In this paper, we introduce a C++ environment for dynamic unanticipated software evolution. Such an environment is composed of a C++ framework called CCF and a C++ application server called CCAS. CCF is a framework fo...
详细信息
ISBN:
(纸本)9781595937537
In this paper, we introduce a C++ environment for dynamic unanticipated software evolution. Such an environment is composed of a C++ framework called CCF and a C++ application server called CCAS. CCF is a framework for developing component based software supporting dynamic unanticipated evolution. Such a framework implements the COMPOR Component Model Specification, which provides mechanisms to evolve applications at runtime, even for unpredicted changes. CCAS manages the applications implemented through the CCF. We describe the CCF and CCAS design and main implementation issues. In order to validate the proposed environment, we implemented an application for a Linux based mobile device that encodes/decodes files using the DjVu format. Copyright 2008 acm.
The importance of the Web service technology for business, government, among other sectors, is growing. Its use in these sectors demands security concern. The Web Services Security standard is a step towards satisfyin...
详细信息
ISBN:
(纸本)9781595937537
The importance of the Web service technology for business, government, among other sectors, is growing. Its use in these sectors demands security concern. The Web Services Security standard is a step towards satisfying this demand. However, in the current security approach, the mechanism used for describing security properties of Web services restricts security policy specification and intersection. In environments that include loosely-coupled components, a rich description, of components is needed to determine whether they can interact in a secure manner. The goal of this paper is to propose a security approach for Web services, which combines Web Services Policy Framework policies and a Web Ontology Language ontology to overcome the limitation of the current syntactic approach. The main contribution, of this paper is an extended approach based, on semantics-enriched security policies. Copyright 2008 acm.
Ethnography is a research method to understand how people carry out their tasks in real-world experiences. Medical grand rounds are quotidian, formal meeting experiences where physicians discuss clinical problems of p...
详细信息
ISBN:
(纸本)9781595937537
Ethnography is a research method to understand how people carry out their tasks in real-world experiences. Medical grand rounds are quotidian, formal meeting experiences where physicians discuss clinical problems of patients. This paper presents an ethnographic study of medical grand rounds that has driven the design and development of a ubiquitous computing prototype to address the lack of a proper documentation of medical grand rounds. We have learnt that ethnography is a powerful means of understanding tacit knowledge about physicians' needs, behaviors and rituals. Copyright 2008 acm.
The Java Modeling Language (JML) is a behavioral interface specification language (BISL) designed for Java. It was developed to improve functional software correctness of Java applications. However, instrumented objec...
详细信息
ISBN:
(纸本)9781595937537
The Java Modeling Language (JML) is a behavioral interface specification language (BISL) designed for Java. It was developed to improve functional software correctness of Java applications. However, instrumented object program generated by the JML compiler use the Java reflection mechanism and data structures not supported by Java ME applications. To deal with this limitation, we propose the use of AspectJ to implement a new JML compiler, which generates an instrumented bytecode compliant with both Java SE and Java ME applications. The paper includes a comparative study to demonstrate the quality of the final code generated by our compiler. The size of the code is compared against the code generated by an existent JML compiler. Moreover, we evaluate the amount of additional code required to implement the JML assertions in Java applications. Results indicate that the overhead in code size produced by our compiler is very small, which is essential for Java ME applications. Copyright 2008 acm.
Tackling biodiversity information is essentially a distributed effort. Data handled are inherently heterogeneous, being provided by distinct research groups and using different vocabularies. Queries in biodiversity sy...
详细信息
ISBN:
(纸本)9781595937537
Tackling biodiversity information is essentially a distributed effort. Data handled are inherently heterogeneous, being provided by distinct research groups and using different vocabularies. Queries in biodiversity systems require to correlate these data, using many kinds of knowledge on geographic, biologic and ecological issues. Available biodiversity systems can only cope with part of these queries, and end users must perform several manual tasks to derive the desired, correlations, because of semantic mismatches among, data sources and lack of appropriate operators. This paper presents a solution based on Web services to meet these challenges. It relies on ontologies to retrieve the query contexts and uses the terms of this context to discover suitable sources in data repositories. This approach is being tested using real data, with new services. Copyright 2008 acm.
A number of techniques for generating geometric models of human head and body are in use nowadays. Models of human characters are useful in computer games, virtual reality, and many other applications. The complexitie...
详细信息
ISBN:
(纸本)9781595937537
A number of techniques for generating geometric models of human head and body are in use nowadays. Models of human characters are useful in computer games, virtual reality, and many other applications. The complexities involved in generating such models, however, impose heavy limitations on the variety of characters produced. In this paper, diploid reproduction is mimicked to produce an unlimited number of character models, which inherit traits from two parent models. The meshes of all models are constructed based on control parameters that are distributed as genes among a group of chromosomes. Thus, the technique consists of distributing pre-selected characteristics, represented as control parameters, over a pre-determined number of chromosome pairs for both parents;followed by a simulated generation of the father's and the mother's gametes;which are randomly combined in a simulated fecundation. The diversity is ensured in four random processes: the random exchange of segments during crossover;the random alignment of homologous chromosomes at metaphases I and II of meiosis;and the random union of male and female gametes during fecundation. Copyright 2008 acm.
