Tomasz Muldner - Profile on Academia.edu (original) (raw)
Papers by Tomasz Muldner
Compilation of Parallel Programs
FUND. INFO., 1981
On visualization and implementation of algorithms
The 2004 International Conference on Modeling, …, 2004
Sequential Specifications and Concurrent Execution of Banach Programs
Book review: "C" as a second laguage: For Native Speakers of Pascal by Tomasz Muldner & Peter W. Steele (Addison-Wesley: MA, 1988)
ACM Sigchi Bulletin, 1989
Beginning computer science students frequently ask their professors to recommend a book about C p... more Beginning computer science students frequently ask their professors to recommend a book about C programming. These students usually know Pascal, have a vague idea that C is an important language, and know that C will be used in their upper level courses to come. C as a Second Language was written to fill this need. In their preface, the authors describe the book's intended audience as "students, professional programmers, and computer hobbyists studying C on their own" (Muldner, p. v). Experience in Pascal programming is assumed.
Explaining Algorithms: A New Perspective
Explaining Algorithms: A New Perspective (9781599049410): Tomasz Muldner, Elhadi Shakshuki: Book ... more Explaining Algorithms: A New Perspective (9781599049410): Tomasz Muldner, Elhadi Shakshuki: Book Chapters.
Advances in technology have led to the increasing use of computers as an educational tool. Severa... more Advances in technology have led to the increasing use of computers as an educational tool. Several collaborative educational applications exist, yet almost all of them are built using a client/server architecture. In this report, we describe APEX, a custom e-learning system we have designed that utilizes a peer-to-peer architecture.
Implementation and propertives of certain tools for parallel computations
Fundamenta Informaticae, 1981
On the compilation of parallel programs
Fundamenta Informaticae, 1979
On the semantics of parallel programs
Fundamenta Informaticae, 1981
On the synchronizing tools for parallel programs
Fundamenta Informaticae, 1981
P2P [Peer-to-Peer] systems use messaging for communication amongst peers, and therefore the effic... more P2P [Peer-to-Peer] systems use messaging for communication amongst peers, and therefore the efficiency of messaging is a key concern for any P2P environment; particularly environments with a potentially large number of peers. One of popular representations of a P2P system is JXTA, which uses XML-based messaging. In this paper, we describe how the use of XML compression can increase efficiency of P2P messaging in JXTA-based environments. In the proposed solution, message elements containing XML data are compressed using an XML-aware compressor. Our design can be used not only for compression but also for other kinds of encodings of XML data, such as encryption. Experimental results demonstrate that our compression technique results in a substantial decrease in message transport time along with a corresponding decrease in the size of messages. Therefore, the application of XML compression for messaging in JXTA-based P2P environments results in an increase in the efficiency of messaging and a decrease in network traffic.
XML is a popular meta-language in widespread use across a variety of application domains. However... more XML is a popular meta-language in widespread use across a variety of application domains. However, its verbose nature has limited its acceptance in cases where a more succinct textual or binary data encoding format can be used. In this report, we describe AXECHOP, an XML-conscious compressor which uses a grammarbased approach to exploit the possibly significant structural redundancies within XML documents in order to achieve significant rates of compression.
Distributed applications have become very popular and there is a growing need to efficiently and ... more Distributed applications have become very popular and there is a growing need to efficiently and securely distribute data and remotely invoke program components. This paper describes the design and the implementation of a distributed installer (DI), which can accomplish both these tasks. We review goals that any such system should achieve, and show which goals are achieved by DI and several similar systems. This paper provides the description of the functionality, design and the implementation of DI.
SLADER: Hypermedia Presentation on Drugs and Alcohol Use
On Properties of Certain Synchronizing Tool for Parallel Computations
Globalization systems are designed to internationalize webpages by making them available in vario... more Globalization systems are designed to internationalize webpages by making them available in various languages. In this paper, we describe design and implementation of a system called CGF (Cocoon-based Globalization Framework) to build globalized webpages, based on a popular Apache Cocoon web development framework. CGF supports users in various roles, including creators of webpages and text translators, and separates these roles to make the translation process transparent to the creator. Therefore, users without any programming experience can create data in one or more languages, request translations, and then receive webpages available in requested languages.
