Computer Software and Applications Conference, 1993. COMPSAC 93. Proceedings., Seventeenth Annual International

1-5 Nov. 1993

Filter Results

Displaying Results 1 - 25 of 59
  • Proceedings of 1993 IEEE 17th International Computer Software and Applications Conference COMPSAC '93

    Publication Year: 1993
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • SD/sup 2/-A system for distributed software development

    Publication Year: 1993, Page(s):131 - 137
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (474 KB)

    We design and implementation a system for distributed software development. The system helps the program designer by first extracting the program model (in Petri nets). The system then monitors the program run and collects program trace into a database. The monitor also interacts with the network management system for resource allocation. Program debugging is achieved by replaying the trace data, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software architecture for maintaining temporal consistency in a distributed real-time environment

    Publication Year: 1993, Page(s):380 - 387
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (627 KB)

    Control applications constitute an important class of real-time systems. Such applications have specific temporal requirements that have to be taken into account during the system design. One such requirement is data temporary consistency. This paper gives an overview of the temporal consistency problem and addresses implementation issues for a distributed real-time system that is configured accor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reduced incremental ECFSM-based protocol verification

    Publication Year: 1993, Page(s):166 - 172
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    The extended communication finite state machine (ECFSM) model, which belongs to the state transition model, has been used to formally specify protocols with context variables and predicates. Global state reachability analysis is one of the most straight-forward ways to verify communication protocols specified in the state transition model. Many CFSM-based global state reduction techniques have bee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure group communication protocol for distributed systems

    Publication Year: 1993, Page(s):159 - 165
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    In distributed applications like groupware, group communication among multiple entities is required. The local area networks (LANs) and radio networks provide broadcast communication at the media access control (MAC) layer, that is, every entity can receive every protocol data unit (PDU) transmitted in the network. Group communication among multiple entities can be easily realized by these network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Process dependence net of distributed programs and its applications in development of distributed systems

    Publication Year: 1993, Page(s):231 - 240
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB)

    In addition to the usual control and data dependences proposed and studied for sequential and centralized programs, this paper introduces three new types of primary program dependences in concurrent and distributed programs, named the selection dependence, synchronization dependence, and communication dependence, and a new program representation for concurrent and distributed programs, named the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software reengineering for reusability

    Publication Year: 1993, Page(s):100 - 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    Programs are often reengineered for better maintainability or in order to migrate programs into newer computer/software platforms. However, many of the aging business systems must be also upgraded in order to meet strategic goals of an organization. To meet such ambitious objectives, we must fundamentally redesign programs, rather than merely restructure them for improved maintainability. When muc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of a distributed database

    Publication Year: 1993, Page(s):152 - 158
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB)

    We describe an approach for controlling certain unauthorized inferences in a multilevel secure distributed database management system. In such a system, two or more multilevel secure database management systems are connected via a trusted network. Furthermore, the environment that we have considered is a limited heterogeneous one where not all of the nodes handle the same accreditation ranges. In ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated data structure with multiple access paths for database and its performance

    Publication Year: 1993, Page(s):241 - 247
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    An integrated data structure is presented in this paper which offers multiple access paths for processing different types of queries efficiently. Our approach is to fuse those data structures which offer efficient access path of a particular type. To show the feasibility of our scheme we fused the B+-tree, the grid file and extendible hashing, using a proper interface. We implemented an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences with a faceted classification scheme in a large reusable software library (RSL)

    Publication Year: 1993, Page(s):90 - 99
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB)

    This paper presents experiences with software classification in a large corporate reuse software library (RSL) at IBM. We use facets extensively as one method of component classification in the IBM RSL. However, facets alone cannot adequately provide all the information needed to fully classify and understand a reusable component. Experience with an operational RSL reveals that we require a combin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating abstraction flexibility with diverse program perspectives

    Publication Year: 1993, Page(s):186 - 192
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    Technically, because of the limited dimensions of the presentation media, and psychologically, because of the limited human attention span, graphical program visualization in computer assisted reverse engineering becomes increasingly difficult with scale. This problem becomes compounded when multi-perspective visualization is taken into consideration. In this research we present a system called HV... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An extended recursive algebra for nested relations and its optimization

    Publication Year: 1993, Page(s):145 - 151
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    This paper considers query optimization for nested relational databases based on a recursive algebra. A recursive algebra which has been proposed in the literature for nested relations has been extended to accommodate arbitrary algebraic expressions in any nested level of the query. This extended algebra can be used to conveniently express queries in two query languages proposed for the nested rel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive algorithm selection method (AASM) for dynamic software tuning

    Publication Year: 1993, Page(s):248 - 256
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    This paper presents a new approach to dynamic software tuning called the adaptive algorithm selection method (AASM). The AASM is built into the calling sequence of a library. When the library is called, the AASM is activated. The AASM selects and executes the optimum algorithm from registered algorithms in a library, based on data and machine type. As a result, the software is automatically tuned ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical and space efficient scheme for keeping source location in parse trees

