By Topic

Computer Science Society, 2002. SCCC 2002. Proceedings. 22nd International Conference of the Chilean

Date 6-8 Nov. 2002

Filter Results

Displaying Results 1 - 25 of 29
  • Proceedings 22nd International Conference of the Chilean Computer Science Society

    Publication Year: 2002
    Request permission for commercial reuse | PDF file iconPDF (293 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2002, Page(s): 243
    Request permission for commercial reuse | PDF file iconPDF (176 KB)
    Freely Available from IEEE
  • MiRABIT: A new algorithm for mining association rules

    Publication Year: 2002, Page(s):162 - 166
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    Mining a sales transaction database is a very expensive task in terms of the processing time. Depending on the business branch of the company some characteristics of the database are different. The algorithms currently used for mining association rules optimize this task for databases with supermarket characteristics. The MiRABIT algorithm that is presented in this work optimizes the mining task f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data warehouse design: a schema-transformation approach

    Publication Year: 2002, Page(s):153 - 161
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    This paper addresses DW design problems, with the goal of improving the DW logical design process. Some of the existing work in transformation oriented methodologies for DW design construct the DW starting from an entity-relationship model of the source database, and arrive to a conceptual or high-level-logical dimensional model of the DW. We propose a mechanism for obtaining the DW logical schema... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation-based architectural evaluation for collaborative systems

    Publication Year: 2002, Page(s):204 - 213
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (529 KB) | HTML iconHTML

    Software quality can be expressed through various attributes, many of which depend on the architecture by nature. Therefore an architecture-focused development process, with an integrated self-evaluation, must be selected. Since there is no known process covering these attributes, a method capable of evaluating the architecture must be built into the development process. The purpose of this resear... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Problems in the maintenance of a federated database schema

    Publication Year: 2002, Page(s):124 - 132
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    We characterize the problem of maintenance of a federated schema to cope with local schema evolution in a tightly coupled federation. By means of an example, we present the problems that local schema changes could cause on the federated schema and show proposed solutions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling EAI [Enterprise Application Integration]

    Publication Year: 2002, Page(s):195 - 203
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    Software integration has been a solution to the problem of connecting dissimilar systems for many years. Integration is still a challenging issue. EAI is defined as the process of integrating enterprise systems with existing applications. Since software integration research has yielded a variety of different concepts, we survey and discuss this terminology. EAI arises as an evolution of the CASE t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the distribution of keys by hashing

    Publication Year: 2002, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    The distribution of keys by a hash function as used in hash search with chaining is studied by considering the distribution of keys a random function front keys to buckets would give. This model gives surprisingly simple expressions for the mean value of some statistics on hash functions. It is also seen that the universal hash functions give the same distribution of keys, and so the results here ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Querying XML databases

    Publication Year: 2002, Page(s):142 - 150
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    The XML (eXtensible Mark-up Language), proposed by the W3C (World Wide Web Consortium) as the new standard for data representation and exchange in the Internet, is a document mark-up (meta) language that seems adequate to the needs of today's World Wide Web. With the proliferation of XML documents in the Web, it is necessary to store and query them efficiently. It is our purpose to investigate the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximate and on-line algorithms for list update problem

    Publication Year: 2002, Page(s):14 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB) | HTML iconHTML

    In this paper we present two algorithms for solving the list update problem which is to maintain a list of items to support such basic operations as access, insert and delete. The first algorithm proposed is an approximation to the optimal off-line algorithm. Knowing the complete request sequence, it provides a good approximation to the lower bound of the optimum cost and finds an approximately op... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling data using fuzzy attributes

    Publication Year: 2002, Page(s):117 - 123
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    We present a proposal for the application of fuzzy logic to conceptual modeling as an extension to the EER model. In order to do this, we extend some EER components to fuzzy ERR and we propose a notation for fuzzy representations, such as fuzzy values in the attributes, the degree in each value of an attribute and the degree in a set of values of diverse attributes, as well as fuzzy entities treat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental, collaborative software process improvement in a tiny software group

    Publication Year: 2002, Page(s):187 - 194
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    Defined software processes using quality models like CMM have proven to be effective means to develop software in large organizations. The effort required to define or tailor a process for a very small group may easily exceed available resources. Our aim is to define a software process compatible with CMM level 3 for a 1-dozen engineer organization, without committing significant resources. We hav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On procedure recognition in the Situation Calculus

    Publication Year: 2002, Page(s):33 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    The aim of our ongoing research is to give a method to construct intelligent tutoring systems for agents who are executing typical procedures in dynamic environments based on a logical framework. Typical procedures are similar to plans in the sense that they describe the actions an agent should execute to achieve a certain goal. In this paper we address what we consider is the first step toward th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaborative multilevel adaptation in distributed mobile applications

