Proceedings 36th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Asia 2000

30 Oct.-4 Nov. 2000

Filter Results

Displaying Results 1 - 25 of 41
  • Proceedings 36th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Asia 2000

    Publication Year: 2000
    Request permission for reuse | PDF file iconPDF (176 KB)
    Freely Available from IEEE
  • Improving object oriented analysis by explicit change analysis

    Publication Year: 2000, Page(s):2 - 7
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (371 KB)

    Changeability is one of the major concerns in software development. Object-oriented (OO) technology itself is not enough to solve this problem. In this paper, we first discuss how the changeability issue is handled in current software development methods and what is the most important prerequisite for solving the software changeability problem. Based on these analyses, we argue that most of curren... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Object-Oriented Method (HOOM): the software development process

    Publication Year: 2000, Page(s):8 - 17
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    The paper is aimed at providing a detailed description of the incremental, iterative and well-guided software development process of the Hybrid Object-Oriented Method (HOOM) which mainly encompasses three phases: analysis, design and coding. In the analysis phase, firstly, a requirement analysis activity ends by writing a requirement specification describing what the system under development is in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Java Virtual Machine design based on hybrid concurrent compilation model

    Publication Year: 2000, Page(s):18 - 23
    Cited by:  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    The shift from interpretation to just-in-time (JIT) compilation has improved Java's performance greatly. However, further amelioration is still possible. A new execution model of Java-the hybrid concurrent compilation model (HCCM)-is proposed in this paper, which possesses the potential to surpass JIT by overlapping the production of native code with program execution through multithreaded control... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expanding design pattern to support parallel programming

    Publication Year: 2000, Page(s):24 - 31
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (370 KB)

    The design pattern concept is widely used in large object-oriented software development, but this should not be limited to the object-oriented field: it can be used in many other areas. Explicit parallel programming is well-known to be complex and error-prone, and design patterns can ease this work. This paper introduces a pattern-based approach for parallel programming, in which we classify desig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedding UML and type theory to formalize the process of requirement engineering

    Publication Year: 2000, Page(s):32 - 39
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    Nowadays, the main reason for the failure of large-scale systems developments is that the requirements analysis stage cannot produce complete, understandable, unambiguous traceable and testable system requirements documents. To conquer this problem, from the point of view of "requirements engineering" (RE), the formalization of the RE process is discussed from three aspects: a full process model, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture framework for software test tool

    Publication Year: 2000, Page(s):40 - 47
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    A software test tool based on source code is an important tool to aid software quality assurance, and under those environments where the test technology and test requirements continuously vary, the software test tool itself should be endowed with extensibility, easy reusability and interoperability. In this paper, the necessity of research on an integrated framework for component-based software te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent-based and software composite DDSS

    Publication Year: 2000, Page(s):50 - 57
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (462 KB)

    Agent-based systems are an increasingly prevalent issue in artificial intelligence (AI), and their application to distributed decision support systems (DDSSs) operating over the Internet is a potentially valuable contribution. This paper proposes an approach to DDSSs using multiple agents to coordinate decision support: agent-based DDSSs (ABDDSSs). The architecture of individual agents involved in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing undo/redo in PDF Studio using object-oriented design pattern

    Publication Year: 2000, Page(s):58 - 64
    Cited by:  Patents (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (306 KB)

    PDF Studio is a software package that provides a visual design environment to help a user create a document with text, images and data from a database, and that generates the file in PDF (Portable Document Format). Undo/redo functionality is a common requirement for most software that has a visual user interface. This paper introduces the implementation of undo/redo in this software package and de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using object-orientation in developing a flexible automatic test system

    Publication Year: 2000, Page(s):65 - 72
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (402 KB)

    Aiming at improving the reconfiguration capability of an automatic testing system for turbine machinery, the method of object orientation is employed to develop its software. Since the project size is small, we adopt a compact and pragmatic approach to construct this object-oriented application instead of using complicated commercial object-oriented methods. Although the method is simple, it cover... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of object-oriented analysis and design in CDMA BSS development

    Publication Year: 2000, Page(s):73 - 80
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (357 KB)

    Describes the application of SOMT (SDL-oriented Object Modeling Technique) to the specification and design of CDMA (code-division multiple access) base station systems (BSSs). SOMT is based on object models for analysis and SDL (Specification and Description Language) for design, and decomposes the development process into five sequential activities, viz. requirements analysis, systems analysis, s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design consideration using the Multimedia Object Repository

    Publication Year: 2000, Page(s):81 - 86
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    This paper presents a study of the intermediate design and development of multimedia applications using the Multimedia Object Repository (MOR). The goal of MOR is to increase the availability of different multimedia objects for the designing of real world multimedia applications. Details of MOR were described in (Bingyang Zhou, 2000); this paper focuses on the architecture of a multimedia applicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on life cycle management mechanism in COM/CORBA interworking

    Publication Year: 2000, Page(s):88 - 93
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (407 KB)

