the proceedings contain 38 papers. the topics discussed include: supporting design and development of safety critical applications by model based tools;subject-oriented operating system development based on system pre...
ISBN:
(纸本)9789634639251
the proceedings contain 38 papers. the topics discussed include: supporting design and development of safety critical applications by model based tools;subject-oriented operating system development based on system predicate classes;enlivenment of information systems;a fully segment based method for the classification of satellite images;commanding a robot in a safe way;node-based architecture for lightweight middleware;programming with indirect pointers;efficient implementation of linearly used finite maps;an agent based architecture style for application integration;reference extraction and coauthorship visualization of semi-structured bibliographic data;situation aware computing in distributed computing systems;introducing records by refactoring in erlang programs;and tutoring system for distance learning of java programming language.
Chisel is an open-source high-level hardware construction language embedded in Scala to facilitate parameterizable, reusable circuit design generators. It is becoming increasingly popular and has been used to design m...
详细信息
Interpretation of the truth degrees. Suitable extension of the two-valued logical operations as conjunction, disjunction, implication, negation. Main directions (Post, Kleene, Lukasiewicz, Bochvar). Notion of assertab...
详细信息
ISBN:
(纸本)9789634639251
Interpretation of the truth degrees. Suitable extension of the two-valued logical operations as conjunction, disjunction, implication, negation. Main directions (Post, Kleene, Lukasiewicz, Bochvar). Notion of assertability. Designated values. Functional completeness via two valued negation, conjunction, disjunction. Normal forms as tools in theorem proving.
We present Goblint, a static analyzer for detecting potential data races in the multithreaded C code. the implemented analysis is sound on a "safe" subset of C and sufficiently efficient to be used for race-...
详细信息
ISBN:
(纸本)9789634639251
We present Goblint, a static analyzer for detecting potential data races in the multithreaded C code. the implemented analysis is sound on a "safe" subset of C and sufficiently efficient to be used for race-detection of medium sized multithreaded programs. It uses a global invariant approach to avoid the state space explosion problem and is both context- and path-sensitive.
the paper is devoted to draft the importance of the continuous queries over data streams and relation operations. A concrete language, CQL (for Continuous Query Language) based on SQL (for Structured Query Language) s...
详细信息
ISBN:
(纸本)9789634639251
the paper is devoted to draft the importance of the continuous queries over data streams and relation operations. A concrete language, CQL (for Continuous Query Language) based on SQL (for Structured Query Language) seems to be one of the most promising tools among the recently developed continuous query language. Although a wide variety of queries in CQL is available, some suggestions for the extension of CQL have already been published. Some new ideas for enlarging of the applications of CQL are also proposed in the paper.
Protecting a software from unauthorized access is an ever demanding task. thus, in this paper, we focus on the protection of source code by means of obfuscation and discuss the adaptation of a control flow transformat...
详细信息
ISBN:
(纸本)9789634639251
Protecting a software from unauthorized access is an ever demanding task. thus, in this paper, we focus on the protection of source code by means of obfuscation and discuss the adaptation of a control flow transformation technique called control flow flattening to the C++ language. In addition to the problems of adaptation and the solutions proposed for them, a formal algorithm of the technique is given as well. A prototype implementation of the algorithm presents that the complexity of a program can show an increase as high as 5-fold due to the obfuscation.
Effective runtime trace generation is vital for understanding, analyzing, and maintaining large-scale applications. In this paper an effective detailed runtime trace generation method is introduced for the .NET platfo...
详细信息
ISBN:
(纸本)9789634639251
Effective runtime trace generation is vital for understanding, analyzing, and maintaining large-scale applications. In this paper an effective detailed runtime trace generation method is introduced for the .NET platform. the non-intrusive method is based on the .NET Profiler;consequently, neither additional development tools, nor the .NET Framework SDK is required to be installed on the target system. the method is applied to a test set of real-size executables and compared by performance and applicability to the original program.
this paper discusses learning of Constraint Logic Programs using unfolding and slicing technique. the transformation rule for unfolding together with clause removal is a method for specialization of (Constraint) Logic...
详细信息
ISBN:
(纸本)9789634639251
this paper discusses learning of Constraint Logic Programs using unfolding and slicing technique. the transformation rule for unfolding together with clause removal is a method for specialization of (Constraint) Logic Programs. Slicing is a program analysis technique originally developed for imperative languages. It facilitates the understanding of data flow and debugging. this paper formulates the semantics of a learning method, proves that the unfolding transformation preserves the operational and logical semantics, and combines the defined unfolding technique by applying slicing. A prototype learner of CLP programs which implements the above ideas is briefly described.
the skeleton computing the distributed elementwise processing in D-Clean splits the input data, then applies an elementwise process-able function on the divided input, and finally composes the result from the already ...
详细信息
ISBN:
(纸本)9789634639251
the skeleton computing the distributed elementwise processing in D-Clean splits the input data, then applies an elementwise process-able function on the divided input, and finally composes the result from the already computed subresults. this paper presents improvements and refinements of the generalized skeleton implementation. the distributed and functional skeleton of the elementwise processing is implemented using the D-Clean coordination language with a new technique.
作者:
Farkas, KárolyBudapest Tech
Polytechnical Institution John von Neumann Faculty of Informatics Bécsi út 96/b 1034 Budapest Hungary
I think that life-long playing is more important than life-long learning. the teaching of informatics may be playful and enjoyable on every level of education. Perhaps this can be the most enjoyable subject. Use the c...
详细信息
ISBN:
(纸本)9789634639251
I think that life-long playing is more important than life-long learning. the teaching of informatics may be playful and enjoyable on every level of education. Perhaps this can be the most enjoyable subject. Use the computer in an adequate way, make the computer compute and do not compute yourself! there are several methodological elements which serve these goals: to push an advantage of motivation, creativity, syntonicity, the logo-pedagogy by Papert, the school of thinking by Polya, and the tenure of computer as a plane not so as a bullock cart.
暂无评论