Automatic programming can be defined as developing software in a high abstraction level. the definition of automatic programming is not precise because what is meant by automatic programming is changing over time. the...
详细信息
ISBN:
(纸本)9781467386159
Automatic programming can be defined as developing software in a high abstraction level. the definition of automatic programming is not precise because what is meant by automatic programming is changing over time. the goal of automatic programming has the programmer set the specifications of a program and the computer generate the source code of that program. there exists a group of specification languages that vary in their properties; the Descartes specification language is known to be comprehensible and easily constructible. Descartes represents the specifications by defining a system's inputs and outputs, as well as the relationship between these as functions. Descartes has been extended to support concurrent systems. these features made Descartes to be a good basis to build this research effort on. this research effort studied automatic programming approaches and created a shortcut between specifications and implementation with all its benefits. this research created a way to transform Descartes specifications into C source code automatically. Automatic programming can apply to all fields of knowledge that can be automated; therefore, the scope of this research project was restricted to a few case studies that involve parallel programming.
When proving safety of programs, we must show, in particular, the absence of integer overflows. Unfortunately, there are lots of situations where performing such a proof is extremely difficult, because the appropriate...
详细信息
ISBN:
(纸本)9783319296135;9783319296128
When proving safety of programs, we must show, in particular, the absence of integer overflows. Unfortunately, there are lots of situations where performing such a proof is extremely difficult, because the appropriate restrictions on function arguments are invasive and may be hard to infer. Yet, in certain cases, we can relax the desired property and only require the absence of overflow during the first n steps of execution, n being large enough for all practical purposes. It turns out that this relaxed property can be easily ensured for large classes of algorithms, so that only a minimal amount of proof is needed, if at all. the idea is to restrict the set of allowed arithmetic operations on the integer values in question, imposing a "speed limit" on their growth. For example, if we repeatedly increment a 64-bit integer, starting from zero, then we will need at least 2 64 steps to reach an overflow;on current hardware, this takes several hundred years. When we do not expect any single execution of our program to run that long, we have effectively proved its safety against overflows of all variables with controlled growth speed. In this paper, we give a formal explanation of this approach, prove its soundness, and show how it is implemented in the context of deductive verification.
It is known that code readability has an impact on software quality. this paper introduces a preliminary list of 33 good practices for code readability that could be taught in object oriented programming courses of in...
详细信息
It is known that code readability has an impact on software quality. this paper introduces a preliminary list of 33 good practices for code readability that could be taught in object oriented programming courses of informatics programs. In this set are included practices with both positive and negative impact, the latter mainly from bad smells. A survey was made with OOP teachers in order to assess the significance of teaching a set of good practices. the results showed that teachers consider it important to teach the defined set. Such result was statistically significant. Still, the same level of significance was not awarded to all practices. Some additional results are presented.
this paper presents a first step of our research on designing an effective and efficient GP-based method for symbolic regression. First, we propose three extensions of the standard Single Node GP, namely (1) a selecti...
详细信息
Recently optimal design for engineering structures is being a research hotspot, and the core technology is structural optimization technology, which is being used in more and more fields. In this paper, its research p...
详细信息
ISBN:
(纸本)9781467388306
Recently optimal design for engineering structures is being a research hotspot, and the core technology is structural optimization technology, which is being used in more and more fields. In this paper, its research progress was reviewed which was consists of research condition and prospect in future. Firstly, the fundamental concept of structural optimization was introduced, and then structural optimization levels such as size optimization, shape optimization, and topology optimization and its application in aerospace field were presented. Afterwards, optimization algorithms like optimality criteria methods, mathematical programming methods, and genetic algorithms were reviewed, and finally, probable research directions of structural optimization technology in the future were prospected.
Managing interest in collaborative data sharing involves determining interest of both owner and other parties. Interest management method is bound to information such as user request, location, history, preferences an...
详细信息
ISBN:
(纸本)9781467389150
Managing interest in collaborative data sharing involves determining interest of both owner and other parties. Interest management method is bound to information such as user request, location, history, preferences and data policies. Considering other researchers' works, managing data interest of sharing for its' constitutional adhered policy are rarely done in computerize manner. With attention that data shared are constituted with policy implicitly or explicitly, this paper proposes an automatic design of data policy via policy programming language in order to handle interest management. the study starts by analyzing secondary data through massive literature reviews. Two pertinent issues on interest management and data policy are explored, analyzed and summarized. Based on the research gap found in these analyses, an interest management for automated data policy is designed. As a case study, a new set of programming constructs are implemented and embedded into an existing collaborative language called JACIE (Java-based Authoring language for Collaborative Interactive Environments) that acts as a policy programming language. the results of this study conform that automated data policy is feasible and functioning well. thus, this helps an interest manager to have flexible data policy in handling collaborative activities.
