Pub Date : 1992-12-20DOI: 10.1109/HICSS.1992.183492
E. McLean, Leon A. Kappelman
Given the growing prominence of end-user computing (EUC), a survey was conducted among senior information systems executives, from a broad-based cross-section of consumer-goods manufacturing firms, on the patterns of computing within their companies. The results indicated that the definition of end-user computing is expanding considerably within their organizations; that this expansion is blurring the distinction between end-user computing and traditional information systems; and that these developments are, on the whole, successful and are likely to be even more so in the future. These findings suggest the need for a closer working relationship between information systems professionals and end-users, building what might be called a 'partnership for success'.<>
{"title":"The convergence of organizational and end-user computing","authors":"E. McLean, Leon A. Kappelman","doi":"10.1109/HICSS.1992.183492","DOIUrl":"https://doi.org/10.1109/HICSS.1992.183492","url":null,"abstract":"Given the growing prominence of end-user computing (EUC), a survey was conducted among senior information systems executives, from a broad-based cross-section of consumer-goods manufacturing firms, on the patterns of computing within their companies. The results indicated that the definition of end-user computing is expanding considerably within their organizations; that this expansion is blurring the distinction between end-user computing and traditional information systems; and that these developments are, on the whole, successful and are likely to be even more so in the future. These findings suggest the need for a closer working relationship between information systems professionals and end-users, building what might be called a 'partnership for success'.<<ETX>>","PeriodicalId":103288,"journal":{"name":"Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127906482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1992-12-20DOI: 10.1109/HICSS.1992.183528
A. Vinze, Arun Sen, S. Liou
Building models for problem solving is a common practice for many disciplines. Model formulation is a complex process. Researchers have in the past approached this process from a variety of angles including planning, model structuring, model integration, model representation and others. In this paper, the authors use observations of expert modelers in an attempt to understand the process. The observations, made in the form of protocol analysis, identified three important facets to this process. These included: formulation tasks, control considerations and the opportunism in the process of formulation. Using these observations, the AEROBA system was constructed using the blackboard paradigm as its basis. Evaluation of AEROBA is accomplished by comparing protocols obtained from the expert modelers with an execution trace of AEROBA.<>
{"title":"AEROBA: a blackboard approach to model formulation","authors":"A. Vinze, Arun Sen, S. Liou","doi":"10.1109/HICSS.1992.183528","DOIUrl":"https://doi.org/10.1109/HICSS.1992.183528","url":null,"abstract":"Building models for problem solving is a common practice for many disciplines. Model formulation is a complex process. Researchers have in the past approached this process from a variety of angles including planning, model structuring, model integration, model representation and others. In this paper, the authors use observations of expert modelers in an attempt to understand the process. The observations, made in the form of protocol analysis, identified three important facets to this process. These included: formulation tasks, control considerations and the opportunism in the process of formulation. Using these observations, the AEROBA system was constructed using the blackboard paradigm as its basis. Evaluation of AEROBA is accomplished by comparing protocols obtained from the expert modelers with an execution trace of AEROBA.<<ETX>>","PeriodicalId":103288,"journal":{"name":"Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127150440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1992-01-07DOI: 10.1109/HICSS.1992.183164
A. Helal, Yongguang Zhang, Bharat Bhargava
Graceful performance degradation due to failures can be achieved by maintaining updated system reachability information. This can be accomplished through the early detection of site and communication failures and repairs. Surveillance protocols are responsible for gathering and updating this information which are known as views. The author present a simple, reliable surveillance protocol along with its application to distributed transaction processing systems. The authors examine the effect of surveillance on the performance of transaction processing during failures with and without surveillance. They show that while the cost of surveillance overhead is affordable through a fixed additional MIPS, the benefits of surveillance are indispensable.<>
