Computer Software and Applications Conference, 1996. COMPSAC '96., Proceedings of 20th International

21-23 Aug. 1996

Filter Results

Displaying Results 1 - 25 of 101
  • Proceedings of 20th International Computer Software and Applications Conference: COMPSAC '96

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (1321 KB)
    Freely Available from IEEE
  • A colored Petri net-based formal method for the design of control systems

    Publication Year: 1996, Page(s):28 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (787 KB)

    Several formal methods model reactive systems as discrete-event systems (DES). This makes mathematical reasoning about their properties easier and controller synthesis possible. We investigate the forbidden state control problem in which a DES is represented as a colored Petri net with a symmetry specification. More specifically, we provide an efficient formal method for synthesizing a controller ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia on the Internet

    Publication Year: 1996
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (79 KB)

    Summary form only given. Sun is a strong supporter of open standards and therefore believes in cross-platform interoperability. The web is the universal interface to world's digital library. The biggest component of multimedia is video. Compliance of video with international standards based on ISO/MPEG specifications is very important in terms of facilitating interoperability. The standardized uni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Marriage of wired and wireless networks to build tomorrow's Internet

    Publication Year: 1996
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (97 KB)

    Summary form only given. Tomorrow's Internet will neither be completely wired nor be completely wireless. Our proposed solution is the interim of the wired and wireless network, where roaming nodes are connected back to the wired media when they reach a wired site. The idea is to utilize the large bandwidth infrastructure available over the wired backbone network to connect all static nodes and at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High assurance systems engineering

    Publication Year: 1996
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    Summary form only given, as follows. As we aim to develop more and more complex software systems for real time applications, the concern about their safety and reliability is also growing. In the author's opinion, development of these systems require more formal approaches than the development of a general purpose software system. We can draw our analogy from hardware engineering for which we know... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network management system development using an application framework

    Publication Year: 1996
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (119 KB)

    Summary form only given. The advantages of using an application framework are described by introducing the NetKeeper network management system. Experience using NetKeeper has shown the ease of constructing communication applications and the rapidity of software construction with an application framework. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software process re-engineering and improvement

    Publication Year: 1996
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    Summary form only given. We discuss the methodology and lessons learned in the reengineering and improvement of software process. The following areas are specifically tackled: new demands to and changing paradigms of software development; methods of software process reengineering and improvement; information and software technology for software process reengineering and improvement; best practices... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A team-based process improvement initiative

    Publication Year: 1996
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    Summary form only given. The Information Technology Institute (ITI) thrives on a research and development environment that is similar to many applied research institutes in the United States. It delivers projects that apply advanced and useful high technologies to difficult problems. Most of these projects have a fixed deadline, be it a launch date or a deployment date. Hence, the process supporti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardware/software partitioning for telecommunications systems

    Publication Year: 1996, Page(s):483 - 488
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (613 KB)

    Telecommunications systems, like other embedded systems, are dataflow systems, easily represented by a set of tasks and precedence constraints. The main goal of the design of such systems is to determine for each task the assignment (hardware or software), the scheduling and resources required. We consider assignment and scheduling to be closely linked in hardware/software partitioning and therefo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software education in the 21st century

    Publication Year: 1996
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (39 KB)

    Summary form only given. It is a well recognized fact that economic growth in industrial countries come from three main sources-technical progress, capital, and a well-educated labour force. To maintain our position as, or to become, economic powerhouses in the world, education in science and technology must be emphasized and wide spread. Computer education (not just software education) is an impo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (149 KB)
    Freely Available from IEEE
  • Optimal linear hashing files for orthogonal range retrieval

    Publication Year: 1996, Page(s):406 - 413
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    We are concerned with the problem of designing optimal linear hashing files for orthogonal range retrieval. Through the study of performance expressions, we show that optimal basic linear hashing files and optimal recursive linear hashing files for orthogonal range retrieval can be produced, in certain cases, by a greedy method called the MMI (minimum marginal increase) method; and it is pointed o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new signature scheme for query processing in object-oriented database

    Publication Year: 1996, Page(s):400 - 405
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    As a result of the wide acceptance of object oriented database systems, some implementation issues such as query processing and indexing become a crucial factor in the success of object oriented database systems. To tackle the issues, we propose an s-signature scheme, which is an efficient access method to nested objects for query processing, especially, when the path dictionary is used. We also c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling active object-oriented database applications using multi-level diagrams