    Publication Year: 1993, Page(s):374 - 379
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    Many CASE tools use graphical notations to represent program source code, which provide an effective visual aid for program analysis. In such systems, it is important that facilities exist for tracing back to source code from, say, a node in a control-flow graph. We describe a scheme by which source code location information is kept with parse trees. The most attractive feature of this scheme is t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DELTA-DEsign Language To Actor

    Publication Year: 1993, Page(s):263 - 269
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    DELTA, a DEsign Language To Actor, is a formal language used to enhance the design process. DELTA incorporates the concepts of object-oriented design into a design language. Once the preliminary steps of design have been completed, DELTA can be used to bridge the gap between architectural design and a detailed design specification. DELTA can be used to produce a documented design. Rapid prototypin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A task allocation algorithm for distributed computing systems

    Publication Year: 1993, Page(s):336 - 342
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    Most performance lapses in distributed computing systems can be traced to the lack of a good task allocation strategy for distributed software. Random assignment of tasks or modules onto processors or subsystems can substantially degrade the performance of the entire distribution system. In this paper a heuristic algorithm for task allocation for any distributed computing system where the subsyste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recording software design processes for maintaining the software

    Publication Year: 1993, Page(s):27 - 33
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    This paper proposes a method of supporting software change propagation analysis using a recorded software design rationale. This paper discusses recording costs, the usage and effectiveness of the recorded information for change propagation analysis, which other papers don't. Change propagation analysis of the software being modified is difficult when no design rationale for the software is left. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing parallel database programs using PARSE

    Publication Year: 1993, Page(s):117 - 123
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    The problems of constructing parallel programs are considered and the aims of the PARSE parallel software engineering methodology are introduced. PARSE is a multi-stage methodology that covers logical and physical design, design verification, and implementation strategy. The first stage in the methodology involves the use of process graphs which provide a language and architecture independent nota... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-based formal specification directed testing of abstract data types

    Publication Year: 1993, Page(s):360 - 366
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    A model-based formal specification directed software testing approach is presented. It provides a test oracle and introduces a new coverage criterion for the functional (black-box) testing based on formal specifications. Given the source code of an implementation, its formal specification, and the retrieve functions, a test driver can be generated to conduct, evaluate, and measure the functional t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Motorola software engineering benchmark program: Organization, directions, and results

    Publication Year: 1993, Page(s):284 - 290
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    In mid-1991, teams of Motorola's senior executives, software engineering technologists, and researchers chartered to provide the future software management and technology directions in Motorola, joined forces to develop and execute a benchmark program for software engineering. The author has managed this program since its inception. The goal of the program is to determine and continuously monitor ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for modelling evolving requirements

    Publication Year: 1993, Page(s):83 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    The most crucial aspect of software engineering is the gathering of requirements. Increasing the amount of time and improving the quality of effort expended at this stage will lead to fewer and more manageable problems later on in the development life-cycle. The purpose of this paper is to highlight one of the most crucial problems that afflict user organizations when engaging in IT systems: the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Use of a specification construction and animation tool to teach formal methods

    Publication Year: 1993, Page(s):327 - 333
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    ZAL (Z Animation in LISP) is a package which allows a Z specification to be incrementally designed and validated in an interactive environment built on Common LISP. A Z specification is transformed into an equivalent ZAL program which can be executed in order to demonstrate the functionality of the intended implementation. ZED is a full screen editor and syntax analyser for Z. Using these two tool... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visual CASE: A software development system for home appliances

    Publication Year: 1993, Page(s):11 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    This paper describes Visual CASE: a software development system that provides a framework which can be used by the whole development team: product planners, product designers, and software developers. This system includes interactive browsers, editors, and databases to manipulate the object model we designed specifically for the software in home appliances. We apply the object model to an entity t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online workload, performance and scalability of a database production system: A case study

    Publication Year: 1993, Page(s):306 - 312
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    Today, enterprises are seeking solutions to integrate their business functions by using advanced computing technologies. Meanwhile, these enterprises are cutting the information centers' budgets to lower the costs. Computer downsizing becomes essential for cost saving. However, computer downsizing also threatens those enterprises whose business success depends heavily on delivering fast, accurate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method of drawing tree-structured program diagrams on the Euclidian plane

    Publication Year: 1993, Page(s):193 - 201
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    A tree-structured diagram is considered as a tree in which each node has four attributes: (1) width, (2) depth, (3) horizontal coordinate and (4) vertical coordinate. The placing problem of the tree-structured diagram satisfying certain given eumorphous conditions is called a tidy drawing problem. The eumorphous conditions of tree-structured diagrams, oriented to program diagrams, have been formul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.