    COM/CORBA interworking becomes more and more important with the development of DOC (Distributed Object Computing) technology. In this paper, using a Petri net, the COM/CORBA interworking model is described and analyzed, as a result, the limitations of the life cycle management mechanism in the model are found out. Finally the life cycle service is adopted and the COM/CORBA interworking model is im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An implementation model of IntServ/RSVP based CORBA A/V Stream Service

    Publication Year: 2000, Page(s):94 - 99
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (397 KB)

    In order to meet the requirements of building CORBA-based distributed multimedia applications, OMG has defined the CORBA A/V Stream Service Specification. However, it does not specify which network mechanism to use to ensure the QoS of multimedia streams. In this paper, an implementation model of IntServ/RSVP based CORBA A/V Stream Service is proposed. It first maps the application-level QoS param... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A strategy for persistent object service under CORBA and Web environment

    Publication Year: 2000, Page(s):100 - 107
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (409 KB)

    With the rapid development of the Internet, the integrated applications of Web, database, CORBA and Java have offered the three-tiered client/server application models a good computing environment and implementation strategy. This paper briefly introduces this kind of client/server application model based on CORBA and Web, and discusses a persistent object service for it. The paper describes in de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A revised, inheritance-supporting parallel object model in PDEFA-I

    Publication Year: 2000, Page(s):108 - 113
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    PDEFA is a distributed Ada95 pre-compiler, compiler and run-time system. PDEFA-I is the latest version of PDEFA that supports inheritance between parallel objects. Because of the inheritance anomaly problem with concurrent objects Ada95 does not support this mechanism, so we have to slightly modify the language to make inheritance possible. The code of each interface of a protected object in Ada95... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocol Mapping Model for distributed multimedia systems

    Publication Year: 2000, Page(s):114 - 121
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (423 KB)

    We present a layered model for distributed multimedia systems named Protocol Mapping Model. First we introduce the PMM architecture, which applies the protocol mapping technique to support smart protocol binding for applications. Second, we give the programming model and design of PMM. Third, the implementation of PMM is discussed followed by an example application HeteroAudio Station exhibiting t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An object-oriented middleware for our metasystem on Internet

    Publication Year: 2000, Page(s):122 - 125
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (273 KB)

    A metasystem is composed of geographically distributed heterogeneous resources that can be reached over the network. An essential software layer, often called middleware, maps heterogeneous hosts into a single coherent virtual machine, giving the user the power of a unique computing environment. In this paper all object-oriented middleware for the metasystem based on the Internet is described in d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OTMS-a CORBA-compliant object transaction management system

    Publication Year: 2000, Page(s):126 - 133
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (365 KB)

    With the development of computer technology, computer applications in a distributed environment have become the trend of development. However, the even higher requirement of the data consistency and integrality under the distributed environment makes the traditional transaction process technology incompetent. To meet the new challenge, the object transaction service model for the distributed appli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The research on dynamic self-adaptive network security model based on mobile agent

    Publication Year: 2000, Page(s):134 - 139
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    The rapid development and wide application of computer networks presents a new challenge to information security and network security. Traditional security models and single security technology cannot keep up with the change of complicated network structure and varied intrusion measures. Network security management based on policy has traits of low management cost, high agility and wide applicabil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of CORBA security service

    Publication Year: 2000, Page(s):140 - 145
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (291 KB)

    CORBA is a new generation of distributed computing platform based on the distributed object computing technology, and security is always a fundamental problem of a distributed computing platform. Thus, implementation of a security service in the CORBA platform is very important. Referring to the related security standards and distributed computing platform's security models, the CORBA security ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Counter inference of intelligent agents

    Publication Year: 2000, Page(s):148 - 157
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    The essence of counter inference is intelligence competition and critical decision making that will result in chained reactions in an open system environment. Intelligent agents are capable not only of carrying out negotiations but also playing games. A negotiation could have win-win (or lose-lose) outcomes while a game may result in win-lose situations. The paper proposes counter inference as a u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of development method based on multi-agents

    Publication Year: 2000, Page(s):158 - 161
    Cited by:  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (205 KB)

    Multi-agent systems are becoming an important information technique in future manufacturing control. The paper puts forward an analysis method of multi-agent systems, an interactive model of agents, and an agent design scenario. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative mobile agents in dynamic network environment

    Publication Year: 2000, Page(s):162 - 167
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    A multi-MA (mobile agents) cooperative system leads to flexible and efficient solutions for distributed systems, but a lot of research is not suitable for dynamic network environments. Based on the modeling of the multi-MA cooperative system and analysis of MA behavior, we present some new ideas and a theoretic model on fuzzy knowledge representation and exchange, in which some key problems such a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent-based distributed information delivery system

    Publication Year: 2000, Page(s):168 - 175
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (421 KB)

    When building larger network information systems, the efficient management and transmission of a large amount of information are important for several reasons. Firstly, the system will become disordered without a perfect information management strategy when faced with the tremendous amount of information resources. Secondly, it is essential for the system to transmit a large amount of information ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.