By Topic

Computer Software and Applications Conference, 2000. COMPSAC 2000. The 24th Annual International

Date 25-27 Oct. 2000

Filter Results

Displaying Results 1 - 25 of 104
  • The 24th Annual International Computer Software and Applications Conference COMPSAC 2000 [front matter]

    Page(s): i - xv
    Save to Project icon | Request Permissions | PDF file iconPDF (504 KB)  
    Freely Available from IEEE
  • Global leadership in C-commerce

    Page(s): 7 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (156 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network and web security and e-commerce and other applications panel chair's position paper

    Page(s): 131
    Save to Project icon | Request Permissions | PDF file iconPDF (39 KB)  
    Freely Available from IEEE
  • Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Page(s): 623 - 625
    Save to Project icon | Request Permissions | PDF file iconPDF (169 KB)  
    Freely Available from IEEE
  • Supporting the partitioning of distributed systems with Function-Class Decomposition

    Page(s): 351 - 356
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (520 KB)  

    Function-Class Decomposition is a hybrid method that integrates structured analysis with an object oriented approach to decompose a system. The task of class identification is performed in parallel to the decomposition of the system into a hierarchy of functional modules. This hierarchy provides the infrastructure for a systematic approach to partitioning components for distribution and for evaluating key attributes of the resulting architecture. Complexity is reduced by the fact that partitioning decisions are made along the boundaries of previously identified groupings. Early evaluation of the resulting component distribution is also a key factor in mitigating the risks associated with developing distributed applications View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security enhancement for the “simple authentication key agreement algorithm”

    Page(s): 113 - 115
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (176 KB)  

    The weaknesses of the simple authenticated key agreement (SAKA) protocol were shown by H. Sun (2000). These weaknesses include the following facts: (1) it cannot detect a masquerade, (2) it cannot withstand a dictionary attack, and (3) it cannot provide perfect forward secrecy. In this paper, we improve the SAKA algorithm to overcome these weaknesses. In addition, we show that the improved scheme is more simple and more secure than the original one View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting tool for assembling software specification and design methods

    Page(s): 419 - 428
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (772 KB)  

    Specification and design methods for software systems and their support tools are one of the most significant key factors for obtaining success in development projects. Although we have many excellent methods, such as object-oriented analysis and design, we should adapt them into methods that are suitable for a project and its environment, so that we can have more powerful and effective methods. CAME (computer-aided method engineering) is a computerized tool to support the construction and management of methods. Our CAME tool has a method base that stores method fragments and supports in order to assemble the fragments into a suitable method. The method base is implemented on an object base system, and the operations for editing and assembling method fragments are done with a method editor on the WWW. The tool generates the schema of a repository from the product description of a method, and Web pages from its procedural description. The generated Web pages guide the developers following the method, and invoke suitable CASE tools. To generate meaningful method fragments, we need method assembly rules. Our CAME tool can check if the fragments are satisfied with these rules or not, by using Prolog View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed component hub for reusable software components management

    Page(s): 429 - 435
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (568 KB)  

    Presents a distributed software component hub model for reusable software component management, with LDAP (Lightweight Directory Access Protocol) operations and controls. We first briefly discusses the emerging software component technology and its current major research issues. Then we describe the method of using a distributed component hub for effectively resolving the hassles in reusable software-component repository management and retrieval. We specify the overall distributed component hub's framework and its design architecture. The hub's core mechanisms show how the reusable software-component repository and retrieval can be effectively managed with the distributed component hub framework. Experiments demonstrate the model's promise View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A corporate insider's view about virtual universities

    Page(s): 286 - 287
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (116 KB)  

    marchFIRST is an Internet professional services company. Today, companies should operate by giving superior service to customers, and this must be supplemented by the internal organizational capability-i.e. the ability to manage people to keep and continue to expand a competitive position in the marketplace. In this paper, I explain how marchFIRST Campus, our Web-based e-learning tool, focuses its efforts on creating an integrated employee development system to support career planning at marchFIRST by combining skill assessments, skill gap analysis, automatic mapping to learning events to close skill gaps, distributed learning capabilities, training administration, computer-based training and virtual mentoring services into a Web-based tool that employees can access remotely at any time View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet procurement of Formosa Plastics

    Page(s): 169 - 170
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (104 KB)  

    Trade Van designed an Internet procurement system for Formosa Plastics Group. A year and half after this system was deployed, 4000 suppliers use this system to do business with Formosa Plastics. Formosa Plastics has benefited from this system by reductions of 20% to 30% in purchase costs View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tree indexing for efficient search of similar documents

