Object oriented decomposition is the most successful decomposition strategy used nowadays. But a single decomposition strategy cannot capture all aspects of a concept. Roles have been successfully used to model the di...
详细信息
ISBN:
(纸本)9789898565136
Object oriented decomposition is the most successful decomposition strategy used nowadays. But a single decomposition strategy cannot capture all aspects of a concept. Roles have been successfully used to model the different views a concept may provide but, despite this, roles have not been used as building blocks. Roles are mostly used to extend objects at runtime. In this paper we propose roles as a way to compose classes that provides a modular way of capturing and reusing those aspects that fall outside a concept's main purpose, while being close to the OO approach. We present how roles can be made modular and reusable. We also show how we can use roles to compose classes using JavaStage, a java extension that support roles To validate our approach we developed generic and reusable roles for the Gang of Four patterns. We were able to develop reusable roles for 10 out of 23 patterns, which is a good outcome.
For elementary school students, it is needed to provide various experience-centered investigation environments. they should learn how to find the most efficient problem solving method by themselves. this paper introdu...
详细信息
the term computational thinking has received some discussion in the field of computer science education research. the term is defined as the concept of thinking about problems in a way that can be implemented in a com...
详细信息
the proceedings contain 12 papers. the topics discussed include: interplay between user experience evaluation and software development: state of the art;ideas mapping, surface computing and user experience;are softwar...
the proceedings contain 12 papers. the topics discussed include: interplay between user experience evaluation and software development: state of the art;ideas mapping, surface computing and user experience;are software companies aware of UX?;influence of usability on customer satisfaction: a case study on mobile phone services;effectiveness and efficiency as conflicting requirements in designing emergency mission reporting;the craft of programming interaction;a cross-disciplinary UX evaluation of a CRM system;identifying user experiencing factors along the development process: a case study;identifying user experiencing factors along the development process: a case study;the early phases of UX: why they are important (more than evaluation), and what they are;AHP supported evaluation of LMS quality;and to measure or not to measure UX: an interview study.
Near Field Communication (NFC) provides a contactless technology for data transmission between smart phones, PCs, PDAs and such devices. It is based on the Bluetooth technology as they are both short-range communicati...
详细信息
ISBN:
(纸本)9781467353250;9781908320087
Near Field Communication (NFC) provides a contactless technology for data transmission between smart phones, PCs, PDAs and such devices. It is based on the Bluetooth technology as they are both short-range communication technologies. With NFC people can use their mobile phones to pay for goods and services. they can also use other applications such as ticketing, loyalty, etc. Having sensitive information as well as several parties involved during the NFC operation, caused the delay towards its adoption. Managing NFC applications has become a major issue in the market and stakeholders are testing different implementation methods to deliver the most secure, flexible and manageable NFC to their customers. We believe cloud computing can solve many issues in regards to NFC application management and in this paper we have proposed our approach which can be implemented for the ease of managing the whole NFC ecosystem. We have also considered different SE architectures and explained our preferable model.
We study the local behavior of a primal-dual inexact interior point methods for solving nonlinear systems arising from the solution of nonlinear optimization problems or more generally from nonlinear complementarity p...
详细信息
We study the local behavior of a primal-dual inexact interior point methods for solving nonlinear systems arising from the solution of nonlinear optimization problems or more generally from nonlinear complementarity problems. the algorithm is based on the Newton method applied to a sequence of perturbed systems that follows by perturbation of the complementarity equations of the original system. In case of an exact solution of the Newton system, it has been shown that the sequence of iterates is asymptotically tangent to the central path (Armand and Benoist in Math. Program. 115:199-222, 2008). the purpose of the present paper is to extend this result to an inexact solution of the Newton system. We give quite general conditions on the different parameters of the algorithm, so that this asymptotic property is satisfied. Some numerical tests are reported to illustrate our theoretical results.
An increasing number of information systems integrate semantic data stores for managing ontologies. To access these knowledge bases most of the available implementations provide application programming interfaces (API...
详细信息
ISBN:
(纸本)9780769548012
An increasing number of information systems integrate semantic data stores for managing ontologies. To access these knowledge bases most of the available implementations provide application programming interfaces (APIs). the implementations of these APIs normally do not support any kind of network protocol or service interface. this works fine as long as a monolithic system is developed. If the need arises to integrate such a knowledge base into a service-oriented architecture a different approach is needed. In this paper we propose an architecture to address this issue. A first demonstrator was fully implemented in the European project PESCaDO. Several services access and work on a central knowledge base access service which supports multi-threaded access for parallel instantiated ontologies.
We address the optimal design of a Distribution Network (DN), presenting a procedure employing Multi-Objective Genetic Algorithms (MOGA) to select the (sub) optimal DN configuration. Using multi-objective genetic opti...
详细信息
ISBN:
(纸本)9783642259432
We address the optimal design of a Distribution Network (DN), presenting a procedure employing Multi-Objective Genetic Algorithms (MOGA) to select the (sub) optimal DN configuration. Using multi-objective genetic optimization allows solving a nonlinear design problem with piecewise constant contributions in addition to linear ones. the MOGA application allows finding a Pareto frontier of (sub) optimal solutions, which is compared withthe frontier obtained solving the same problem with linear programming, where piecewise constant contributions are linearly approximated. the two curves represent, respectively, the upper and the lower limit of the region including the real Pareto curve. Boththe genetic optimization model and the linear programming are applied under structural constraints to a case study describing the DN of an Italian enterprise.
the linear ordering problem (LOP) consists in rearranging the rows and columns of a given square matrix such that the sum of the super-diagonal entries is as large as possible. the LOP has a significant number of impo...
详细信息
ISBN:
(纸本)9783642289309;9783642289316
the linear ordering problem (LOP) consists in rearranging the rows and columns of a given square matrix such that the sum of the super-diagonal entries is as large as possible. the LOP has a significant number of important practical applications. In this paper we describe an efficient genetic programming based algorithm, designed to find high quality solutions for LOP. the computational results obtained for two sets of benchmark instances indicate that our proposed heuristic is competitive to previous methods for solving the LOP.
暂无评论