By Topic

Computer Software and Applications Conference, 1999. COMPSAC '99. Proceedings. The Twenty-Third Annual International

Date 29-29 Oct. 1999

Filter Results

Displaying Results 1 - 25 of 93
  • Proceedings. Twenty-Third Annual International Computer Software and Applications Conference (Cat. No.99CB37032)

    Publication Year: 1999
    Save to Project icon | Request Permissions | PDF file iconPDF (1526 KB)  
    Freely Available from IEEE
  • Author index

    Publication Year: 1999 , Page(s): 476 - 478
    Save to Project icon | Request Permissions | PDF file iconPDF (128 KB)  
    Freely Available from IEEE
  • Performance analysis of a graph model for channel assignment in a cellular network

    Publication Year: 1999 , Page(s): 239 - 240
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (300 KB)  

    This paper describes a graphical user interface propelled by a simulation engine for performance analysis of a channel assignment model for high-volume cellular networks. It also discusses some experimental results View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software reuse through a novel representation that supports factorization

    Publication Year: 1999 , Page(s): 344 - 349
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (436 KB)  

    Software reuse has received more attention in recent years. However, very often, we still need to re-design and re-develop parts of software, ranging from small to very large size (we shall call them software factors) that have been developed before, for the development of new software systems. These software factors do not fall into any existing implementation constructs. The problem that prevents the reuse of these software factors is the lack of a representation that can represent them separately and compose them together to form a software system. The paper proposes a novel software representation, called the software event net (the SE net), to address the problem. The SE net is based on the high level Petri net with some modification and extension for the specification of events produced in software systems. It applies implicit invocation software architecture in representing a software factor View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchically organized neural net agents for distributed Web information retrieval

    Publication Year: 1999 , Page(s): 192 - 197
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (520 KB)  

    Agent based information retrieval systems have gained great attention, due to the proliferation of readily available but overwhelming information on the Web. We present a neural network based multi agent, especially hierarchically organized information retrieval system. The motivation is based on our experience with an experimental system called Hierarchically Organized Multi-agent Information Retrieval System (HOMIRS) and an analysis of the tradeoff between multi-agent coordination overhead and the benefits of the hierarchical organization of agents. We first introduce our neural network based information retrieval system and then present experimental results with HOMIRS View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reusing CAD tools in object oriented based framework

    Publication Year: 1999 , Page(s): 357 - 362
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (484 KB)  

    The growing importance of VLSI is gaining it much attention, but the increasing complexity of VLSI also creates lots of problems for computer scientists to work on. If no other new way to help designers is developed, then the whole design process will become more difficult to maintain. That's why there is a need for an object-oriented (OO) design framework for the CAD world. Not only is it necessary to develop new methods for CAD, but the extension of reuse technology into the design process will also become a main key to success. We propose an OO-based framework with an object specification language (OSL) for reuse. In our OO design framework, CAD tools are reverse-engineered into a toolbox in a reuse library. During the design (reuse) process, toolboxes are selected automatically for the design process. Thus, tool selection, integration and adoption problems are merged into the design process, together with the OSL specification. With this OO design framework, tool reuse and design data reuse can be automatically integrated into the design process View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • I3: a Petri-net based specification method for architectural components

    Publication Year: 1999 , Page(s): 396 - 402
    Cited by:  Papers (3)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (536 KB)  

    As a research based on technology integration, I3 (pronounced “I cube”) is an executable architectural component description language based on colored Petri-net semantics with the style and understandability of SADT. I3 describes architectural components hierarchically in three levels. First, interface net declares services to be provided to other components. Next, interconnection net specifies the services to be acquired from other components. Finally, interoperation net describes the operational behavior of a component. Through its unique interconnection mechanism, I 3 facilitates the software architect in building an architectural model and formalizing the architectural topology and behavior of each software component as well as the entire system. Implementation of I3 can be made CORBA-compliant View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Talking with computers about the future we shall share

    Publication Year: 1999 , Page(s): 388 - 389
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (160 KB)  

    The time has never been more fitting than now to prepare for a future involving intelligent machines since recent advances have cleared the way for a massive effort that will finally give computers a basic understanding of our world. As computers begin to acquire “common sense” intelligence, they will be transformed from information appliances into helpers, coaches and secretaries. But the most important role for computers and people over the next 5 to 10 years will be that of strident. Computers and people will be partners in a dialogue to understand our world and guide it to a peaceful and prosperous future View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A design pattern for autonomous vehicle software control architectures

