Scheduled Maintenance on May 23rd, 2017:
IEEE Xplore will undergo an upgrade from 1:00 - 4:00 PM EDT. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Proceedings. Twenty-Third Annual International Computer Software and Applications Conference (Cat. No.99CB37032)

29-29 Oct. 1999

Filter Results

Displaying Results 1 - 25 of 93
  • Proceedings. Twenty-Third Annual International Computer Software and Applications Conference (Cat. No.99CB37032)

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (1526 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1999, Page(s):476 - 478
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Optimal software release policy based on cost and reliability with testing efficiency

    Publication Year: 1999, Page(s):468 - 473
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    We study the optimal software release problem considering cost, reliability and testing efficiency. We first propose a generalized logistic testing effort function that can be used to describe the actual consumption of resources during the software development process. We then address the problem of how to decide when to stop testing and when to release software for use. In addressing the optimal ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Here, there and everywhere: the future of software engineering education corporate view

    Publication Year: 1999, Page(s): 245
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach to verify rule-based systems using Petri nets

    Publication Year: 1999, Page(s):462 - 467
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    In the past several years, various graphical techniques were proposed to analyze various types of structural errors, including inconsistency (conflict rules), incompleteness (missing rules), redundancy (redundant rules), and circularity (circular depending rules), of rule based systems. We present a special reachability graph technique based on ω-nets (a special type of low-level Petri net) ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Validation of a patient headache care education system (PHCES) developed from a unified modeling language (UML) domain model

    Publication Year: 1999, Page(s):296 - 298
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    The research goal in the author's study of educational medical information systems tools is to improve the performance of patient decision making by integrating medical professional information with computer augmented information. In part, this goal may be reached by development with validated reusable PCES object design models and with the help of a valid PHCES derived from these models View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software engineering education from a UK academic's perspective

    Publication Year: 1999, Page(s):243 - 244
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    Within the UK, as for the rest of the world, there is an acknowledged shortage of highly skilled software engineers. In UK academia, there is a chronic shortage of able candidates to fill posts at all levels, from research students (through research fellows and lecturers) to professors. It is clear from salaries being offered in industry that it is a “seller's market”. However, since t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Talking with computers about the future we shall share

    Publication Year: 1999, Page(s):388 - 389
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    The time has never been more fitting than now to prepare for a future involving intelligent machines since recent advances have cleared the way for a massive effort that will finally give computers a basic understanding of our world. As computers begin to acquire “common sense” intelligence, they will be transformed from information appliances into helpers, coaches and secretaries. But... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting null pointer violations in Java programs

    Publication Year: 1999, Page(s):456 - 461
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    The use of formal methods has been growing steadily and there have been a number of successful applications of formal methods in a range of application areas. It seems agreed that quality should be assured by applying testing, analysis and formal methods to rigorously defined precode artifacts. The detection of null pointer violation errors is definitely such a goal. This way of applying formal me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design of agent-based tools for bio-informatics

    Publication Year: 1999, Page(s):294 - 295
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    We present the design and implementation of Web based tools for bio-informatics using an agent based workflow model. In our workflow model, a task or action node can be a software agent. Since software agents are more flexible, more intelligent, and can be customized, they increase the expressiveness and modeling power of a pure workflow model View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System scaling for large-scale Internet-based online services

    Publication Year: 1999, Page(s):180 - 185
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    The rapidly growing Web based online services offered by new and traditional vendors have attracted the interests of massive consumers. These vendors provide or extend their services and products to the clients via the Internet. As the service offers or related activities (e.g., merge) increase, they begin to scale up service infrastructure. For example, the vendors may integrate new information s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Here, there and everywhere: the future of software engineering education

    Publication Year: 1999, Page(s): 242
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing dynamic decision support: opportunities, issues and approaches

    Publication Year: 1999, Page(s):386 - 387
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    As the speed increases with which Internet-related computer technologies develop, so do the pressures placed on human decision makers to leverage the new technologies to make better decisions, faster. Use of the vast information resources available through the Internet is changing from incidental, undirected acquisition to focused, outcome-oriented usage. The paradigm shift creates a concomitant n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OBL: a formal deduction method for object-oriented systems