Distribution of Data and Remote Invocation of Programs
Distributed applications have become very popular and there is a growing need to efficiently and ... more Distributed applications have become very popular and there is a growing need to efficiently and securely distribute data. This paper describes the design and the implementation of a distributed installer (DP), which can accomplish both these tasks. The authors reviewed the goals that any such system should achieve, and show which goals are achieved by DI and several similar systems. This paper provides the description of the functionality, design and the implementation of DI.
Coroutines and processes in block structured languages
Popularity of social networks is growing rapidly and secure publishing is an important implementa... more Popularity of social networks is growing rapidly and secure publishing is an important implementation tool for these networks. At the same time, recent implementations of access control policies (ACPs) for sharing fragments of XML documents have moved from distributing to users numerous sanitized sub-documents to disseminating a single document multi-encrypted with multiple cryptographic keys, in such a way that the stated ACPs are enforced. Any application that uses this implementation of ACPs will incur a high cost of generating keys separately for each document. However, most such applications, such as secure publishing, use similar documents, i.e. documents based on a selected schema. This paper describes RBAC defined at the schema level, (SRBAC), and generation of the minimum number of keys at the schema level. The main advantage of our approach is that for any application that uses a fixed number of schemas, keys can be generated (or even pre-generated) only once, and then reused in all documents valid for the given schema. While in general, key generation at the schema level has to be pessimistic, our approach tries to minimize the number of generated keys. Incoming XML documents are efficiently encrypted using single-pass SAX parsing in such a way that the original structure of these documents is completely hidden. We also describe distributing to each user only keys needed for decrypting accessible nodes, and for applying the minimal number of encryption operations to an XML document required to satisfy the protection requirements of the policy.
Interactive Hypertext Documentation for Computer Based Applications
Compilation of Parallel Programs
FUND. INFO., 1981
On visualization and implementation of algorithms
The 2004 International Conference on Modeling, …, 2004
Sequential Specifications and Concurrent Execution of Banach Programs
Book review: "C" as a second laguage: For Native Speakers of Pascal by Tomasz Muldner & Peter W. Steele (Addison-Wesley: MA, 1988)
ACM Sigchi Bulletin, 1989
Beginning computer science students frequently ask their professors to recommend a book about C p... more Beginning computer science students frequently ask their professors to recommend a book about C programming. These students usually know Pascal, have a vague idea that C is an important language, and know that C will be used in their upper level courses to come. C as a Second Language was written to fill this need. In their preface, the authors describe the book's intended audience as "students, professional programmers, and computer hobbyists studying C on their own" (Muldner, p. v). Experience in Pascal programming is assumed.
Explaining Algorithms: A New Perspective
Explaining Algorithms: A New Perspective (9781599049410): Tomasz Muldner, Elhadi Shakshuki: Book ... more Explaining Algorithms: A New Perspective (9781599049410): Tomasz Muldner, Elhadi Shakshuki: Book Chapters.
Advances in technology have led to the increasing use of computers as an educational tool. Severa... more Advances in technology have led to the increasing use of computers as an educational tool. Several collaborative educational applications exist, yet almost all of them are built using a client/server architecture. In this report, we describe APEX, a custom e-learning system we have designed that utilizes a peer-to-peer architecture.
