By Topic

12th International Conference of the Chilean Computer Science Society, 2002. Proceedings.

6-8 Nov. 2002

Filter Results

Displaying Results 1 - 25 of 29
  • Proceedings 22nd International Conference of the Chilean Computer Science Society

    Publication Year: 2002
    Request permission for commercial reuse | PDF file iconPDF (293 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2002, Page(s): 243
    Request permission for commercial reuse | PDF file iconPDF (176 KB)
    Freely Available from IEEE
  • Improved antidictionary based compression

    Publication Year: 2002, Page(s):7 - 13
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    The compression of binary texts using antidictionaries is a novel technique based on the fact that some substrings (called "antifactors") never appear in the text. Let sb be an antifactor where b is its last bit. Every time s appears in the text we know that the next bit is b~ and hence omit its representation. Since building the set of all antifactors is space consuming at compression time, it is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the distribution of keys by hashing

    Publication Year: 2002, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    The distribution of keys by a hash function as used in hash search with chaining is studied by considering the distribution of keys a random function front keys to buckets would give. This model gives surprisingly simple expressions for the mean value of some statistics on hash functions. It is also seen that the universal hash functions give the same distribution of keys, and so the results here ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On procedure recognition in the Situation Calculus

    Publication Year: 2002, Page(s):33 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    The aim of our ongoing research is to give a method to construct intelligent tutoring systems for agents who are executing typical procedures in dynamic environments based on a logical framework. Typical procedures are similar to plans in the sense that they describe the actions an agent should execute to achieve a certain goal. In this paper we address what we consider is the first step toward th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling data using fuzzy attributes

    Publication Year: 2002, Page(s):117 - 123
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    We present a proposal for the application of fuzzy logic to conceptual modeling as an extension to the EER model. In order to do this, we extend some EER components to fuzzy ERR and we propose a notation for fuzzy representations, such as fuzzy values in the attributes, the degree in each value of an attribute and the degree in a set of values of diverse attributes, as well as fuzzy entities treat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality of service for ad hoc wireless network

    Publication Year: 2002, Page(s):100 - 105
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    Wireless networks represent the new computer paradigm. They have as main function to provide users with permanent access, independently of their physical location. With the decrease in the costs of portable devices and the increase in their capacity, a new concept called ad hoc network appeared. Through this technology, communication is made directly between mobile computers. In this paper, the pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing visual component composition environments

    Publication Year: 2002, Page(s):217 - 225
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    Current visual programming environments offer a variety of composition possibilities. Most of these environments provide drag and drop facilities of components on a form and let the interaction between components be defined by selecting suitable components and checking the incompatibilities of the resulting composition. Thus, the special nature of component-based development environments induces r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MiRABIT: A new algorithm for mining association rules

    Publication Year: 2002, Page(s):162 - 166
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    Mining a sales transaction database is a very expensive task in terms of the processing time. Depending on the business branch of the company some characteristics of the database are different. The algorithms currently used for mining association rules optimize this task for databases with supermarket characteristics. The MiRABIT algorithm that is presented in this work optimizes the mining task f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaborative multilevel adaptation in distributed mobile applications

    Publication Year: 2002, Page(s):82 - 90
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (467 KB) | HTML iconHTML

    The next years will be characterized by high levels of heterogeneity and interactions among devices connected to global networks. The first researches involving wide-area distributed systems answered many questions concerning resource management, although they fail in treating questions related to heterogeneity and dynamic adaptation. More recent works, through technologies like CORBA and Java/Jin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dealing with overloading in tasks scheduling

    Publication Year: 2002, Page(s):24 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    Recently, there has been an increasing interest in programming models of real-time systems and approaches of flexible scheduling for dealing with situations of transient overloading, which can occur in nondeterministic environments. This paper presents the (p+i, k)-firm approach that can be seen as a combination and generalization of imprecise computing and of deadline (m,k)-firm. This approach ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Socket-masking and SNMP: a hybrid approach for QoS monitoring in mobile computing environments

    Publication Year: 2002, Page(s):106 - 114
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (393 KB) | HTML iconHTML

    Concomitantly to the extraordinary growth of the multimedia applications, a great development in the field of mobile communications took place, the union of these areas provided a whole new set of fascinating services to end-users. However, the multimedia traffic tends to emphasize the wireless network's limitations making it necessary for the development of applications that are able to adapt the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable QoS approach in a core internet network

    Publication Year: 2002, Page(s):93 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    QoS solutions for Core Internet Networks require that we pay special attention to scalability, as they deal with a lot of flows and demand many resources. In this paper, integrated solutions from the physical layer (SDH/SONET and DTM) to the IP layer (IntServ and DiffServ) are analysed and proposed, concentrating not only on scalability, but also on QoS guarantees. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental, collaborative software process improvement in a tiny software group