    Publication Year: 1999 , Page(s): 172 - 177
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (504 KB)  

    Design patterns represent a generalized approach to solving a related set of problems. Typically, a design pattern does not provide reusable code. Instead it provides a common vocabulary and a generalized approach in an application-independent manner. We have developed a design pattern for use in controlling autonomous vehicles. The control of individual components within an autonomous vehicle will obviously differ from one vehicle to another. However all of the components and subsystems must work together as a whole. This overall control is carried out by a software control architecture, and includes concepts from artificial intelligence, computer vision, vehicle navigation, and graph theory. The strategic-tactical-execution software control architecture (STESCA) was developed to serve as a design pattern for autonomous vehicle control systems. The STESCA approach is currently being used to control both an autonomous underwater vehicle and a land-based wheeled autonomous vehicle in simulation View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generic approach of static analysis for detecting runtime errors in Java programs

    Publication Year: 1999 , Page(s): 67 - 72
    Cited by:  Papers (1)  |  Patents (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (456 KB)  

    This paper presents a generic approach to statically analyze Java programs in order to detect potential errors (bugs). We discuss a framework that supports our approach and carries out the static analysis of Java code automatically. Our approach can detect potential bugs and report them before the program is executed. For a Java class, invariants related to the category of error under examination are automatically generated and used to assess the validity of variable usage in the implementation of this class. Our approach is distinctive in its emphasis to provide a practical generic mechanism for error detection that is capable of addressing error detection for a variety of error categories via a web of specialized components. A research prototype has been developed that demonstrates the feasibility and effectiveness of our approach View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CORBA components testing with perception-based state behavior

    Publication Year: 1999 , Page(s): 116 - 121
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (500 KB)  

    In this paper, we present a dynamic state testing approach for a reusable CORBA component by constructing perception-based state machines and a state-based replay system in the CORBA environment. The state machines are constructed based on the perceptions of the remote component used in our application. Based on the state machine, we also design a program replay system to make the testing deterministic since CORBA components have nondeterministic execution behavior which makes testing inefficient ineffective and not reproducible. With our testing approach, testers can detect state behavioral errors of an uncertain reusable component dynamically and deterministically in the CORBA environment View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can generic software be assured?

    Publication Year: 1999 , Page(s): 94 - 95
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (140 KB)  

    There are many definitions as to what COTS software is. The author uses a very simple definition: COTS software is software functionality obtained from a third party and that is used on an “as is” basis. Examples here include operating system utilities, class libraries, databases, word processing applications, and browser plug-ins. Software assurance problems become magnified for systems that are heavily comprised from COTS software because most of the prevalent quality improvement techniques cannot be applied by the user of the acquired software. These techniques are of course available to the software publisher, but whether the publisher opts to use them cannot be independently verified by the user. That is alarming and could be highly problematic for organizations that opt to buy versus build software systems. In summary, the lack of software quality and publisher responsibility are the greatest concerns that the author sees facing the software industry. The upside, however, is that certification and IV&V can bring assurance back to generic software View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost framework for COTS evaluation

    Publication Year: 1999 , Page(s): 100 - 101
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (124 KB)  

    We focus on factors that the user should consider when deciding whether to use COTS software. We take the approach of using the common denominator, cost. This is done for two reasons: first, cost is obviously of interest in making such decisions, and second a single metric (cost in dollars), can be used for evaluating the pros and cons of using COTS. The reason is that various software system attributes, like acquisition cost and availability (i.e., the percentage of scheduled operating time that the system is available for use), are commensurate quantities. That is, quantitatively “a low acquisition availability”. These units are not multiplicative. However, if it were possible to translate availability into either a cost gain or loss for COTS software, we could operate on these metrics mathematically. Naturally, in addition to cost, the user application is key in making the decision. Thus one could develop a matrix where one dimension is application and the other dimension is the various cost elements. We show how cost elements can be identified and how cost comparisons can be made over the life of the software. Obviously, identifying the costs would not be easy. The user would have to do a lot of work to set up the decision matrix but once it was constructed, it would be a significant tool in the evaluation of COTS. Furthermore, even if all the required data cannot be collected, having a framework that defines software system attributes would serve as a user guide for factors to consider when making the decision about whether to use COTS software or in-house developed software View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach to verify rule-based systems using Petri nets