Implementation and propertives of certain tools for parallel computations
Fundamenta Informaticae, 1981
On the compilation of parallel programs
Fundamenta Informaticae, 1979
On the semantics of parallel programs
Fundamenta Informaticae, 1981
On the synchronizing tools for parallel programs
Fundamenta Informaticae, 1981
P2P [Peer-to-Peer] systems use messaging for communication amongst peers, and therefore the effic... more P2P [Peer-to-Peer] systems use messaging for communication amongst peers, and therefore the efficiency of messaging is a key concern for any P2P environment; particularly environments with a potentially large number of peers. One of popular representations of a P2P system is JXTA, which uses XML-based messaging. In this paper, we describe how the use of XML compression can increase efficiency of P2P messaging in JXTA-based environments. In the proposed solution, message elements containing XML data are compressed using an XML-aware compressor. Our design can be used not only for compression but also for other kinds of encodings of XML data, such as encryption. Experimental results demonstrate that our compression technique results in a substantial decrease in message transport time along with a corresponding decrease in the size of messages. Therefore, the application of XML compression for messaging in JXTA-based P2P environments results in an increase in the efficiency of messaging and a decrease in network traffic.
XML is a popular meta-language in widespread use across a variety of application domains. However... more XML is a popular meta-language in widespread use across a variety of application domains. However, its verbose nature has limited its acceptance in cases where a more succinct textual or binary data encoding format can be used. In this report, we describe AXECHOP, an XML-conscious compressor which uses a grammarbased approach to exploit the possibly significant structural redundancies within XML documents in order to achieve significant rates of compression.
Distributed applications have become very popular and there is a growing need to efficiently and ... more Distributed applications have become very popular and there is a growing need to efficiently and securely distribute data and remotely invoke program components. This paper describes the design and the implementation of a distributed installer (DI), which can accomplish both these tasks. We review goals that any such system should achieve, and show which goals are achieved by DI and several similar systems. This paper provides the description of the functionality, design and the implementation of DI.
SLADER: Hypermedia Presentation on Drugs and Alcohol Use
On Properties of Certain Synchronizing Tool for Parallel Computations
Globalization systems are designed to internationalize webpages by making them available in vario... more Globalization systems are designed to internationalize webpages by making them available in various languages. In this paper, we describe design and implementation of a system called CGF (Cocoon-based Globalization Framework) to build globalized webpages, based on a popular Apache Cocoon web development framework. CGF supports users in various roles, including creators of webpages and text translators, and separates these roles to make the translation process transparent to the creator. Therefore, users without any programming experience can create data in one or more languages, request translations, and then receive webpages available in requested languages.
Distribution of Data and Remote Invocation of Programs
Distributed applications have become very popular and there is a growing need to efficiently and ... more Distributed applications have become very popular and there is a growing need to efficiently and securely distribute data. This paper describes the design and the implementation of a distributed installer (DP), which can accomplish both these tasks. The authors reviewed the goals that any such system should achieve, and show which goals are achieved by DI and several similar systems. This paper provides the description of the functionality, design and the implementation of DI.
Coroutines and processes in block structured languages
Popularity of social networks is growing rapidly and secure publishing is an important implementa... more Popularity of social networks is growing rapidly and secure publishing is an important implementation tool for these networks. At the same time, recent implementations of access control policies (ACPs) for sharing fragments of XML documents have moved from distributing to users numerous sanitized sub-documents to disseminating a single document multi-encrypted with multiple cryptographic keys, in such a way that the stated ACPs are enforced. Any application that uses this implementation of ACPs will incur a high cost of generating keys separately for each document. However, most such applications, such as secure publishing, use similar documents, i.e. documents based on a selected schema. This paper describes RBAC defined at the schema level, (SRBAC), and generation of the minimum number of keys at the schema level. The main advantage of our approach is that for any application that uses a fixed number of schemas, keys can be generated (or even pre-generated) only once, and then reused in all documents valid for the given schema. While in general, key generation at the schema level has to be pessimistic, our approach tries to minimize the number of generated keys. Incoming XML documents are efficiently encrypted using single-pass SAX parsing in such a way that the original structure of these documents is completely hidden. We also describe distributing to each user only keys needed for decrypting accessible nodes, and for applying the minimal number of encryption operations to an XML document required to satisfy the protection requirements of the policy.
Interactive Hypertext Documentation for Computer Based Applications