Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

EUROMICRO Conference, 1999. Proceedings. 25th

Date 8-10 Sept. 1999

Go

Filter Results

Displaying Results 1 - 25 of 64
  • EUROMICRO '99 [front matter]

    Publication Year: 1999 , Page(s): i - xxviii
    Save to Project icon | Request Permissions | PDF file iconPDF (830 KB)  
    Freely Available from IEEE
  • Introduction to the workshop on music technology and audio processing

    Publication Year: 1999 , Page(s): 4 - 5
    Save to Project icon | Request Permissions | PDF file iconPDF (10 KB)  
    Freely Available from IEEE
  • Workshop software process and product improvement

    Publication Year: 1999 , Page(s): 158 - 161
    Save to Project icon | Request Permissions | PDF file iconPDF (164 KB)  
    Freely Available from IEEE
  • Network computing

    Publication Year: 1999 , Page(s): 426 - 429
    Save to Project icon | Request Permissions | PDF file iconPDF (13 KB)  
    Freely Available from IEEE
  • Index of authors

    Publication Year: 1999 , Page(s): 475 - 479
    Save to Project icon | Request Permissions | PDF file iconPDF (25 KB)  
    Freely Available from IEEE
  • PSEEs modelling for supporting and improving collaborative joint software development projects

    Publication Year: 1999 , Page(s): 194 - 201 vol.2
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (44 KB)  

    In the organizations that develop software, existing Process-centered Software Engineering Environments (PSEEs) provide a way to organize software production autonomously. However these environments are often unsuitable to support the development of huge projects that involve several other environments. This paper proposes a model of PSEE allowing to support collaborative joint software development projects View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Radical user interfaces for real-time control

    Publication Year: 1999 , Page(s): 6 - 12 vol.2
    Cited by:  Papers (3)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (52 KB)  

    This paper describes recent work which challenges the predominance of the WIMP (Windows-Icons-Menus-Pointers) computer interface for use in real-time situations. The results of the work have implications for the design of user-interfaces for real-time control tasks (of which musical performance and experimentation are clear examples). This paper describes the tests, the interfaces, and the results from a variety of test subjects over several weeks. It then draws conclusions about the appropriateness of commonly accepted interfaces for complex and creative tasks View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed algorithm for k-way graph partitioning

    Publication Year: 1999 , Page(s): 446 - 448 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (152 KB)  

    Graph partitioning is one of the most important problems in solving many large-scale scientific computations. It forms the basis of many wide ranging problems in VLSI CAD ranging from high-level applications like hardware-software partitioning on one hand, to physical design methods like min-cut, on the other. In this paper we describe a novel method of using distributed computing in the form of loosely coupled independent processors on a network to solve the k-way graph partitioning problem. We have implemented this system on a network of workstations using PVM (Parallel Virtual Machine). We have tested the method with benchmarks designs of the Partitioning '93 suite with encouraging results View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semi-structured data extraction and schema knowledge mining

    Publication Year: 1999 , Page(s): 310 - 317 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (60 KB)  

    It is well known that World Wide Web has become a huge information resource. Therefore, it is very important for us to utilize this kind of information effectively. This paper proposes a semi-structured data extraction method to get the useful information embedded in a group of relevant web pages, and store it with OEM (Object Exchange Model). Then, we adopt data mining method to discover schema knowledge implicit in the semi-structured data. This knowledge can make users understand the information structure on the web more deeply and thoroughly. At the same time, it can also provide a kind of effective schema for the querying of web information View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new music technology system to teach music

    Publication Year: 1999 , Page(s): 30 - 34 vol.2
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (52 KB)  

    A new music technology system is being created by the University of Portsmouth and Counterpoint MTC in order to assist music teachers in Education. This paper describes this system which consists of a network of up to 16 portable keyboards linked together via electronic interfaces to computers. Used alone, an electronic interface supplies power to a music keyboard and processes MIDI signals in real time to control the keyboard. When linked to other electronic interfaces, an audio network is created for grouping users together, each interface being controlled remotely from a control computer or a portable keyboard using a localised data network. A further system is introduced which incorporates an additional data network which can be linked to the Internet and will allow distance learning functions to be added View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dictionary-adaptive speech driven user interface for a distributed multimedia platform

    Publication Year: 1999 , Page(s): 326 - 332 vol.2
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (60 KB)  

    The goal of the PRINCESS project is the development of a distributed end-to-end multimedia platform prototype. The platform supports access to media servers in a computer network via various types of mobile terminals. New paradigms for user interfaces are applied in order to make the terminal devices more intelligent and to enable hands-free operation for a busy user. A speech recognition module capable of recognising Finnish words has been integrated into the user interface. The vocabulary of command words is continuously restricted and adapted to the part of the user interface under control. The experimental system has been demonstrated in a distributed digital image retrieval application. Several different more conventional user interfaces may be used in the application, but the user may also opt to use a speech driven interface. Experiments show that the use of a dynamic vocabulary greatly reduces the recognition errors as compared to a fill set of command words in our application View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Results of an elliptic-curve-approach for use in cryptosystems

