By Topic

Proceedings ACS/IEEE International Conference on Computer Systems and Applications

25-29 June 2001

Filter Results

Displaying Results 1 - 25 of 96
  • Proceedings ACS/IEEE International Conference on Computer Systems and Applications

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (425 KB)
    Freely Available from IEEE
  • Neural speech synthesis system for Arabic language using CELP algorithm

    Publication Year: 2001, Page(s):119 - 121
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    Speech is the most natural and widespread form of human communication. That is why speech synthesis has interested researchers for decades. It turns out that developing an unlimited text-to-speech system is an enormous task. The traditional methods (synthesis by rule and synthesis by concatenation of pre-recorded sounds) used for this have not given good results. In such a situation, neural networ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling data repository and formalizing content-based queries for image databases

    Publication Year: 2001, Page(s):168 - 174
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (709 KB) | HTML iconHTML

    Content-based image retrieval is one of the current active and promising research topics in image analysis and image management. The work of transferring the results of this research to support images in DBMS has also been initiated by many researchers and commercial systems. We first illustrate the importance of using content-based operations in combination with the traditional database operation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Static and dynamic reverse engineering of relational database applications: a form-driven methodology

    Publication Year: 2001, Page(s):191 - 194
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (449 KB) | HTML iconHTML

    We propose a form-based approach for reverse engineering of legacy relational database applications. The approach consists of three dependent steps: (1) acquisition of both structure and instances of forms; (2) extraction of the static aspect of the legacy database: through a combination of forms structures and data instance analysis, forms relational sub-schemas and their constraints are derived.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of extended vector-scalar operations using reconfigurable computing

    Publication Year: 2001, Page(s):227 - 232
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (551 KB) | HTML iconHTML

    This paper maps a new application, namely vector-scalar operations, onto the M1 MorphoSys (from UCI) reconfigurable computing system. A performance analysis study of the M1 RC is also presented to evaluate the efficiency of the algorithm execution on the M1 system. For instance, two algorithms on an 8/spl times/8 RC array M1 were run, and numerical examples were simulated to validate our results, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formalizing COSMIC-FFP using ROOM

    Publication Year: 2001, Page(s):312 - 318
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB) | HTML iconHTML

    We propose a formalization of the COSMIC Full Function Point (COSMIC-FFP) measure for the Real-time Object Oriented Modeling (ROOM) language. COSMIC-FFP is a measure of the functional size of software. It has been proposed by the COSMIC group as an adaptation of the function point measure for real-time systems. The definition of COSMIC-FFP is general and can be applied to any specification languag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CORBA views: distributing objects with views

    Publication Year: 2001, Page(s):369 - 378
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (795 KB) | HTML iconHTML

    We propose a model for building object oriented applications based on the composition of application slices or fragments that provide their own overlapping definitions or expectations of the same domain objects. Different slices may implement different functional or implementation concerns, or embody different access rights and privileges to the same domain objects. We call such slices views and w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keep it small and smart

    Publication Year: 2001, Page(s):537 - 543
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1189 KB) | HTML iconHTML

    The production of interactive multimedia content is in most cases an expensive task in terms of time and cost. It must hence be the goal to optimize the production by exploiting the reusability of interactive multimedia elements. Reusability can be triggered by a combination of reusable multimedia components, together with the appropriate use of metadata to control the components as well as their ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2001, Page(s):562 - 564
    Request permission for commercial reuse | PDF file iconPDF (146 KB)
    Freely Available from IEEE
  • A Reuse Description Formalism

    Publication Year: 2001, Page(s):395 - 401
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB) | HTML iconHTML

    Software reuse has been claimed to be one of the most promising approaches to enhance programmer productivity and software quality. One of the problems to be addressed to achieve high software reuse is organizing databases of software experience, in which information on software products and processes is stored and organized to enhance reuse. We present a system to define and construct such databa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic optimization of variable structure PID control systems

    Publication Year: 2001, Page(s):27 - 30
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    This paper describes the design of a variable structure PID control system (VSPID) using genetic algorithms. This VSPID has a structure similar to that of the simple PID controller where the PD mode is used to speed up response, whereas the PI mode is applied to eliminate the steady state offset. Flexible changes of controller modes and parameter values of the VSPID could therefore solve the confl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Taxonomy of process modeling languages

    Publication Year: 2001, Page(s):435 - 437
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Process modeling languages (PMLs) are languages used to express software process models. Process centered software engineering environments (PSEEs) are the environments used to define, modify, analyze and enact a process model. While both PMLs and PSEEs are important, it is the characteristics of PMLs that are the focus of the article, which leads to a taxonomy different from that presented in oth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Democratic data fusion for information retrieval mediators

