Proceedings. 24th EUROMICRO Conference (Cat. No.98EX204)

27-27 Aug. 1998

Go

Filter Results

Displaying Results 1 - 25 of 86
  • Proceedings. 24th EUROMICRO Conference (Cat. No.98EX204)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (679 KB)
    Freely Available from IEEE
  • Index of authors

    Publication Year: 1998, Page(s):xxxv - xxxviii
    Request permission for commercial reuse | PDF file iconPDF (249 KB)
    Freely Available from IEEE
  • Some research projects on clusters of personal computers

    Publication Year: 1998, Page(s):XLVII - XLLIV vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (852 KB)

    Clusters of personal computers are becoming a viable, low-cost, alternative to traditional high-performance computing platforms as well as to more expensive networks of workstations. This is due in part to the better performance/cost ratio that characterizes personal computer hardware and in part to the outcome of various research projects aimed at producing high-speed communication systems out of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The improvement of a software design methodology by encapsulating knowledge from code

    Publication Year: 1998, Page(s):913 - 918 vol.2
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    While numerous software engineering methodologies exist, are well documented, and are widely used, e.g. JSD, SSADM, etc., it can be argued that none cater for the specific problems associated with reengineering legacy, or dusty-deck systems. This paper reports on a development environment, KATT, that enshrines a methodology which enables the development of new codes or the reengineering of existin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design, testing, and evaluation techniques for software reliability engineering

    Publication Year: 1998, Page(s):XXXIX - XXLVI vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB)

    Software reliability is closely influenced by the creation, manifestation and impact of software faults. Consequently, software reliability can be improved by treating software faults properly, using techniques of fault tolerance, fault removal, and fault prediction. Fault tolerance techniques achieve the design for reliability, fault removal techniques achieve the testing for reliability, and fau... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Product-based software process improvement for embedded systems

    Publication Year: 1998, Page(s):905 - 912 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    The paper addresses conceptual models for relating together embedded systems' product and process characteristics. The purpose of the models is to describe in detail the characteristics of embedded systems for enhancing ISO 15504 (SPICE project) conformant assessment methods to cover embedded systems' software process assessment. The analysis of embedded systems is based on the domain expertise of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalability of multicast based synchronization methods

    Publication Year: 1998, Page(s):969 - 975 vol.2
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    Consistent maintenance of distributed data is important in application areas like groupware and for runtime support for parallel computing. We examine the performance of different multicast based methods for maintaining the consistency of distributed data depending on the network topology and concurrency. Our prototype software implements ordered, reliable multicasts on top of the unreliable IP br... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The sum-absolute-difference motion estimation accelerator

    Publication Year: 1998, Page(s):559 - 566 vol.2
    Cited by:  Papers (35)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    We investigate the Sum Absolute Difference (SAD) operation, an operation frequently used by a number of algorithms for digital motion estimation. For such operation, we propose a single vector instruction that can be performed (in hardware) on an entire block of data in parallel. We investigate possible implementations for such an instruction. Assuming a machine cycle comparable to the cycle of a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey of European reuse experiences: initial results

    Publication Year: 1998, Page(s):875 - 881 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB)

    The paper presents the initial results of the Surprise project. Surprise is an Essi Dissemination action, aimed at identifying and disseminating key factors in adopting or running a company-wide software reuse program. Key factors are derived from empirical evidence of best reuse practices, as emerged from an extensive survey of recent European software reuse projects: around 18 reuse projects per... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling client/server interactions by means of dynamic systems

    Publication Year: 1998, Page(s):499 - 505 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    The dynamic evolution of ecological systems in which predators and prey compete for survival has been investigated by applying suitable mathematical models. This kind of mathematical framework has been shown to be suited to describe evolution of economical systems as well, where instead of predators and prey there are consumers and resources. We believe that this kind of system, called dynamic sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PROMIS: a reliable real-time network management tool for wide area networks

    Publication Year: 1998, Page(s):581 - 588 vol.2
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    The paper presents the PROMIS tool, a new network management tool based on a distributed architecture of traffic probes. PROMIS allows authorized users to monitor traffic from any WAN segment using a WWW console or a Tcl/Tk graphic interface. In contrast to current network monitoring platforms based in SNMP (Simple Network Management Protocol) or RMON (Remote network MONitor), PROMIS is based on a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A product-process dependency definition method

    Publication Year: 1998, Page(s):898 - 904 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    The success of most software companies depends largely on software product quality. High product quality is usually a result of advanced software development processes. Hence, improvement actions should be selected based on sound knowledge about the dependencies between software product quality attributes and software development processes. The article describes a method for developing product/pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Regional weather prediction on small network of workstations

    Publication Year: 1998, Page(s):1053 - 1060 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    In this paper we present a methodology followed to parallelize a weather forecasting code running operationally on a small Network of Workstations with real data sets. The 1D Eta/NMC model code was originally written in Fortran 77 and optimized for vector supercomputers. We describe the steps followed to parallelize the Eta/NMC-dust code. The examination of program workload gave important insights... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving the satisfiability problem by a parallel cellular genetic algorithm

