首页 > 最新文献

Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122)最新文献

英文 中文
Analytical design of reusable software components for evolvable, embedded applications 为可发展的嵌入式应用程序分析设计可重用的软件组件
C. Hoover, P. Khosla, D. Siewiorek
Transforming software requirements into a software design involves the iterative partition of a solution into software components. The partition process starts with the identification of basic high-level design components and concludes with the definition of low-level design elements such as modules, packages, and library specifications. The process is human-intensive and does not guarantee that design objectives such as reusability, evolvability, and adaptable performance are satisfied. This paper overviews our analytical approach for partitioning basic elements of a software solution into reusable and evolvable software components. We discuss the process of generating basic components for an embedded control application using a representative object-oriented design technique. Then we outline our analytical approach and demonstrate its application to a class of search techniques which can be embedded into applications requiring polynomial-time search of a solution-space. Lastly, we discuss future research directions.
将软件需求转换为软件设计涉及到将解决方案迭代地划分为软件组件。划分过程从识别基本的高级设计组件开始,并以定义低级设计元素(如模块、包和库规范)结束。该过程是人力密集型的,并且不能保证满足诸如可重用性、可演化性和适应性性能等设计目标。本文概述了我们将软件解决方案的基本元素划分为可重用和进化的软件组件的分析方法。我们讨论了使用具有代表性的面向对象设计技术为嵌入式控制应用程序生成基本组件的过程。然后我们概述了我们的分析方法,并演示了它在一类搜索技术中的应用,这些技术可以嵌入到需要对解空间进行多项式时间搜索的应用中。最后,对未来的研究方向进行了展望。
{"title":"Analytical design of reusable software components for evolvable, embedded applications","authors":"C. Hoover, P. Khosla, D. Siewiorek","doi":"10.1109/ASSET.1999.756766","DOIUrl":"https://doi.org/10.1109/ASSET.1999.756766","url":null,"abstract":"Transforming software requirements into a software design involves the iterative partition of a solution into software components. The partition process starts with the identification of basic high-level design components and concludes with the definition of low-level design elements such as modules, packages, and library specifications. The process is human-intensive and does not guarantee that design objectives such as reusability, evolvability, and adaptable performance are satisfied. This paper overviews our analytical approach for partitioning basic elements of a software solution into reusable and evolvable software components. We discuss the process of generating basic components for an embedded control application using a representative object-oriented design technique. Then we outline our analytical approach and demonstrate its application to a class of search techniques which can be embedded into applications requiring polynomial-time search of a solution-space. Lastly, we discuss future research directions.","PeriodicalId":340666,"journal":{"name":"Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124914748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless networks self engineering engine 无线网络自工程引擎
Hee Lee, S. Djoko, Hua Jiang, S. Subramanian, K. Basu
Each wireless network system has its own unique operating conditions. The geographical characteristics, RF conditions, call traffic and subscriber mobility of one network are different from others. In order to achieve maximum capacity and optimal performance of a network, the system parameters of the network must be engineered to fit the network's operating conditions. However, because of the complexity of wireless network system engineering, there has not been much success in developing effective engineering rules that are applicable to all systems. This lack of accurate universal engineering rules makes the process of wireless network engineering laborious, expensive and customized. A self engineering engine presented in this paper overcomes the difficulties in the current wireless network engineering practice. The adoption of the self engineering engine in the wireless network system will enable the system to monitor and engineer itself with the goal of achieving maximum capacity and optimal performance.
