Proceedings 36th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Asia 2000

Oct. 30 2000-Nov. 4 2000

Filter Results

Displaying Results 1 - 25 of 41
  • Proceedings 36th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Asia 2000

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (176 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s): 299
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • An agent framework based on distributed object

    Publication Year: 2000, Page(s):188 - 194
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    In the process of developing distributed applications, system reliability, availability, openness, resource sharing and reusability, etc. are very complex and difficult to solve. Recent research into agent theory has demonstrated that agent-oriented technology may be effective in handling these problems. The paper first discusses the relationships of distributed systems from an agent viewpoint, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security characterisation of software components and their composition

    Publication Year: 2000, Page(s):240 - 249
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    Proposes a security characterisation structure of software components and their composition. The structure provides a preliminary modelling of the security properties of stand-alone software components and some of their compositional primitives. In this paper, we are particularly interested in security properties related to user data protection of software components. The proposed compositional sp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel workflow management model based on mobile agents for Internet electronic commerce

    Publication Year: 2000, Page(s):182 - 187
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    Electronic commerce on the Internet is receiving a lot of attention. Workflow management is regarded as an effective mechanism for managing the business processes behind electronic commerce, but the present workflow management model has many drawbacks in this field. The paper gives a novel workflow management model based on mobile agents for Internet electronic commerce, and its advantages are als... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expanding design pattern to support parallel programming

    Publication Year: 2000, Page(s):24 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    The design pattern concept is widely used in large object-oriented software development, but this should not be limited to the object-oriented field: it can be used in many other areas. Explicit parallel programming is well-known to be complex and error-prone, and design patterns can ease this work. This paper introduces a pattern-based approach for parallel programming, in which we classify desig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing trading object services in COM

    Publication Year: 2000, Page(s):230 - 239
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    Identifying and locating services in distributed systems has always been problematic. Often, users have been obliged to identify not only the service required but also the specific supplier object type. Recently, the idea of trading services has been developed, allowing the developer to list a range of criteria required for a service, rather than an object type. We demonstrate how to employ Micros... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of CORBA security service

    Publication Year: 2000, Page(s):140 - 145
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    CORBA is a new generation of distributed computing platform based on the distributed object computing technology, and security is always a fundamental problem of a distributed computing platform. Thus, implementation of a security service in the CORBA platform is very important. Referring to the related security standards and distributed computing platform's security models, the CORBA security ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using the Web and Jini to link vending machines and enterprise systems

    Publication Year: 2000, Page(s):260 - 264
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    The use of open technologies in enterprise resource planning (ERP) systems and the development of new distributed infrastructures allows for novel systems to be developed. This paper reports on a project to bring vending machines into the scope of ERP systems, using Jini for network discovery and event generation View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture framework for software test tool

    Publication Year: 2000, Page(s):40 - 47
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    A software test tool based on source code is an important tool to aid software quality assurance, and under those environments where the test technology and test requirements continuously vary, the software test tool itself should be endowed with extensibility, easy reusability and interoperability. In this paper, the necessity of research on an integrated framework for component-based software te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing an e-commerce application by using content component model

    Publication Year: 2000, Page(s):275 - 284
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    Applications using the Web, such as electronic commerce applications, have become larger more complex and dynamic. Developing and maintaining such large and complex Web applications demands a systematic process and an effective engineering methodology. A suitable model of Web application that can capture its features is crucial and fundamental to the establishment of such approaches. Through a pra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent-based load balancing mechanism: PLRM using Java

    Publication Year: 2000, Page(s):176 - 181
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    We discuss current typical load balancing mechanisms, which can be divided into static or dynamic models. We also discuss the program-data model known as SPMD and MPMD. On this basis, as a result of our research work, we have built a new dynamic load-balancing model called the periodical load rebalancing model (PLRM) based on Java. We introduce agent technology to strengthen host-host communicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Java Virtual Machine design based on hybrid concurrent compilation model

    Publication Year: 2000, Page(s):18 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    The shift from interpretation to just-in-time (JIT) compilation has improved Java's performance greatly. However, further amelioration is still possible. A new execution model of Java-the hybrid concurrent compilation model (HCCM)-is proposed in this paper, which possesses the potential to surpass JIT by overlapping the production of native code with program execution through multithreaded control... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative mobile agents in dynamic network environment