    Publication Year: 1999 , Page(s): 415 - 422 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (372 KB)  

    This paper presents new research results concerning cryptosystems based upon elliptic curves. The system which has been developed is similar to that of T. ElGamal (1985) over a finite field Fq. The investigations cover those elliptic curves with primary characteristics over Fq (216⩽q⩽2257 , q is a prime number). The aim of the study is the determination of dependencies between calculation time required by the cryptosystem and size of the keys and length of messages. Additionally, possible areas vulnerable to attacks are identified View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An experiment to improve cost estimation and project tracking for software and systems integration projects

    Publication Year: 1999 , Page(s): 177 - 184 vol.2
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (72 KB)  

    It is becoming increasingly difficult to predict the resources, costs, and time scales for the integration of software and systems built from components supplied by third parties. Many cost models use the concept of product size as the prime driver for cost estimation but our experience has shown that the supplied quality of components and the required quality of the integrated systems are becoming the dominant factors affecting the costs and time scales of many projects today. ICL has undertaken an experiment using an alternative life cycle model, known as the Cellular Manufacturing Process Model (CMPM), which describes how a product is integrated from its constituent components. The experiment has helped to develop a method and sets of metrics to improve cost estimation and project tracking View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Motion curves in music: the statistical analysis of midi data

    Publication Year: 1999 , Page(s): 13 - 19 vol.2
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (116 KB)  

    This paper postulates that the analysis of multivariate MIDI data allows for the statistical analysis of motion in music. The paper deals with analysing the kinematic motion components within music, specifically music velocity (i.e. tempo) and music acceleration/deceleration (i.e. tempo change), based upon Truslit's definition of predominant up-down motion types (1938). Thus, the variables of music velocity and acceleration are mathematically defined and extracted from MIDI encodings. Analysis of music velocity indicates that the differing motion types have specific and consistent velocity profiles, and that these profiles can be expressed mathematically and analysed statistically. In particular the paper focuses on the open motion curve fit relating the open motion velocity curve to the beta distribution. Analysis of acceleration within music suggests that music acceleration is not constant in nature, implying that theories of linear velocity are inaccurate models. Hence, MIDI data analysis allows for the statistical exploration of musical kinematics View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Locust-a brokerage system for accessing idle resources for Web-Computing

    Publication Year: 1999 , Page(s): 466 - 473 vol.2
    Cited by:  Patents (16)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (84 KB)  

    In this paper we present a brokerage system for making idle cpu resources of anonymous users of the World Wide Web accessible for distributed Web-Computing. The Locust (LOw cost Computing Utilizing Skimmed idle Time) Broker collects and remarkets the aggregated resources by means of ubiquitous Web and Java technologies and creates an electronic spot market focused on the mainstream Internet user as suppliers of idle computing resources. We introduce the economic Price/Market model of Locust enabling the export or import of resource surpluses or lacks between so-called submarkets. Test cases for consumption of aggregated CPU resources include distributed Raytracing and RC5 decryption. We further describe the RC5 key block management and our efforts to reach performance comparable to native RC5 implementations View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardwired Paeth codec for portable network graphics (PNG)

    Publication Year: 1999 , Page(s): 318 - 325 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (88 KB)  

    This paper describes an execution unit capable of computing the Paeth predictor, as used in the portable network graphics (PNG) standard. PNG is a rather new, lossless compression method for real-world pictures. It features five prediction schemes, of which the modified Paeth predictor is the most computational intensive. This paper focuses on a hardware implementation of the Paeth predictor and a hardware Paeth codec capable of computing three different quantities: the Paeth predictor of three inputs, the difference of the current pixel and the Paeth predictor of the other inputs (coding), and the sum of the coded input and the Paeth predictor of the other three inputs (decoding). The proposed Paeth codec takes two cycles, where a cycle is comparable to an general purpose ALU cycle. Depending on the mode of operation, the proposed mechanism produces the predictor or the (de/en)-coded pixel value View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A parallel processing system for polyphonic singing synthesis

    Publication Year: 1999 , Page(s): 70 - 74 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (80 KB)  

    A synthesiser has been designed for polyphonic (multi-voice) singing synthesis. Singing synthesis requires frequent updating of parameters to achieve a natural output sound. These parameters include fundamental frequency, formant frequencies, formant bandwidths, and voice source parameters (such as Open Quotient). The synthesis engine is controlled using a script and a graphical user interface. The hardware consists of several SHARC ADSP-21060 processors, an FPGA and a multi-channel D/A convertor. This paper presents an overview of the synthesiser and the synthesis model employed. The results show a soundfile which has been created using a synthesis-by-analysis approach View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design patterns for component-oriented software development

    Publication Year: 1999 , Page(s): 220 - 228 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (72 KB)  