    Page(s): 210 - 211
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (144 KB)  

    Linear algebra-based techniques have long been used to correlate similar documents. They map the documents to a multidimensional vector space, in which each document is represented by a vector. Searching related documents then translates into searching nearest neighbors in the vector space. We propose an indexing structure, called cosine R-tree, which indexes multidimensional vector space and provides efficient nearest neighbor search. Our preliminary results show that it gives better performance than a brute-force linear scan strategy View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using rough sets to build-up Web-based one to one customer services

    Page(s): 463 - 464
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (104 KB)  

    As more complicated and complex situations in current markets, especially in the highly competitive electronic commerce environment emerge, proper customer services become more important than before. Therefore, data mining to assist customer relationship management (CRM) becomes a major topic in the Internet world. The article presents the use of rough sets to build up a one-to-one service Web site for electronic commerce service companies to understand customer desires and quickly respond to customer wants and needs. This makes these companies more competitive than their competitors. The article discusses the concepts and methods for building up a Web based one-to-one CRM system View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical method for watermarking Java programs

    Page(s): 191 - 197
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (644 KB)  

    Java programs distributed through the Internet are now suffering from program theft. This is because Java programs can be easily decomposed into reusable class files and even decompiled into source code by program users. We propose a practical method that discourages program theft by embedding Java programs with a digital watermark. Embedding a program developer's copyright notation as a watermark in Java class files will ensure the legal ownership of class files. Our embedding method is indiscernible by program users, yet enables us to identify an illegal program that contains stolen class files. The result of the experiment to evaluate our method showed most of the watermarks (20 out of 23) embedded in class files survived two kinds of attacks that attempt to erase watermarks: an obfuscactor attack, and a decompile-recompile attack View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A visual authoring system for animated multimedia homepage

    Page(s): 249 - 254
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (512 KB)  

    The WWW has become a powerful media for knowledge displacement and acquisitions for Internet users. For Internet content providers, the homepage is the common way to let users know where the contents are placed. Currently, there are many homepage design tools available for content providers to make their Web pages, FrontPage Express, Flash, HotDog, to name a few. While making an animated multimedia homepage, most of these design tools have to use their extended programming features such as combing part of the code of JavaScript, or Java program to achieve this goal. For general users, especially for the non-computer professional users, to write Java programs to make an animated multimedia homepage is not an easy job. In this paper, a visual authoring system for general users to make an animated multimedia homepage is proposed. Based on this tool, users can create an animated multimedia homepage at their fingertips without writing any program or code. The proposed authoring tool has been technology transferred to the Best Wise International Computing Cooperation for product development. Examples shown in this paper are created based on the WebFace Maker (a product of the Best Wise International Computing Co.) which is a product developed using the proposed technology View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing reconfigurable algorithms for managing replicated data with strict consistency requirements: a case study

    Page(s): 608 - 613
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (540 KB)  

    We address reconfigurable algorithms for managing replicated data with strict consistency requirements, that is, whenever the user performs an update operation, the update is applied to all reachable copies as part of the update protocol. A key issue of designing such algorithms is to determine how often one should detect and react to failure conditions so that reorganization operations can be performed at the appropriate time to improve the availability of replicated data. We use dynamic voting as a case study to illustrate how often such failure detection and reconfiguration activities should be performed so as to maximize the data availability. We show that there exists an optimal period at which the failure detection and reconfiguration activities should be performed to optimize the system availability. Stochastic Petri nets (SPNs) are used as a tool to facilitate our analysis View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable transaction design using MTS

    Page(s): 357 - 362
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (504 KB)  

    Component based development is an emerging discipline of software development. Recently, the growth of middleware technologies has brought the notion of server-side component into CBD for developing mission-critical applications. The authors propose a method for designing reliable component systems for mission-critical tasks. To this end, they formulate the MTS system (Microsoft Transaction Server) and develop a framework for describing the specification and design of component based systems and reasoning about them. For illustrating our framework, we show that the design of a simple bank example violates its specification. We strongly believe that the refactoring of transaction boundaries is common practice for improving scalability, and thus, the developed framework is useful when evaluating refactorings View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding data mining and applying it to command, control, communications and intelligence environments

    Page(s): 171 - 175
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (332 KB)  

    The paper describes data mining and the various ways in which it can be applied to command, control, communications and intelligence. It begins with an overview of data mining and the various steps in the data mining process. Examples of data mining outcomes are cited and an example of a text mining scenario for intelligence applications is described. Problems associated with data mining are described, including the conflict between security and privacy and the challenges of distributed mining. The paper concludes with a discussion of future trends in data mining View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TTP: secure ACID transfer protocol for electronic ticket between personal tamper-proof devices

