By Topic

25th Annual International Computer Software and Applications Conference. COMPSAC 2001

8-12 Oct. 2001

Filter Results

Displaying Results 1 - 25 of 90
  • 25th Annual International Computer Software and Applications Conference. COMPSAC 2001

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (586 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s):645 - 647
    Request permission for commercial reuse | PDF file iconPDF (156 KB)
    Freely Available from IEEE
  • Context-sensitive distributed software development for ubiquitous computing environments

    Publication Year: 2001, Page(s):263 - 268
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB) | HTML iconHTML

    Ubiquitous computing represents the next wave of distributed computing, which focus on integrating computers with various wearable, mobile, and sensor devices, thus making computing and communication essentially transparent to the users. This type of environments mainly consists of myriad of embedded computing nodes interacting in transparent fashion to provide different services to the users. In ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A quantitative comparison of load balancing approaches in distributed object computing systems

    Publication Year: 2001, Page(s):257 - 262
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    Several load balancing schemes have been proposed for distributed object computing systems, which are widely envisioned to be the desired distributed software development paradigm due to the higher modularity and the capability of handling machine and operating system heterogeneity. However, while the rationales and mechanisms employed are dramatically different, the relative strengths and weaknes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel intrusion detection system model for securing web-based database systems

    Publication Year: 2001, Page(s):249 - 254
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    Intrusion detection (ID) has become an important technology for protecting information resources and databases from malicious attacks and information leakage. This paper proposes a novel two-layer mechanism to detect intrusions against a web-based database service. Layer one builds historical profiles based on audit trails and other log data provided by the web server and database server. Pre-alar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • InfoSleuth: agent-based system for data integration and analysis

    Publication Year: 2001, Page(s):474 - 476
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    InfoSleuth is an agent-based system that automates the gathering and analysis of dynamic, distributed data accessible over the web. To gather data, a user specifies an SQL query which references elements from a common domain ontology (i.e., terminology). Agents then locate resources that have advertised having data relevant to these elements and translate the ontology-based query into queries refe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accomplishing adaptability in simulation frameworks: the Bubble approach

    Publication Year: 2001, Page(s):437 - 444
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB) | HTML iconHTML

    Enforcing framework adaptability is one of the key points in the process of building an object-oriented application framework. When it comes to simulation, some adaptation mechanisms to configure components on-the-fly are usually required in order to produce quality software artifacts and alleviate development effort. The paper reports on an experience using a simulation multi-agent framework, ini... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing role hierarchies for access control in workflow systems

    Publication Year: 2001, Page(s):117 - 122
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    Due to the correspondence between the role abstraction in Role-based Access Control (RBAC) and the notion of organizational positions, it seems easy to construct role hierarchies. This is, however, a misconception. This paper argues that, in order to reflect the functional requirements, a role hierarchy becomes very complex. In a bid to simplify the design of role hierarchies suitable for the expr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EC-SignGate: electronic contract signing gateway

    Publication Year: 2001, Page(s):245 - 248
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    We describe the motivation, the concept, and the architecture of our electronic contract signing gateway (EC-SignGate) that lets e-merchants without public key infrastructure installation employ digital signatures in their web-based e-business View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Availability requirement for fault management server

    Publication Year: 2001, Page(s):468 - 473
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    In this paper, we examine the availability requirement for the fault management server in high-availability communication systems. According to our study, we find that the availability of the fault management server does not need to be 99.999% in order to guarantee a 99.999% system availability as long as the fail-safe ratio (the probability that the failure of the fault management server will not... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing matching time for OPS5 production systems

    Publication Year: 2001, Page(s):429 - 434
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    A rule-based system must satisfy stringent timing constraints when applied to a real-time environment. The most critical performance factor in the implementation of a production system is the condition-testing algorithm. We show an approach designed to reduce the response time of rule-based expert systems by reducing the matching time based on RETE. There are two steps in the method we propose: th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Melanoma prediction using data mining system LERS

    Publication Year: 2001, Page(s):615 - 620
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    One of the important tools for early diagnosis of malignant melanoma is the total dermatoscopy score (TDS), computed using the ABCD (asymmetry, border, color, diameter) formula. Our primary objective was to check whether the ABCD formula is optimal. Using a data set containing 276 cases of melanoma and the LERS (Learning from Examples based on Rough Sets) data mining system, we checked more than 2... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From software architecture to implementation with UML

    Publication Year: 2001, Page(s):113 - 114
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Although originally developed to describe OO design, today UML is also being used to describe software architecture. However, using the same notation for different levels of abstraction can create confusion. In this paper we illustrate some of the important differences between software architecture models and implementation models in UML View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Back-end software for highly dependable real-time control systems

