By Topic

Computer Systems and Applications, ACS/IEEE International Conference on. 2001

Date 25-29 June 2001

Filter Results

Displaying Results 1 - 25 of 96
  • Proceedings ACS/IEEE International Conference on Computer Systems and Applications

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (425 KB)
    Freely Available from IEEE
  • Keep it small and smart

    Publication Year: 2001, Page(s):537 - 543
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1189 KB) | HTML iconHTML

    The production of interactive multimedia content is in most cases an expensive task in terms of time and cost. It must hence be the goal to optimize the production by exploiting the reusability of interactive multimedia elements. Reusability can be triggered by a combination of reusable multimedia components, together with the appropriate use of metadata to control the components as well as their ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2001, Page(s):562 - 564
    Request permission for commercial reuse | PDF file iconPDF (146 KB)
    Freely Available from IEEE
  • Bargaining in e-commerce: a special negotiation scheme

    Publication Year: 2001, Page(s):546 - 548
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed mutual exclusion token-permission based by prioritized groups

    Publication Year: 2001, Page(s):253 - 259
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    Sites with the same priority are gathered in the same group. Communication inside a group is organized in a logical rooted tree structure. The tree's root is the site that last held the token. This organization is similar to that of Raymond's algorithm (1989). For its external communications, a group resorts to an external supplementary element: a router. This router manages external communication... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On designing a systolic network for the resolution of linear systems using the “Gauss-Seidel” method

    Publication Year: 2001, Page(s):283 - 286
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Parallelism has generated new concepts and approaches making it possible to conceive competitive systems and parallel architectural configurations. These two concepts are hard to bring altogether and require a precise definition of the structural elements of algorithm and their projection on suitable parallel architectures. The work described, tries to concretize this merge of concepts for a class... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reuse Description Formalism

    Publication Year: 2001, Page(s):395 - 401
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB) | HTML iconHTML

    Software reuse has been claimed to be one of the most promising approaches to enhance programmer productivity and software quality. One of the problems to be addressed to achieve high software reuse is organizing databases of software experience, in which information on software products and processes is stored and organized to enhance reuse. We present a system to define and construct such databa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated detection of Internet usage policy violation

    Publication Year: 2001, Page(s):507 - 510
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    The Internet is considered to be a powerful business tool, with its use increasing all the time. You may still find, however, negative aspects linked to its usage in various areas. Reports may be found so often in the computing press of how the Internet is being misused by employees. This paper suggests and puts forward the need for corporate Internet connections to be monitored along with the cre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic signature files update in antivirus software using active packets

    Publication Year: 2001, Page(s):457 - 460
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB) | HTML iconHTML

    The field of information technology is growing very quickly, and so there are more and more regular updates. At the same time, computer viruses are also on the increase, and people are now even complaining that attacks on computers are mostly from within the intranet structure. So, if we are able to update the signature files of the anti-virus software that exists on the various computers that are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An execution model for the seamless integration of control flow and data flow

    Publication Year: 2001, Page(s):402 - 404
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    In the visual languages community, data flow and control flow models are often seen as antagonistic. However, data flow formalisms are seldom purely data flow based, and control flow formalisms are seldom purely control flow based. We describe the execution model of a formalism that completely integrates the two kinds of flows. This execution model is based on directed graphs, with both control fl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constraint-based timetabling-a case study

    Publication Year: 2001, Page(s):67 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    This paper reports a case study in applying constraint satisfaction techniques to university and school timetabling. It involves the construction of a substantial, carefully specified, fully tested and fully operational system. The software engineering aspect of constraint satisfaction is emphasized. Constraint satisfaction problems are expressed in a language more familiar to the formal software ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Connectionist approach for Website visitors behaviors mining

    Publication Year: 2001, Page(s):511 - 515
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB) | HTML iconHTML

    Proposes a new version of the “topological maps” algorithm, which has been used to cluster Web site visitors. These are characterized by partially redundant variables over time. In this version, we only consider those input vectors' neurons that participate in the selection of the winning neuron in the map. In order to identify these neurons, we use a binary function. Subsequently, we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UML-L: a UML based design description language

    Publication Year: 2001, Page(s):438 - 441
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    A new textual language for the formal description of static and dynamic object models is proposed. The language is UML based and is given the name UML-L. UML-L targets the developers of object model design analysis tools, allowing them to perform analyses and checking on the object model described using UML. For illustration, UML-L is used to analyze the static object model and check the consisten... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object based software engineering with hidden sorted ECATNets and hidden labeled rewriting logic

