ACM-SE 35最新文献

筛选
英文 中文
Hypertext document generator in a computer supported cooperative work environment 在计算机支持的协同工作环境中的超文本文档生成器
ACM-SE 35 Pub Date : 1997-04-02 DOI: 10.1145/2817460.2817512
Yifang Chang, Kai-Hsiung Chang, L. Murphy, Timothy W. Dollar, B. Lee, Jonathan D. Fouss
{"title":"Hypertext document generator in a computer supported cooperative work environment","authors":"Yifang Chang, Kai-Hsiung Chang, L. Murphy, Timothy W. Dollar, B. Lee, Jonathan D. Fouss","doi":"10.1145/2817460.2817512","DOIUrl":"https://doi.org/10.1145/2817460.2817512","url":null,"abstract":"Distributed Collaborative Writing Aid (DCWA) is an environment developed for a group of designers to work together. It provides real-time communication that enables collaboration members to share ideas while working together. The emphasis of this paper is on the process of integrating and generating documents. This process involves creating, editing, and revising a document tree structure and integrating textual, graphic, and image components into a complete document. HTML is chosen as the format for the integrated documents generated by DCWA. With this capability, collaboration members can tailor the collaboration document to meet their individual needs.","PeriodicalId":274966,"journal":{"name":"ACM-SE 35","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127855119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A tightly secure object-oriented data model using both discretionary and mandatory security methodologies 使用任意和强制安全方法的高度安全的面向对象数据模型
ACM-SE 35 Pub Date : 1997-04-02 DOI: 10.1145/2817460.2817515
Eric Minor, Susan V. Vrbsky
{"title":"A tightly secure object-oriented data model using both discretionary and mandatory security methodologies","authors":"Eric Minor, Susan V. Vrbsky","doi":"10.1145/2817460.2817515","DOIUrl":"https://doi.org/10.1145/2817460.2817515","url":null,"abstract":"Today's industries, such as the intelligence industry, the medical industry, and the government, rely strongly on object-oriented database systems to protect their highly sensitive data from being infiltrated and/or corrupted by malicious users. Therefore, the need for a reliable database security paradigm has become an immediate concern. Current security methods such as the discretionary method, and the mandatory method address this concern. Although both methods provide significant progresses in database security for object-oriented databases, there still exists a gap between current security measures and a completely secure database system. Our goal in this paper is to narrow this gap by presenting a security data model that combines both the discretionary policies and the mandatory policies as well as establish its own security policies.","PeriodicalId":274966,"journal":{"name":"ACM-SE 35","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130426390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy spatial relations 模糊空间关系
ACM-SE 35 Pub Date : 1997-04-02 DOI: 10.1145/2817460.2817498
A. Esterline, G. Dozier, A. Homaifar
{"title":"Fuzzy spatial relations","authors":"A. Esterline, G. Dozier, A. Homaifar","doi":"10.1145/2817460.2817498","DOIUrl":"https://doi.org/10.1145/2817460.2817498","url":null,"abstract":"We present a fuzzy version of the crisp spatial logic developed by Randell et al., which takes the single relation connected-with as primitive. Membership functions are defined for each spatial relation defined in the crisp theory. Furthermore, principles are presented for defining linguistic variables whose linguistic values are spatial relations. The work reported here addresses spatial reasoning in situations where numerical or geometric precision is unlikely; it is particularly suited for dynamic situations.","PeriodicalId":274966,"journal":{"name":"ACM-SE 35","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122244346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Constructing Delaunay triangulation on the Intel Paragon 在Intel Paragon上构建Delaunay三角剖分
ACM-SE 35 Pub Date : 1997-04-02 DOI: 10.1145/2817460.2817476
F. Lee
{"title":"Constructing Delaunay triangulation on the Intel Paragon","authors":"F. Lee","doi":"10.1145/2817460.2817476","DOIUrl":"https://doi.org/10.1145/2817460.2817476","url":null,"abstract":"In this paper, we develop a parallel algorithm on the Intel Paragon supercomputer for constructing the two-dimensional Delaunay triangulation (called 2-d DT) of a point set with N points on the plane. The time complexity of the best sequential algorithm for 2-d DT is O(N log N). Our parallel algorithm improves it to constant or O(1) time by using N processors in the Paragon. The 2-d DT has many practical applications on sciences and technologies, such as unstructured mesh generation on computational fluid dynamics, geometric modeling on computer-aided design, volume rendering on scientific visualization, and Voronoi diagram on robotics and image processing.","PeriodicalId":274966,"journal":{"name":"ACM-SE 35","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114240834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of distributed applications using Java 使用Java实现分布式应用程序
ACM-SE 35 Pub Date : 1997-04-02 DOI: 10.1145/2817460.2817519
Obaid Yousuf, Jennifer McManis
{"title":"Implementation of distributed applications using Java","authors":"Obaid Yousuf, Jennifer McManis","doi":"10.1145/2817460.2817519","DOIUrl":"https://doi.org/10.1145/2817460.2817519","url":null,"abstract":"Java's portability, architectural neutrality, and support of network connectivity make it ideal for implementation of applications on networks. Java applets in particular are designed to interact with Web browsers to provide a variety of services over the network. Unfortunately, Java applet security constraints restrict the user's ability to connect with and transfer data to and from remote sites and thus limit the user's ability to utilize distributed applications. In this paper we explore ways to get around this limitation. Specifically, we propose to use an intermediate server to connect the user of the applet to remote sites that they wish to access.","PeriodicalId":274966,"journal":{"name":"ACM-SE 35","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116218998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A programmable telephone rate meter: a hardware/software codesign case study 可编程电话速率计:硬件/软件协同设计案例研究