每种无线网络系统都有其独特的运行条件。一个网络的地理特征、射频条件、呼叫流量和用户移动性与其他网络不同。为了实现网络的最大容量和最佳性能,必须对网络的系统参数进行设计,以适应网络的运行条件。然而,由于无线网络系统工程的复杂性,在制定适用于所有系统的有效工程规则方面尚未取得很大成功。由于缺乏精确的通用工程规则,使得无线网络工程过程繁琐、昂贵且需要定制。本文提出的自工程引擎克服了目前无线网络工程实践中的困难。在无线网络系统中采用自工程引擎将使系统能够以实现最大容量和最佳性能为目标来监控和设计自身。
{"title":"Wireless networks self engineering engine","authors":"Hee Lee, S. Djoko, Hua Jiang, S. Subramanian, K. Basu","doi":"10.1109/ASSET.1999.756777","DOIUrl":"https://doi.org/10.1109/ASSET.1999.756777","url":null,"abstract":"Each wireless network system has its own unique operating conditions. The geographical characteristics, RF conditions, call traffic and subscriber mobility of one network are different from others. In order to achieve maximum capacity and optimal performance of a network, the system parameters of the network must be engineered to fit the network's operating conditions. However, because of the complexity of wireless network system engineering, there has not been much success in developing effective engineering rules that are applicable to all systems. This lack of accurate universal engineering rules makes the process of wireless network engineering laborious, expensive and customized. A self engineering engine presented in this paper overcomes the difficulties in the current wireless network engineering practice. The adoption of the self engineering engine in the wireless network system will enable the system to monitor and engineer itself with the goal of achieving maximum capacity and optimal performance.","PeriodicalId":340666,"journal":{"name":"Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129711453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Generalized loop-unrolling: a method for program speedup 广义循环展开:一种程序加速方法
J.C. Huang, T. Leng
It is well known that to optimize a program for speedup efforts should be focused on the regions where the payoff will be greatest. Loop constructs in a program represent such regions. In the literature, it has been shown that a certain degree of speedup can be achieved by loop unrolling. The technique published so far, however, appears to be applicable to FOR-loops only. This paper presents a generalized loop-unrolling method that can be applied to any type of loop construct. Possible complications in its applications, together with some experimental results, are discussed in detail.
众所周知,优化加速计划的努力应该集中在回报最大的区域。程序中的循环结构表示这样的区域。在文献中,已经表明,通过循环展开可以实现一定程度的加速。然而,迄今为止发表的技术似乎只适用于for循环。本文提出了一种广义的循环展开方法,该方法适用于任何类型的循环结构。文中还详细讨论了其应用中可能出现的问题,以及一些实验结果。
{"title":"Generalized loop-unrolling: a method for program speedup","authors":"J.C. Huang, T. Leng","doi":"10.1109/ASSET.1999.756775","DOIUrl":"https://doi.org/10.1109/ASSET.1999.756775","url":null,"abstract":"It is well known that to optimize a program for speedup efforts should be focused on the regions where the payoff will be greatest. Loop constructs in a program represent such regions. In the literature, it has been shown that a certain degree of speedup can be achieved by loop unrolling. The technique published so far, however, appears to be applicable to FOR-loops only. This paper presents a generalized loop-unrolling method that can be applied to any type of loop construct. Possible complications in its applications, together with some experimental results, are discussed in detail.","PeriodicalId":340666,"journal":{"name":"Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128740202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Extension and partitioning of use cases in support of formal object modeling 扩展和划分用例以支持形式化对象建模
J. Ryoo, J. Stach, E. Park
The number of use cases produced for any non-trivial system can be large. These use cases may contain redundancies resulting from multilevel stakeholder communities, natural language ambiguity, terminology differences, and common data and behaviours. In order to prepare use cases for formal requirements modeling, some structure is needed to classify the use cases into partitions that are meaningful to the object modeler. This paper extends Jacobson's (1992) use cases with a refinement called system oriented use cases. The extensions are then partitioned according to the strength of their similarity: behavioural, intentional, and environmental. The partitioning is exhaustive and produces a hierarchy. The hierarchy is a useful input to bound the requirements modeling activity that follows the elicitation phase.
