By Topic

Computer Science, 1998. SCCC '98. XVIII International Conference of the Chilean Society of

Date 9-14 Nov. 1998

Filter Results

Displaying Results 1 - 25 of 27
  • Proceedings SCCC'98. 18th International Conference of the Chilean Society of Computer Science (Cat. No.98EX212)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (227 KB)
    Freely Available from IEEE
  • Index of authors

    Publication Year: 1998, Page(s): 207
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • Clipping: a technique for improving retrieval performance

    Publication Year: 1998, Page(s):140 - 148
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    The authors present a technique for improving retrieval performance which they call clipping. Clipping is based on the manipulation of the original query terms, without attempting query expansion. The idea is to use a small set of query terms, which they call a clipping set, to clip the original answer set, reducing the number of documents in it. They discuss the alternatives that such a clipping ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formalising the software evaluation process

    Publication Year: 1998, Page(s):15 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    Software process evaluation is an essential activity for improving software development in an organisation. Actually there is a need for a formalised method of evaluation that encompasses all the factors that affect software production. If a software process evaluation is to faithfully reflect the current status of an organisation, it must also consider the assessment of other factors. A formalise... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolutionary algorithms for constraint satisfaction problems

    Publication Year: 1998, Page(s):158 - 165
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB)

    The author is interested in defining a general evolutionary algorithm to solve constraint satisfaction problems, which takes into account both advantages of the systematic and traditional methods and of characteristics of the CSP. She presents evolutionary algorithms to solve constraint satisfaction problems (CSP) View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specifying active databases in the situation calculus

    Publication Year: 1998, Page(s):32 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    The paper provides a predicate logic based semantics for active rules in active databases. Previous work has been done to provide the semantics of execution of active rules. In part, this work has been directed towards providing a unifying criteria regarding the meaning of active rules, and to provide a framework for comparing different proposals for active database systems. The main contribution ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic verification of hybrid systems: an audio control protocol

    Publication Year: 1998, Page(s):184 - 191
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    The work is concerned with formal approaches to specification and verification for a better development in systems design. Automatic verification is a solution for validating highly critical systems, like controlling robots or supervising electronical devices. Important efforts have been realized in industry and education for supporting its development. Nevertheless, technical problems keep arisin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On a tree-like representation for symbolic-numeric data and its use in Galois lattice method

    Publication Year: 1998, Page(s):48 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    The authors propose a knowledge representation system that combines a greater expressive richness than that of the Boolean or attribute frameworks, and an analogous treatment complexity. This system can be used in symbolic-numerical clustering analysis and will be used to build a Galois (concept) lattice. Data and data classes are described by labelled, recursive trees called genterms. The set of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic logic model for the formal foundation of object-oriented analysis and design

    Publication Year: 1998, Page(s):130 - 139
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    The authors present an object-oriented conceptual model representing the information acquired during object-oriented analysis and design. It fulfills the three requirements for conceptual models: formality, usability and flexibility. The proposed conceptual model integrates both of the levels in the architecture of modeling notations (i.e. model and metamodel levels) into a single conceptual frame... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Meta data support for evolutionary software systems

    Publication Year: 1998, Page(s):84 - 90
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    The scope of the paper is the software engineering process of a special class of important software systems, namely large, heterogeneous, distributed information systems based on several underlying autonomous databases and applications. Increasingly, these systems are subject to integration and interoperability requirements using middleware (e.g. CORBA) and/or the Internet as integration platforms... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resurrecting Ada's Rendez-Vous in Java

    Publication Year: 1998, Page(s):106 - 112
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    Java is a programming language designed with concurrency in mind from its inception. However the synchronization mechanism provided is a restricted version of Hoare's Monitors, being too low level for most applications. The authors propose a high level synchronization mechanism for Java, based on Ada's Rendez-Vous, adapting the notation and semantics to Java. The result is a nice and readable nota... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use of agents techniques on intelligent tutoring systems

    Publication Year: 1998, Page(s):76 - 83
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    The paper presents some considerations about the impact of agents' and related technologies on educational software research and its application to designing and to implementing intelligent tutoring systems. It also presents an overview about systems for educational software that adopted the pedagogical agents to better explore the interaction and dynamic changes in teaching-learning environments.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query evaluation in almost consistent databases using residues

    Publication Year: 1998, Page(s):8 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    The authors consider the problem of logical characterization of the notion of correct answers in a relational database that may violate given integrity constraints. This notion is captured in terms of the possible repaired versions of the database. A computational counterpart of the semantic notion is provided in terms of the reconstruction of the database as a deductive database to which concepts... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel generation of inverted files for distributed text collections

