Pub Date : 2000-10-30DOI: 10.1109/TOOLS.2000.885898
Min Zhang, Kehong Wang
PDF Studio is a software package that provides a visual design environment to help a user create a document with text, images and data from a database, and that generates the file in PDF (Portable Document Format). Undo/redo functionality is a common requirement for most software that has a visual user interface. This paper introduces the implementation of undo/redo in this software package and describes how object-oriented design patterns are applied to its design and implementation.
PDF Studio是一个软件包,它提供了一个可视化的设计环境,帮助用户从数据库中创建文本、图像和数据的文档,并生成PDF(可移植文档格式)文件。撤销/重做功能是大多数具有可视化用户界面的软件的常见需求。本文介绍了撤销/重做在该软件包中的实现,并描述了如何将面向对象的设计模式应用于其设计和实现。
{"title":"Implementing undo/redo in PDF Studio using object-oriented design pattern","authors":"Min Zhang, Kehong Wang","doi":"10.1109/TOOLS.2000.885898","DOIUrl":"https://doi.org/10.1109/TOOLS.2000.885898","url":null,"abstract":"PDF Studio is a software package that provides a visual design environment to help a user create a document with text, images and data from a database, and that generates the file in PDF (Portable Document Format). Undo/redo functionality is a common requirement for most software that has a visual user interface. This paper introduces the implementation of undo/redo in this software package and describes how object-oriented design patterns are applied to its design and implementation.","PeriodicalId":393932,"journal":{"name":"Proceedings 36th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Asia 2000","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131671570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2000-10-30DOI: 10.1109/TOOLS.2000.885913
Wang Minyi, Yao Shaowen, Zhou Mingtian
A multi-MA (mobile agents) cooperative system leads to flexible and efficient solutions for distributed systems, but a lot of research is not suitable for dynamic network environments. Based on the modeling of the multi-MA cooperative system and analysis of MA behavior, we present some new ideas and a theoretic model on fuzzy knowledge representation and exchange, in which some key problems such as fuzzy belief composition and contradiction coordination are solved. With the help of simulation experiments on dynamic network topology discovery, we prove the model's availability and efficiency.
多移动agent (multi-MA, mobile agent)协同系统为分布式系统提供了灵活高效的解决方案,但很多研究并不适合动态网络环境。在对多主体协作系统建模和主体行为分析的基础上,提出了模糊知识表示与交换的新思路和理论模型,解决了模糊信念构成和矛盾协调等关键问题。通过动态网络拓扑发现的仿真实验,验证了该模型的有效性和有效性。
{"title":"Cooperative mobile agents in dynamic network environment","authors":"Wang Minyi, Yao Shaowen, Zhou Mingtian","doi":"10.1109/TOOLS.2000.885913","DOIUrl":"https://doi.org/10.1109/TOOLS.2000.885913","url":null,"abstract":"A multi-MA (mobile agents) cooperative system leads to flexible and efficient solutions for distributed systems, but a lot of research is not suitable for dynamic network environments. Based on the modeling of the multi-MA cooperative system and analysis of MA behavior, we present some new ideas and a theoretic model on fuzzy knowledge representation and exchange, in which some key problems such as fuzzy belief composition and contradiction coordination are solved. With the help of simulation experiments on dynamic network topology discovery, we prove the model's availability and efficiency.","PeriodicalId":393932,"journal":{"name":"Proceedings 36th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Asia 2000","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122500396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2000-10-30DOI: 10.1109/TOOLS.2000.885927
Qingshan Li, Ping Chen, Jian Chen
Applications using the Web, such as electronic commerce applications, have become larger more complex and dynamic. Developing and maintaining such large and complex Web applications demands a systematic process and an effective engineering methodology. A suitable model of Web application that can capture its features is crucial and fundamental to the establishment of such approaches. Through a practical case, relevant to business to business electronic commerce, we make a study of content component Web application models, within which a content component is regarded as an independent process unit performing necessary content organizing processing and presenting functions. From the content component view, which is at the level of software analysis and design, a Web application is regarded as a collection of content components and some other service components providing certain content service. The authors emphasise more effective development and maintenance in Web application by using content component models, methods and underlying technologies.