    Publication Year: 2000, Page(s):162 - 167
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    A multi-MA (mobile agents) cooperative system leads to flexible and efficient solutions for distributed systems, but a lot of research is not suitable for dynamic network environments. Based on the modeling of the multi-MA cooperative system and analysis of MA behavior, we present some new ideas and a theoretic model on fuzzy knowledge representation and exchange, in which some key problems such a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation and proof for normalization design of object-oriented data schemes

    Publication Year: 2000, Page(s):220 - 227
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    Describes a normalization design for complex object schemes and its proof. The purpose of normalizing complex object schemes is not only to group objects into related relationships, but also to choose a structure for the information system which is a good representation of the semantic relationships among objects that already exist in the real world. Firstly, we define the object dependency (OD) b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving object oriented analysis by explicit change analysis

    Publication Year: 2000, Page(s):2 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    Changeability is one of the major concerns in software development. Object-oriented (OO) technology itself is not enough to solve this problem. In this paper, we first discuss how the changeability issue is handled in current software development methods and what is the most important prerequisite for solving the software changeability problem. Based on these analyses, we argue that most of curren... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The research on dynamic self-adaptive network security model based on mobile agent

    Publication Year: 2000, Page(s):134 - 139
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    The rapid development and wide application of computer networks presents a new challenge to information security and network security. Traditional security models and single security technology cannot keep up with the change of complicated network structure and varied intrusion measures. Network security management based on policy has traits of low management cost, high agility and wide applicabil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A revised, inheritance-supporting parallel object model in PDEFA-I

    Publication Year: 2000, Page(s):108 - 113
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    PDEFA is a distributed Ada95 pre-compiler, compiler and run-time system. PDEFA-I is the latest version of PDEFA that supports inheritance between parallel objects. Because of the inheritance anomaly problem with concurrent objects Ada95 does not support this mechanism, so we have to slightly modify the language to make inheritance possible. The code of each interface of a protected object in Ada95... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A change notification framework based on agent for information system

    Publication Year: 2000, Page(s):195 - 200
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    The Web is a platform for information systems such as active document management systems that are easy to deploy and use both for information providers and users. In this sort of information system, multiple users can modify the shared information resources concurrently, and the update may affect transactions that other users are simultaneously engaged in. Change notification mechanisms are import... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formalized abstract component object model - Z-COM

    Publication Year: 2000, Page(s):250 - 257
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    The importance of having a sound basis for engineers to reason about architectural standards should not be underestimated. A component standard, or integration architecture, is a set of design rules that is meant to ensure that such components can be integrated in defined ways without undue effort. This paper presents a formalized abstract component object model, Z-COM, based on Microsoft's Compon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedding UML and type theory to formalize the process of requirement engineering

    Publication Year: 2000, Page(s):32 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    Nowadays, the main reason for the failure of large-scale systems developments is that the requirements analysis stage cannot produce complete, understandable, unambiguous traceable and testable system requirements documents. To conquer this problem, from the point of view of “requirements engineering” (RE), the formalization of the RE process is discussed from three aspects: a full pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Counter inference of intelligent agents

    Publication Year: 2000, Page(s):148 - 157
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    The essence of counter inference is intelligence competition and critical decision making that will result in chained reactions in an open system environment. Intelligent agents are capable not only of carrying out negotiations but also playing games. A negotiation could have win-win (or lose-lose) outcomes while a game may result in win-lose situations. The paper proposes counter inference as a u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Web application architecture with UML

    Publication Year: 2000, Page(s):265 - 274
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    As the increasing popularity and complexity of Web applications and the emergence of new Web application architecture, the design, development and maintenance of large, complex Web applications is becoming complex and difficult. One way to manage the complexity is to abstract and model them. The authors propose a method of modeling Web application architecture with UML, in which the design of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent-based and software composite DDSS

    Publication Year: 2000, Page(s):50 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    Agent-based systems are an increasingly prevalent issue in artificial intelligence (AI), and their application to distributed decision support systems (DDSSs) operating over the Internet is a potentially valuable contribution. This paper proposes an approach to DDSSs using multiple agents to coordinate decision support: agent-based DDSSs (ABDDSSs). The architecture of individual agents involved in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet object-oriented information model

    Publication Year: 2000, Page(s):285 - 290
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    In the network management area, management information models are based on a center of managed objects to denote the abstract of network resource. Internet management standards only tell how to access management variables. Aiming at making use of recent advances in distributed computing and in object oriented analysis and design, an Internet management architecture can also be based on the Open Di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.