ACM-SE 35 Pub Date : 1997-04-02 DOI: 10.1145/2817460.2817483
Bridgette M. Wallace, Richard O. Chapman, L. Moore
{"title":"A programmable telephone rate meter: a hardware/software codesign case study","authors":"Bridgette M. Wallace, Richard O. Chapman, L. Moore","doi":"10.1145/2817460.2817483","DOIUrl":"https://doi.org/10.1145/2817460.2817483","url":null,"abstract":"We present an example of the design of an embedded digital system using hardware-software codesign methodology. The use of this methodology permits a relatively inexperienced digital designer to develop a reasonably sophisticated device consisting of a microprocessor and custom hardware in a very short time. The device under production is a telephone rate meter that keeps track of the cost of calls made from a particular telephone. Given the plethora of calling plans marketed by telecommunications providers, a great deal of flexibility is required in the manner in which the rate structure can be specified. Use of codesign methodology permits the metering of any rate structure that can be specified algorithmically.","PeriodicalId":274966,"journal":{"name":"ACM-SE 35","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129646382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
I want it all and I want it now!: data retrieval in a distributed multimedia database system 我想要一切,现在就要!:分布式多媒体数据库系统中的数据检索
ACM-SE 35 Pub Date : 1997-04-02 DOI: 10.1145/2817460.2817525
Sasa Tomic, T. Camp
{"title":"I want it all and I want it now!: data retrieval in a distributed multimedia database system","authors":"Sasa Tomic, T. Camp","doi":"10.1145/2817460.2817525","DOIUrl":"https://doi.org/10.1145/2817460.2817525","url":null,"abstract":"A distributed algorithm for data retrieval in a distributed multimedia database system is presented. The algorithm combines the idea of a token ring algorithm with the use of parallelism to solve the 'hiccups' problem. Data objects are replicated across an array of disk stations to increase the total throughput of the system, and to prevent object requests from becoming unserviceable due to a failure of a disk station. Two replication strategies are examined: media independent partitioning and media type partitioning.","PeriodicalId":274966,"journal":{"name":"ACM-SE 35","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123998350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of a linear transitive closure algorithm in relational database design 关系型数据库设计中线性传递闭包算法的实现
ACM-SE 35 Pub Date : 1997-04-02 DOI: 10.1145/2817460.2817462
R. Ladner
{"title":"Implementation of a linear transitive closure algorithm in relational database design","authors":"R. Ladner","doi":"10.1145/2817460.2817462","DOIUrl":"https://doi.org/10.1145/2817460.2817462","url":null,"abstract":"This paper describes a correction to an existing linear transitive closure algorithm found in [1], explains how the algorithm works and provides an example of how it works. Relational database design involves the generation of relational schemes that avoid unnecessary repetition of information. At the same time the ability to accurately retrieve all data stored in the database must be preserved. A transitive closure algorithm can be used in the design process to identify the correct attributes that can be removed without jeopardizing the accuracy of data retrieval [2]. Linear run time can be achieved with the corrected algorithm described in this paper.","PeriodicalId":274966,"journal":{"name":"ACM-SE 35","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123045416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed object-oriented database programming using Java 使用Java进行分布式面向对象数据库编程
ACM-SE 35 Pub Date : 1997-04-02 DOI: 10.1145/2817460.2817480
Oceana O. Pun
{"title":"Distributed object-oriented database programming using Java","authors":"Oceana O. Pun","doi":"10.1145/2817460.2817480","DOIUrl":"https://doi.org/10.1145/2817460.2817480","url":null,"abstract":"The Java programming language allows programs developed to access data across the Inter-Net. One of the main applications of this technology is distributed databases. In this paper we investigate the use of Java as a language for manipulating object-oriented databases and also the Remote Method Invocation (RMI) package for distributing this data. We were able to allow distributed access to a database from multiple clients on a variety of different machines.","PeriodicalId":274966,"journal":{"name":"ACM-SE 35","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125695582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study on the maintenance of literate programs 关于文化项目维护的研究
ACM-SE 35 Pub Date : 1997-04-02 DOI: 10.1145/2817460.2817507
Randy K. Smith, Marcus Brown
{"title":"A study on the maintenance of literate programs","authors":"Randy K. Smith, Marcus Brown","doi":"10.1145/2817460.2817507","DOIUrl":"https://doi.org/10.1145/2817460.2817507","url":null,"abstract":"This paper outlines an ongoing study investigating the maintenance of literate programs. The study examines the accuracy and performance time of subjects performing maintenance task on 4 different literate programs of varying size. The preliminary data suggest that subject performance is not directly related to program size.","PeriodicalId":274966,"journal":{"name":"ACM-SE 35","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122108879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信