Tomasz Muldner - Profile on Academia.edu (original) (raw)

Papers by Tomasz Muldner

Research paper thumbnail of Compilation of Parallel Programs

Compilation of Parallel Programs

FUND. INFO., 1981

Research paper thumbnail of On visualization and implementation of algorithms

On visualization and implementation of algorithms

The 2004 International Conference on Modeling, …, 2004

Research paper thumbnail of Sequential Specifications and Concurrent Execution of Banach Programs

Sequential Specifications and Concurrent Execution of Banach Programs

Research paper thumbnail of Book review: "C" as a second laguage: For Native Speakers of Pascal by Tomasz Muldner & Peter W. Steele (Addison-Wesley: MA, 1988)

Book review: "C" as a second laguage: For Native Speakers of Pascal by Tomasz Muldner & Peter W. Steele (Addison-Wesley: MA, 1988)

ACM Sigchi Bulletin, 1989

Beginning computer science students frequently ask their professors to recommend a book about C p... more Beginning computer science students frequently ask their professors to recommend a book about C programming. These students usually know Pascal, have a vague idea that C is an important language, and know that C will be used in their upper level courses to come. C as a Second Language was written to fill this need. In their preface, the authors describe the book's intended audience as "students, professional programmers, and computer hobbyists studying C on their own" (Muldner, p. v). Experience in Pascal programming is assumed.

Research paper thumbnail of Explaining Algorithms: A New Perspective

Explaining Algorithms: A New Perspective

Explaining Algorithms: A New Perspective (9781599049410): Tomasz Muldner, Elhadi Shakshuki: Book ... more Explaining Algorithms: A New Perspective (9781599049410): Tomasz Muldner, Elhadi Shakshuki: Book Chapters.

Research paper thumbnail of APEX: A P2P-Based Collaborative Learning Environment

Advances in technology have led to the increasing use of computers as an educational tool. Severa... more Advances in technology have led to the increasing use of computers as an educational tool. Several collaborative educational applications exist, yet almost all of them are built using a client/server architecture. In this report, we describe APEX, a custom e-learning system we have designed that utilizes a peer-to-peer architecture.

Research paper thumbnail of Implementation and propertives of certain tools for parallel computations

Implementation and propertives of certain tools for parallel computations

Fundamenta Informaticae, 1981

Research paper thumbnail of On the compilation of parallel programs

On the compilation of parallel programs

Fundamenta Informaticae, 1979

Research paper thumbnail of On the semantics of parallel programs

On the semantics of parallel programs

Fundamenta Informaticae, 1981

Research paper thumbnail of On the synchronizing tools for parallel programs

On the synchronizing tools for parallel programs

Fundamenta Informaticae, 1981

Research paper thumbnail of Using XML Compression to Increase Efficiency of P2P Messaging in JXTA-based Environments

P2P [Peer-to-Peer] systems use messaging for communication amongst peers, and therefore the effic... more P2P [Peer-to-Peer] systems use messaging for communication amongst peers, and therefore the efficiency of messaging is a key concern for any P2P environment; particularly environments with a potentially large number of peers. One of popular representations of a P2P system is JXTA, which uses XML-based messaging. In this paper, we describe how the use of XML compression can increase efficiency of P2P messaging in JXTA-based environments. In the proposed solution, message elements containing XML data are compressed using an XML-aware compressor. Our design can be used not only for compression but also for other kinds of encodings of XML data, such as encryption. Experimental results demonstrate that our compression technique results in a substantial decrease in message transport time along with a corresponding decrease in the size of messages. Therefore, the application of XML compression for messaging in JXTA-based P2P environments results in an increase in the efficiency of messaging and a decrease in network traffic.

Research paper thumbnail of A Grammar-based Approach for Compressing XML

XML is a popular meta-language in widespread use across a variety of application domains. However... more XML is a popular meta-language in widespread use across a variety of application domains. However, its verbose nature has limited its acceptance in cases where a more succinct textual or binary data encoding format can be used. In this report, we describe AXECHOP, an XML-conscious compressor which uses a grammarbased approach to exploit the possibly significant structural redundancies within XML documents in order to achieve significant rates of compression.

Research paper thumbnail of Data Synchronization and Remote Invocation

Distributed applications have become very popular and there is a growing need to efficiently and ... more Distributed applications have become very popular and there is a growing need to efficiently and securely distribute data and remotely invoke program components. This paper describes the design and the implementation of a distributed installer (DI), which can accomplish both these tasks. We review goals that any such system should achieve, and show which goals are achieved by DI and several similar systems. This paper provides the description of the functionality, design and the implementation of DI.

