Mobile code distribution relies on digital signatures to guarantee code authenticity. Unfortunately, standard signature schemes are not well suited for use in conjunction with program transformation techniques, such a...
详细信息
ISBN:
(纸本)9781450342339
Mobile code distribution relies on digital signatures to guarantee code authenticity. Unfortunately, standard signature schemes are not well suited for use in conjunction with program transformation techniques, such as aspect-orientedprogramming. With these techniques, code development is performed in sequence by multiple teams of programmers. This is fundamentally different from traditional single-developer/single-user models, where users can verify end-to-end (i.e., developer-to-user) authenticity of the code using digital signatures. To address this limitation, we introduce FLEX, a flexible code authentication framework for mobile applications. FLEX allows semi-trusted intermediaries to modify mobile code without invalidating the developer's signature, as long as the modification complies with a "contract" issued by the developer. We introduce formal definitions for secure code modification, and show that our instantiation of FLEX is secure under these definitions. Although FLEX can be instantiated using any language, we design AMJ-a novel programming language that supports code annotations-and implement a FLEX prototype based on our new language.
Semantic subtyping is an approach for defining sound and complete procedures to decide subtyping for expressive types, including union and intersection types;although it has been exploited especially in functional lan...
详细信息
Semantic subtyping is an approach for defining sound and complete procedures to decide subtyping for expressive types, including union and intersection types;although it has been exploited especially in functional languages for XML based programming, recently it has been partially investigated in the context of object-oriented languages, and a sound and complete subtyping algorithm has been proposed for record types, but restricted to immutable fields, with union and recursive types interpreted coinductively to support cyclic objects. In this work we address the problem of studying semantic subtyping for imperative object-oriented languages, where fields can be mutable;in particular, we add read/write field annotations to record types, and, besides union, we consider intersection types as well, while maintaining coinductive interpretation of recursive types. In this way, we get a richer notion of type with a flexible subtyping relation, able to express a variety of type invariants useful for enforcing static guarantees for mutable objects. The addition of these features radically changes the definition of subtyping, and, hence, the corresponding decision procedure, and surprisingly invalidates some subtyping laws that hold in the functional setting. We propose an intuitive model where mutable record values contain type information to specify the values that can be correctly stored in fields. Such a model, and the corresponding subtyping rules, require particular care to avoid circularity between coinductive judgments and their negations which, by duality, have to be interpreted inductively. A sound and complete subtyping algorithm is provided, together with a prototype implementation.
For effective articulatory feedback in computer-assisted pronunciation training (CAPT) systems, we address effective articulatory models of second language (L2) learners' speech without using such data, which is d...
详细信息
ISBN:
(纸本)9781509041183
For effective articulatory feedback in computer-assisted pronunciation training (CAPT) systems, we address effective articulatory models of second language (L2) learners' speech without using such data, which is difficult to collect and annotate in a large scale. Context-dependent articulatory attributes (placement and manner of articulation) are modeled based on deep neural network (DNN). In order to efficiently train the non-native articulatory models, we exploit large speech corpora of native and target language to model inter-language phenomena. This multi-lingual learning is then combined with multi-task learning, which uses phone-classification as a sub-task. These methods are applied to Mandarin Chinese pronunciation learning by Japanese native speakers. Effects are confirmed in the native attribute classification and pronunciation error detection of non-native speech.
Aliasing is a known source of challenges in the context of imperative object-oriented languages, which have led to important advances in type systems for aliasing control. However, their large-scale adoption has turne...
详细信息
Aliasing is a known source of challenges in the context of imperative object-oriented languages, which have led to important advances in type systems for aliasing control. However, their large-scale adoption has turned out to be a surprisingly difficult challenge. While new language designs show promise, they do not address the need of aliasing control in existing languages. This paper presents a new approach to isolation and uniqueness in an existing, widely-used language, Scala. The approach is unique in the way it addresses some of the most important obstacles to the adoption of type system extensions for aliasing control. First, adaptation of existing code requires only a minimal set of annotations. Only a single bit of information is required per class. Surprisingly, the paper shows that this information can be provided by the object-capability discipline, widely-used in program security. We formalize our approach as a type system and prove key soundness theorems. The type system is implemented for the full Scala language, providing, for the first time, a sound integration with Scala's local type inference. Finally, we empirically evaluate the conformity of existing Scala open-source code on a corpus of over 75,000 LOC.
Training a bottleneck feature (BNF) extractor with multilingual data has been common in low resource keyword search. In a low resource application, the amount of transcribed target language data is limited while there...