为任何重要系统生成的用例数量都可能很大。这些用例可能包含由多级涉众社区、自然语言歧义、术语差异以及公共数据和行为导致的冗余。为了为正式的需求建模准备用例,需要一些结构来将用例划分为对对象建模者有意义的分区。本文扩展了Jacobson(1992)的用例,并对其进行了细化,称为面向系统的用例。然后根据其相似性的强度对扩展进行划分:行为,故意和环境。分区是详尽的,并产生层次结构。层次结构是一个有用的输入,可以将需求建模活动绑定到启发阶段之后。
{"title":"Extension and partitioning of use cases in support of formal object modeling","authors":"J. Ryoo, J. Stach, E. Park","doi":"10.1109/ASSET.1999.756774","DOIUrl":"https://doi.org/10.1109/ASSET.1999.756774","url":null,"abstract":"The number of use cases produced for any non-trivial system can be large. These use cases may contain redundancies resulting from multilevel stakeholder communities, natural language ambiguity, terminology differences, and common data and behaviours. In order to prepare use cases for formal requirements modeling, some structure is needed to classify the use cases into partitions that are meaningful to the object modeler. This paper extends Jacobson's (1992) use cases with a refinement called system oriented use cases. The extensions are then partitioned according to the strength of their similarity: behavioural, intentional, and environmental. The partitioning is exhaustive and produces a hierarchy. The hierarchy is a useful input to bound the requirements modeling activity that follows the elicitation phase.","PeriodicalId":340666,"journal":{"name":"Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125016762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identifying modules which do not propagate errors 识别不传播错误的模块
T. Khoshgoftaar, E. B. Allen, Wai Hong Tang, C. Michael, J. Voas
Our goal is to identify software modules that have some locations which do not propagate errors induced by a suite of test cases. This paper focuses on whether or not data state errors can propagate from a location in the code to the outputs or observable data state during random testing with inputs drawn from an operational distribution. If a code-location's probability of propagation is estimated to be zero, then a fault in that location could escape defection during testing. Because testing is never exhaustive, there is a risk that failures due to such latent faults could occur during operations. Fault injection is a technique for directly measuring the probability of propagation. However, measurement for every location in the code of a full-scale program is often prohibitively computation-intensive. Our objective is a practical, useful alternative to direct measurement. We present empirical evidence that static software product metrics can be useful for identifying software modules where the effects of a fault in that module are not observable. A case study of an intricate computer game program revealed a useful empirical relationship between static software product metrics and propagation of errors. The case study program was an order of magnitude larger than previously reported studies.
我们的目标是识别软件模块,这些模块有一些位置不会传播由一组测试用例引起的错误。本文的重点是数据状态错误是否可以从代码中的某个位置传播到输出或可观察的数据状态,在随机测试中从操作分布中提取输入。如果一个代码位置的传播概率被估计为零,那么在测试期间,该位置的错误可以避免缺陷。因为测试从来都不是详尽的,所以在操作过程中可能会发生由这些潜在错误引起的故障。断层注入是一种直接测量传播概率的技术。然而,对全尺寸程序代码中每个位置的测量通常需要大量的计算。我们的目标是一种实际的、有用的替代直接测量的方法。我们提供了经验证据,证明静态软件产品度量对于识别模块中故障的影响不可观察的软件模块是有用的。一个复杂的电脑游戏程序的案例研究揭示了静态软件产品度量和错误传播之间有用的经验关系。这个案例研究项目比以前报道的研究要大一个数量级。
{"title":"Identifying modules which do not propagate errors","authors":"T. Khoshgoftaar, E. B. Allen, Wai Hong Tang, C. Michael, J. Voas","doi":"10.1109/ASSET.1999.756768","DOIUrl":"https://doi.org/10.1109/ASSET.1999.756768","url":null,"abstract":"Our goal is to identify software modules that have some locations which do not propagate errors induced by a suite of test cases. This paper focuses on whether or not data state errors can propagate from a location in the code to the outputs or observable data state during random testing with inputs drawn from an operational distribution. If a code-location's probability of propagation is estimated to be zero, then a fault in that location could escape defection during testing. Because testing is never exhaustive, there is a risk that failures due to such latent faults could occur during operations. Fault injection is a technique for directly measuring the probability of propagation. However, measurement for every location in the code of a full-scale program is often prohibitively computation-intensive. Our objective is a practical, useful alternative to direct measurement. We present empirical evidence that static software product metrics can be useful for identifying software modules where the effects of a fault in that module are not observable. A case study of an intricate computer game program revealed a useful empirical relationship between static software product metrics and propagation of errors. The case study program was an order of magnitude larger than previously reported studies.","PeriodicalId":340666,"journal":{"name":"Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116573731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A simulation environment for dimensioning telecommunication management systems 电信管理系统的仿真环境
G. Damm, S. Giorcelli, G. Fouquet
This paper presents an integrated simulation environment to help dimensioning distributed systems in the field of telecommunication network management, and to be a guideline for software design of such systems. Dimensioning concerns sales persons, who have to quickly optimise configurations in terms of cost and efficiency in order to meet customer requirements. Software designers can use this tool to make and validate architectural choices, as well as to exhaustively test the performance and limits of the system. The proposed tool focuses on management traffic. To improve the assessment efficiency, simulation studies should be performed by the same teams who design or market the products; available simulation tools require specific skills. As a consequence, we developed a tool which provides an intuitive, user-friendly graphical interface, and gives easy access to the underlying models of the objects composing the network.