    Publication Year: 2002, Page(s):82 - 90
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (467 KB) | HTML iconHTML

    The next years will be characterized by high levels of heterogeneity and interactions among devices connected to global networks. The first researches involving wide-area distributed systems answered many questions concerning resource management, although they fail in treating questions related to heterogeneity and dynamic adaptation. More recent works, through technologies like CORBA and Java/Jin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Availability analysis of an ad-hoc DSMS for disaster relief environments

    Publication Year: 2002, Page(s):59 - 71
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB) | HTML iconHTML

    The number of victims rescued alive when a disaster occurs depends on the efficiency of search and rescue teams. Hence, communication, coordination and collaboration must be developed as best as possible. Currently the communication infrastructure, radio gear, permits us only to transfer audio signals, so enhancing group interaction by providing complementary communication media and services is a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality of service for ad hoc wireless network

    Publication Year: 2002, Page(s):100 - 105
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    Wireless networks represent the new computer paradigm. They have as main function to provide users with permanent access, independently of their physical location. With the decrease in the costs of portable devices and the increase in their capacity, a new concept called ad hoc network appeared. Through this technology, communication is made directly between mobile computers. In this paper, the pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing OLAP interoperability with OLAPWare

    Publication Year: 2002, Page(s):167 - 176
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (590 KB) | HTML iconHTML

    This paper presents OLAPWare and how to achieve OLAP interoperability with its use. OLAPWare is a Java middleware for providing OLAP Services compliant with the OLE DB for OLAP standard. OLE DB for OLAP is an industrial standard for allowing interoperability among OLAP tools. However, it is limited to the Windows/COM platform, even when a Java API is used. By using OLAPWare to overcome this limita... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing visual component composition environments

    Publication Year: 2002, Page(s):217 - 225
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    Current visual programming environments offer a variety of composition possibilities. Most of these environments provide drag and drop facilities of components on a form and let the interaction between components be defined by selecting suitable components and checking the incompatibilities of the resulting composition. Thus, the special nature of component-based development environments induces r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mapping rules to convert from ODL to XML-SCHEMA

    Publication Year: 2002, Page(s):133 - 141
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    As new standards for technology specifications related to XML are unveiled, and stable tools to implement them become available, the widespread usage of XML as a universal format for data exchange between heterogeneous systems (using the Internet), will increasingly become a reality. Therefore, in order to deal efficiently with the large amounts of XML data that will be generated in the near futur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved antidictionary based compression

    Publication Year: 2002, Page(s):7 - 13
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    The compression of binary texts using antidictionaries is a novel technique based on the fact that some substrings (called "antifactors") never appear in the text. Let sb be an antifactor where b is its last bit. Every time s appears in the text we know that the next bit is b~ and hence omit its representation. Since building the set of all antifactors is space consuming at compression time, it is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Socket-masking and SNMP: a hybrid approach for QoS monitoring in mobile computing environments

    Publication Year: 2002, Page(s):106 - 114
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (393 KB) | HTML iconHTML

    Concomitantly to the extraordinary growth of the multimedia applications, a great development in the field of mobile communications took place, the union of these areas provided a whole new set of fascinating services to end-users. However, the multimedia traffic tends to emphasize the wireless network's limitations making it necessary for the development of applications that are able to adapt the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An overview of industrial software documentation practice

    Publication Year: 2002, Page(s):179 - 186
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    A system documentation process maturity model and assessment procedure were developed and used to assess 91 projects at 41 different companies over a seven year period. During this time the original version evolved into a total of four versions based on feedback from industry and the experience gained from the assessments. This paper reports the overall results obtained from the assessments which ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dealing with overloading in tasks scheduling

    Publication Year: 2002, Page(s):24 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    Recently, there has been an increasing interest in programming models of real-time systems and approaches of flexible scheduling for dealing with situations of transient overloading, which can occur in nondeterministic environments. This paper presents the (p+i, k)-firm approach that can be seen as a combination and generalization of imprecise computing and of deadline (m,k)-firm. This approach ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost effective vision system for mobile robots

    Publication Year: 2002, Page(s):43 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (485 KB) | HTML iconHTML

    A Webcam-based vision system for performing image processing in real time in a restricted environment is presented. A color based image segmentation algorithm is the fundamental part of the system. Algorithm efficiency was very important due to hardware limitations. This led to a simple and cost-effective vision system that is able to detect and identify several mobile robots through successive fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A constraint parser for contextual rules

    Publication Year: 2002, Page(s):234 - 242
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (583 KB) | HTML iconHTML

    In this paper we describe a constraint analyser for contextual rules. Contextual rules constitute a rule-based formalism that allows rewriting of terminals and/or non terminal sequences taking in account their context. The formalism allows also to refer to portions of text by means of exclusion zones, that is, patterns that are only specified by a maximum length and a set of not allowed categories... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.