    Publication Year: 1998, Page(s):149 - 157
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    The authors present a scalable algorithm for the parallel computation of inverted files for large text collections. The algorithm takes into account an environment of a high bandwidth network of workstations with a shared-nothing memory organization. The text collection is assumed to be evenly distributed among the disks of the various workstations. Compression is used to save space in main memory... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software architectural specification for optimal object distribution

    Publication Year: 1998, Page(s):25 - 31
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    Software architectural design is essential for complex distributed applications. Architectural specifications need to define the key aspects of the application, including its intended functions, interfaces, interoperability requirements, distributability; scalability, extensibility, target platforms and networks, and required middleware services. The authors present an architectural extension for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AMACA: a multi-agent collaborative architecture

    Publication Year: 1998, Page(s):166 - 170
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    Autonomous agents that incorporate pedagogical capabilities provide excellent opportunities for the design of new tools for learning and intelligent assistance. The paper describes a multi-agent architecture named AMACA. AMACA is a pedagogical agent capable of coordinating multiple activities and providing explanatory advice in response to changing problem-solving contexts in learning environments View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent management of computer networks: the GIR proposal

    Publication Year: 1998, Page(s):40 - 47
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB)

    The paper presents a system proposed for the intelligent management of computer networks. The system is based on the use of artificial intelligence techniques-data mining, expert systems and multi-agent systems. The work is based on the following lines of action: (a) the use of distributed agents for the intelligent search of information in the network, supplying it in a more abstract way, adapted... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tool support for helping the use of frameworks

    Publication Year: 1998, Page(s):192 - 201
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    Frameworks promote design and code reuse, at a higher level of granularity. The use of frameworks is a hard task though, because usually they lack documentation and instructions on how to use them, thus being, in general, very difficult to understand. The paper addresses some mechanisms to help in object oriented framework usage. It presents SEA-Preceptor, a hyperdocument based tool that sets up t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workflow modeling: exception and failure handling representation

    Publication Year: 1998, Page(s):58 - 67
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    The representation of the activities that compose the workflow processes, their execution sequence and relationships, the agents responsible for their execution, and the resources that are used during execution, is known as workflow modeling. Several techniques are being proposed to model workflow. One of them is to express the workflow model using the temporal object oriented data model TF-ORM (M... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improvement of the Guajardo-Paar method for multiplication on non-supersingular elliptic curves

    Publication Year: 1998, Page(s):91 - 95
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    Calculation of multiples of elliptic points plays a central role in elliptic curve public key cryptosystems. We present improved formulae for computing repeated doubling points on non supersingular elliptic curves over finite fields of characteristic two. These formulae, in combination with variants of the sliding window method, lead to efficient algorithms for computing a multiple of a point in s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive model for programming distributed real-time applications in CORBA

    Publication Year: 1998, Page(s):122 - 129
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    CORBA is a middleware with open standardization that is receiving plenty of acceptance for facilitating the distributed objects programming. CORBA is being extended through the specification of interfaces and necessary abstractions for supporting applications with real-time constraints. The use of CORBA in the contemporary real-time systems is adequate to meet the new requirements of flexibility a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing performance of cache server hierarchies

    Publication Year: 1998, Page(s):113 - 121
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    Although caching and the creation of cache server hierarchies has became a popular strategy for reducing user waiting time and network traffic, there is no recipe for determining the best hierarchy configuration given a set of machines and the workload that they have to serve. The paper presents a novel approach for analyzing the performance of cache proxy hierarchies that is based on two metrics:... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constraints in generalization structures in conceptual database schemes

    Publication Year: 1998, Page(s):202 - 206
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (24 KB)

    We introduce two types of constraints on generalization structures in conceptual database schemes: non exclusive cardinality and non exhaustive cardinality constraints. We present some of the problems to express these constraints in Batini's EER model (C. Batini et al., 1994), and we explain how the expansion of this model through the addition of new new constraints generating rules may enhance th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic programming as frame for efficient parsing

    Publication Year: 1998, Page(s):68 - 75
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    The last few years have seen a renewal of interest in the consideration of dynamic programming in compiler technology. This is due to the compactness of the representations, which are turning this paradigm into a common way of dealing with highly redundant computations occurring, for instance, in natural language processing, logic programming or abstract interpretation and related to phenomena suc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rationality postulates for relevance relations

    Publication Year: 1998, Page(s):96 - 105
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2124 KB)

    The paper presents a characterization of relevance as a primitive conceptual notion. Informal definitions for the notions of positive (ir)relevance and negative (ir)relevance are suggested and a set of schemas and rationality postulates for formalizing these notions are proposed. A possible-world approach is adopted to give the relevance-relations a semantics. The semantics is connected to the pos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.