    Publication Year: 2001, Page(s):530 - 536
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A genetic-based neuro-fuzzy generator: NEFGEN

    Publication Year: 2001, Page(s):18 - 23
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    This paper is concerned with the design of a new generation of intelligent systems. These systems or machines are intelligent if they are able to improve their performance or maintain an acceptable level of performance in the presence of uncertainty. The ability of these systems to examine and modify their behaviors in a limited sense is usually achieved by using techniques such as knowledge-based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A service oriented standardised system for virtual private networks

    Publication Year: 2001, Page(s):360 - 366
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB) | HTML iconHTML

    Success on the global market has made the adoption of modern management and administration structures of prime importance. The administration of heterogeneous sets of services and applications necessitates the use of information technology, which facilitates cross-organisational process planning and tracking. We describe a virtual private network architecture that uses special monitoring and co-or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Principal component analysis of multispectral images using neural network

    Publication Year: 2001, Page(s):89 - 95
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB) | HTML iconHTML

    The conventional approach of PCA applied to multispectral images involves the computation of the spectral image covariance matrix and application of diagonalization procedures for extracting the eigenvalues and corresponding eigenvectors. When the number of spectral images grows significantly, the matrix computation and manipulation become practically inefficient and inaccurate due to round-off er... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constraint-based timetabling-a case study

    Publication Year: 2001, Page(s):67 - 72
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    This paper reports a case study in applying constraint satisfaction techniques to university and school timetabling. It involves the construction of a substantial, carefully specified, fully tested and fully operational system. The software engineering aspect of constraint satisfaction is emphasized. Constraint satisfaction problems are expressed in a language more familiar to the formal software ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object based software engineering with hidden sorted ECATNets and hidden labeled rewriting logic

    Publication Year: 2001, Page(s):386 - 391
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    Hidden sorted ECATNets and hidden labeled rewriting logic were introduced independently from each other. Hidden sorted ECATNets were developed to meet the objectives of object based software engineering. Their semantics in terms of logic of concurrency allows them to be used in the life cycle of sequential as well as concurrent and distributed systems. They are mainly useful in the earliest stages... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A security analysis for label switching routers

    Publication Year: 2001, Page(s):525 - 529
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generic functional genetic algorithm

    Publication Year: 2001, Page(s):11 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    We present a generic genetic algorithm expressed in the functional programming style, specifically the language Haskell. This is a single, higher order function that can encapsulate the functionality of almost any genetic algorithm, and is accompanied by a library of standard GA components. We demonstrate its flexibility by expressing a number of differing case studies as specific instances of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling resources in a UML-based simulative environment

    Publication Year: 2001, Page(s):405 - 410
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB) | HTML iconHTML

    The importance of early performance assessment grows as software systems increase in terms of size, logical distribution and interaction complexity. Lack of time on the side of software developers, as well as distance between software model notations and performance model representation do not help to build an integrated software process that takes into account, from the early phases of the lifecy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalability analysis and domain decomposition of large eddy simulations of ship wakes

    Publication Year: 2001, Page(s):213 - 219
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB) | HTML iconHTML

    Simulation of turbulent fluctuations in ship wakes is one of the complex applications of large eddy simulations in computational fluid dynamics (CFD). Ship wake simulation requires extensive computations and large amounts of computer resources. The accuracy of ship wake prediction is limited by the memory of the workstation. We present the parallel implementation of large eddy simulations (LES) of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Arabic object-oriented programming language Al-Risalh

    Publication Year: 2001, Page(s):424 - 427
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Al-Risalh is an Arabic pure object-oriented programming language that has the basic mechanisms of object-orientation, objects, classes, and messages. Also the language has the full support of object orientation concepts. The Al-Risalh language supports application programming as well as systems programming. The paper introduces the language that can used to teach Arabic-speaking students, how to p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed mutual exclusion token-permission based by prioritized groups

    Publication Year: 2001, Page(s):253 - 259
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    Sites with the same priority are gathered in the same group. Communication inside a group is organized in a logical rooted tree structure. The tree's root is the site that last held the token. This organization is similar to that of Raymond's algorithm (1989). For its external communications, a group resorts to an external supplementary element: a router. This router manages external communication... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case study with relational database metrics

    Publication Year: 2001, Page(s):485 - 487
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    Metrics are useful mechanisms for assuring database quality. However, it is necessary to prove the practical utility of the metrics because they must be used in real life. Consequently if the metrics are not useful from a practical point of view, they must be rejected. We present the metrics we have proposed for controlling the quality of relational databases and we present the case study develope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.