By Topic

Proceedings 36th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Asia 2000

Oct. 30 2000-Nov. 4 2000

Filter Results

Displaying Results 1 - 25 of 41
  • Proceedings 36th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Asia 2000

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (176 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s): 299
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Using the Web and Jini to link vending machines and enterprise systems

    Publication Year: 2000, Page(s):260 - 264
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    The use of open technologies in enterprise resource planning (ERP) systems and the development of new distributed infrastructures allows for novel systems to be developed. This paper reports on a project to bring vending machines into the scope of ERP systems, using Jini for network discovery and event generation View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent-based distributed information delivery system

    Publication Year: 2000, Page(s):168 - 175
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    When building larger network information systems, the efficient management and transmission of a large amount of information are important for several reasons. Firstly, the system will become disordered without a perfect information management strategy when faced with the tremendous amount of information resources. Secondly, it is essential for the system to transmit a large amount of information ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formalized abstract component object model - Z-COM

    Publication Year: 2000, Page(s):250 - 257
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    The importance of having a sound basis for engineers to reason about architectural standards should not be underestimated. A component standard, or integration architecture, is a set of design rules that is meant to ensure that such components can be integrated in defined ways without undue effort. This paper presents a formalized abstract component object model, Z-COM, based on Microsoft's Compon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Java Virtual Machine design based on hybrid concurrent compilation model

    Publication Year: 2000, Page(s):18 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    The shift from interpretation to just-in-time (JIT) compilation has improved Java's performance greatly. However, further amelioration is still possible. A new execution model of Java-the hybrid concurrent compilation model (HCCM)-is proposed in this paper, which possesses the potential to surpass JIT by overlapping the production of native code with program execution through multithreaded control... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative mobile agents in dynamic network environment

    Publication Year: 2000, Page(s):162 - 167
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    A multi-MA (mobile agents) cooperative system leads to flexible and efficient solutions for distributed systems, but a lot of research is not suitable for dynamic network environments. Based on the modeling of the multi-MA cooperative system and analysis of MA behavior, we present some new ideas and a theoretic model on fuzzy knowledge representation and exchange, in which some key problems such a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on life cycle management mechanism in COM/CORBA interworking

    Publication Year: 2000, Page(s):88 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    COM/CORBA interworking becomes more and more important with the development of DOC (Distributed Object Computing) technology. In this paper, using a Petri net, the COM/CORBA interworking model is described and analyzed, as a result, the limitations of the life cycle management mechanism in the model are found out. Finally the life cycle service is adopted and the COM/CORBA interworking model is im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security characterisation of software components and their composition

    Publication Year: 2000, Page(s):240 - 249
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    Proposes a security characterisation structure of software components and their composition. The structure provides a preliminary modelling of the security properties of stand-alone software components and some of their compositional primitives. In this paper, we are particularly interested in security properties related to user data protection of software components. The proposed compositional sp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Object-Oriented Method (HOOM): the software development process

    Publication Year: 2000, Page(s):8 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    The paper is aimed at providing a detailed description of the incremental, iterative and well-guided software development process of the Hybrid Object-Oriented Method (HOOM) which mainly encompasses three phases: analysis, design and coding. In the analysis phase, firstly, a requirement analysis activity ends by writing a requirement specification describing what the system under development is in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing undo/redo in PDF Studio using object-oriented design pattern

    Publication Year: 2000, Page(s):58 - 64
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    PDF Studio is a software package that provides a visual design environment to help a user create a document with text, images and data from a database, and that generates the file in PDF (Portable Document Format). Undo/redo functionality is a common requirement for most software that has a visual user interface. This paper introduces the implementation of undo/redo in this software package and de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of CORBA security service

    Publication Year: 2000, Page(s):140 - 145
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    CORBA is a new generation of distributed computing platform based on the distributed object computing technology, and security is always a fundamental problem of a distributed computing platform. Thus, implementation of a security service in the CORBA platform is very important. Referring to the related security standards and distributed computing platform's security models, the CORBA security ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of development method based on multi-agents

    Publication Year: 2000, Page(s):158 - 161
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    Multi-agent systems are becoming an important information technique in future manufacturing control. The paper puts forward an analysis method of multi-agent systems, an interactive model of agents, and an agent design scenario View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spatiotemporal data modelling and management: a survey