    Publication Year: 2002, Page(s):187 - 194
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    Defined software processes using quality models like CMM have proven to be effective means to develop software in large organizations. The effort required to define or tailor a process for a very small group may easily exceed available resources. Our aim is to define a software process compatible with CMM level 3 for a 1-dozen engineer organization, without committing significant resources. We hav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mapping rules to convert from ODL to XML-SCHEMA

    Publication Year: 2002, Page(s):133 - 141
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    As new standards for technology specifications related to XML are unveiled, and stable tools to implement them become available, the widespread usage of XML as a universal format for data exchange between heterogeneous systems (using the Internet), will increasingly become a reality. Therefore, in order to deal efficiently with the large amounts of XML data that will be generated in the near futur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data warehouse design: a schema-transformation approach

    Publication Year: 2002, Page(s):153 - 161
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    This paper addresses DW design problems, with the goal of improving the DW logical design process. Some of the existing work in transformation oriented methodologies for DW design construct the DW starting from an entity-relationship model of the source database, and arrive to a conceptual or high-level-logical dimensional model of the DW. We propose a mechanism for obtaining the DW logical schema... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing wireless networks with transition mechanisms

    Publication Year: 2002, Page(s):72 - 81
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    The deployment of wireless networks based on IPv4 is spreading quickly all over the world. However, there is a strong shortage of public IPv4 addresses. Because of this, IPv6 has recently, received a new push of development. Most of the advances related to IPv6 are concerned to the development of transition mechanisms allowing IPv6 hosts to communicate through an existing IPv4 infrastructure or ye... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximate and on-line algorithms for list update problem

    Publication Year: 2002, Page(s):14 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB) | HTML iconHTML

    In this paper we present two algorithms for solving the list update problem which is to maintain a list of items to support such basic operations as access, insert and delete. The first algorithm proposed is an approximation to the optimal off-line algorithm. Knowing the complete request sequence, it provides a good approximation to the lower bound of the optimum cost and finds an approximately op... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost effective vision system for mobile robots

    Publication Year: 2002, Page(s):43 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (485 KB) | HTML iconHTML

    A Webcam-based vision system for performing image processing in real time in a restricted environment is presented. A color based image segmentation algorithm is the fundamental part of the system. Algorithm efficiency was very important due to hardware limitations. This led to a simple and cost-effective vision system that is able to detect and identify several mobile robots through successive fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Problems in the maintenance of a federated database schema

    Publication Year: 2002, Page(s):124 - 132
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    We characterize the problem of maintenance of a federated schema to cope with local schema evolution in a tightly coupled federation. By means of an example, we present the problems that local schema changes could cause on the federated schema and show proposed solutions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Holo Debugger: a debugger for a concurrent multiparadigm language

    Publication Year: 2002, Page(s):226 - 233
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    The Hololanguage (briefly, Holo) is a programming language derived from a new software development paradigm, the Holoparadigm. This paper provides an initial treatment to the problem of supporting the debug process of Holo-programs. To this end, an extension is proposed to the Holoplatform, the Holo Extension for Debugging (HED). Finally, the Holo Debugger a simple debugger is presented to illustr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing OLAP interoperability with OLAPWare

    Publication Year: 2002, Page(s):167 - 176
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (590 KB) | HTML iconHTML

    This paper presents OLAPWare and how to achieve OLAP interoperability with its use. OLAPWare is a Java middleware for providing OLAP Services compliant with the OLE DB for OLAP standard. OLE DB for OLAP is an industrial standard for allowing interoperability among OLAP tools. However, it is limited to the Windows/COM platform, even when a Java API is used. By using OLAPWare to overcome this limita... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A constraint parser for contextual rules

    Publication Year: 2002, Page(s):234 - 242
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (583 KB) | HTML iconHTML

    In this paper we describe a constraint analyser for contextual rules. Contextual rules constitute a rule-based formalism that allows rewriting of terminals and/or non terminal sequences taking in account their context. The formalism allows also to refer to portions of text by means of exclusion zones, that is, patterns that are only specified by a maximum length and a set of not allowed categories... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An overview of industrial software documentation practice

    Publication Year: 2002, Page(s):179 - 186
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    A system documentation process maturity model and assessment procedure were developed and used to assess 91 projects at 41 different companies over a seven year period. During this time the original version evolved into a total of four versions based on feedback from industry and the experience gained from the assessments. This paper reports the overall results obtained from the assessments which ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling EAI [Enterprise Application Integration]

    Publication Year: 2002, Page(s):195 - 203
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    Software integration has been a solution to the problem of connecting dissimilar systems for many years. Integration is still a challenging issue. EAI is defined as the process of integrating enterprise systems with existing applications. Since software integration research has yielded a variety of different concepts, we survey and discuss this terminology. EAI arises as an evolution of the CASE t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.