{"title":"Surveillance for controlled performance degradation during failures","authors":"A. Helal, Yongguang Zhang, Bharat Bhargava","doi":"10.1109/HICSS.1992.183164","DOIUrl":"https://doi.org/10.1109/HICSS.1992.183164","url":null,"abstract":"Graceful performance degradation due to failures can be achieved by maintaining updated system reachability information. This can be accomplished through the early detection of site and communication failures and repairs. Surveillance protocols are responsible for gathering and updating this information which are known as views. The author present a simple, reliable surveillance protocol along with its application to distributed transaction processing systems. The authors examine the effect of surveillance on the performance of transaction processing during failures with and without surveillance. They show that while the cost of surveillance overhead is affordable through a fixed additional MIPS, the benefits of surveillance are indispensable.<<ETX>>","PeriodicalId":103288,"journal":{"name":"Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115773272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1992-01-07DOI: 10.1109/HICSS.1992.183150
S. Ng
In a conventional magnetic storage subsystem, rotational latency is a major component of the basic service time for an I/O access. In CD-ROMs, where the rotational speed is one order of magnitude slower than that of magnetic disks, latency's role is even greater. While simple latency techniques using data replication have already been proposed for conventional magnetic disks, such techniques can not be directly applied to CD-ROMs, because, unlike conventional magnetic disks which are consist angular velocity (CAV) devices, CD-ROMs employ the constant linear velocity (CLV) scheme. Instead of many concentric tracks, there is only one long continuous spiral per surface. In this paper, a data replication technique for reducing average latency is proposed for CD-ROMs and other CLV disks. This technique is analyzed in terms of the reduction in average latency and the impact on storage capacity.<>
{"title":"Latency reduction for CD-ROM and CLV disks","authors":"S. Ng","doi":"10.1109/HICSS.1992.183150","DOIUrl":"https://doi.org/10.1109/HICSS.1992.183150","url":null,"abstract":"In a conventional magnetic storage subsystem, rotational latency is a major component of the basic service time for an I/O access. In CD-ROMs, where the rotational speed is one order of magnitude slower than that of magnetic disks, latency's role is even greater. While simple latency techniques using data replication have already been proposed for conventional magnetic disks, such techniques can not be directly applied to CD-ROMs, because, unlike conventional magnetic disks which are consist angular velocity (CAV) devices, CD-ROMs employ the constant linear velocity (CLV) scheme. Instead of many concentric tracks, there is only one long continuous spiral per surface. In this paper, a data replication technique for reducing average latency is proposed for CD-ROMs and other CLV disks. This technique is analyzed in terms of the reduction in average latency and the impact on storage capacity.<<ETX>>","PeriodicalId":103288,"journal":{"name":"Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences","volume":"60 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117223317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1992-01-07DOI: 10.1109/HICSS.1992.183516
P. Piela, R. McKelvey, A. Westerberg
Recently there has been a growing realization among researchers and practitioners that current technologies do not adequately support mathematical modeling 'in the large'. In this paper the authors discuss a technology called ASCEND, which addresses this issue. They describe two aspects of the technology: a modeling language and an interactive model-building environment. The ASCEND language is structured, declarative and strongly-typed and incorporates object-oriented extensions. The interactive environment is based on the notion of a concurrent set of tools which reflect the various phases of ASCEND modeling. These tools do not enforce a strict sequence of operations, but rather have been designed to support the flexible access implied by declaratively specified models. ASCEND offers solutions to several of the issues raised by A. Geoffrion (1989, 1990) and use categories introduced by him to frame this discussion.<>
{"title":"An introduction to ASCEND: its language and interactive environment","authors":"P. Piela, R. McKelvey, A. Westerberg","doi":"10.1109/HICSS.1992.183516","DOIUrl":"https://doi.org/10.1109/HICSS.1992.183516","url":null,"abstract":"Recently there has been a growing realization among researchers and practitioners that current technologies do not adequately support mathematical modeling 'in the large'. In this paper the authors discuss a technology called ASCEND, which addresses this issue. They describe two aspects of the technology: a modeling language and an interactive model-building environment. The ASCEND language is structured, declarative and strongly-typed and incorporates object-oriented extensions. The interactive environment is based on the notion of a concurrent set of tools which reflect the various phases of ASCEND modeling. These tools do not enforce a strict sequence of operations, but rather have been designed to support the flexible access implied by declaratively specified models. ASCEND offers solutions to several of the issues raised by A. Geoffrion (1989, 1990) and use categories introduced by him to frame this discussion.<<ETX>>","PeriodicalId":103288,"journal":{"name":"Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127076889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1992-01-07DOI: 10.1109/HICSS.1992.183420