    Publication Year: 1998, Page(s):715 - 722 vol.2
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (828 KB)

    The paper presents an evolutionary method for solving the satisfiability problem. It is based on a parallel cellular genetic algorithm which performs global search on a random initial population of individuals and local selective generation of new strings according to new defined genetic operators. The algorithm adopts a diffusion model of information among chromosomes by realizing a two dimension... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bulk synchronous parallel without barriers

    Publication Year: 1998, Page(s):961 - 968 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    BSP oriented runtime systems try to get closer actual machines to the BSP ideal machine by packing individual messages generated during a superstep and optimizing communication time by rearranging the order in which messages are sent at the end of the superstep. These design considerations strongly contribute to the remarkable accuracy of BSP runtime systems. Unfortunately, barrier synchronization... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image compression using the wavelet transform on textural regions of interest

    Publication Year: 1998, Page(s):633 - 639 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1148 KB)

    This paper suggests a new image compression scheme, using the discrete wavelet transformation (DWT), which is based on attempting to preserve the texturally important image characteristics. The main point of the proposed methodology lies on that, the image is divided into regions of textural significance employing textural descriptors as criteria and fuzzy clustering methodologies. These textural ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DRoPS: kernel support for runtime adaptable protocols

    Publication Year: 1998, Page(s):1029 - 1036 vol.2
    Cited by:  Papers (15)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB)

    Configurable protocols are tailored to operate efficiently within specific environments. Parameters such as application requirements, host capabilities and connection characteristics determine the appropriate internal mechanisms used by the protocol. Whilst such systems provide solutions tailored to specific environments, they are static and unable to adapt as this environment changes. Adaptable p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards continuous process development: designing SQA function for large organisation needs

    Publication Year: 1998, Page(s):763 - 768 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    Established Software Quality Assurance function is expected to be an information channel in an organisation. Senior management gets information on how well-defined processes are followed, designers get feedback on the quality of their work and process developers get information on the need to improve the existing processes. Just setting up an SQA organisation is not enough in managing these tasks.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient memory management in VOD disk array servers using Per-Storage-Device buffering

    Publication Year: 1998, Page(s):551 - 558 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    We present a buffering technique that reduces video-on-demand server memory requirements in more than one order of magnitude. This technique, Per-Storage-Device Buffering (PSDB), is based on the allocation of a fixed number of buffers per storage device, as opposed to existing solutions based on per-stream buffering allocation. The combination of this technique with disk array servers is studied i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software development process improvements by metrics-a taming of chaos

    Publication Year: 1998, Page(s):871 - 874 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    Trying to improve a process by looking at some of the smallest parts of the system is asking for trouble, if you do not know what you are doing. The process that you normally are trying to improve is also a process with a lot of uncertain parameters. The process is a dynamic system. A software process is almost always a process of chaos. We describe why and how to handle this situation, and which ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and querying video databases

    Publication Year: 1998, Page(s):492 - 498 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    Indexing video data is essential for providing content based access. This paper develops a data model and a rule-based query language for video content based indexing and retrieval. The data model is based on the notion of generalized strata, which can be seen as a set of intervals. Each interval can be analyzed to extract symbolic descriptions of interest that can be put into a database. This dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Retransmission scheme for MPEG streams in mission critical multimedia applications

    Publication Year: 1998, Page(s):574 - 580 vol.2
    Cited by:  Papers (2)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB)

    Since multimedia data are characterized by continuity and massive volume, compression techniques such as MPEG are used for efficient transmission. However, transmission error occurring at a frame tends to be propagated to other frames because MPEG frames cross-reference one another upon presentation. Due to time constraints, it is usual to discard without retransmission the data which have transmi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reuse-based software process based on domain analysis and OO framework

    Publication Year: 1998, Page(s):890 - 897 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB)

    We address two of the most critical steps of domain engineering: namely, the definition and analysis of a domain also known as domain analysis (DA) and the development of object oriented frameworks (OOF). It aims to demonstrate, based on experimentation, the adequacy of the combined use of DA and OOF techniques to capture domain knowledge in the design activities and facilitate the production of d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel internal units for a neural network based adaptive fuzzy inference systems

    Publication Year: 1998, Page(s):647 - 654 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    Novel internal computing units are discussed for carrying out the `OR' operation in fuzzy logic based controllers. A simplified form of the Tageki-Sugeno controller, implemented by a form of (generalised) radial basis function neural network, is used throughout. As well as extending the scope of possible rule bases, a development of the new type of node is shown to provide an alternative to conven... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallelization of volume visualization on computer networks

    Publication Year: 1998, Page(s):1045 - 1052 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    Many algorithms in the field of scientific visualization require high computational capacity. In general, low-end machines are not capable of delivering sufficient performance to achieve interactivity. Even worse, to generate high quality images of large data sets, the necessary time is in the order of minutes. Besides algorithmic optimizations, parallelization is necessary to quicken the computat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.