A major obstacle that decreases the performance of text classifiers is the extremely high dimensionality of text data. To reduce the dimension, a number of approaches based on rough-set theory have been proposed. Howe...
详细信息
ISBN:
(纸本)9781595937537
A major obstacle that decreases the performance of text classifiers is the extremely high dimensionality of text data. To reduce the dimension, a number of approaches based on rough-set theory have been proposed. However, these works often suffer from two problems: the first is that they cannot directly deal with continuous text features;the second is that they often incur considerable running time. To deal with the first issue, we make some extensions to discernibility matrix so that it can work with continuous features. To cut down running time, we employ centroids rather than examples to construct discernibility matrix, which reduce the time complexity from O(T2W) to O(K2W) where T denotes the size of training examples, K denotes the number of training classes and W denotes the size of vocabulary. The experimental results indicate that proposed method not only yields much higher accuracy than Information Gain when the number of selected features is smaller than 6000, but also incurs much smaller CPU time than Information Gain. Copyright 2008 acm.
P2P applications have been seen as one of the most elegant and simple web applications which stirred a lot of controversy as they were a vehicle for many web activities which were and are not legal. The P2P technology...
详细信息
ISBN:
(纸本)9780769534251
P2P applications have been seen as one of the most elegant and simple web applications which stirred a lot of controversy as they were a vehicle for many web activities which were and are not legal. The P2P technology has been applied to many domains, from applications spanning the space of music downloading to communication system management etc. The grid as a middleware has raised P2P technology to the level of distributed computing. A series of P2P tools have been devised for the design, development and deployment of network based computing. Despite their spread, there are many open issues such as the lack of any centralized control or hierarchical organization. In this paper, a new hybrid architecture in which a P2P solution based on SIP a server to server connectivity on demand. The above serves as the central axis of a platform for media collaboration on the cloud. It is shown that using the new collaborative workspace on the cloud architecture different social networks in can be linked in a Peer-to-Peer manner.. The security issues do not make the subject of this paper. A proof of concept, a use case scenario, and results obtained from its usage in a test environment are given at the end of the paper.
Grids allow for collaborative e-Research to be undertaken, often across institutional and national boundaries. Typically this is through the establishment of virtual organizations (VOs) where policies on access and us...
详细信息
ISBN:
(纸本)9781424442379
Grids allow for collaborative e-Research to be undertaken, often across institutional and national boundaries. Typically this is through the establishment of virtual organizations (VOs) where policies on access and usage of resources across partner sites are defined and subsequently enforced For many VOs, these agreements have been lightweight and erred on the side of flexibility with minimal constraints on the kinds of jobs a user is allowed to run or the amount of resources that can be consumed. For many new domains such as e-Health, such flexibility is simply not tenable. Instead, precise definitions of what jobs can be run, and what data can be accessed by who need to be defined and enforced by sites. The role based access control model (RBAC) provides a well researched paradigm for controlling access to large scale dynamic VOs. However, the standard RBAC model assumes a single domain with centralised role management. When RBAC is applied to VOs, it does not specify how or where roles should be defined or made known to the distributed resource sites (who are always deemed to be autonomous to make access control decisions). Two main possibilities exist based on either a centralized or decentralized approach to VO role management. We present the advantages and disadvantages of the centralized and decentralized role models and describe how we have implemented them in a range of security focused e-Research domains at the National e-Science Centre (NeSC) at the University of Glasgow.
Real-time crowds significantly improve the realism of virtual environments, therefore their use has increased considerably over the last few years in a variety of applications, including real-time games and virtual to...
详细信息
ISBN:
(纸本)9781595939517
Real-time crowds significantly improve the realism of virtual environments, therefore their use has increased considerably over the last few years in a variety of applications, including real-time games and virtual tourism. However, due to current hardware limitations, crowd variety tends to be sacrificed in order for the crowd simulation to execute in real-time, which decreases the quality and realism of the crowd. Currently the little variety that is incorporated in real-time crowds tends to be applied by modulating each avatar with random colours, which has a detrimental effect on the texture quality. Furthermore, the existing crowd variety is often hard to define and control. To overcome these problems a set of techniques are presented, which defines and controls crowd variety, to further improve on current variety and quality of crowds. These techniques permit variety to be introduced: by changing the body mass via the application of a dis-Copyright 2008 acm.
暂无评论