本文提出了一种集成仿真环境,以帮助电信网络管理领域的分布式系统量纲化,并为分布式系统的软件设计提供指导。尺寸与销售人员有关,他们必须根据成本和效率快速优化配置,以满足客户需求。软件设计人员可以使用这个工具来制定和验证架构选择,以及详尽地测试系统的性能和限制。建议的工具侧重于流量管理。为了提高评估效率,模拟研究应由设计或销售产品的同一团队进行;可用的仿真工具需要特定的技能。因此,我们开发了一个工具,它提供了一个直观的、用户友好的图形界面,并且可以轻松访问组成网络的对象的底层模型。
{"title":"A simulation environment for dimensioning telecommunication management systems","authors":"G. Damm, S. Giorcelli, G. Fouquet","doi":"10.1109/ASSET.1999.756783","DOIUrl":"https://doi.org/10.1109/ASSET.1999.756783","url":null,"abstract":"This paper presents an integrated simulation environment to help dimensioning distributed systems in the field of telecommunication network management, and to be a guideline for software design of such systems. Dimensioning concerns sales persons, who have to quickly optimise configurations in terms of cost and efficiency in order to meet customer requirements. Software designers can use this tool to make and validate architectural choices, as well as to exhaustively test the performance and limits of the system. The proposed tool focuses on management traffic. To improve the assessment efficiency, simulation studies should be performed by the same teams who design or market the products; available simulation tools require specific skills. As a consequence, we developed a tool which provides an intuitive, user-friendly graphical interface, and gives easy access to the underlying models of the objects composing the network.","PeriodicalId":340666,"journal":{"name":"Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129313102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Accountability issues in multihop message communication 多跳消息通信中的责任问题
S. Bhattacharya, R. Paul
Accountability (aka non-repudiation, or NRP) is a key component of information systems security, and it is a stated need in the Orange Book guidelines for security level classifications. This paper presents a framework of the "accountability" needs of a message communication system. In particular, we demonstrate that the traditional approach of digital signature (DS) based solutions to the accountability needs of a message communication system is only one part of the overall problem. In a multihop message delivery system (where the hops could be physically separated routers. Or logically distinct multiple software modules), there can be other aspects of accountability that may not be addressed using DS techniques. We identify a specific problem, namely the sender's ambiguity problem (SAP), that remains to be solved if a comprehensive treatment to accountability could be developed. The primary focus of this paper is to identify the SAP problem (and, hence, raise a point that DS alone cannot completely solve the accountability problem). Then we present an outline of our research in SAP framework. The framework includes NRP categories, NRP types of services, NRP levels of certification. Finally, we present a set of metrics that can potentially be used to assess the SAP problem, and its existence severance, in a networked or distributed system. Follow on research is required to elaborate the SAP framework.
