By Topic

Euromicro Conference, 2001. Proceedings. 27th

Date 4-6 Sept. 2001

Filter Results

Displaying Results 1 - 25 of 56
  • Proceedings 27th EUROMICRO Conference. 2001: A Net Odyssey

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (280 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s):461 - 462
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • Delivering the correct multimedia in a standards dominated environment

    Publication Year: 2001, Page(s):331 - 335
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    There is an increasing demand for hypermedia delivery of technical documentation for safety critical systems. The world in which such systems exist is dominated by standards bodies, whose standards rapidly become mandatory. In the world of hypermedia technical documentation, most of the work being done is directed towards data formats for storage and delivery, rather than on quality of content. Pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of a zero-copy protocol implementation

    Publication Year: 2001, Page(s):324 - 330
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    Internet services like the world-wide web and multimedia applications like news- and video-on-demand have become very popular over the last years. Since a high and rapidly increasing number of users retrieve multimedia data with high data rates, the data servers can represent a severe bottleneck. Traditional time and resource consuming operations, like memory copy operations, limit the number of c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing and building software federations

    Publication Year: 2001, Page(s):121 - 129
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB) | HTML iconHTML

    Commercial Off The Shelf tools (COTS) are now widely distributed, of good quality, relatively cheap and cover most of the application domains. It is thus a surprise to consider that it is uncommon to reuse COTS when building large applications. At least it is recognized that building a large application based on COTS is a tough issue. This paper seeks to show why COTS reuse is not a reality: we sh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Components @ work: component technology for embedded systems

    Publication Year: 2001, Page(s):64 - 71
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB) | HTML iconHTML

    The use of component-based software development is getting more common for desktop applications to speed up time to market and reduce development costs. Especially, in the area of embedded real-time systems the reuse of tested and robust parts of prior applications is of great desire, to fulfil the strong requirements on maturity, availability and cost. However, further requirements like low power... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Universal WWW access for heterogeneous client devices

    Publication Year: 2001, Page(s):315 - 322
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB) | HTML iconHTML

    With the growth of using World Wide Web (WWW), WWW has become a powerful means of dissemination of information. Thus, the demand for faster, more efficient, and more convenient ways for accessing to WWW are urgently required. Consequently, the heterogeneous I/O client devices, i.e., DTMF telephone sets, fax machines, pocket PCs, cellular phones, note books, desktop computers, are devised to allow ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On systematic design of protectors for employing OTS items

    Publication Year: 2001, Page(s):22 - 29
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB) | HTML iconHTML

    Off-the-shelf (OTS) components are increasingly used in application areas with stringent dependability requirements. Component wrapping is a well known structuring technique used in many areas. We propose a general approach to developing protective wrappers that assist in integrating OTS items with a focus on the overall system dependability. The wrappers are viewed as redundant software used to d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving software development practices through components

    Publication Year: 2001, Page(s):97 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    Software crisis, a concept coined many years ago but still true today, synthesizes the chronic inadequacy of the software firm to satisfy customer needs. Software development is a very complex process that has not achieved the maturity level that the market requires; software engineering and specific technologies like object orientation and components promise to raise the process capability, reduc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and analysis of redundancy management in distributed object-oriented systems by using UML statecharts

    Publication Year: 2001, Page(s):200 - 207
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB) | HTML iconHTML

    The paper presents techniques that enable the modeling and analysis of redundancy schemes in distributed object-oriented systems. The replication manager, as a core part of the redundancy scheme, is modeled by using UML statecharts. The flexibility of the statechart-based modeling, which includes event processing and state hierarchy, enables an easy and efficient modeling of replication strategies... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SEPAM-CMM implementation for developing telecommunications systems

    Publication Year: 2001, Page(s):272 - 278
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    CMM (Capability Maturity Model) is becoming a standard for organisations asking for a roadmap to evaluate and improve maturity of their processes in developing software/systems. Implementation of the CMM is also an important current activity in research & development at Iskratel Ltd. The paper presents our experience with the use of the SE-CMM (Systems Engineering CMM), particularly with the u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Topological Zoo. Mathematical visualization in virtual environment

    Publication Year: 2001, Page(s):420 - 426
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    Differential geometry and topology are the areas of higher mathematics, which particularly require visual representation of studying objects for better understanding of the material. On the other hand, the complex structure of such objects makes their visualization a challenge for modern graphical systems. In this paper we describe some methods useful for adequate representation of topologically n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the implementation of OOD frameworks in COM

    Publication Year: 2001, Page(s):40 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB) | HTML iconHTML

    Objects that play multiple roles in different contexts are called role objects. Object-oriented design (OOD) frameworks are groups of role objects. These frameworks are increasingly recognised as better units of reuse in software development than single-role objects. Composing OOD frameworks yields role objects. In this paper we discuss the implementation of OOD frameworks, in particular their com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On quality attribute based software engineering