Since maritime transportation is the most cost-efficient way to transport goods, it has experienced a significant growth in the last few decades due to global trade and economic development. Consequently, CO 2 emissi...
详细信息
ISBN:
(纸本)9781509034307
Since maritime transportation is the most cost-efficient way to transport goods, it has experienced a significant growth in the last few decades due to global trade and economic development. Consequently, CO 2 emissions accounting for this sector have also risen. the purpose of this paper is to estimate and minimize the amount of CO 2 emissions generated while a vessel is in the hoteling phase, both from the perspective of the vessel and the cranes servicing it, while providing an insight into the share of emissions from both sources and the potential solutions to reduce them. A Mixed Integer programming model was formulated using General Algebraic Modeling System (GAMS). the results of the study show that the quay crane emissions play a significant role of the total emissions during the hoteling phase, affecting quay crane workload distribution and bay allocation, and they should be taken into account when trying to minimize emissions at the terminal operations.
Recently due to the increasing pressure to improve the efficiency of port operations, a great deal of research has been devoted to optimizing container terminal operations. Most papers deal with either the berth alloc...
详细信息
ISBN:
(纸本)9781509034307
Recently due to the increasing pressure to improve the efficiency of port operations, a great deal of research has been devoted to optimizing container terminal operations. Most papers deal with either the berth allocation problem or the crane scheduling problem. However only a limited number of papers deal with both, berth allocation and crane scheduling through either a combined model of the two problems, or two models with nested loops of each problem feeding into each other. In this paper, however, a mixed integer programming model is proposed for the integrated berth allocation and quay crane scheduling. Numerical experiments are conducted to test the performance of the proposed approach, using commercial software. the results illustrate that predefining boththe berth allocation and crane scheduling before the vessel is processed results in improved time optimization.
the proceedings contain 56 papers. the special focus in this conference is on Cryptanalysis of Symmetric Key, SideChannel Attacks, Implementation, Lattice-Based Cryptography, Virtual Private Network, Signatures, Hash,...
ISBN:
(纸本)9789811030048
the proceedings contain 56 papers. the special focus in this conference is on Cryptanalysis of Symmetric Key, SideChannel Attacks, Implementation, Lattice-Based Cryptography, Virtual Private Network, Signatures, Hash, MultiParty Computation, Symmetric Cryptography, Authentication, System Security, Homomorphic Encryption, Network Security, Privacy, and Authentication. the topics include: Linear regression attack with f-test: a new SCARE technique for secret block ciphers;compact representation for division property;an automatic cryptanalysis of transposition ciphers using compression;diversity within the rijndael design principles for resistance to differential power analysis;server-aided revocable identity-based encryption from lattices;implementation state of HSTS and HPKP in both browsers and servers;group signature with deniability;how to disavow a signature;secure error-tolerant graph matching protocols;verifiable message-locked encryption;security of online AE Schemes in RUP setting;AAL and static conflict detection in policy;generic access control system for ad hoc MCC and fog computing;FHE over the integers and modular arithmetic circuits;efficient and secure multiparty computations using a standard deck of playing cards;improved attacks on extended generalized feistel networks;on the power of public-key function-private functional encryption;an efficient construction of non-interactive secure multiparty computation;implementation of verified set operation protocols based on bilinear accumulators;integral privacy;user authentication from mouse movement data using SVM classifier;language-based hypervisors and network flooding as a side channel in cloud environments.
Sequence comparison problems such as sequence alignment and approximate string matching are part of the fundamental problems in many fields such as natural language processing, data mining and bioinformatics. However,...
详细信息
ISBN:
(纸本)9781467386159
Sequence comparison problems such as sequence alignment and approximate string matching are part of the fundamental problems in many fields such as natural language processing, data mining and bioinformatics. However, the algorithms proposed to address these problems suffer from high computational complexities prohibiting them from being widely used in practical large-scale settings. Many researchers used parallel programming to reduce the execution time of these algorithms. In this paper, we follow this approach and use the parallelism capabilities of the Graphics Processing Unit (GPU) to accelerate one of the most common algorithms to compute the edit distance between two strings, which is known as the Levenshtein distance. To take full advantage of the large number of cores in a GPU, we employ a diagonal-based tracing technique which results in even greater improvements in terms of the running time. In fact, our CUDA implementation of the Levenshtein algorithm is about 11X faster than the sequential implementation. this is achieved without affecting the accuracy.
暂无评论