    Publication Year: 1996, Page(s):306 - 311
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    Active object-oriented database systems (AOODBSs) are based on the object-oriented paradigm and provide an event driven behavior for implementing time critical reactions by integrating event-condition-action (ECA) rules to the database. We focus on the modeling aspects of AOODBSs. We propose an integrated approach, called A/OODBMT (Active Object-Oriented Database Modeling Technique), which integra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic network management for firmware controlled network topology

    Publication Year: 1996
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    High assurance is a collective term implying real time security, reliability and safety. We consider a load balancing utopia for dynamic media access control (MAC) in firmware controlled network media (e.g., wireless, optical network) which provides high assurance. In a firmware controlled network, frequency and time assignment can be embedded in the logical channel on the fly-that is, logical cha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer science education in the Asia-Pacific region in the 21st century

    Publication Year: 1996
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    Singapore aims to be the premier teaching and research centre for computer science in the Asia-Pacific region in the 21st century, and the National University of Singapore is taking steps to meet that objective. Excellence in teaching is promoted via continued efforts to secure top quality students and lecturers, promoting teaching quality, and establishing close links with industry to ensure that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VIRON: an annotation-based video information retrieval system

    Publication Year: 1996, Page(s):298 - 303
    Cited by:  Papers (1)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    To provide efficient search and retrieval of video data from large archives, we need to model video data appropriately. We propose a video data model and describe the design and implementation of the annotation-based video retrieval system VIRON (Video Information Retrieval On Notation) based on the proposed model. This model provides the mechanism of sharing and reusing annotations among users by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring the structural complexity of OPS5 rule-based programs

    Publication Year: 1996, Page(s):522 - 527
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    Complexity metrics, such as McCabe's cyclomatic number of a program control graph and Halstead's number of operator/operand occurrences have been used extensively to measure the structural complexity of procedural programs. However, few suitable complexity metrics have been developed for rule-based programs written in OPS5 and OPS5-like rule-based languages. With the increasingly common use of rul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of a relational database with multimedia data

    Publication Year: 1996, Page(s):290 - 297
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    We propose a method for integrating a preexisting conventional database system with a multimedia server in a multidatabase environment. In the multidatabase environment, changes to the preexisting database system are not allowed because such changes are too expensive. For the integration, high-level semantic description of multimedia data is modeled using the enhanced entity-relationship (EER) mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Component-Based Software Development Model

    Publication Year: 1996
    Cited by:  Papers (12)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Opusdei-integrated environment for software development and maintenance

    Publication Year: 1996, Page(s):516 - 521
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    This paper discusses an integrated software development and maintenance environment, Opusdei, built and used for the past seven years at Hitachi Software Engineering (HSK) for its various projects. Industrial software is usually large, has many versions, undergoes frequent changes, and is developed concurrently by multiple programmers. Opusdei was developed by HSK to handle the various problems th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling algorithms for N-version programming scheme

    Publication Year: 1996, Page(s):184 - 189
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    For critical computer applications, N-version Programming (NVP) is used for software fault tolerance. However, software redundancy which is employed in NVP results in system performance degradation. We propose software fault-tolerant scheduling policies based on both fully N-version programming and semi N-version programming models of computation. Further we study the performance of the system und... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying conventional testing techniques for class testing

    Publication Year: 1996, Page(s):447 - 454
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    We discuss how conventional testing criteria such as branch coverage can be applied to the testing of member functions inside a class. To support such testing techniques we employ symbolic execution techniques and finite state machines (FSMs). Symbolic execution is performed on the code of a member function to identify states that are required to fulfil a given criterion. We use FSMs to generate a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A presentation scheduling scheme for multimedia databases

    Publication Year: 1996, Page(s):284 - 289
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    An essential function of the multimedia DBMS is to present objects of the query result according to their temporal-spatial relations. These relations can be specified within the database schema on the class level and used for each object presentation. In the case of partial extraction, however, the retrieved objects may not belong to an existing class, but to a newly created class which does not h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Slicing functional components from data-intensive business programs

    Publication Year: 1996, Page(s):384 - 388
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    Functional components are program components which provide a set of tightly-coupled program functionalities. As functionalities embody domain knowledge, these components provide a basis for the recovery of reusable program components. We augment general program slicing to handle the interaction among input/output statements operating on a database. With the use of augmented program slicing, an app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.