Research paper thumbnail of SLADER: Hypermedia Presentation on Drugs and Alcohol Use

SLADER: Hypermedia Presentation on Drugs and Alcohol Use

Research paper thumbnail of On Properties of Certain Synchronizing Tool for Parallel Computations

On Properties of Certain Synchronizing Tool for Parallel Computations

Research paper thumbnail of USING COCOON TO BUILD GLOBALIZED WEBPAGES

Globalization systems are designed to internationalize webpages by making them available in vario... more Globalization systems are designed to internationalize webpages by making them available in various languages. In this paper, we describe design and implementation of a system called CGF (Cocoon-based Globalization Framework) to build globalized webpages, based on a popular Apache Cocoon web development framework. CGF supports users in various roles, including creators of webpages and text translators, and separates these roles to make the translation process transparent to the creator. Therefore, users without any programming experience can create data in one or more languages, request translations, and then receive webpages available in requested languages.

Research paper thumbnail of Distribution of Data and Remote Invocation of Programs

Distribution of Data and Remote Invocation of Programs

Distributed applications have become very popular and there is a growing need to efficiently and ... more Distributed applications have become very popular and there is a growing need to efficiently and securely distribute data. This paper describes the design and the implementation of a distributed installer (DP), which can accomplish both these tasks. The authors reviewed the goals that any such system should achieve, and show which goals are achieved by DI and several similar systems. This paper provides the description of the functionality, design and the implementation of DI.

Research paper thumbnail of Coroutines and processes in block structured languages

Coroutines and processes in block structured languages

Research paper thumbnail of Balisage: The Markup Conference Secure Publishing using Schema-level Role-based Access Control Policies for Fragments of XML Documents

Popularity of social networks is growing rapidly and secure publishing is an important implementa... more Popularity of social networks is growing rapidly and secure publishing is an important implementation tool for these networks. At the same time, recent implementations of access control policies (ACPs) for sharing fragments of XML documents have moved from distributing to users numerous sanitized sub-documents to disseminating a single document multi-encrypted with multiple cryptographic keys, in such a way that the stated ACPs are enforced. Any application that uses this implementation of ACPs will incur a high cost of generating keys separately for each document. However, most such applications, such as secure publishing, use similar documents, i.e. documents based on a selected schema. This paper describes RBAC defined at the schema level, (SRBAC), and generation of the minimum number of keys at the schema level. The main advantage of our approach is that for any application that uses a fixed number of schemas, keys can be generated (or even pre-generated) only once, and then reused in all documents valid for the given schema. While in general, key generation at the schema level has to be pessimistic, our approach tries to minimize the number of generated keys. Incoming XML documents are efficiently encrypted using single-pass SAX parsing in such a way that the original structure of these documents is completely hidden. We also describe distributing to each user only keys needed for decrypting accessible nodes, and for applying the minimal number of encryption operations to an XML document required to satisfy the protection requirements of the policy.

Research paper thumbnail of Interactive Hypertext Documentation for Computer Based Applications

Interactive Hypertext Documentation for Computer Based Applications

Research paper thumbnail of Compilation of Parallel Programs

Compilation of Parallel Programs

FUND. INFO., 1981

Research paper thumbnail of On visualization and implementation of algorithms

On visualization and implementation of algorithms

The 2004 International Conference on Modeling, …, 2004

Research paper thumbnail of Sequential Specifications and Concurrent Execution of Banach Programs

Sequential Specifications and Concurrent Execution of Banach Programs

Research paper thumbnail of Book review: "C" as a second laguage: For Native Speakers of Pascal by Tomasz Muldner & Peter W. Steele (Addison-Wesley: MA, 1988)

Book review: "C" as a second laguage: For Native Speakers of Pascal by Tomasz Muldner & Peter W. Steele (Addison-Wesley: MA, 1988)

ACM Sigchi Bulletin, 1989

Beginning computer science students frequently ask their professors to recommend a book about C p... more Beginning computer science students frequently ask their professors to recommend a book about C programming. These students usually know Pascal, have a vague idea that C is an important language, and know that C will be used in their upper level courses to come. C as a Second Language was written to fill this need. In their preface, the authors describe the book's intended audience as "students, professional programmers, and computer hobbyists studying C on their own" (Muldner, p. v). Experience in Pascal programming is assumed.

Research paper thumbnail of Explaining Algorithms: A New Perspective

Explaining Algorithms: A New Perspective

Explaining Algorithms: A New Perspective (9781599049410): Tomasz Muldner, Elhadi Shakshuki: Book ... more Explaining Algorithms: A New Perspective (9781599049410): Tomasz Muldner, Elhadi Shakshuki: Book Chapters.

Research paper thumbnail of APEX: A P2P-Based Collaborative Learning Environment

Advances in technology have led to the increasing use of computers as an educational tool. Severa... more Advances in technology have led to the increasing use of computers as an educational tool. Several collaborative educational applications exist, yet almost all of them are built using a client/server architecture. In this report, we describe APEX, a custom e-learning system we have designed that utilizes a peer-to-peer architecture.

