Proceedings 23rd Australasian Computer Science Conference. ACSC 2000 (Cat. No.PR00518)最新文献

筛选
英文 中文
Towards certificate verification in a certificate management system 证书管理系统中的证书验证
Chuchang Liu, M. Ozols, Marie Henderson, A. Cant
{"title":"Towards certificate verification in a certificate management system","authors":"Chuchang Liu, M. Ozols, Marie Henderson, A. Cant","doi":"10.1109/ACSC.2000.824396","DOIUrl":"https://doi.org/10.1109/ACSC.2000.824396","url":null,"abstract":"A Certificate Management System (CMS) is used to generate, distribute, store and verify certificates. It supports secure electronic communication through its functions. In a CMS, the integrity of every certificate that a security application relies upon must be verified. The certificate verification function performs the verification process and can store verified certificates in the local database for later use. Focusing on the certificate verification function, this paper presents a state-based model for CMSs and discusses certificate verification issues. A recursive approach to certificate verification is proposed, and several verification techniques, which may be employed to reduce the amount of work in the verification process, are also presented.","PeriodicalId":304540,"journal":{"name":"Proceedings 23rd Australasian Computer Science Conference. ACSC 2000 (Cat. No.PR00518)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130993308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Object-oriented natural language requirements specification 面向对象的自然语言需求规范
B. Bryant
{"title":"Object-oriented natural language requirements specification","authors":"B. Bryant","doi":"10.1109/ACSC.2000.824376","DOIUrl":"https://doi.org/10.1109/ACSC.2000.824376","url":null,"abstract":"A methodology is proposed for the formal development of software systems from a user's requirements specification in natural language into a complete implementation, proceeding through the steps of formal specification, and detailed design and implementation in an automated manner. Our methodology is based upon the theories of two-level grammar (TLG) and object-oriented design and takes advantage of the existence of several existing software design tools. We develop an iterative transformation process from the natural language specification into the final implementation, with a specification development environment to assist the user, as well as the designer in accomplishing this transformation. Our underlying formal specification methodology may also be used in the final development of the implementation. This methodology is a major advance in object-oriented software development and the software engineering process in general.","PeriodicalId":304540,"journal":{"name":"Proceedings 23rd Australasian Computer Science Conference. ACSC 2000 (Cat. No.PR00518)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128243949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Conglomeration-realising alias protection 实现集群别名保护
John Michael Potter, J. Noble
{"title":"Conglomeration-realising alias protection","authors":"John Michael Potter, J. Noble","doi":"10.1109/ACSC.2000.824402","DOIUrl":"https://doi.org/10.1109/ACSC.2000.824402","url":null,"abstract":"Composition and aggregation are widely used in UML analysis and design models to represent part-whole structures. Neither kind of association places any restriction on how the paths may be used from outside the whole object; this can lead to a number of problems if a part object is aliased from outside. Conglomeration realises a stronger form of encapsulation than does composition. Parts of conglomerate objects are protected from external access. By imposing instance-level consistency conditions on part-whole relationships, conglomeration can make UML models easier to build, understand, and implement correctly.","PeriodicalId":304540,"journal":{"name":"Proceedings 23rd Australasian Computer Science Conference. ACSC 2000 (Cat. No.PR00518)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133469310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Indicators of performance in first-year computing 第一年计算的性能指标
Annegret Goold, R. Rimmer
{"title":"Indicators of performance in first-year computing","authors":"Annegret Goold, R. Rimmer","doi":"10.1109/ACSC.2000.824383","DOIUrl":"https://doi.org/10.1109/ACSC.2000.824383","url":null,"abstract":"A group of first-year university students majoring in computer science were the subjects of this research. The performances of these students in the study of information technology unit and two units of computer programming were examined against a range of factors. Although the performance in other units studied at university was directly related to performance for all three units, from unit to unit other significant determining factors varied. Learning style and problem-solving skill were important in the study of information technology; gender and secondary school performance were important in introductory programming, while dislike of programming features in both programming units. Observed factors account for between 43 and 65 per cent of examination mark and overall performance.","PeriodicalId":304540,"journal":{"name":"Proceedings 23rd Australasian Computer Science Conference. ACSC 2000 (Cat. No.PR00518)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133960862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A three-valued semantic for Horn clause programs 霍恩子句程序的三值语义
L. Naish
{"title":"A three-valued semantic for Horn clause programs","authors":"L. Naish","doi":"10.1109/ACSC.2000.824399","DOIUrl":"https://doi.org/10.1109/ACSC.2000.824399","url":null,"abstract":"The study of semantics of logic programs has shown strong links between the model theoretic semantics (truth and falsity of atoms in the programmer's interpretation of a program), procedural semantics (for example, SLD resolution) and fixpoint semantics (which is useful for program analysis and alternative execution mechanisms). Nearly all of this work assumes that intended interpretations are two-valued: a ground atom is true (and should succeed according to the procedural semantics) or false (and should not succeed). In reality, intended interpretations are less precise. Programmers consider that some atoms \"should not occur\" or are \"ill-typed\" or \"inadmissible\". Programmers don't know and don't care whether such atoms succeed. In this paper we propose a three-valued semantics for (essentially) Horn clause programs which reflects this. It is simpler and more flexible than previously proposed type schemes and more flexible than previously proposed type schemes which implicitly recognise this third truth value. It provides tools to reason about correctness of programs without the need for unnatural precision or undue restrictions on programming style. This work has been motivated by work on declarative debugging, where it has been recognised that inadmissible calls are important.","PeriodicalId":304540,"journal":{"name":"Proceedings 23rd Australasian Computer Science Conference. ACSC 2000 (Cat. No.PR00518)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132646565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Automated layout of concept lattices using force directed placement and genetic algorithms 使用力定向放置和遗传算法的概念格自动布局
