By Topic

Computer Software and Applications Conference, 2000. COMPSAC 2000. The 24th Annual International

Date 25-27 Oct. 2000

Filter Results

Displaying Results 1 - 25 of 104
  • The 24th Annual International Computer Software and Applications Conference COMPSAC 2000 [front matter]

    Publication Year: 2000, Page(s):i - xv
    Request permission for commercial reuse | PDF file iconPDF (504 KB)
    Freely Available from IEEE
  • Global leadership in C-commerce

    Publication Year: 2000, Page(s):7 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network and web security and e-commerce and other applications panel chair's position paper

    Publication Year: 2000, Page(s): 131
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Is the harmonisation of professional standards for software engineers feasible? or even welcome?

    Publication Year: 2000, Page(s): 345
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (89 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2000, Page(s):623 - 625
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • A practical method for watermarking Java programs

    Publication Year: 2000, Page(s):191 - 197
    Cited by:  Papers (16)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    Java programs distributed through the Internet are now suffering from program theft. This is because Java programs can be easily decomposed into reusable class files and even decompiled into source code by program users. We propose a practical method that discourages program theft by embedding Java programs with a digital watermark. Embedding a program developer's copyright notation as a watermark... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for WWW query processing

    Publication Year: 2000, Page(s):187 - 188
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    Query processing is the most common operation in a DBMS. Sophisticated query processing has been mainly targeted at a single enterprise environment providing centralized control over data and metadata. Submitting queries by anonymous users on the Web is different in such a way that load balancing or DBMS access control becomes the key issue. This paper provides a solution by introducing a framewor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining the Web for knowledge with sub-optimal mining algorithms

    Publication Year: 2000, Page(s):184 - 186
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    The Web provides a forum in which AI systems can be demonstrated and compared. This paper addresses a fuzzy method for context-sensitive textual matching. We are investigating two key approaches. Knowledge on the Web must be retrieved and structured to facilitate mining operations. Case-based filtering allows the algorithm to adapt dynamically to changes in content or efficiency of expression. Our... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concurrent embedded real-time software verification

    Publication Year: 2000, Page(s):516 - 521
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    The verification of software is more complex than hardware due to inherent flexibilities (dynamic behavior) that incur a multitude of possible system states. The verification of Concurrent Embedded Real-Time Software (CERTS) is all the more difficult due to its concurrency and embeddedness. The work presented shows how the complexity of CERTS verification can be reduced significantly through answe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new framework for testing real-time software

    Publication Year: 2000, Page(s):337 - 342
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    The time-dependent and asynchronous nature of many real time applications adds a potentially difficult problem to the testing activities, which needs to be solved. To address this need, we present a formal testing strategy for real time software by using a dual-language approach. This approach offers the advantage that by integrating the executability of operational formalism and the formal verifi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reengineering legacy systems using Web

    Publication Year: 2000, Page(s):182 - 183
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB)

    There has been an increasing need to migrate legacy systems to new hardware and software development paradigms because legacy systems present problems such as high maintenance costs and lack of documentation. All organizations must overcome serious challenges if they are to remain competitive in today's fast changing business and technological environment. Legacy systems cannot evolve to provide n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated solution for creating dependable software

    Publication Year: 2000, Page(s):269 - 270
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    Software testing and maintenance are the two most expensive phases of the software life cycle. Why, in general, are customers not satisfied with the quality of software? Studies have shown that approximately 20% of a software system is responsible for 80% of the faults and over the lifetime of an average software system as much as 70% of the cost is estimated to be dedicated to testing and mainten... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PENS: a Predictive Event Notification System for e-commerce environment

    Publication Year: 2000, Page(s):93 - 98
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    In the e-commerce market, we identified the need for an intelligent system that has the capacity to keep the customers well-informed. One form of information capture and discovery is through the services of event notification equipped with a prediction capability. With such a capability, an e-commerce participant can leverage (near-)real-time prediction regarding almost every area in the e-commerc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Region Encoding Diagram for fully symbolic verification of real-time systems

    Publication Year: 2000, Page(s):509 - 515
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    RED (Region Encoding Diagram), first reported by F.Wang (2000), is a BDD-like data structure for fully symbolic verification of symmetric real time systems with single clock per process. We propose to extend RED for asymmetric real time systems with an unrestricted number of global or local clocks. Unlike in DBM which records differences between pairs of clock readings, we record the ordering amon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Popularity-independent multimedia-on-demand server model