    Publication Year: 2001, Page(s):386 - 391
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    Hidden sorted ECATNets and hidden labeled rewriting logic were introduced independently from each other. Hidden sorted ECATNets were developed to meet the objectives of object based software engineering. Their semantics in terms of logic of concurrency allows them to be used in the life cycle of sequential as well as concurrent and distributed systems. They are mainly useful in the earliest stages... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Methods and metrics for selective regression testing

    Publication Year: 2001, Page(s):463 - 465
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    In corrective software maintenance, selective regression testing includes test selection from previously-run test suites and test coverage identification. We propose three reduction-based regression test selection methods and two McCabe-based coverage identification metrics (T. McCabe, 1976). We empirically compare these methods with three other reduction- and precision-oriented methods, using 60 ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Arabic object-oriented programming language Al-Risalh

    Publication Year: 2001, Page(s):424 - 427
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Al-Risalh is an Arabic pure object-oriented programming language that has the basic mechanisms of object-orientation, objects, classes, and messages. Also the language has the full support of object orientation concepts. The Al-Risalh language supports application programming as well as systems programming. The paper introduces the language that can used to teach Arabic-speaking students, how to p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location management in mobile computing

    Publication Year: 2001, Page(s):287 - 289
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    This paper discusses wireless networks and location management schemes which consist of location updates and location inquiries. The paper provides a survey of a large number of location updates and location inquiries strategies that have been proposed in the literature over the years. As well, methods for evaluating the performances of different location management schemes, including users mobili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A measure for component interaction test coverage

    Publication Year: 2001, Page(s):304 - 311
    Cited by:  Papers (18)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB) | HTML iconHTML

    A trend in software development is to assemble a system from a number of components. These may be either available commercially off-the-shelf, or by the use of network-based resources. In many cases, the system is expected to function for multiple configurations of interchangeable components. The trade off that a system tester faces is the thoroughness of test component configuration coverage, ver... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a new approach on software process evolution

    Publication Year: 2001, Page(s):345 - 351
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    This paper presents a new approach of software process evolution. This new approach deals with the evolution of both software processes and their models in process centered software engineering environments (PSEEs). These two types of evolution are complementary. The first one allows acting directly on the process during its execution. By appropriate update operations, it gives to the user the pos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transformation rules from semi-structured XML documents to database model

    Publication Year: 2001, Page(s):181 - 184
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    XML semi-structured documents provide a flexible and natural way to capture data. More often, users exchange documents with others or reuse their data in a wide range of tasks. A direct consequence is a growing need to manage semi-structured documents and to gain conventional database functionality. The aim of our research is the development of a comprehensive capturing and mapping data system tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovery of fuzzy sequential patterns for fuzzy partitions in quantitative attributes

    Publication Year: 2001, Page(s):144 - 150
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB) | HTML iconHTML

    We propose the Fuzzy Grid Based Sequential Pattern Mining Algorithm (FGBSPMA) to generate all fuzzy sequential patterns from relational databases. In FGBSPMA, each quantitative attribute is viewed as a linguistic variable, and can be divided into many candidate 1-dim fuzzy grids. FGBSPMA consists of two phases: one is to generate all the large 1-fuzzy sequences, the other is to generate all the fu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A unified symbolic execution system

    Publication Year: 2001, Page(s):466 - 469
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    Test data generation is one of the hardest tasks in the software life-cycle. Many testing methods try to answer this question, all in a heuristic way. Symbolic execution is one such software testing method that can be used either for program evaluation or in order to assist the automated test data generation process. A number of systems employing symbolic execution for test data generation have al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Web database access using decision diagrams

    Publication Year: 2001, Page(s):519 - 525
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB) | HTML iconHTML

    In some areas of management and commerce that are accelerated by advances in Web technologies, especially in electronic commerce (e-commerce), it is essential to support the decision-making process using formal methods. The problems of e-commerce applications include reducing the time of data access so that huge databases can be searched quickly, decreasing the cost of database design, etc. We pre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward a model of agents society: a descriptive approach

    Publication Year: 2001, Page(s):128 - 131
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    A multi-agent approach to problem resolution is located beyond the complexity of the system of agents and resides in the multitude of interactions between the system components. These multiple interactions, if they permit the resolution of a complex problem, also lead to conflicting situations and situations which are undertaken by agents carrying out redundant actions. Then, it becomes necessary ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generic functional genetic algorithm

    Publication Year: 2001, Page(s):11 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    We present a generic genetic algorithm expressed in the functional programming style, specifically the language Haskell. This is a single, higher order function that can encapsulate the functionality of almost any genetic algorithm, and is accompanied by a library of standard GA components. We demonstrate its flexibility by expressing a number of differing case studies as specific instances of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.