By Topic

25th Annual International Computer Software and Applications Conference. COMPSAC 2001

8-12 Oct. 2001

Filter Results

Displaying Results 1 - 25 of 90
  • 25th Annual International Computer Software and Applications Conference. COMPSAC 2001

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (586 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s):645 - 647
    Request permission for commercial reuse | PDF file iconPDF (156 KB)
    Freely Available from IEEE
  • Reducing matching time for OPS5 production systems

    Publication Year: 2001, Page(s):429 - 434
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    A rule-based system must satisfy stringent timing constraints when applied to a real-time environment. The most critical performance factor in the implementation of a production system is the condition-testing algorithm. We show an approach designed to reduce the response time of rule-based expert systems by reducing the matching time based on RETE. There are two steps in the method we propose: th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coupling of design patterns: common practices and their benefits

    Publication Year: 2001, Page(s):574 - 579
    Cited by:  Papers (10)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB) | HTML iconHTML

    Object-oriented (OO) design patterns define collections of interconnected classes that serve a particular purpose. A design pattern is a structural unit in a system built out of patterns, not unlike the way a function is a structural unit in a procedural program or a class is a structural unit in an OO system designed without patterns. When designers treat patterns as structural units, they become... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Certificate based authorization simulation system

    Publication Year: 2001, Page(s):190 - 195
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    Using certificates for distributed authorizations in computer network systems has been discussed in the literature. However real implementations of the concept are rarely seen. In our certificate based authorization simulation system (CBASS) project, we prototyped a computer system including some of the emulated functions of an operating system such as machine, user and file management, and emulat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case study on formal design of hybrid control systems

    Publication Year: 2001, Page(s):423 - 428
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    The authors present an approach to the design of hybrid systems by a combination of several comprehensive formalization techniques. We use Duration Calculus (DC) to specify the requirement and design at abstract level of system development. Then the high level designs are further refined in control theory. A formal verification may be done either in DC if it is possible, or in predicate calculus u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An unsupervised segmentation framework for texture image queries

    Publication Year: 2001, Page(s):569 - 573
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    In this paper a novel unsupervised segmentation framework for texture image queries is presented. The proposed framework consists of an unsupervised segmentation method for texture images, and a multi-filter query strategy. By applying the unsupervised segmentation method on each texture image, a set of texture feature parameters for that texture image can be extracted automatically. Based upon th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Windows CE implementation of a middleware architecture supporting time-triggered message-triggered objects

    Publication Year: 2001, Page(s):181 - 189
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB) | HTML iconHTML

    The time-triggered message-triggered object (TMO) programming scheme has been established to remove the limitation of conventional object programming techniques and tools in developing applications containing real-time (RT) distributed computing components. It is a unified approach for efficient design and implementation of both RT and non-RT distributed applications. As a cost-effective facility ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality planning for software development

    Publication Year: 2001, Page(s):104 - 109
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    A historical project is used as a reference model for the verification planning process. The planning equations and an example are presented. The example objective set is to increase the level of defect removal from the final software from the historical level of 35% to about 88% of the defects introduced into the code and to reduce the overall number of delivered defects/KLOC by 85%. The example ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building and managing XML/XSL-powered Web sites: an experience report

    Publication Year: 2001, Page(s):547 - 554
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (912 KB) | HTML iconHTML

    The World Wide Web Consortium's eXtensible Markup Language (XML) and the eXtensible Stylesheet Language (XSL) are standards defined in the interest of multipurpose publishing and content reuse. XML and XSL have been gaining popularity rapidly both in industry and in academia. Although much has been written on XML/XSL-based solutions, there exists a gap between theory and practice. In this paper we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algebraic transformations in regular array design

    Publication Year: 2001, Page(s):417 - 422
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    Efficient parallelizing and mapping of algorithms onto regular arrays requires algebraic transformations. The paper considers the Iso-plane method for a class of algebraic transformations on the polytope model of algorithm. This method uses the partitioning of the ranges of loop indices in order to increase the dimensionality of the problem representation and a specific reordering of computations.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model driven process engineering

    Publication Year: 2001, Page(s):225 - 230
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    Within the domain of information systems, one of the main technological moves we may presently observe in industrial circles is the paradigm shift from object composition to model transformation. This is happening at a very fast pace. Among the concrete signs of this evolution one may mention the ongoing change at the Object Management Group from OMA (Object Management Architecture) to MDA (Model-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-ADOME: enacting composite E-services in an advanced workflow environment

    Publication Year: 2001, Page(s):311 - 316
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    E-services refer to services provided via the Internet. To provide value-added and composite e-services, we need an information system that can coordinate API-based, interactive web-based and human agents, internal and external to an organization. We present an environment to model and enact composite e-services as workflows, by extending our ADOME-WFMS (Advanced Object Modeling Environment-Workfl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualization issues for software requirements negotiation