    Publication Year: 2000, Page(s):575 - 580
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    The authors develop a VHDL based popularity-independent multimedia-on-demand distributed server model. The three server subsystems: the control subsystem, the communication subsystem and the storage subsystem are modeled. The communication subsystem is designed as an interconnection network with meshed-pipe structure and delivers packets to their destination through the sub-optimal shortest path. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A visual supporting method for sequence controller programming

    Publication Year: 2000, Page(s):331 - 336
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    Establishes a visual support method for developing sequence controller programs. Current sequence controller programming methods have problems such as user-unfriendly programming languages and low programmer productivity. Our support method provides solutions to these problems that lead to a more efficient way of writing a sequence controller program. The method lets a programmer combine software ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A national clearinghouse service for B2B exchanges in the telecommunications industry

    Publication Year: 2000, Page(s):179 - 181
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    To effectively compete in the competitive telecommunications marketplace, telecommunication service providers need to execute business transactions and exchange business information electronically with each other. The article describes TelcordicaTM Exchange Link, an interconnection clearinghouse that has been developed at Telcordia Technologies specifically to support B2B exchanges in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design and implementation of a virtual conference system

    Publication Year: 2000, Page(s):261 - 266
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    With the enormous use of networks, many real-world activities are realized on the Internet. We propose a complete virtual conference system (VCS) to handle all activities of real-world conferences. The VCS includes a virtual conference management system and a mobile virtual conference system. Video conferencing is a trend of future communications. With the improvement of broadband network technolo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TTP: secure ACID transfer protocol for electronic ticket between personal tamper-proof devices

    Publication Year: 2000, Page(s):87 - 92
    Cited by:  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    The expanding market for digital content increases the demand to transfer electronic value through open networks. This paper describes the Ticket Transfer Protocol (TTP), which enables electronically transferable tickets to directly move between two personal tamper-proof devices. The applied two-phase commit protocol for the transfer realizes the ACID (atomicity, consistency, isolation, durability... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards the verification of scenarios with time Petri-nets

    Publication Year: 2000, Page(s):503 - 508
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    The focus of the paper is on the use of time Petri nets to serve as the verification mechanism for acquired scenarios. Use cases are used to elicit the user needs and to derive the scenarios. After specifying all possible scenarios, each of them can be transformed into its corresponding time Petri nets model (TPN). Through the analysis of these TPN models, wrong information and missing information... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting the partitioning of distributed systems with Function-Class Decomposition

    Publication Year: 2000, Page(s):351 - 356
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    Function-Class Decomposition is a hybrid method that integrates structured analysis with an object oriented approach to decompose a system. The task of class identification is performed in parallel to the decomposition of the system into a hierarchy of functional modules. This hierarchy provides the infrastructure for a systematic approach to partitioning components for distribution and for evalua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A phase-based approach to creating highly reliable software

    Publication Year: 2000, Page(s):276 - 277
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB)

    Software reliability engineering includes: software reliability measurement, which includes estimation and prediction, with the help of software reliability models established in the literature; the attributes and metrics of product design, development process, system architecture, software operational environment, and their implications on reliability; and the application of this knowledge in spe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A corporate insider's view about virtual universities

    Publication Year: 2000, Page(s):286 - 287
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    marchFIRST is an Internet professional services company. Today, companies should operate by giving superior service to customers, and this must be supplemented by the internal organizational capability-i.e. the ability to manage people to keep and continue to expand a competitive position in the marketplace. In this paper, I explain how marchFIRST Campus, our Web-based e-learning tool, focuses its... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical key distribution schemes for channel protection

    Publication Year: 2000, Page(s):569 - 574
    Cited by:  Papers (2)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    The paper presents three key distribution schemes for channel protection. With the proposed schemes, encryption keys of the ordered programs can be distributed to the authorized subscribers efficiently and securely. In these schemes, for key updates, at most two messages are transmitted and simpler computation functions, including one-way hash function and XOR operation, are used to reduce the com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast link layer and intra-domain handoffs for mobile Internet

    Publication Year: 2000, Page(s):325 - 330
    Cited by:  Papers (2)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    To support fast and efficient handoffs, we propose a single protocol for both link-layer (within an IP subnet) and IP-layer (across the IP subnet) handoffs within a local domain. It is a complementary protocol to Mobile IP, in which Mobile IP deals with inter-domain mobility in the wide area. By combining a routing table in the IP layer and a bridging table in the link layer to form a single forwa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.