    Publication Year: 2001, Page(s):114 - 120
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    Software components are an incarnation of architectural means to better cope with the variety of quality aspects of software systems. Unfortunately, architectural artifacts appear somewhat magically sometimes, and so do components. Components are not a major extension to OO in the programming language or functional modeling sense, but a basis to address many of the quality requirements, be they di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the technical quality of a universal motor using an evolutionary approach

    Publication Year: 2001, Page(s):287 - 293
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB) | HTML iconHTML

    This paper presents a new procedure for designing the rotor and the stator of a universal motor for home appliances that is based on a genetic algorithm (GA). The GA was employed in order to optimize the independent geometric parameters of the rotor/stator lamination with the aim to reduce the main motor's power losses, i.e. the losses occurring in the iron and the copper. Using this procedure the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Communities of professionals: An innovative experience in a distance learning perspective

    Publication Year: 2001, Page(s):435 - 442
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    The evolution of the economic system towards contexts characterised by greater instability and competitiveness is changing the organisations cognitive processes of the enterprises. The ability to learn and share knowledge and competencies within a network of players represents a key factor in order to manage the growing complexity of the economic and social environment. This scenario forces to ret... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • K-BACEE: knowledge-based automated component ensemble evaluation

    Publication Year: 2001, Page(s):56 - 62
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB) | HTML iconHTML

    Component reuse suffers from the inability of system integrators to effectively identify ensembles of compatible software components that can be easily integrated into a system. To address this problem, we developed a process for identifying component ensembles that satisfy a system requirements specification, and for ranking these ensembles based on a knowledge base of system integration rules. W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer-vision-based human-computer interaction with a back projection wall using arm gestures

    Publication Year: 2001, Page(s):308 - 314
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB) | HTML iconHTML

    A computer-vision-based interaction system for back projection walls is presented. The user controls the projected graphical user interface of an application by pointing with the arm. The mouse cursor follows the motion of the arm. Further instructions corresponding e.g. to a mouse button click can be given by voice commands. The combination of the interaction system with an application program do... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic TV program genre classification based on audio patterns

    Publication Year: 2001, Page(s):370 - 375
    Cited by:  Papers (6)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB) | HTML iconHTML

    We discuss the automatic classification of TV program genre based on audio patterns. The audio patterns are defined as a set of relative probabilities for a set of mid-level audio categories. First, we describe the extraction of these audio patterns. Second, we discuss how to use these audio patterns for genre classification. Our genre classification differs from current methods used for TV progra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software reliability analysis in designing data base oriented applications

    Publication Year: 2001, Page(s):166 - 173
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    The paper deals with the problem of evaluating the reliability of newly created software systems. It outlines the most important problems encountered in integrating reliability with testing and software development issues. We have embedded some of reliability analysis ideas into real software production of data base applications. The paper presents and discusses results of applying these ideas to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decision and risk analysis for process evolution

    Publication Year: 2001, Page(s):240 - 245
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    Evolution is one of the integral parts in the lifecycle of a process. Similar to software, a process often has to be modified in order to fulfill changed process requirements, or to correct problems that occurred during its enactment. Although currently changes are often implemented ad-hoc without any consideration of side-effects and risks, it is obvious that such side-effects and especially the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An optimal method for allocating buffer and bandwidth for MPEG traffic in a network node

    Publication Year: 2001, Page(s):354 - 361
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB) | HTML iconHTML

    Multimedia transmission is becoming a very important service on the Internet. For continuous playback at the client, strict quality of service (QoS) must be provided in an end-to-end manner. To guarantee this QoS supposes a very demanding resource reservation on the network. Therefore, it is necessary to optimise the reservation of network resources. We introduce a new method to optimise the reser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A strategy for managing risk in component-based software development

    Publication Year: 2001, Page(s):12 - 21
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB) | HTML iconHTML

    The reality of component-based development is often very different from the commonly held notion that it is a low risk development strategy, which provides a simple and rapid mechanism for increasing the functionality and capability of a system. In reality component-based development carries significant risk throughout the system life cycle. These risks are related to the nature of COTS software, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible components with frame technology: a case study

    Publication Year: 2001, Page(s):146 - 153
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB) | HTML iconHTML

    Components are rarely reused “as are” most often, we must adapt components' functions, interfaces and other properties to make them fit into a specific reuse context. Therefore, reusable components must be flexible. This paper is a case study in applying frame technology to inject flexibility into components. During reuse, we can engineer anticipated variant requirements into component... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architecture line structure for command and control software

    Publication Year: 2001, Page(s):90 - 96
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    Product line software engineering should include an up-front and ongoing investment in a reusable architecture. Identification, selection, documentation and validation of general architectural patterns and their product line, organisation or domain specific variants allow designers to adopt approved patterns as a starting point. This paper discusses how to apply design patterns to the problems of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.