Proceedings. Twenty-Third Annual International Computer Software and Applications Conference (Cat. No.99CB37032)

29-29 Oct. 1999

Filter Results

Displaying Results 1 - 25 of 93
  • Proceedings. Twenty-Third Annual International Computer Software and Applications Conference (Cat. No.99CB37032)

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (1526 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1999, Page(s):476 - 478
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Some insights into the maintenance of legacy systems within small manufacturing and distribution organisations in the UK

    Publication Year: 1999, Page(s):13 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (724 KB)

    Within small organisations, where software and IT are often seen as simply technology to support the business (rather than as a central component of it), the issues associated with legacy systems are rarely assessed. What constitutes a legacy system and how such systems should be viewed are considered. From case study material four distinct acquisition policies used by small organisations are iden... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer network intrusion detection, assessment and prevention based on security dependency relation

    Publication Year: 1999, Page(s):86 - 91
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    An approach to detection, assessment and prevention of further intrusions of distributed intrusions in a computer network is presented. Our approach uses audit data from multiple network nodes and services. To achieve accurate results, inherent security relations among different network nodes should be considered. In our approach, the security dependency relation (SDR) is defined to describe these... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward more reliable telecom systems

    Publication Year: 1999, Page(s):151 - 156
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    A word currently in vogue in software engineering is quality. Quality involves many factors, and it would be time-consuming to address all of them in one paper. Instead, only one is addressed: reliability. Specifically, this paper presents the use of redundant software as a means of improving the software reliability of telecom systems at the operational phase. Redundant software acts as a supervi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supply and demands of information technology workers

    Publication Year: 1999, Page(s): 342
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic software architecture slicing

    Publication Year: 1999, Page(s):61 - 66
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    Software architectural design is becoming increasingly important in software engineering, as being manifested through various recent developments in the field such as the component-based software engineering paradigm and the distributed and collaborative computing paradigm. Abstraction is such a mechanism as the key concept underpinning software architecture, namely hiding the immense amount of de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CataLogger: a framework for building asset management solutions

    Publication Year: 1999, Page(s):328 - 329
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB)

    A robust asset management solution is a critical component of any system that seeks to provide automated access to content or services. A core issue in the design of such systems is the capability to model complex assets and their dependencies in an environment where such assets are continually being defined accessed, modified, tracked, and reused. The purpose of the paper is to present CataLogger... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia tools and applications in the development of a large complex network system

    Publication Year: 1999, Page(s):226 - 231
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    The paper demonstrates the capability and use of integrating multimedia tools and events in the life-cycle development of large, complex networks. Network engineering (NE), detailed by the authors' previous research, defines process steps for the requirement specification, design, evaluation, testing, layout and maintenance of computer networks (S. Palangala et al., 1998). The paper shows that the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural evolution of legacy systems

    Publication Year: 1999, Page(s):4 - 12
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB)

    The purpose of this paper is to gain experience in solving real problems faced by a company. We first specify the system architecture of the AFS Master System (R) using our Component Specification Language (CSL). We then identified various problem evident in the current architecture of the AFS Master System (R). Based on an analysis of the architecture and these problems, we proposed a modificatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting ontologies from legacy systems for understanding and re-engineering

    Publication Year: 1999, Page(s):21 - 26
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    Ontology has been investigated in the context of knowledge sharing among heterogeneous and disparate database and knowledge base systems. Our recent study and experiments suggest that ontology also have a great potential for legacy software understanding and re-engineering. In this paper we consider an ontology to be composed of four elements: classes, relations, functions and instances. We show t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A design pattern for autonomous vehicle software control architectures

    Publication Year: 1999, Page(s):172 - 177
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    Design patterns represent a generalized approach to solving a related set of problems. Typically, a design pattern does not provide reusable code. Instead it provides a common vocabulary and a generalized approach in an application-independent manner. We have developed a design pattern for use in controlling autonomous vehicles. The control of individual components within an autonomous vehicle wil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile agents protection in the Internet environment

    Publication Year: 1999, Page(s):80 - 85
    Cited by:  Papers (5)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    The Mobile Agent (MA) paradigm seems to be a promising technology for developing applications in open, distributed and heterogeneous environments, such as the Internet. Mobile agents can overcome some of the limits of the traditional client/server model and can easily integrate with the Web to improve application accessibility. Many application areas, such as electronic commerce, mobile computing,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of traffic control system based on stochastic timed Petri net models