    Publication Year: 2001, Page(s):237 - 244
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB) | HTML iconHTML

    A new generation of highly dependable real-time control systems (such as automotive brake-by-wire and steer-by-wire) is under development. Specific application domain requirements lead to the new features to be supported by the system software. These requirements are best supported by a time-triggered approach. Motorola is working on the time-triggered fault-tolerant communication hardware as well... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ELKAR: a component based re-engineering methodology to provide cooperation

    Publication Year: 2001, Page(s):65 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    There is an increasing demand from firms to evolve their applications to be more co-operative. The problem is to realise this migration and to maintain the quality of existing applications which are reliable due to previously encountered difficulties We will propose a method based on an organisation of dynamic workgroups (their composition can evolve with time) composed of components. The method i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • End-to-end integration testing design

    Publication Year: 2001, Page(s):166 - 171
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    Integration testing has always been a challenge especially if the system under test is large with many subsystems and interfaces. This paper proposes an approach to design End-to-End (E2E) integration testing, including test scenario specification, test case generation and tool support. Test scenarios are specified as thin threads, each of which represents a single function from an end user's poin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An application of data warehouse technology to the measurement system for UML based artifacts

    Publication Year: 2001, Page(s):459 - 467
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB) | HTML iconHTML

    A novel system, Project Data Warehouse, for the measurement of changes in development artifacts based on data warehouse technology is reported. The new system is based on an architecture that is extendable to store various kinds of UML based development artifacts and flexible to apply the various types of measurements to quantify the changes in those artifacts. Also, it provides multi-dimensional ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case study on formal design of hybrid control systems

    Publication Year: 2001, Page(s):423 - 428
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    The authors present an approach to the design of hybrid systems by a combination of several comprehensive formalization techniques. We use Duration Calculus (DC) to specify the requirement and design at abstract level of system development. Then the high level designs are further refined in control theory. A formal verification may be done either in DC if it is possible, or in predicate calculus u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Index Miner

    Publication Year: 2001, Page(s):613 - 614
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    Index Miner is a Java-based data mining tool which contains the methodologies of classification, clustering, association rules, visualization, attribute transformation and feature selection. The paper briefly introduces this tool and discusses the methods that are implemented in this tool to show how to create and perform a learning process for data in order to mine the patterns that are hidden in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Task and team management in the Distributed Software Project Management Tool

    Publication Year: 2001, Page(s):401 - 408
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB) | HTML iconHTML

    The Distributed Software Project Management Tool (DSPMtool) is an integration of tools opening the realms of software project management to users distributed across the world. The first prototype presented the core of a software repository and configuration management. The authors present DSPMtool's second prototype and introduce new concepts of task and team management to improve the quality of s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-ADOME: enacting composite E-services in an advanced workflow environment

    Publication Year: 2001, Page(s):311 - 316
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    E-services refer to services provided via the Internet. To provide value-added and composite e-services, we need an information system that can coordinate API-based, interactive web-based and human agents, internal and external to an organization. We present an environment to model and enact composite e-services as workflows, by extending our ADOME-WFMS (Advanced Object Modeling Environment-Workfl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality planning for software development

    Publication Year: 2001, Page(s):104 - 109
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    A historical project is used as a reference model for the verification planning process. The planning equations and an example are presented. The example objective set is to increase the level of defect removal from the final software from the historical level of 35% to about 88% of the defects introduced into the code and to reduce the overall number of delivered defects/KLOC by 85%. The example ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business rules specification, enforcement and distribution for heterogeneous environments

    Publication Year: 2001, Page(s):3 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    Business rules are statements about the enterprise's way of doing business. They become requirements that govern the operational system of the enterprise and determine constraints for any system developed or procured for an enterprise. This paper addresses an architecture for the specification, enforcement and distribution of business rules, as a way of achieving the interoperability of distribute... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing process: taming the Web development cycle

    Publication Year: 2001, Page(s):233 - 234
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    In this paper, we present an outline of a process for developing design products. The advantage of having a process for these types of projects is that it allows us to focus on the creative aspects of the project, by reducing team stress. The design process also allows us to integrate the creative aspects of a Web project with the more mundane aspects of software development View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous decentralized database system for assurance in heterogeneous e-business

    Publication Year: 2001, Page(s):589 - 595
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    Due to the advancement in the Information Technology, different kind of companies with heterogeneous needs have had the necessity to cooperate among them to get more benefit in a continuous changing market. That is heterogeneous e-business. In order to cope with such kind of e-business, a platform which can effectively realize heterogeneous needs, real time, flexibility and fault-tolerance is need... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.