问责制(又名不可抵赖性,或NRP)是信息系统安全的关键组成部分,它是安全级别分类的橙皮书指南中规定的需求。本文提出了一个消息通信系统“问责”需求的框架。特别是,我们证明了基于数字签名(DS)的解决方案的传统方法对消息通信系统的问责需求只是整个问题的一部分。在多跳消息传递系统中(跳可以是物理上分开的路由器)。(或逻辑上不同的多个软件模块),可能存在使用DS技术无法解决的责任的其他方面。我们确定了一个具体的问题,即发送者的歧义问题(SAP),如果可以开发对问责制的综合处理,则该问题仍有待解决。本文的主要焦点是确定SAP问题(因此,提出一个观点,即仅靠DS不能完全解决责任问题)。然后对SAP框架的研究进行了概述。该框架包括NRP类别、NRP服务类型、NRP认证级别。最后,我们提出了一组可以潜在地用于评估SAP问题及其在网络或分布式系统中的存在性分离的度量。后续研究需要详细阐述SAP框架。
{"title":"Accountability issues in multihop message communication","authors":"S. Bhattacharya, R. Paul","doi":"10.1109/ASSET.1999.756754","DOIUrl":"https://doi.org/10.1109/ASSET.1999.756754","url":null,"abstract":"Accountability (aka non-repudiation, or NRP) is a key component of information systems security, and it is a stated need in the Orange Book guidelines for security level classifications. This paper presents a framework of the \"accountability\" needs of a message communication system. In particular, we demonstrate that the traditional approach of digital signature (DS) based solutions to the accountability needs of a message communication system is only one part of the overall problem. In a multihop message delivery system (where the hops could be physically separated routers. Or logically distinct multiple software modules), there can be other aspects of accountability that may not be addressed using DS techniques. We identify a specific problem, namely the sender's ambiguity problem (SAP), that remains to be solved if a comprehensive treatment to accountability could be developed. The primary focus of this paper is to identify the SAP problem (and, hence, raise a point that DS alone cannot completely solve the accountability problem). Then we present an outline of our research in SAP framework. The framework includes NRP categories, NRP types of services, NRP levels of certification. Finally, we present a set of metrics that can potentially be used to assess the SAP problem, and its existence severance, in a networked or distributed system. Follow on research is required to elaborate the SAP framework.","PeriodicalId":340666,"journal":{"name":"Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123490344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Software hazard mining 软件隐患挖掘
J. Voas
Software fault injection is a process that discovers how "badly" software can behave after its state gets corrupted. Fault injection results are sometimes viewed suspiciously since state corruption is hypothetically-based. In response to this suspicion, this paper explores the potential return-on-investment when artificial state corruptions are used. We will primarily focus on fault injection's unique ability to reveal hazards that were inadvertently overlooked during software requirements and design. To our knowledge, this application of fault injection has never been exploited.
软件故障注入是一个发现软件在其状态被破坏后的行为有多“糟糕”的过程。错误注入的结果有时被认为是可疑的,因为国家腐败是基于假设的。针对这种怀疑,本文探讨了使用人为国家腐败时的潜在投资回报。我们将主要关注故障注入的独特能力,它可以揭示在软件需求和设计过程中无意中忽略的危险。据我们所知,这种故障注入的应用从未被利用过。
{"title":"Software hazard mining","authors":"J. Voas","doi":"10.1109/ASSET.1999.756767","DOIUrl":"https://doi.org/10.1109/ASSET.1999.756767","url":null,"abstract":"Software fault injection is a process that discovers how \"badly\" software can behave after its state gets corrupted. Fault injection results are sometimes viewed suspiciously since state corruption is hypothetically-based. In response to this suspicion, this paper explores the potential return-on-investment when artificial state corruptions are used. We will primarily focus on fault injection's unique ability to reveal hazards that were inadvertently overlooked during software requirements and design. To our knowledge, this application of fault injection has never been exploited.","PeriodicalId":340666,"journal":{"name":"Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124032030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TMO-based programming in COTS software/hardware platforms: a case study COTS软件/硬件平台中基于tmo的编程:一个案例研究
E. Shokri, Kane Kim
Object-oriented analysis and design methodologies have become popular in development of non-real-time business data processing applications. However conventional object-oriented techniques have had minimal impact on development of real-time applications mainly because these techniques do not explicitly address key characteristics of real-time systems, in particular, timing requirements. Time-triggered message-triggered object (TMO) structuring is in our view the most natural extension of the object-oriented design and implementation techniques which allows the system designer to explicitly specify timing characteristics of data and function components of an object. To facilitate TMO-based design of real-time systems in the most cost-effective manner, we have developed middleware (named TMOSM/ORB) providing TMO execution support mechanisms on top of the Windows NT operating system and a CORBA compliant object request broker. In order to evaluate the effectiveness of CORBA-compliant TMO based system development, a defense command-control application was ported into the TMOSM/ORB environment. In this paper, first the basics of the CORBA-compliant TMO structuring scheme are presented. We then report the porting experience and its findings regarding the effectiveness of the CORBA-compliant TMO based programming in developing real-time applications.