    Publication Year: 1999 , Page(s): 462 - 467
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (364 KB)  

    In the past several years, various graphical techniques were proposed to analyze various types of structural errors, including inconsistency (conflict rules), incompleteness (missing rules), redundancy (redundant rules), and circularity (circular depending rules), of rule based systems. We present a special reachability graph technique based on ω-nets (a special type of low-level Petri net) to detect all of the above types of structural errors. Our new technique is simple, efficient, and can be easily automated. We highlight the unique features of this new approach and demonstrate its application through an example View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Patterns in postmortems

    Publication Year: 1999 , Page(s): 314 - 315
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (148 KB)  

    In the face of rapidly changing technology and increasing customer demands for newer, faster, better products, companies are looking for ways to improve development processes. Reuse has been proposed as a way to take advantage of current best practices and make them known throughout a company. The paper describes the use of postmortems and patterns, a powerful combination for capturing and sharing corporate knowledge. Two patterns derived from this approach are presented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward more reliable telecom systems

    Publication Year: 1999 , Page(s): 151 - 156
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (476 KB)  

    A word currently in vogue in software engineering is quality. Quality involves many factors, and it would be time-consuming to address all of them in one paper. Instead, only one is addressed: reliability. Specifically, this paper presents the use of redundant software as a means of improving the software reliability of telecom systems at the operational phase. Redundant software acts as a supervisor by monitoring both inputs and outputs of a target system and checking them against the target system's specification. A case study involving a PBX (private branch exchange) illustrates the use of Statecharts as a formalism to specify the software supervisor. Benefits in terms of quality improvement and cost reduction are discussed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An object-oriented architecture supporting Web application testing

    Publication Year: 1999 , Page(s): 122 - 127
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (544 KB)  

    The flexibility and rich application frameworks of the Web model make Web applications more prevalent in both Internet and intranet environments. Programmers enjoy various Web application frameworks with support ranging from simple user interactions based on the plain client-server model, to complicated distributed-object computations based on CORBA. The variety gives users the flexibility to decide a proper framework, and leads to demands for new support tools and a testing framework to test and maintain Web applications. This paper presents an architecture containing several supporting tools which enhance traditional software testing architecture to fit common Web application frameworks. The architecture suits current Web models and reuses several software patterns and architectures from traditional testing environments. In addition, a prototype Web application testing environment is constructed for demonstration View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A proxy server structure and its cache consistency mechanism at the network bottleneck

    Publication Year: 1999 , Page(s): 278 - 283
    Cited by:  Papers (2)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (480 KB)  

    The response time, bandwidth usage and server load are three representative performance metrics that are used for proxy cache consistency mechanisms. However, the primary metric affecting the overall performance can be different depending on the situation. At a network bottleneck, such as the inter-continental backbone, the network bandwidth is limited. Also, the response time is a basic performance metric used for the proxy cache, and an unsatisfactory response time can be a reason why clients hesitate to use the proxy cache, which may potentially increase the network traffic. Hence, we should give higher priority to the response time and the bandwidth usage at the bottleneck, as compared to other metrics. In this paper, we suggest a proxy server structure at the network bottleneck which improves the response time and even results in a small amount of network traffic reduction at the bottleneck. Its cache consistency mechanism is based on periodic polling performed at the polling server located beyond the bottleneck. Our approach may increase the network bandwidth beyond the bottleneck and the load on the originating Web servers. However, the faster response time and the reduced network traffic at the bottleneck can compensate for them View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Merging interval caching with adaptive viewers' bias based caching strategy

    Publication Year: 1999 , Page(s): 272 - 277
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (460 KB)  

    The architecture of a hierarchical video-on-demand (VOD) system consists of continuous media servers (CMS) which basically stand as a cache between the archive servers (AS) and the clients. The adaptive viewers' bias-based (AVBB) cache management algorithm is higher-performing than any existing ones because it considers and adapts to the video characteristics which viewers generally have a bias towards at different times and places. However, in AVBB, a cached item is an entire video. In this paper, we briefly look at both the AVBB and integrated bandwidth and space-constrained (IBSC) caching algorithms. We then incorporate the interval caching concept from IBSC into AVBB by reformulating the AVBB cache management algorithm not in terms of the videos themselves but in terms of video intervals. We then compare the performance of this modified algorithm with that of existing algorithms View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CataLogger: a framework for building asset management solutions