    Publication Year: 1999, Page(s):450 - 455
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    Object Behavior Logic (OBL) is proposed in order to specify object oriented system behavior. An inference engine is introduced for verifying the consistency of the systems based on the specification in OBL. OBL uses the paradigms of state machine to catch the dynamic aspect of object oriented systems in formal specification, plus the features of object oriented concepts such as inheritance, instan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for top-down cost estimation of software development

    Publication Year: 1999, Page(s):322 - 323
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    The Function Point Method, estimation by analogy, and algorithmic modeling are three of the most commonly applied methods used to estimate the costs and worker hours needed for a software development project. These methods, however, require a deep and wide expertise in particular areas and may still result in unacceptable discrepancies between the estimated costs and the actual costs. The paper pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new flash memory management for flash storage system

    Publication Year: 1999, Page(s):284 - 289
    Cited by:  Papers (10)  |  Patents (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    Proposes a new way of managing flash memory space for flash memory-specific file systems based on a log-structured file system. Flash memory has attractive features such as non-volatility and fast I/O speed, but it also suffers from an inability to update in place, and limited usage cycles. These drawbacks require many changes to conventional storage (file) management techniques. Our focus is on l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ORR: object-relational rapprochement

    Publication Year: 1999, Page(s):42 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    The current fashion in database technology is the eschewing of relational databases in favor of object-oriented databases. C.J. Date and Hugh Darwen (1995) have issued a challenge for the industry to turn away from today's relational database products and to begin to develop and use databases conforming to the formal relational model. To meet the storage requirements of modern data, they propose t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed object-oriented real-time simulation of ground transportation networks with the TMO structuring scheme

    Publication Year: 1999, Page(s):130 - 138
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB)

    The TMO (Time-triggered Message-Triggered Object) structuring scheme is aimed at facilitating real-time (RT) distributed software engineering in a form which software engineers in the vast business software field can adapt to with small efforts. It is a syntactically simple and natural but semantically powerful extension of the conventional object structuring approaches. In the course of developin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A design pattern for autonomous vehicle software control architectures

    Publication Year: 1999, Page(s):172 - 177
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    Design patterns represent a generalized approach to solving a related set of problems. Typically, a design pattern does not provide reusable code. Instead it provides a common vocabulary and a generalized approach in an application-independent manner. We have developed a design pattern for use in controlling autonomous vehicles. The control of individual components within an autonomous vehicle wil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The unique reference NCSLOC metric

    Publication Year: 1999, Page(s):316 - 317
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    We propose that by utilizing certain metrics and gathering operating system information it can be determined if a file is a version or duplicate of another file on the system. In a software development environment, knowing what files are versions of other files would be beneficial in many areas. It would help a manager estimate the amount of code that needs to be modified in a reengineering projec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of a graph model for channel assignment in a cellular network

    Publication Year: 1999, Page(s):239 - 240
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    This paper describes a graphical user interface propelled by a simulation engine for performance analysis of a channel assignment model for high-volume cellular networks. It also discusses some experimental results View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software architecture analysis-a case study

    Publication Year: 1999, Page(s):265 - 270
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    Presents a case study that evaluates two software quality attributes: performance and availability. We use three programs based on two architectural styles: pipe-filter and batch-sequential. The objective of this study is to identify the crucial factors that might have an influence on these quality attributes from the software architecture perspective. The benefit of this study is that early quali... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computers as partners: a technology forecast for decision-making in the 21st century

    Publication Year: 1999, Page(s):384 - 385
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    By the end of the next decade, computers will not be just information gatherers who return reams of keyword-related information. Instead computers will become mobile intelligent helpers who will truly understand entire problems and provide just the right information to solve them. What capabilities will be needed to realize such advanced systems? This paper projects technology advances and assesse... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building Java applets by using DJ-a Java-based constraint language

    Publication Year: 1999, Page(s):442 - 447
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    DJ (Declarative Java) is an extension of Java that supports constraint programming. On the one hand, DJ can serve as a high-level specification language for Java applets. To construct a graphic user interface (GUI) with DJ, the users only need to specify the components that compose the GUI and the relationships among the components by using constraints. On the other hand, DJ, as a constraint langu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile information agents for processing under information overload: a position statement

    Publication Year: 1999, Page(s):392 - 393
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    Information in electronic form is proliferating rapidly in a variety of forms. We now have powerful search engines that can return pointers to millions of documents on any subject. How can we tap into this fortune, while avoiding information overload? The productivity and success of an individual in a society inundated with electronic data will be largely determined by timely access to information... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.