    In this paper we present four partially not yet documented design patterns for component-oriented programming. To this end, we first define component-orientation and show its essential properties. This definition leads us to a creational, two structural and a behavioral pattern. We first present the DYNAMIC FACTORY; a creational pattern which allows for the creation of late-bound components. Secondly, we describe the AGGREGATION and the EMBEDDING pattern. These two structural patterns are archetypal for component-oriented programming. Finally, the PROPAGATOR as an important pattern for message propagation is illustrated. Flexible message propagation, expressed in delegation and forwarding, is a key aspect of component-oriented programming View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing multiparty interactions on a network computer

    Publication Year: 1999 , Page(s): 458 - 465 vol.2
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (208 KB)  

    Classical client/server interaction primitives such as remote procedure call or rendez-vous are not adequate when we need to describe the behaviour of three or more processes that need to collaborate simultaneously in order to solve a problem. Multiparty interactions are the key to describe these problems, and there are several languages that use them for the description of reactive systems. In this paper, we show and compare two different fair implementations of this mechanism and also outline the research we are carrying out in an effort to improve them View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining motion estimation with feature extraction in MPEG video coders

    Publication Year: 1999 , Page(s): 384 - 391 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (148 KB)  

    General purpose motion estimation algorithms do not exploit the information available about the fixed characteristics of the video sequences in specific application domains. In this paper we propose to take advantage of such information to develop efficient video compression algorithms and we apply the proposed approach to the highway monitoring application domain. The proposed approach allows also extracting selected features at the video compression level and more specifically those features related to object movements View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for audio analysis based on classification and temporal segmentation

    Publication Year: 1999 , Page(s): 61 - 67 vol.2
    Cited by:  Papers (7)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (116 KB)  

    Existing audio tools handle the increasing amount of computer audio data inadequately. The typical tape-recorder paradigm for audio interfaces is inflexible and time consuming, especially for large data sets. On the other hand, completely automatic audio analysis and annotation is impossible using current techniques. Alternative solutions are semi-automatic user interfaces that let users interact with sound in flexible ways based on content. This approach offers significant advantages over manual browsing, annotation and retrieval. Furthermore, it can be implemented using existing techniques for audio content analysis in restricted domains. This paper describes a framework for experimenting evaluating and integrating such techniques. As a test for the architecture, some recently proposed techniques have been implemented and tested. In addition, a new method for temporal segmentation based on audio texture is described. This method is combined with audio analysis techniques and used for hierarchical browsing classification and annotation of audio files View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel computing using Java mobile agents

    Publication Year: 1999 , Page(s): 430 - 437 vol.2
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (420 KB)  

    We propose a mobile-agent parallel processing framework that uses multiple Java mobile agents, each one of which utilizes multithreading. A mobile agent can travel at any Web site to perform its tasks. We also introduce the concept of task handlers, which are Java objects capable of implementing a particular task of the target application. TaskHandlers are dynamically assigned to mobile agents. We have developed and tested a prototype application for parallel Web querying as a proof of concept of our proposed framework. Boosted by the inherited benefits of using Java and mobile agents, our proposed methodology brakes the barriers of heterogeneity and provides the means for the parallel deployment of the available on the World Wide Web computational resources View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural network based textural labeling of images in multimedia applications

    Publication Year: 1999 , Page(s): 392 - 396 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (200 KB)  

    In this paper the use of multilayer perceptron type neural networks in the characterization of images by texture content is investigated. The paper is focused on the effects of textural feature extraction methods on the network architecture, training performance and generalization capability when applied to indexing of images in multimedia image databases. An in depth experimental study is conducted comparing several well known textural feature extraction techniques along with a novel discrete wavelet transform based methodology. It is demonstrated that the proposed technique leads to the design and selection of multilayer perceptron architectures with the best texture classification accuracy View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PVM parameter tuning to improve communication in distributed applications

    Publication Year: 1999 , Page(s): 438 - 445 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (80 KB)  

    This paper presents experimental results of an investigation to efficiently exploit PVM communication on Network of Workstations (NoW) over ATM networks. Test results show that a better exploitation of ATM LAN bandwidth can be gained by tuning few parameters, both at PVM application program interface and PVM implementation level, such as PVM packet fragment size and TCP socket buffer size. Parameter tuning gave good communication performances compared with other PVM implementation that directly use the ATM Adaptation Layer instead of TCP/IP. It is foreseen that, on developing PVM distributed applications, better communication performances could be obtained through a careful network parameter setting View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error recovery using forced validity assisted by executable assertions for error detection: an experimental evaluation

    Publication Year: 1999 , Page(s): 105 - 112 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (84 KB)  

    This paper proposes and evaluates error detection and recovery mechanisms suitable for embedded systems. The purpose of these mechanisms is to provide detection of and recovery from data errors in internal variables. A classification scheme for variables enables us to construct a parameterised detection and recovery mechanism for each variable. Error detection is handled by executable assertions and recovery is attempted by forcing an erroneous variable into the valid domain of that variable. The effect on failure probability from some of the proposed mechanisms is evaluated in an error injection experiment targeting an embedded system. Errors were injected into the original system without mechanisms as well as into an instrumented system. Results show that the failure probability decreased most for errors in monitored variables and very little for errors in variables that were not directly monitored. For errors in the stack and CPU registers, no significant change was observed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.