    Publication Year: 2001, Page(s):10 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    Negotiating the right balance between conflicting requirements is often a key to the successful software projects. For large projects, requirements negotiation can be especially difficult to do effectively and efficiently when combining input from non-co-located experts and reaching consensus among the different stakeholders (e.g., end-users, developers, software assurance, customers) as well as a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Category-based Web personalization system

    Publication Year: 2001, Page(s):621 - 625
    Cited by:  Papers (1)  |  Patents (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    There has been a massive growth in systems on the Internet that can personalize the content delivered to individual users. This paper develops a category-based Web personalization system in which an unconventional system logger, along with a category generator and a customizer, was designed. This system obtains and records more precise information directly from the users' activity and the objects ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scenario-based functional regression testing

    Publication Year: 2001, Page(s):496 - 501
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB) | HTML iconHTML

    Regression testing has been a popular quality-assurance technique. Most regression testing techniques are based on code or software design. This paper proposes a scenario-based functional regression testing, which is based on end-to-end (E2E) integration test scenarios. The test scenarios are first represented in a template model that embodies both test dependency and traceability. By using test d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal design of real-time components on a shared data space architecture

    Publication Year: 2001, Page(s):143 - 150
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB) | HTML iconHTML

    We present a formal approach to the top-down design of real-time components that communicate using a shared data space. The approach is compositional, that is, only the formal specifications of the components are used to reason about their combined behaviour Formal reasoning is supported by the interactive theorem prover PVS. Our shared data space model is based on the so are architecture SPLICE, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous decentralized database system for assurance in heterogeneous e-business

    Publication Year: 2001, Page(s):589 - 595
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    Due to the advancement in the Information Technology, different kind of companies with heterogeneous needs have had the necessity to cooperate among them to get more benefit in a continuous changing market. That is heterogeneous e-business. In order to cope with such kind of e-business, a platform which can effectively realize heterogeneous needs, real time, flexibility and fault-tolerance is need... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An XML-message based architecture description language and architectural mismatch checking

    Publication Year: 2001, Page(s):561 - 566
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB) | HTML iconHTML

    Current component interfaces, such as those defined by CORBA, are devoid of additional constraints that make helps in the task of composing software, therefore the dependent relations and interaction protocols among components are hidden within the implementations. The "implicity" reduces the composability and makes it difficult to reuse, validate and manage components. This paper presents a messa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A knowledge-oriented clustering technique based on rough sets

    Publication Year: 2001, Page(s):632 - 637
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    Presents a knowledge-oriented clustering method based on rough set theory. The method evaluates the simplicity of classification knowledge during the clustering process and produces readable clusters reflecting the global features of objects. The method uses a newly-introduced measure, the indiscernibility degree, to evaluate the importance of equivalence relations that are related to the roughnes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic generation of database instances for white-box testing

    Publication Year: 2001, Page(s):161 - 165
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Testing is a critical activity for database application programs as faults if undetected could lead to unrecoverable data loss. Database application programs typically contain statements written in an imperative programming language with embedded data manipulation commands, such as SQL. However relatively little study has been made in the testing of database application programs. In particular, fe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault-based testing in the absence of an oracle

    Publication Year: 2001, Page(s):172 - 178
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    Although testing is the most popular method for assuring software quality, there are two recognized limitations, known as the reliable test set problem and the oracle problem. Fault-based testing is an attempt by Morell to alleviate the reliable test set problem. In this paper, we propose to enhance fault-based testing to address the oracle problem as well. We present an integrated method that com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QAME - QoS-aware management environment

    Publication Year: 2001, Page(s):269 - 274
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    Providing QoS-guaranteed services in current installed networks is an important issue, only the deploying QoS services is not enough to guarantee their success: QoS management must also be provided. Nowadays, policy-based management addresses this need, but such management is not enough either network managers often deal with QoS tasks that cannot be performed using only policy-based management Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A memory-based reasoning approach for assessing software quality

    Publication Year: 2001, Page(s):97 - 103
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    Several methods have been explored for assuring the reliability of mission critical systems (MCS), but no single method has proved to be completely effective. This paper presents an approach for quantifying the confidence in the probability that a program is free of specific classes of defects. The method uses memory-based reasoning techniques to admit a variety of data from a variety of projects ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Availability requirement for fault management server

    Publication Year: 2001, Page(s):468 - 473
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    In this paper, we examine the availability requirement for the fault management server in high-availability communication systems. According to our study, we find that the availability of the fault management server does not need to be 99.999% in order to guarantee a 99.999% system availability as long as the fail-safe ratio (the probability that the failure of the fault management server will not... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.