    Publication Year: 1999, Page(s):436 - 441
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    We present a new modeling method to evaluate the performance indices of traffic control systems where each intersection has two or four phases. The method is based on the stochastic timed Petri net models of isolated intersections. It considers one direction of traffic along a street each time, and the interactions between traffic of different directions are partially approximated by statistical m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining weak rules

    Publication Year: 1999, Page(s):309 - 310
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    Finding patterns from data sets is a fundamental task of data mining. If we categorize all patterns into strong, weak, and random, conventional data mining techniques are designed only to find strong patterns, which hold for numerous objects and are usually consistent with the expectations of experts. We address the problem of finding weak patterns (i.e., reliable exceptions) from databases. They ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous coordination for atomicity of transactions in heterogeneous systems

    Publication Year: 1999, Page(s):145 - 150
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    Recent recession has compelled many companies to look for more effective ways to restructure their information and control systems. One solution is to construct the system with the ADS (autonomous decentralized system) technique to cope with changing environments. However, in the heterogeneous autonomous decentralized environments (HADE) each system has its own autonomy and property, and so it's v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of Complementary Processing on Navy command and control software

    Publication Year: 1999, Page(s):336 - 337
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB)

    Complementary Processing (CP), is a scheduling methodology to increase software execution speed. Experiments were performed to test CP with command and control software, specifically, to measure the effect of CP on the speed of processing Navy track-message data. A 37.5-fold increase was observed in this preliminary test. Recommendations for future tests are discussed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An industrial application of an integrated UML and SDL modeling technique

    Publication Year: 1999, Page(s):54 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    The use of rigorous software development techniques provides opportunities for the early detection of defects in software requirements and design. Early detection and correction of defects can, in turn, reduce the time spent on implementing defective software models. A number of rigorous techniques that target specific development phases exist. Industrial use of these techniques requires the devel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An active database approach to integrating black-box software components

    Publication Year: 1999, Page(s):403 - 409
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    Active database technology uses active rules, called Event-Condition-Action (ECA) rules, as an integral feature of application development. Active rules specify an event that the database monitors, a declarative condition to evaluate when the event occurs, and an action to execute when the condition is true. This paper motivates the use of active rules to develop a software application that is the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Venice-a toolkit/framework for integration and component-based computing

    Publication Year: 1999, Page(s):326 - 327
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    Venice is both a toolkit and a framework to enable development and system integration using component based computing. It has been used to support the integration of a Defense Advanced Research Projects Agency (DARPA) large system integration effort. A technical description is provided and future research directions are outlined View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperating process components

    Publication Year: 1999, Page(s):218 - 223
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB)

    Modern automated process support systems can be considered monolithic in three ways. First, they model processes top-down, usually from a single perspective, such as the organizational perspective. Second, they are process-centered, in that they often require extensive knowledge of the users, data types, and applications in their environment. Third, they tie process implementation to a specific re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing dynamic decision support: opportunities, issues and approaches

    Publication Year: 1999, Page(s):386 - 387
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    As the speed increases with which Internet-related computer technologies develop, so do the pressures placed on human decision makers to leverage the new technologies to make better decisions, faster. Use of the vast information resources available through the Internet is changing from incidental, undirected acquisition to focused, outcome-oriented usage. The paradigm shift creates a concomitant n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing extensible design patterns in object-oriented frameworks through scenario templates

    Publication Year: 1999, Page(s):166 - 171
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    Design patterns have been used in object-oriented frameworks. This paper first discusses the issues in testing applications developed with design patterns using an object-oriented framework. Two kinds of design patterns are available, extensible and static patterns, and this paper focuses on testing applications using the latter. Applications developed using extensible design patterns are difficul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Processing queries with expensive predicates by filtering

    Publication Year: 1999, Page(s):350 - 356
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    There has been increasing interest in the application of abstract data types (ADT) in database technology to other fields. However, processing queries including ADT is always computationally expensive. We formalize a query processing scheme for selection operation which involves a computationally expensive predicate. Our approach is based on “filtering”. In the method, an expensive pre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A protocol and simulation for distributed communicating firewalls

    Publication Year: 1999, Page(s):74 - 79
    Cited by:  Papers (3)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    The concept of distributing firewalls into the Internet was previously presented for the purpose of pushing LAN attacks away from a single firewall (R.N. Smith and S. Bhattacharya, 1997; 1999). The paper presents a protocol for firewalls to communicate information to enable distributed firewalls to isolate LAN attacks. Currently firewalls are used to protect a single LAN or extranet of collaborati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.