Proceedings 36th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Asia 2000最新文献

筛选
英文 中文
Implementing undo/redo in PDF Studio using object-oriented design pattern 在PDF Studio中使用面向对象的设计模式实现撤销/重做
Min Zhang, Kehong Wang
{"title":"Implementing undo/redo in PDF Studio using object-oriented design pattern","authors":"Min Zhang, Kehong Wang","doi":"10.1109/TOOLS.2000.885898","DOIUrl":"https://doi.org/10.1109/TOOLS.2000.885898","url":null,"abstract":"PDF Studio is a software package that provides a visual design environment to help a user create a document with text, images and data from a database, and that generates the file in PDF (Portable Document Format). Undo/redo functionality is a common requirement for most software that has a visual user interface. This paper introduces the implementation of undo/redo in this software package and describes how object-oriented design patterns are applied to its design and implementation.","PeriodicalId":393932,"journal":{"name":"Proceedings 36th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Asia 2000","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131671570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cooperative mobile agents in dynamic network environment 动态网络环境下的协同移动代理
Wang Minyi, Yao Shaowen, Zhou Mingtian
{"title":"Cooperative mobile agents in dynamic network environment","authors":"Wang Minyi, Yao Shaowen, Zhou Mingtian","doi":"10.1109/TOOLS.2000.885913","DOIUrl":"https://doi.org/10.1109/TOOLS.2000.885913","url":null,"abstract":"A multi-MA (mobile agents) cooperative system leads to flexible and efficient solutions for distributed systems, but a lot of research is not suitable for dynamic network environments. Based on the modeling of the multi-MA cooperative system and analysis of MA behavior, we present some new ideas and a theoretic model on fuzzy knowledge representation and exchange, in which some key problems such as fuzzy belief composition and contradiction coordination are solved. With the help of simulation experiments on dynamic network topology discovery, we prove the model's availability and efficiency.","PeriodicalId":393932,"journal":{"name":"Proceedings 36th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Asia 2000","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122500396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Developing an e-commerce application by using content component model 使用内容组件模型开发电子商务应用程序
Qingshan Li, Ping Chen, Jian Chen
{"title":"Developing an e-commerce application by using content component model","authors":"Qingshan Li, Ping Chen, Jian Chen","doi":"10.1109/TOOLS.2000.885927","DOIUrl":"https://doi.org/10.1109/TOOLS.2000.885927","url":null,"abstract":"Applications using the Web, such as electronic commerce applications, have become larger more complex and dynamic. Developing and maintaining such large and complex Web applications demands a systematic process and an effective engineering methodology. A suitable model of Web application that can capture its features is crucial and fundamental to the establishment of such approaches. Through a practical case, relevant to business to business electronic commerce, we make a study of content component Web application models, within which a content component is regarded as an independent process unit performing necessary content organizing processing and presenting functions. From the content component view, which is at the level of software analysis and design, a Web application is regarded as a collection of content components and some other service components providing certain content service. The authors emphasise more effective development and maintenance in Web application by using content component models, methods and underlying technologies.","PeriodicalId":393932,"journal":{"name":"Proceedings 36th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Asia 2000","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122627793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Agent-based and software composite DDSS 基于agent和软件组合的DDSS
Chunhua Ju, Ling Yun, T. Norman
{"title":"Agent-based and software composite DDSS","authors":"Chunhua Ju, Ling Yun, T. Norman","doi":"10.1109/TOOLS.2000.885897","DOIUrl":"https://doi.org/10.1109/TOOLS.2000.885897","url":null,"abstract":"Agent-based systems are an increasingly prevalent issue in artificial intelligence (AI), and their application to distributed decision support systems (DDSSs) operating over the Internet is a potentially valuable contribution. This paper proposes an approach to DDSSs using multiple agents to coordinate decision support: agent-based DDSSs (ABDDSSs). The architecture of individual agents involved in such a system are discussed, and a particular agent organization is analyzed with a view to applying this technology to DDSSs.","PeriodicalId":393932,"journal":{"name":"Proceedings 36th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Asia 2000","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124954079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security characterisation of software components and their composition 软件组件及其组成的安全特征
K. Khan, Jun Han, Yuliang Zheng
{"title":"Security characterisation of software components and their composition","authors":"K. Khan, Jun Han, Yuliang Zheng","doi":"10.1109/TOOLS.2000.885923","DOIUrl":"https://doi.org/10.1109/TOOLS.2000.885923","url":null,"abstract":"Proposes a security characterisation structure of software components and their composition. The structure provides a preliminary modelling of the security properties of stand-alone software components and some of their compositional primitives. In this paper, we are particularly interested in security properties related to user data protection of software components. The proposed compositional specification makes an attempt to model the resulting effect between the security attributes of two contracting components. The compositional specification structure can capture the results of the combined security specifications of two participating components in a contract. Our security specification syntax is based on four compositional elements: the identities of the contracting components, the actions to be performed in a compositional relationship, the security attributes supported by the components, and the resources to be used by other components. The structure is used in an example of secure interactions over a network in order to illustrate the applicability of the proposed work.","PeriodicalId":393932,"journal":{"name":"Proceedings 36th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Asia 2000","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126864716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信