Research paper thumbnail of Implementation and propertives of certain tools for parallel computations

Implementation and propertives of certain tools for parallel computations

Fundamenta Informaticae, 1981

Research paper thumbnail of On the compilation of parallel programs

On the compilation of parallel programs

Fundamenta Informaticae, 1979

Research paper thumbnail of On the semantics of parallel programs

On the semantics of parallel programs

Fundamenta Informaticae, 1981

Research paper thumbnail of On the synchronizing tools for parallel programs

On the synchronizing tools for parallel programs

Fundamenta Informaticae, 1981

Research paper thumbnail of Using XML Compression to Increase Efficiency of P2P Messaging in JXTA-based Environments

P2P [Peer-to-Peer] systems use messaging for communication amongst peers, and therefore the effic... more P2P [Peer-to-Peer] systems use messaging for communication amongst peers, and therefore the efficiency of messaging is a key concern for any P2P environment; particularly environments with a potentially large number of peers. One of popular representations of a P2P system is JXTA, which uses XML-based messaging. In this paper, we describe how the use of XML compression can increase efficiency of P2P messaging in JXTA-based environments. In the proposed solution, message elements containing XML data are compressed using an XML-aware compressor. Our design can be used not only for compression but also for other kinds of encodings of XML data, such as encryption. Experimental results demonstrate that our compression technique results in a substantial decrease in message transport time along with a corresponding decrease in the size of messages. Therefore, the application of XML compression for messaging in JXTA-based P2P environments results in an increase in the efficiency of messaging and a decrease in network traffic.

Research paper thumbnail of A Grammar-based Approach for Compressing XML

XML is a popular meta-language in widespread use across a variety of application domains. However... more XML is a popular meta-language in widespread use across a variety of application domains. However, its verbose nature has limited its acceptance in cases where a more succinct textual or binary data encoding format can be used. In this report, we describe AXECHOP, an XML-conscious compressor which uses a grammarbased approach to exploit the possibly significant structural redundancies within XML documents in order to achieve significant rates of compression.

Research paper thumbnail of Data Synchronization and Remote Invocation

Distributed applications have become very popular and there is a growing need to efficiently and ... more Distributed applications have become very popular and there is a growing need to efficiently and securely distribute data and remotely invoke program components. This paper describes the design and the implementation of a distributed installer (DI), which can accomplish both these tasks. We review goals that any such system should achieve, and show which goals are achieved by DI and several similar systems. This paper provides the description of the functionality, design and the implementation of DI.

Research paper thumbnail of SLADER: Hypermedia Presentation on Drugs and Alcohol Use

SLADER: Hypermedia Presentation on Drugs and Alcohol Use

Research paper thumbnail of On Properties of Certain Synchronizing Tool for Parallel Computations

On Properties of Certain Synchronizing Tool for Parallel Computations

Research paper thumbnail of USING COCOON TO BUILD GLOBALIZED WEBPAGES

Globalization systems are designed to internationalize webpages by making them available in vario... more Globalization systems are designed to internationalize webpages by making them available in various languages. In this paper, we describe design and implementation of a system called CGF (Cocoon-based Globalization Framework) to build globalized webpages, based on a popular Apache Cocoon web development framework. CGF supports users in various roles, including creators of webpages and text translators, and separates these roles to make the translation process transparent to the creator. Therefore, users without any programming experience can create data in one or more languages, request translations, and then receive webpages available in requested languages.

Research paper thumbnail of Distribution of Data and Remote Invocation of Programs

Distribution of Data and Remote Invocation of Programs

Distributed applications have become very popular and there is a growing need to efficiently and ... more Distributed applications have become very popular and there is a growing need to efficiently and securely distribute data. This paper describes the design and the implementation of a distributed installer (DP), which can accomplish both these tasks. The authors reviewed the goals that any such system should achieve, and show which goals are achieved by DI and several similar systems. This paper provides the description of the functionality, design and the implementation of DI.

Research paper thumbnail of Coroutines and processes in block structured languages

Coroutines and processes in block structured languages

Research paper thumbnail of Balisage: The Markup Conference Secure Publishing using Schema-level Role-based Access Control Policies for Fragments of XML Documents

Popularity of social networks is growing rapidly and secure publishing is an important implementa... more Popularity of social networks is growing rapidly and secure publishing is an important implementation tool for these networks. At the same time, recent implementations of access control policies (ACPs) for sharing fragments of XML documents have moved from distributing to users numerous sanitized sub-documents to disseminating a single document multi-encrypted with multiple cryptographic keys, in such a way that the stated ACPs are enforced. Any application that uses this implementation of ACPs will incur a high cost of generating keys separately for each document. However, most such applications, such as secure publishing, use similar documents, i.e. documents based on a selected schema. This paper describes RBAC defined at the schema level, (SRBAC), and generation of the minimum number of keys at the schema level. The main advantage of our approach is that for any application that uses a fixed number of schemas, keys can be generated (or even pre-generated) only once, and then reused in all documents valid for the given schema. While in general, key generation at the schema level has to be pessimistic, our approach tries to minimize the number of generated keys. Incoming XML documents are efficiently encrypted using single-pass SAX parsing in such a way that the original structure of these documents is completely hidden. We also describe distributing to each user only keys needed for decrypting accessible nodes, and for applying the minimal number of encryption operations to an XML document required to satisfy the protection requirements of the policy.

Research paper thumbnail of Interactive Hypertext Documentation for Computer Based Applications

Interactive Hypertext Documentation for Computer Based Applications