We report on the successful process of transitioning a 4th-year university software engineering capstone course from a waterfall approach to an iterative, more agile model. the setting included external requirements o...
详细信息
ISBN:
(纸本)1601320671
We report on the successful process of transitioning a 4th-year university software engineering capstone course from a waterfall approach to an iterative, more agile model. the setting included external requirements on the structure of the course as well as ingrained expectations by stakeholders. We gradually introduced agile tools and methods into the existing syllabus while preserving the overall structure of the course. the selected practices included automated unit testing, iterations, wikis, and pair programming, among others. the success or failure of each technology, as well as the overall approach, was evaluated. We found that some, but not all, agile techniques proved effective in the given setting, and recommend that teachers in a similar situation consider a gradual approach to the introduction of new technologies.
the Gridbus workflow management system (GWMS) is designed to execute scientific applications, expressed in the form of workflows, onto Grid and Cloud resources. Withthe help of this system, we demonstrate a computati...
详细信息
the Forensic Lucid programming language is being developed for inten- sional cyberforensic case specification and analysis, including the syntax and oper ational semantics. In significant part, the language is based o...
详细信息
Electric powered wheelchair (EPW) controllers have not seen substantial improvement since the introduction of the microprocessor. there are no features that warn the driver of danger or help keep the EPW under control...
详细信息
ISBN:
(纸本)9780889867406
Electric powered wheelchair (EPW) controllers have not seen substantial improvement since the introduction of the microprocessor. there are no features that warn the driver of danger or help keep the EPW under control in adverse conditions such as slipping or tipping. With an estimated 300,000 EPWs in use in the United States and the population of older adults increasing rapidly, the need for safer control systems for EPWs is a priority. this paper presents in detail the electronic, mechanical, and software design used in developing a smart controller for EPWs. A single board computer provides the computational power and storage space needed to execute normal operations, complex safety algorithms, and extensive data logging. An array of sensors connects to the computer, providing feedback on velocity, inertia, caster angle, and obstacle range. A rugged aluminum enclosure protects the electronics and provides connectors for all the sensors. A real-time operating system is used as the basis for programming. the software architecture uses a 3 level hierarchical structure that organizes tasks based on periodicity, priority, and computational load. the goal of this project is to demonstrate what can be done with an EPW to enhance the mobility, participation, and safety of its occupant.
this paper makes use of the characteristics of the Petri net, which describes the discrete event system effectively. Based on the principle of Petri net in arrangement and the characteristic of the earthwork allocatio...
详细信息
Peer-to-peer overlays provide a substrate well suited to building distributed storage systems. Applications that use the infrastructure need the ability to control access to their data. However, traditional authorizat...
详细信息
ISBN:
(纸本)9781605582412
Peer-to-peer overlays provide a substrate well suited to building distributed storage systems. Applications that use the infrastructure need the ability to control access to their data. However, traditional authorization services were not designed to operate in the face of network partitions, malicious nodes, and on an Internet-wide scale. We describe the implementation of the Decentralized Authentication and Authorization Layer (DAAL), a mechanism to leverage the storage functionality of the overlay and obviate the need for an online, centralized access control service. the system can efficiently identify malicious nodes and continue to operate correctly when an arbitrary, predefined fraction of the network is unreachable (as occurs during an attack against the routing infrastructure or during a distributed denial-of-service attack). DAAL melds the access request efficiency of capability-based systems withthe revocation power of reference monitor-based access control lists. It avoids the use of distributed leases as they create a vulnerability window during which there is a gap between the security policy and configuration. Actualizing the design can be challenging. Hence, we describe the protocol details and how they can be abstracted behind a minimal, intuitive application programming interface. As a proof of concept, we implemented DAAL as a Java prototype on a 200-node peer-to-peer overlay distributed across the world. Copyright 2008 ACM.
this paper presents the design and implementation of an open visual object-oriented programming environment (VOOPE). the environment supports a programming approach in which a program is created using extended visual ...
详细信息
this paper presents the design and implementation of an open visual object-oriented programming environment (VOOPE). the environment supports a programming approach in which a program is created using extended visual objects (EVOs) - the objects having visual forms and dynamic behaviors. the environment allows creation of EVOs and modification of their behavior to adapt the changing software requirements. thereby, VOOPE allows incremental software development using the learning capability of EVOs without rebuilding the software.
To quickly localize defects, we want our attention to be focussed on relevant failing tests. We propose to improve defect localization by exploiting dependencies between tests, using a JUNIT extension called JEXAMPLE....
详细信息
ISBN:
(纸本)9783540682547
To quickly localize defects, we want our attention to be focussed on relevant failing tests. We propose to improve defect localization by exploiting dependencies between tests, using a JUNIT extension called JEXAMPLE. In a case study, a monolithic white-box test suite for a complex algorithm is refactored into two traditional JUNIT style tests and to JEXAMPLE. Of the three refactorings, JEXAMPLE reports five times fewer defect locations and slightly better performance (-8-12%), while having similar maintenance characteristics. Compared to the original implementation, JEXAMPLE greatly improves maintainability due the improved factorization following the accepted test quality guidelines. As such, JEXAMPLE combines the benefits of test chains with test quality aspects of JUNIT style testing.
—In delay tolerant networks, custody transfer can provide certain degree of reliability as a custodian node cannot discard a message unless its life time expires or the custody is transferred to another node after a ...
详细信息
When the training subset of a support vector machine contains fuzzy information, the support vector machine won't work. A method for calculating fuzzy linear separable support vector classifier is discussed. With ...
详细信息
When the training subset of a support vector machine contains fuzzy information, the support vector machine won't work. A method for calculating fuzzy linear separable support vector classifier is discussed. Withthe given confidence level, convert the fuzzy classification problem into finding the fuzzy chance constrained programming, and establish a solution finding theory with fuzzy chance constrained programming crisp equivalence programming dual programming. A algorithm for fuzzy linear separable support vector classifier is derived: given the fuzzy training subset of a fuzzy linear separable problem and selecting appropriate confidential level, construct appropriate quadratic programming equation;find the optimal solution of the quadratic programming;construct optimal separating hyperplane, find the optimal classification function, and establish new training subset;construct support vector regression machine withthe new training subset, get the regression functions, and establish the membership function of the optimal classification function from these;lastly, find the optimal solution. the algorithm is also verified with given data.
暂无评论