Richard Cole
{"title":"Automated layout of concept lattices using force directed placement and genetic algorithms","authors":"Richard Cole","doi":"10.1109/ACSC.2000.824378","DOIUrl":"https://doi.org/10.1109/ACSC.2000.824378","url":null,"abstract":"Concept lattices represent a conceptual hierarchy inherent in a data set. A labelled line diagram for such a lattice represents this information diagramatically. A diagram for a concept lattice may be algebraically generated by a set of vectors assigned to elements of the lattice. Such a diagram is called an additive line diagram, and is considered useful because it makes apparent the inherent structure of the lattice. This paper reports on experience with two approaches to automated concept lattice layout. (i) using generic algorithms optimising over a finite discrete space of diagrams, and (ii) force directed placement optimising over a continuous rational space. The layout of concept lattices is of relevance to the layout of lattices in general since any lattice can be represented simply by a concept lattice.","PeriodicalId":304540,"journal":{"name":"Proceedings 23rd Australasian Computer Science Conference. ACSC 2000 (Cat. No.PR00518)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114267217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Exposing memory mapped I/O using NFS 使用NFS公开内存映射I/O
A. L. Brown
{"title":"Exposing memory mapped I/O using NFS","authors":"A. L. Brown","doi":"10.1109/ACSC.2000.824375","DOIUrl":"https://doi.org/10.1109/ACSC.2000.824375","url":null,"abstract":"The design and implementation of some persistent object stores rely on the availability of memory mapped files. A significant difficulty faced by this approach is that the programmer has very little control over when I/O occurs. In this paper, a mechanism for exposing the I/O activity of a memory mapped file is presented. This involves implementing a special purpose NFS server that provides a shadow paged file which can be memory mapped by a persistent object store. Some initial performance figures are presented to indicate the relative performance of this approach compared to more traditional approaches.","PeriodicalId":304540,"journal":{"name":"Proceedings 23rd Australasian Computer Science Conference. ACSC 2000 (Cat. No.PR00518)","volume":"393 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120892145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Result fusion in multi-agent systems based on OWA operator 基于OWA算子的多智能体系统结果融合
Zili Zhang, Chengqi Zhang
{"title":"Result fusion in multi-agent systems based on OWA operator","authors":"Zili Zhang, Chengqi Zhang","doi":"10.1109/ACSC.2000.824409","DOIUrl":"https://doi.org/10.1109/ACSC.2000.824409","url":null,"abstract":"In multi-agent systems, each of the agents may have its own expertise. When they are asked to accomplish the same task, the results may be different. In such situations, we need to fuse the results to obtain a final one. We propose an information fusion approach when multiple agents are asked to collect the information for the same query from different resources. We also discuss the group decision fusion problem that several agents with similar knowledge make decisions using the same information. Both are based on ordered weighted averaging (OWA) operator.","PeriodicalId":304540,"journal":{"name":"Proceedings 23rd Australasian Computer Science Conference. ACSC 2000 (Cat. No.PR00518)","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116094662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Storage and retrieval of software components using aspects 使用方面存储和检索软件组件
J. Grundy
{"title":"Storage and retrieval of software components using aspects","authors":"J. Grundy","doi":"10.1109/ACSC.2000.824386","DOIUrl":"https://doi.org/10.1109/ACSC.2000.824386","url":null,"abstract":"While component-based software engineering technologies have become popular, finding and reusing appropriate software components is often challenging. We describe a software component repository that uses a concept of component \"aspects\" to index and query components based on their high-level systemic characteristics, including their user interface, persistency, distribution, security and collaborative work support. Software components are queried for aspects of a system they provide or require and these are used to automatically generate a high-level indexing system. Developers and end users can formulate high-level, aspect-based queries to retrieve components providing or requiring services appropriate to their needs.","PeriodicalId":304540,"journal":{"name":"Proceedings 23rd Australasian Computer Science Conference. ACSC 2000 (Cat. No.PR00518)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132556057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Refining logic programs using types 使用类型精炼逻辑程序
R. Colvin, I. Hayes, P. Strooper
{"title":"Refining logic programs using types","authors":"R. Colvin, I. Hayes, P. Strooper","doi":"10.1109/ACSC.2000.824379","DOIUrl":"https://doi.org/10.1109/ACSC.2000.824379","url":null,"abstract":"The logic programming refinement calculus is a method for transforming specifications to executable code, maintaining the correctness of the code with respect to its specification. In this paper we show how types can be handled in the logic programming refinement calculus. Types of variables are necessary for a complete specification of a procedure, and typing information can guide the refinement of a procedure specification to code. As an application of this framework, we show how dynamic type-checks can be formally eliminated from a sample program.","PeriodicalId":304540,"journal":{"name":"Proceedings 23rd Australasian Computer Science Conference. ACSC 2000 (Cat. No.PR00518)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132069816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信