    Publication Year: 1999 , Page(s): 328 - 329
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (148 KB)  

    A robust asset management solution is a critical component of any system that seeks to provide automated access to content or services. A core issue in the design of such systems is the capability to model complex assets and their dependencies in an environment where such assets are continually being defined accessed, modified, tracked, and reused. The purpose of the paper is to present CataLogger, a general asset management framework that can model the life cycle of complex assets View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting ontologies from legacy systems for understanding and re-engineering

    Publication Year: 1999 , Page(s): 21 - 26
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (468 KB)  

    Ontology has been investigated in the context of knowledge sharing among heterogeneous and disparate database and knowledge base systems. Our recent study and experiments suggest that ontology also have a great potential for legacy software understanding and re-engineering. In this paper we consider an ontology to be composed of four elements: classes, relations, functions and instances. We show these four elements forming an ontology for a legacy system can be extracted from the code of the concerned system using the existing software re-engineering tools. We then present our vision how the obtained ontology can be applied to understanding and eventually better re-engineering the legacy systems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ensuring the capability of COTS products

    Publication Year: 1999 , Page(s): 96 - 97
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (168 KB)  

    The question of how a systems integrator can acquire a reasonable level of confidence in the robustness and applicability of any COTS product is one of the key concerns of researchers dealing with COTS based software systems. This assurance must be gained before the COTS product is selected for inclusion in the final system. The author proposes that we examine three main areas of interest dealing with COTS selection (legal, management and technical issues). He argues that direct, detailed examination provides the most practical timely data that will allow integrators to verify that particular COTS products can perform the tasks that are required, within the overall system context View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Establishing guidelines for suitability of COTS for a mission critical application

    Publication Year: 1999 , Page(s): 98 - 99
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (112 KB)  

    Commercial Off The Shelf (COTS) products are being considered for inclusion in ever more complex and critical systems. There are clearly advantages to consider the use of COTS, but given the rigorous needs of such critical systems or subsystems, there have begun to emerge concerns about the suitability of COTS for such applications. The paper identifies some of the characteristics of mission critical systems that makes the selection process of COTS products an emerging factor in total system acceptance. The paper also suggests an approach towards making this `suitability' decision. Further refinements and enhancements to such a proposed approach would assist both the acquisition community as well as the development/integration community in this area. Mission critical system characteristics such as reliability, safety, availability, maintainability and certification tend to influence whether or not COTS should be considered for a given application. Once the suitability of COTS has been determined, it is possible that additional requirements may be placed on the product and/or the product's vendor for such mission critical applications. It is also possible that certain system requirements and expectations may need to be modified because of the inclusion of COTS products into that system. As COTS products continue to be considered as candidates for inclusion within mission critical systems, there are likely to be additional concerns and factors to emerge that will influence how both acquirers and suppliers decide if and/or when to use COTS products. Ongoing monitoring of this technology area seems to be warranted View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A pattern-based approach to structural design composition

    Publication Year: 1999 , Page(s): 160 - 165
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (528 KB)  

    This paper describes an approach to component-based software engineering based on a formal description of design patterns. The architectural design information, captured by design patterns, is made explicit and represented in a declarative way, being packaged into tangible artifacts as building block design components in the development process. These design component descriptions can be instantiated, adapted, assembled, implemented, and maintained. Furthermore, we can use these representations to reason about properties related to the combination of design components. We illustrate the utility of our approach through a case study involving various design patterns View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous coordination for atomicity of transactions in heterogeneous systems

    Publication Year: 1999 , Page(s): 145 - 150
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (548 KB)  

    Recent recession has compelled many companies to look for more effective ways to restructure their information and control systems. One solution is to construct the system with the ADS (autonomous decentralized system) technique to cope with changing environments. However, in the heterogeneous autonomous decentralized environments (HADE) each system has its own autonomy and property, and so it's very important to preserve these characteristics even if heterogeneous systems are integrated together. A study of how to achieve the synergistic effect while preserving heterogeneity and autonomy has not been done. In order to achieve the synergistic effect, the different levels of atomicity of cooperative applications in the heterogeneous system are defined which aims to preserve the autonomy and the heterogeneity for each system. In order to ensure the atomicity without knowing the entire system architecture and to realize it by each system autonomously, an autonomous two-phase commitment (A2PC) technique is proposed. This paper also shows the realization technique of A2PC based on the ADS technique View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.