{"title":"Developing an e-commerce application by using content component model","authors":"Qingshan Li, Ping Chen, Jian Chen","doi":"10.1109/TOOLS.2000.885927","DOIUrl":"https://doi.org/10.1109/TOOLS.2000.885927","url":null,"abstract":"Applications using the Web, such as electronic commerce applications, have become larger more complex and dynamic. Developing and maintaining such large and complex Web applications demands a systematic process and an effective engineering methodology. A suitable model of Web application that can capture its features is crucial and fundamental to the establishment of such approaches. Through a practical case, relevant to business to business electronic commerce, we make a study of content component Web application models, within which a content component is regarded as an independent process unit performing necessary content organizing processing and presenting functions. From the content component view, which is at the level of software analysis and design, a Web application is regarded as a collection of content components and some other service components providing certain content service. The authors emphasise more effective development and maintenance in Web application by using content component models, methods and underlying technologies.","PeriodicalId":393932,"journal":{"name":"Proceedings 36th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Asia 2000","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122627793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2000-10-30DOI: 10.1109/TOOLS.2000.885897
Chunhua Ju, Ling Yun, T. Norman
Agent-based systems are an increasingly prevalent issue in artificial intelligence (AI), and their application to distributed decision support systems (DDSSs) operating over the Internet is a potentially valuable contribution. This paper proposes an approach to DDSSs using multiple agents to coordinate decision support: agent-based DDSSs (ABDDSSs). The architecture of individual agents involved in such a system are discussed, and a particular agent organization is analyzed with a view to applying this technology to DDSSs.
{"title":"Agent-based and software composite DDSS","authors":"Chunhua Ju, Ling Yun, T. Norman","doi":"10.1109/TOOLS.2000.885897","DOIUrl":"https://doi.org/10.1109/TOOLS.2000.885897","url":null,"abstract":"Agent-based systems are an increasingly prevalent issue in artificial intelligence (AI), and their application to distributed decision support systems (DDSSs) operating over the Internet is a potentially valuable contribution. This paper proposes an approach to DDSSs using multiple agents to coordinate decision support: agent-based DDSSs (ABDDSSs). The architecture of individual agents involved in such a system are discussed, and a particular agent organization is analyzed with a view to applying this technology to DDSSs.","PeriodicalId":393932,"journal":{"name":"Proceedings 36th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Asia 2000","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124954079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2000-10-30DOI: 10.1109/TOOLS.2000.885923
K. Khan, Jun Han, Yuliang Zheng
Proposes a security characterisation structure of software components and their composition. The structure provides a preliminary modelling of the security properties of stand-alone software components and some of their compositional primitives. In this paper, we are particularly interested in security properties related to user data protection of software components. The proposed compositional specification makes an attempt to model the resulting effect between the security attributes of two contracting components. The compositional specification structure can capture the results of the combined security specifications of two participating components in a contract. Our security specification syntax is based on four compositional elements: the identities of the contracting components, the actions to be performed in a compositional relationship, the security attributes supported by the components, and the resources to be used by other components. The structure is used in an example of secure interactions over a network in order to illustrate the applicability of the proposed work.
{"title":"Security characterisation of software components and their composition","authors":"K. Khan, Jun Han, Yuliang Zheng","doi":"10.1109/TOOLS.2000.885923","DOIUrl":"https://doi.org/10.1109/TOOLS.2000.885923","url":null,"abstract":"Proposes a security characterisation structure of software components and their composition. The structure provides a preliminary modelling of the security properties of stand-alone software components and some of their compositional primitives. In this paper, we are particularly interested in security properties related to user data protection of software components. The proposed compositional specification makes an attempt to model the resulting effect between the security attributes of two contracting components. The compositional specification structure can capture the results of the combined security specifications of two participating components in a contract. Our security specification syntax is based on four compositional elements: the identities of the contracting components, the actions to be performed in a compositional relationship, the security attributes supported by the components, and the resources to be used by other components. The structure is used in an example of secure interactions over a network in order to illustrate the applicability of the proposed work.","PeriodicalId":393932,"journal":{"name":"Proceedings 36th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Asia 2000","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126864716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}