The Community for Technology Leaders
Proceedings of the Thirty-First Hawaii International Conference on System Sciences (1998)
Kohala Coast, HI, USA
Jan. 9, 1998 to Jan. 9, 1998
ISBN: 0-8186-8255-8
TABLE OF CONTENTS

The role of energy imbalance management on power market stability (PDF)

F.L. Alvarado , Dept. of Electr. & Comput. Eng., Wisconsin Univ., Madison, WI, USA
pp. 4-8

The dynamics of market power with deregulated electricity generation supplies (PDF)

R.E. Schuler , Inst. of Public Affairs, Cornell Univ., Ithaca, NY, USA
pp. 9-14

Load-frequency control service in a deregulated environment (PDF)

A.P. Sakis Meliopoulos , Sch. of Electr. & Comput. Eng., Georgia Inst. of Technol., Atlanta, GA, USA
pp. 24-31

Design of predatory generation control in electric power systems (PDF)

C.L. DeMarco , Dept. of Electr. & Comput. Eng., Wisconsin Univ., Madison, WI, USA
pp. 32-38

Influence of operational risk assessment on bidding strategies in power markets (PDF)

D. Ray , Sch. of Bus., Wisconsin Univ., Madison, WI, USA
pp. 47 vol.3

Autonomous cyber agents: rules for collaboration and concurrency (PDF)

S.N. Talukdar , Dept. of Electr. & Comput. Eng., Carnegie Mellon Univ., Pittsburgh, PA, USA
pp. 57-61

Inclusion of price dependent load models in the optimal power flow (PDF)

J.D. Weber , Dept. of Electr. & Comput. Eng., Illinois Univ., Urbana, IL, USA
pp. 62-70

A transmission-constrained unit commitment method (PDF)

Chung-Li Tseng , Dept. of Ind. Eng. & Oper. Res., California Univ., Berkeley, CA, USA
pp. 71-80

Thermal unit commitment including optimal AC power flow constraints (PDF)

C. Murillo-Sanchez , Sch. of Electr. Eng., Cornell Univ., Ithaca, NY, USA
pp. 81-88

Alternatives for calculating transmission reliability margin (TRM) in available transfer capability (ATC) (PDF)

P.W. Sauer , Dept. of Electr. & Comput. Eng., Illinois Univ., Urbana, IL, USA
pp. 89 vol.3

A simulation based approach to pricing reactive power (PDF)

J.D. Weber , Dept. of Electr. & Comput. Eng., Illinois Univ., Urbana, IL, USA
pp. 96-103

A multi-agent approach to the deregulation and restructuring of power industry (PDF)

F. Wu , Dept. of Electr. & Electron. Eng., Hong Kong Univ., Hong Kong
pp. 122-131

Complexities in DSP software compilation: performance, code size, power, retargetability (PDF)

C.H. Gebotys , Dept. of Electr. & Comput. Eng., Waterloo Univ., Ont., Canada
pp. 150-156

Performance oriented design using HL (PDF)

Lei Hu , Dept. of Comput. Sci., New South Wales Univ., Sydney, NSW, Australia
pp. 167-176

Automatic analysis of embedded systems specified in Astral (PDF)

K. Brink , Fac. of Tech. Math. & Inf., Delft Univ. of Technol., Netherlands
pp. 177-186

A comparison of alternative extensions for data modeling in VHDL (PDF)

P.J. Ashenden , Dept. of Comput. Sci., Adelaide Univ., SA, Australia
pp. 207-215

A software control architecture for autonomous vehicles (Abstract)

M.L. Nelson , Dept. of Comput. Sci., Texas Univ., Edinburg, TX, USA
pp. 226,227,228,229,230,231,232

Intelligent system for reading handwriting on forms (PDF)

M.D. Garris , Nat. Inst. of Stand. & Technol., Gaithersburg, MD, USA
pp. 233-242

Object oriented ARM7 coprocessor (PDF)

G. Donzellini , Dept. of Biophys. & Electron. Eng., Genoa Univ., Italy
pp. 243-252

Near-optimal broadcast in all-port wormhole-routed 3D tori with dimension-ordered routing (PDF)

Yu-Chee Tseng , Dept. of Comput. Sci. & Inf. Eng., Nat. Central Univ., Chung-Li, Taiwan
pp. 253-262

Semi-automated design of high-performance communication subsystems (PDF)

J.H. Schiller , Inst. of Telematics, Karlsruhe Univ., Germany
pp. 273-282

Techniques for secure system development (PDF)

D. Frincke , Dept. of Comput. Sci., Idaho Univ., Moscow, ID, USA
pp. 304-306

The architecture of secure systems (PDF)

J. Alves-Foss , Dept. of Comput. Sci., Idaho Univ., Moscow, ID, USA
pp. 307-316

The SecureRing protocols for securing group communication (PDF)

K.P. Kihlstrom , Dept. of Electr. & Comput. Eng., California Univ., Santa Barbara, CA, USA
pp. 317-326

Formal verification of secure programs in the presence of side effects (PDF)

P.E. Black , Nat. Inst. of Stand. & Technol., Gaithersburg, MD, USA
pp. 327-334

Applying the composition principle to verify a hierarchy of security servers (PDF)

M.R. Heckman , Dept. of Comput. Eng., California Univ., Davis, CA, USA
pp. 338-347

Using formal specifications for component retrieval and reuse (PDF)

J. Penix , Dept. of Electr. & Comput. Eng. & Comput. Sci., Cincinnati Univ., OH, USA
pp. 356-365

A WWW-based tool for software inspection (PDF)

L. Harjumaa , Dept. of Inf. Process. Sci., Oulu Univ., Finland
pp. 379-388

A proposed learning environment for goal-specific improvements (PDF)

S.A. Becker , Dept. of Comput. Sci. & Inf. Syst., American Univ., Washington, DC, USA
pp. 389-398

Software process modeling: theory, results and commentary (PDF)

R. Gibson , Dept. of Comput. Sci. & Inf. Syst., American Univ., Washington, DC, USA
pp. 399-408

Analyzing business domain: a methodology and repository system (PDF)

Heeseok Lee , Graduate Sch. of Manage., Korea Adv. Inst. of Sci. & Technol., Seoul, South Korea
pp. 409-419

Wrappings for software development (PDF)

C. Landauer , Aerosp. Integration Sci. Center, Aerosp. Corp., Los Angeles, CA, USA
pp. 420-429

Author index (PDF)

pp. 461-470
100 ms
(Ver 3.1 (10032016))