I. Posner, Ronald M. Baecker
Builders of groupware writing technologies need a better understanding of collaborative writing if their systems are to adequately address user needs. The authors present a taxonomy of joint writing based on an analysis of interviews with authors who have written documents together. The taxonomy describes joint writing in terms of four components: roles played in the collaboration, activities performed in the writing process, document control methods used, and writing strategies employed. The authors conclude by outlining a set of design requirements for collaborative writing that are suggested by the interviews and the taxonomy, and by evaluating six existing systems with respect to these requirements.<>
{"title":"How people write together (groupware)","authors":"I. Posner, Ronald M. Baecker","doi":"10.1109/HICSS.1992.183420","DOIUrl":"https://doi.org/10.1109/HICSS.1992.183420","url":null,"abstract":"Builders of groupware writing technologies need a better understanding of collaborative writing if their systems are to adequately address user needs. The authors present a taxonomy of joint writing based on an analysis of interviews with authors who have written documents together. The taxonomy describes joint writing in terms of four components: roles played in the collaboration, activities performed in the writing process, document control methods used, and writing strategies employed. The authors conclude by outlining a set of design requirements for collaborative writing that are suggested by the interviews and the taxonomy, and by evaluating six existing systems with respect to these requirements.<<ETX>>","PeriodicalId":103288,"journal":{"name":"Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences","volume":"3065 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127465959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1992-01-07DOI: 10.1109/HICSS.1992.183354
H. Saiedian, M. Zand
The design of a specification methodology for office systems is described. In particular, the authors discuss the desired properties of a computational model upon which a specification methodology for office systems should be based. An overview of ABSL, a specification language that they developed, is presented. The central concept in ABSL is an object which is the principal mechanism for representing the data and computations. The design of ABSL is based on the formal theory of the actor model. The actor model is chosen because not only it captures the abstract power of object-orientation paradigm, but provides as well a mathematically precise abstract machine for analysis of asynchronous and concurrent computations.<>
{"title":"An object-based approach to the specification of applications for office support systems","authors":"H. Saiedian, M. Zand","doi":"10.1109/HICSS.1992.183354","DOIUrl":"https://doi.org/10.1109/HICSS.1992.183354","url":null,"abstract":"The design of a specification methodology for office systems is described. In particular, the authors discuss the desired properties of a computational model upon which a specification methodology for office systems should be based. An overview of ABSL, a specification language that they developed, is presented. The central concept in ABSL is an object which is the principal mechanism for representing the data and computations. The design of ABSL is based on the formal theory of the actor model. The actor model is chosen because not only it captures the abstract power of object-orientation paradigm, but provides as well a mathematically precise abstract machine for analysis of asynchronous and concurrent computations.<<ETX>>","PeriodicalId":103288,"journal":{"name":"Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126189723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1992-01-07DOI: 10.1109/HICSS.1992.183384
J.M. An, R.G. Hung, G. Sanders
As members of a group begin to interact and solve problems, a group schema evolves. This group cognitive structure is the result of realized consensus about and coverage of the problem domain of the group; and it becomes the mechanism by which the group structures and solves problems. The authors describe how a technological agent can be used to control and enhance the evolution of the group schema by creating an environment which facilitates consensus and coverage.<>
