTA: Peer-to-peer AdaptabLe Topology for Ambient intelligence

    Publication Year: 2008, Page(s):100 - 109
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (487 KB) | HTML iconHTML

    Many ambient intelligence (AmI) scenarios fit perfectly for auto-generated distributed networks, but they assume the existence of good enough network topology organizing the connected devices. AmI scenarios need to handle an unanticipated number of participants and inappropriate distributed network topologies can affect the network's efficiency by making it unstable and hard to manage. This paper ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sets Matching in Binary Images Using Mathematical Morphology

    Publication Year: 2008, Page(s):110 - 115
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (948 KB) | HTML iconHTML

    In this paper we present a novel approach to establish correspondences between connected components in a sequence of binary images. This matching method is formulated using mathematical morphology concepts which are also used in an interpolation technique where correspondences between sets must be established. The work presents some examples of interpolated images sequences where our matching meth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Translation from RSL to CSP

    Publication Year: 2008, Page(s):119 - 126
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    The Raise specification language (RSL) is a broad spectrum modeling language which supports a wide range of specification styles. In order to apply verification techniques based on model checking to descriptions of concurrent systems in RSL, we translate RSL specifications into the input language CSPM of the FDR model checker. FDR is a well-established model checker for the process algebra CSP. Ho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BMC Encoding for Concurrent Systems

    Publication Year: 2008, Page(s):127 - 134
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    Bounded model checking (BMC) is an efficient verification technique designed originally for synchronous systems. Recently, however, several studies have been conducted that attempt to apply BMC to concurrent systems. In this paper, we propose a BMC encoding for systems modeled as synchronized products of transition systems. Our encoding generates compact formulas compared to basic methods, and thu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardware Synthesis for Asynchronous Communications Mechanisms

    Publication Year: 2008, Page(s):135 - 143
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    Asynchronous data communication mechanisms (ACMs) have been extensively studied as data connectors between independently timed concurrent processes. In this work an automatic method for synthesis of re-reading ACMs is introduced. This method is is oriented to the generation of hardware artifacts. The behavior of re-reading ACMs is formally defined and the correctness properties are discussed. Then... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.