    Publication Year: 2000, Page(s):202 - 211
    Cited by:  Papers (2)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    Many data objects in the real world have attributes concerning location and time. Such spatiotemporal objects can be found in applications such as geographic information systems (GIS), environmental data management and multimedia databases. Traditional relational database technology is not suitable for managing spatiotemporal data, which are multi-dimensional with complex structures and behaviours... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent framework based on distributed object

    Publication Year: 2000, Page(s):188 - 194
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    In the process of developing distributed applications, system reliability, availability, openness, resource sharing and reusability, etc. are very complex and difficult to solve. Recent research into agent theory has demonstrated that agent-oriented technology may be effective in handling these problems. The paper first discusses the relationships of distributed systems from an agent viewpoint, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A revised, inheritance-supporting parallel object model in PDEFA-I

    Publication Year: 2000, Page(s):108 - 113
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    PDEFA is a distributed Ada95 pre-compiler, compiler and run-time system. PDEFA-I is the latest version of PDEFA that supports inheritance between parallel objects. Because of the inheritance anomaly problem with concurrent objects Ada95 does not support this mechanism, so we have to slightly modify the language to make inheritance possible. The code of each interface of a protected object in Ada95... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design consideration using the Multimedia Object Repository

    Publication Year: 2000, Page(s):81 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    This paper presents a study of the intermediate design and development of multimedia applications using the Multimedia Object Repository (MOR). The goal of MOR is to increase the availability of different multimedia objects for the designing of real world multimedia applications. Details of MOR were described in (Bingyang Zhou, 2000); this paper focuses on the architecture of a multimedia applicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing trading object services in COM

    Publication Year: 2000, Page(s):230 - 239
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    Identifying and locating services in distributed systems has always been problematic. Often, users have been obliged to identify not only the service required but also the specific supplier object type. Recently, the idea of trading services has been developed, allowing the developer to list a range of criteria required for a service, rather than an object type. We demonstrate how to employ Micros... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving object oriented analysis by explicit change analysis

    Publication Year: 2000, Page(s):2 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    Changeability is one of the major concerns in software development. Object-oriented (OO) technology itself is not enough to solve this problem. In this paper, we first discuss how the changeability issue is handled in current software development methods and what is the most important prerequisite for solving the software changeability problem. Based on these analyses, we argue that most of curren... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent-based and software composite DDSS

    Publication Year: 2000, Page(s):50 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    Agent-based systems are an increasingly prevalent issue in artificial intelligence (AI), and their application to distributed decision support systems (DDSSs) operating over the Internet is a potentially valuable contribution. This paper proposes an approach to DDSSs using multiple agents to coordinate decision support: agent-based DDSSs (ABDDSSs). The architecture of individual agents involved in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The research on dynamic self-adaptive network security model based on mobile agent

    Publication Year: 2000, Page(s):134 - 139
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    The rapid development and wide application of computer networks presents a new challenge to information security and network security. Traditional security models and single security technology cannot keep up with the change of complicated network structure and varied intrusion measures. Network security management based on policy has traits of low management cost, high agility and wide applicabil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Web application architecture with UML

    Publication Year: 2000, Page(s):265 - 274
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    As the increasing popularity and complexity of Web applications and the emergence of new Web application architecture, the design, development and maintenance of large, complex Web applications is becoming complex and difficult. One way to manage the complexity is to abstract and model them. The authors propose a method of modeling Web application architecture with UML, in which the design of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent-based load balancing mechanism: PLRM using Java

    Publication Year: 2000, Page(s):176 - 181
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    We discuss current typical load balancing mechanisms, which can be divided into static or dynamic models. We also discuss the program-data model known as SPMD and MPMD. On this basis, as a result of our research work, we have built a new dynamic load-balancing model called the periodical load rebalancing model (PLRM) based on Java. We introduce agent technology to strengthen host-host communicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expanding design pattern to support parallel programming

    Publication Year: 2000, Page(s):24 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    The design pattern concept is widely used in large object-oriented software development, but this should not be limited to the object-oriented field: it can be used in many other areas. Explicit parallel programming is well-known to be complex and error-prone, and design patterns can ease this work. This paper introduces a pattern-based approach for parallel programming, in which we classify desig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An implementation model of IntServ/RSVP based CORBA A/V Stream Service

    Publication Year: 2000, Page(s):94 - 99
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    In order to meet the requirements of building CORBA-based distributed multimedia applications, OMG has defined the CORBA A/V Stream Service Specification. However, it does not specify which network mechanism to use to ensure the QoS of multimedia streams. In this paper, an implementation model of IntServ/RSVP based CORBA A/V Stream Service is proposed. It first maps the application-level QoS param... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.