    Page(s): 87 - 92
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (416 KB)  

    The expanding market for digital content increases the demand to transfer electronic value through open networks. This paper describes the Ticket Transfer Protocol (TTP), which enables electronically transferable tickets to directly move between two personal tamper-proof devices. The applied two-phase commit protocol for the transfer realizes the ACID (atomicity, consistency, isolation, durability) transaction properties without any external coordinators. Moreover, this paper addresses the initial implementation of a secure TTP, enabling the detection of message replays by attackers, and evaluates the size of its logging field in the transaction. We conclude that TTP has enough reliability to transfer electronic tickets directly between personal ticket wallets View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards harmonized professional standards for software engineers: constraints, conflicts and concessions

    Page(s): 346 - 347
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (164 KB)  

    The harmonization of professional standards usually means an attempt to unify the standards among different nations or states. It is a necessary step towards the maturity of a profession because of two factors: (a) that professional standards have been developed independently in different nations; and (b) that the standards thus developed are not uniform among nations. Since harmonization is not the only step before a mature software engineering profession, the author proposes to take a look at various constraints and conflicts against harmonized professional standards in software engineering View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality issues in system engineering affecting virtual distance learning systems

    Page(s): 17 - 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (312 KB)  

    A quality learning system is the foundation of virtual distance learning. It represents not only a significant investment and a competitive edge for a particular learning institution, but is also crucial to the success of the learning process. The integration of the heritage systems and legacy data into a network-centric environment involves more than just connecting data and hardware to the Internet, it requires the ability to make intelligent trade-offs that extend the scope of and harvest the investment in, these systems. The systems engineer must design a strategy for the implementation and maintenance of a quality learning system. This quality is parametrized by factors such as feasibility, schedule, flexibility and maintenance, chronological instability, and scalability and expandability. We describe how these parameters affect the quality of a virtual learning system, and attempt to reduce unforseen systems engineering problems when developing a new virtual learning system View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formalizing UML class diagrams-a hierarchical predicate transition net approach

    Page(s): 217 - 222
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (488 KB)  

    Unified Modeling Language (UML) has been widely accepted as the standard object-oriented development methodology in the software industry. However, many graphical notations in UML only have informal English definitions and thus are error-prone and cannot be formally analyzed. We present our preliminary results on an approach to formally define UML class diagrams using hierarchical predicate transition nets (HPrTNs). We show how to define the main concepts related to class diagrams using HPrTN elements View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing an FSM architectural framework for service-based applications

    Page(s): 234 - 239
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (516 KB)  

    This paper describes an FSM (Finite State Machine) architectural framework called StateJ. In an FSM architectural framework, a business service is realized by a finite state machine and implemented as a component called service managed by the state management service. Distributed services communicate with each other through the request management service and event notification service. StateJ has been exploited to develop several service-based applications, in particular, telecom service provisioning systems. This paper describes the StateJ framework and the authors' experience of using it View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using pattern-join and purchase-combination for mining Web transaction patterns in an electronic commerce environment

    Page(s): 99 - 104
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (468 KB)  

    Explores a data mining capability which involves mining Web transaction patterns in an electronic commerce (EC) environment. To better reflect the customer usage patterns in the EC environment, we propose a data mining model that takes both the customers' travelling patterns and their purchasing behaviour into consideration. We devise two efficient algorithms [MTSPJ (Maximal Transaction Segment with Pattern Join) and MTSPC (Maximal Transaction Segment with Purchase Combination)] for determining frequent transaction patterns, which are termed “large transaction patterns” in this paper. In addition, the WTM (Web Transaction Mining) algorithm is used for comparison purposes. By utilizing the path-trimming technique, which is developed to exploit the relationship between travelling and purchasing behaviours, MTSPJ and MTSPC are able to generate the large transaction patterns very efficiently. A simulation model for the EC environment is developed and a synthetic workload is generated for performance studies View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plan tracking knowledge base

    Page(s): 299 - 304
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (328 KB)  

    Creating project plans is a key management activity. Software project managers spend a lot of their time manually gathering data to track software project compliance to plans. This paper describes a knowledge base framework that is created by computer tools that gather information from project files. The framework provides facts to intelligent agents to help managers track compliance to plans. The plan-tracking framework is an extension of the PAMPA (Project Attribute Monitoring and Prediction Associate) tool's knowledge base structure View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.