详细信息
ISBN:
(纸本)9781509041183
Training a bottleneck feature (BNF) extractor with multilingual data has been common in low resource keyword search. In a low resource application, the amount of transcribed target language data is limited while there are usually plenty of multilingual data. In this paper, we investigated two methods to train efficient multilingual BNF extractors for low resource keyword search. One method is to use the target language data to update an existing BNF extractor, and another method is to combine the target language data to train a new multilingual BNF extractor from the start. In these two methods, we proposed to use long short-term memory recurrent neural network based language identification to select utterances in the multilingual training data that are acoustically close to the target language. Experiments on Swahili in the OpenKWS15 data demonstrated the efficiency of our proposed methods. The first method facilitates rapid system development, while both methods outperform using baseline BNF extractors in terms of accuracy.
Scala's type system unifies aspects of ML modules, object-oriented, and functional programming. The Dependent object Types (DOT) family of calculi has been proposed as a new theoretic foundation for Scala and simi...
详细信息
Scala's type system unifies aspects of ML modules, object-oriented, and functional programming. The Dependent object Types (DOT) family of calculi has been proposed as a new theoretic foundation for Scala and similar expressive languages. Unfortunately, type soundness has only been established for restricted subsets of DOT. In fact, it has been shown that important Scala features such as type refinement or a subtyping relation with lattice structure break at least one key metatheoretic property such as environment narrowing or invertible subtyping transitivity, which are usually required for a type soundness proof. The main contribution of this paper is to demonstrate how, perhaps surprisingly, even though these properties are lost in their full generality, a rich DOT calculus that includes recursive type refinement and a subtyping lattice with intersection types can still be proved sound. The key insight is that subtyping transitivity only needs to be invertible in code paths executed at run time, with contexts consisting entirely of valid runtime objects, whereas inconsistent subtyping contexts can be permitted for code that is never executed.
Today's scientific applications usually take considerable time to run, and hence parallel computing environments, such as Grids and data centers/Clouds, have emerged. Indeed, traditionally, much research in high-p...
详细信息
ISBN:
(纸本)9783319312323;9783319312316
Today's scientific applications usually take considerable time to run, and hence parallel computing environments, such as Grids and data centers/Clouds, have emerged. Indeed, traditionally, much research in high-performance computing has been conducted with the goal of executing such applications as fast as possible. However, energy has recently been recognized as another crucial goal to consider, because of its negative economic and ecological implications. Energy-driven solutions in these environments are mostly focused on the hardware and middleware layers, but little efforts target the application level. We revisit a catalog of primitives commonly used in objectoriented-based scientific programming, or micro-benchmarks, to identify energy-friendly variants of the same primitive. Based on this, we refactor three existing scientific applications, resulting in energy improvements ranging from 2.58% to 96.74%.
The MDD method was used to develop software to evaluate the hydraulic safety of irrigation pipeline systems. The difficulty in developing and maintaining the software is that the diversity of hydraulic behavior and st...
详细信息
ISBN:
(纸本)9783319398839;9783319398822
The MDD method was used to develop software to evaluate the hydraulic safety of irrigation pipeline systems. The difficulty in developing and maintaining the software is that the diversity of hydraulic behavior and structure of various ancillary facilities constituting the irrigation pipeline system bring complexity into the code to process the boundary conditions and to enter data in the numerical calculation solver. To solve that problem, this study used the following two methods. (1) The various pipe facilities and ancillary facilities which are the domain to analyze were defined the data structure by UML and the design pattern was applied in implementation. (2) The method of entering data about the boundary conditions into the numerical analysis solver was assisted by objects automatically coded from the metadata that were stipulated using the schema language of XML.
The proceedings contain 77 papers. The topics discussed include: emergent feature modularization;harnessing emergence for manycore programming: early experience integrating ensembles, adverbs, and object-based inherit...
ISBN:
(纸本)9781450302401
The proceedings contain 77 papers. The topics discussed include: emergent feature modularization;harnessing emergence for manycore programming: early experience integrating ensembles, adverbs, and object-based inheritance;collaborative model merging;sonifying performance data to facilitate tuning of complex systems: performance tuning: music to my ears;a recommender for conflict resolution support in optimistic model versioning;inferring arbitrary distributions for data and computation;object-oriented software considerations in airborne systems and equipment certification;migrating a large modeling environment from XML/UML to Xtext/GMF;software evolution in agile development: a case study;application frameworks: how they become your enemy;MDSD for the iPhone: developing a domain-specific language and IDE tooling to produce real world applications for mobile devices;and stop the software architecture erosion: building better software systems.
暂无评论