{"title":"The role of domain coverage and consensus in a network of learning and problem solving systems","authors":"J.M. An, R.G. Hung, G. Sanders","doi":"10.1109/HICSS.1992.183384","DOIUrl":"https://doi.org/10.1109/HICSS.1992.183384","url":null,"abstract":"As members of a group begin to interact and solve problems, a group schema evolves. This group cognitive structure is the result of realized consensus about and coverage of the problem domain of the group; and it becomes the mechanism by which the group structures and solves problems. The authors describe how a technological agent can be used to control and enhance the evolution of the group schema by creating an environment which facilitates consensus and coverage.<<ETX>>","PeriodicalId":103288,"journal":{"name":"Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126712735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1992-01-07DOI: 10.1109/HICSS.1992.183198
C. Maeda
A new method of LAN fault diagnosis is described based on host behavior categorization. Monitored network traffic is used to represent a host's behavior as a point in a high-dimensional parameter space. A number of these points (one for each host) is categorized by an inductive Bayesian classifier and the resulting categorization is used to predict future network host behavior. If a host's subsequent behavior is not consistent with its expected class, the host is flagged anomalous and becomes a focus of further diagnosis. The system has been tested on approximately a network-year of data and has successfully diagnosed all known faults in this data due to programmer error and has even pointed out several that had previously gone undetected. Ways to improve the system's performance with complementary diagnostic techniques are introduced.<>
{"title":"Categorization for network fault diagnosis","authors":"C. Maeda","doi":"10.1109/HICSS.1992.183198","DOIUrl":"https://doi.org/10.1109/HICSS.1992.183198","url":null,"abstract":"A new method of LAN fault diagnosis is described based on host behavior categorization. Monitored network traffic is used to represent a host's behavior as a point in a high-dimensional parameter space. A number of these points (one for each host) is categorized by an inductive Bayesian classifier and the resulting categorization is used to predict future network host behavior. If a host's subsequent behavior is not consistent with its expected class, the host is flagged anomalous and becomes a focus of further diagnosis. The system has been tested on approximately a network-year of data and has successfully diagnosed all known faults in this data due to programmer error and has even pointed out several that had previously gone undetected. Ways to improve the system's performance with complementary diagnostic techniques are introduced.<<ETX>>","PeriodicalId":103288,"journal":{"name":"Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116417510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1992-01-07DOI: 10.1109/HICSS.1992.183243
H. Bhargava
The paper discusses experiments involving a method for the automatic detection, prior to the integration of database schemas, of conflicts in the naming of data elements within these schemas. The method relies on the representation of semantic information (called quiddity) about the data elements present in the various schemas. The authors develop several inference procedures which, utilizing this information, determine whether two distinctly named elements in fact represent the same object, or if elements with the same name actually represent different objects. The experiments are concerned with (a) examining the accuracy and consistency with which quiddities of data elements might be declared by different database designers, and (b) evaluating the accuracy and errors of these automated procedures. The results indicate that the method has promise for use in detection of naming conflicts, and that certain inference procedures are superior to others in terms of their accuracy and error rates.<>
{"title":"Automated detection of naming conflicts in schema integration: experiments with quiddities","authors":"H. Bhargava","doi":"10.1109/HICSS.1992.183243","DOIUrl":"https://doi.org/10.1109/HICSS.1992.183243","url":null,"abstract":"The paper discusses experiments involving a method for the automatic detection, prior to the integration of database schemas, of conflicts in the naming of data elements within these schemas. The method relies on the representation of semantic information (called quiddity) about the data elements present in the various schemas. The authors develop several inference procedures which, utilizing this information, determine whether two distinctly named elements in fact represent the same object, or if elements with the same name actually represent different objects. The experiments are concerned with (a) examining the accuracy and consistency with which quiddities of data elements might be declared by different database designers, and (b) evaluating the accuracy and errors of these automated procedures. The results indicate that the method has promise for use in detection of naming conflicts, and that certain inference procedures are superior to others in terms of their accuracy and error rates.<<ETX>>","PeriodicalId":103288,"journal":{"name":"Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences","volume":"13 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114181989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}