面向对象的分析和设计方法在非实时业务数据处理应用程序的开发中非常流行。然而,传统的面向对象技术对实时应用程序的开发影响很小,主要是因为这些技术没有明确地处理实时系统的关键特征,特别是时间需求。在我们看来,时间触发消息触发对象(TMO)结构是面向对象设计和实现技术最自然的扩展,它允许系统设计者显式地指定对象的数据和功能组件的时间特征。为了以最经济有效的方式促进基于TMO的实时系统设计,我们开发了中间件(名为TMOSM/ORB),在Windows NT操作系统和CORBA兼容的对象请求代理之上提供TMO执行支持机制。为了评估基于corba兼容的TMO系统开发的有效性,将一个国防命令控制应用程序移植到TMOSM/ORB环境中。本文首先介绍了符合corba标准的TMO结构方案的基本原理。然后,我们报告移植经验,以及在开发实时应用程序时,基于corba兼容的TMO编程的有效性。
{"title":"TMO-based programming in COTS software/hardware platforms: a case study","authors":"E. Shokri, Kane Kim","doi":"10.1109/ASSET.1999.756756","DOIUrl":"https://doi.org/10.1109/ASSET.1999.756756","url":null,"abstract":"Object-oriented analysis and design methodologies have become popular in development of non-real-time business data processing applications. However conventional object-oriented techniques have had minimal impact on development of real-time applications mainly because these techniques do not explicitly address key characteristics of real-time systems, in particular, timing requirements. Time-triggered message-triggered object (TMO) structuring is in our view the most natural extension of the object-oriented design and implementation techniques which allows the system designer to explicitly specify timing characteristics of data and function components of an object. To facilitate TMO-based design of real-time systems in the most cost-effective manner, we have developed middleware (named TMOSM/ORB) providing TMO execution support mechanisms on top of the Windows NT operating system and a CORBA compliant object request broker. In order to evaluate the effectiveness of CORBA-compliant TMO based system development, a defense command-control application was ported into the TMOSM/ORB environment. In this paper, first the basics of the CORBA-compliant TMO structuring scheme are presented. We then report the porting experience and its findings regarding the effectiveness of the CORBA-compliant TMO based programming in developing real-time applications.","PeriodicalId":340666,"journal":{"name":"Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129152484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Content based image retrieval systems 基于内容的图像检索系统
J. Zachary, S. Iyengar
The ability to organize and retrieve visual information such as images and video is becoming a crucial problem for specialists and general computer users alike. Because processing visual information requires perceptual abilities not yet known to exist in computational form, the ability to retrieve visual information without human assistance is a rich, complex, and interesting problem. This paper presents the problem from the point of view of real-world system construction, discusses the main feature extraction methods used in modern CBIR systems, and outlines several CBIR system implementations.
组织和检索图像和视频等视觉信息的能力正成为专家和普通计算机用户的一个关键问题。由于处理视觉信息需要的感知能力尚不以计算形式存在,因此在没有人类帮助的情况下检索视觉信息的能力是一个丰富、复杂和有趣的问题。本文从现实世界系统构建的角度提出了这一问题,讨论了现代CBIR系统中使用的主要特征提取方法,并概述了几种CBIR系统的实现。
{"title":"Content based image retrieval systems","authors":"J. Zachary, S. Iyengar","doi":"10.1109/ASSET.1999.756762","DOIUrl":"https://doi.org/10.1109/ASSET.1999.756762","url":null,"abstract":"The ability to organize and retrieve visual information such as images and video is becoming a crucial problem for specialists and general computer users alike. Because processing visual information requires perceptual abilities not yet known to exist in computational form, the ability to retrieve visual information without human assistance is a rich, complex, and interesting problem. This paper presents the problem from the point of view of real-world system construction, discusses the main feature extraction methods used in modern CBIR systems, and outlines several CBIR system implementations.","PeriodicalId":340666,"journal":{"name":"Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116654371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1