In this paper, we describe a new approach for introducing the principles of programming to students. Students in introductory CS courses (CS0/CS1) often have minimal exposure to or experience withprogramming and may ...
详细信息
ISBN:
(纸本)9780889869202
In this paper, we describe a new approach for introducing the principles of programming to students. Students in introductory CS courses (CS0/CS1) often have minimal exposure to or experience withprogramming and may struggle for weeks while creating their initial programs. We present a tool called pBot, which is designed to provide a guided and highly interactive introduction to programming. pBot consists of a custom teaching language, an IDE designed for iPod touches, and a simulator that allows for a robot to explore and manipulate its world. this paper deals with motivation for creating pBot, its features, how it has been used in our introductory classes, and feedback we have received on its use.
Software classifications have been created withthe purpose of keeping track of attack patterns as well as providing a history of incidents for software packages. this article focuses on one single class of such attac...
详细信息
ISBN:
(纸本)9780769547756
Software classifications have been created withthe purpose of keeping track of attack patterns as well as providing a history of incidents for software packages. this article focuses on one single class of such attacks, conventionally known as "Time and State" attacks. We offer a method of analyzing the anatomy of such attacks by reasoning about vulnerabilities using "swimlane" diagrams annotated with some semantics of concurrent programming, such as the notions of traces and stability. We summarize our conclusions with a taxonomy based on abstraction layers, implying thereby some form of tree hierarchy where vulnerabilities inherit properties from the upper layers and share code-level flaws on the lower layers. this approach allows us to classify attacks by what they share in common, which is different from other classification attempts.
Optimality conditions for multi objective programming problems have been studied extensively in the literature. A necessary condition for Pareto optimality is derived by reducing the multi objective programming under ...
详细信息
ISBN:
(纸本)9783037853122
Optimality conditions for multi objective programming problems have been studied extensively in the literature. A necessary condition for Pareto optimality is derived by reducing the multi objective programming under inclusion constraints to systems of single objective problem and then using known results of them. the result is reasonable and efficient. Our aim in this paper is to get the optimality condition of problem (MOP) by a lemma which helps reducing multi objective optimality problem to systems of single objective ones.
Operations related to Sparse matrix multiplication are frequently used in scientific computing area, and these operations usually become a performance bottleneck because of their high operational complexity. For examp...
详细信息
Differential evolution (DE) is a simple and efficient technique for real parameter optimization over continuous spaces. Its success is highly dependent on the choice of correct trial vector generation strategies and c...
详细信息
ISBN:
(纸本)9781467314343;9781467314350
Differential evolution (DE) is a simple and efficient technique for real parameter optimization over continuous spaces. Its success is highly dependent on the choice of correct trial vector generation strategies and control parameters. Choosing appropriate trial vector generation strategies and control parameters for new problems by trial and error method can be computationally costly and inefficient. this paper proposes a hybrid approach, incorporating genetic programming (GP) with DE, where GP generates trial vector generation strategies based on the problem specification and the state of the population using a simple learning method. Trial vector generation strategies are chosen from this pool of strategies generated by GP. the choice of a particular strategy depends on the type of the problem, initialization values and state of evolution. Consequently, the strategies chosen for different run of the same problem are different. However, it allows self-adaptation to be completely problem dependent and as a result for a unknown problem domain the method is expected to perform better than other state-of-the-art self-adaptive evolutionary techniques. In this method, the control parameter F is eliminated and crossover ratio Cr is evolved withthe population and population size NP is still fixed empirically. the performance of this method is extensively evaluated using the CEC2005 contest test instances. Experimental results show that, self-adaptive genetically programmed differential evolution (SaGPDE) leads to quick convergence and produce very competitive results.
the proceedings contain 31 papers. the topics discussed include: on the importance of being earnest: challenges in computer science education;is self-efficacy in programming decreasing withthe level of programming sk...
ISBN:
(纸本)9781450317870
the proceedings contain 31 papers. the topics discussed include: on the importance of being earnest: challenges in computer science education;is self-efficacy in programming decreasing withthe level of programming skills?;concept of an extracurricular learning environment for computer science;uncovering structure behind function the experiment as teaching method in computer science education;agile projects in high school computing education - emphasizing a learners' perspective;conceptual change and epistemological belief framework for web site credibility instruction;how teachers in different educational systems value central concepts of computer science;promoting computational thinking withprogramming;preparing teachers for teaching informatics: theoretical considerations and practical implications;bringing contexts into the classroom a design-based approach;and information theory on Czech grammar schools: first findings.
Video calling is one of the widely used method of communicating. Encryption is applied to video call data to keep it secret. Real-time encryption is needed to support real-time communication such as video calling. Sel...
详细信息
We show how, under certain conditions, programs written in the behavioral programming approach can be modified (e. g., as result of new requirements or discovered bugs) using automatically-generated code modules. Give...
详细信息
ISBN:
(纸本)9782954181004
We show how, under certain conditions, programs written in the behavioral programming approach can be modified (e. g., as result of new requirements or discovered bugs) using automatically-generated code modules. Given a trace of undesired behavior, one can generate a relatively small piece of code, whose execution is interwoven at run time withthe rest of the system and brings about the desired changes without modifying existing code, and without introducing new bugs. At the core of our approach is the ability of a thread of behavior to prevent the triggering of events from other threads. Our repair algorithms apply model checking to the program and transform the counterexamples produced by the model-checker into corrective modules. Our work is supported by a proof-of-concept tool, which creates understandable modules that can be further manually managed as part of ongoing incremental system development.
this paper presents a two-stage electronic ballast for metal-halide (MH) lamps. the first stage is a single-switch flyback and buck-boost integrated converter. the post stage is a half-bridge inverter driving the MH l...
详细信息
the increasing capability and flexibility of reconfigurable hardware, such as Field-Programmable Gate Arrays (FPGAs), give developers a wide range of architectural choices that can satisfy various non-functional requi...
详细信息
ISBN:
(纸本)9781467351652;9780769549149
the increasing capability and flexibility of reconfigurable hardware, such as Field-Programmable Gate Arrays (FPGAs), give developers a wide range of architectural choices that can satisfy various non-functional requirements, such as those involving performance, resource and energy efficiency. this paper describes a novel approach, based on an aspect-oriented language called LARA, that enables systematic coding and reuse of optimisation strategies that address such non-functional requirements. Our approach will be presented in three steps. First, this approach is shown to support design space exploration (DSE) which makes use of various compilation and optimisation tools, through the deployment of a master weaver and multiple slave weavers. Second, we present three compilation and synthesis strategies for word-length optimisation based on this approach, which involve three tools: the WLOT word-length optimiser deploying a combination of analytical methods;the AutoESL tool compiling C-based descriptions into hardware;and the ISE tool targeting Xilinx devices. third, the effectiveness of the approach is evaluated. In addition to promoting design re-use, our approach can be used to automatically produce a range of designs with different trade-offs in resource usage and numerical accuracy according to a given LARA-based strategy. For example, one implementation for a subband filter in an MPEG encoder provides 31% savings in area using non-uniform quantizers when compared to a floating-point description with a similar error specification at the output. Another fixed-point implementation for the gridIterate kernel used by a 3D path planning application consumed 25% less resources when the error specification is increased from 1e-6 to 1e-4.
暂无评论