The proceedings contain 6 papers. The topics discussed include: building debuggers and other tools: we can 'have it all';trace-based debugging for advanced-dispatching programming languages;call-target-specifi...
ISBN:
(纸本)9781450336574
The proceedings contain 6 papers. The topics discussed include: building debuggers and other tools: we can 'have it all';trace-based debugging for advanced-dispatching programming languages;call-target-specific method arguments;Metis: a smart memory allocator using historical reclamation information;towards reducing the need for algorithmic primitives in dynamic language VMS through a tracing JIT;and techniques and applications for guest-language safepoints.
The field of enterprise modeling (EM) is facing a number of challenges. Some of them result out of the application of informal or semi-formal modeling languages having usually semantics similar to object-oriented prog...
详细信息
ISBN:
(纸本)9781467373401
The field of enterprise modeling (EM) is facing a number of challenges. Some of them result out of the application of informal or semi-formal modeling languages having usually semantics similar to object-orientedprogramming languages. The EM community has recognized ontologies as a promising way to address some of the existing problems. There is, however, a striking lack of consensus about understanding of ontology in the Information systems domain. The multiplicity of different understandings leads to an increased diversity of proposed approaches. To contribute to a better understanding of the role of ontologies in the realm of EM and of requirements they would need to meet, we distinguish and discuss different categories of applications of ontologies in the EM field. Based on their analysis, we identify the main benefits resulting out of the application of ontologies and point to the main challenges hampering their adoption. This allows to assess the maturity of this field and to identify directions of future research.
Bidirectional long short-term memory (BLSTM) based speech synthesis has shown great potential in improving the quality of the synthetic speech. However, for low-resource languages, it is difficult to obtain a high qua...
详细信息
ISBN:
(纸本)9781479999897
Bidirectional long short-term memory (BLSTM) based speech synthesis has shown great potential in improving the quality of the synthetic speech. However, for low-resource languages, it is difficult to obtain a high quality BLSTM model. BLSTM based speech synthesis can be viewed as a transformation between the input features and the output features. We assume that the input and output layers of BLSTM are language-dependent while the hidden layers can be language-independent if trained properly. We investigate whether sufficient training data of another language (auxiliary) can benefit the BLSTM training of a new language (target) that has only limited training data. In this paper, we propose 1) a multilingual BLSTM that shares hidden layers across different languages and 2) a specific training approach that can best utilize the training data from both the auxiliary and target languages. Experimental results demonstrate the effectiveness of the proposed approach. The multilingual BLSTM can learn the cross-lingual information, and can predict more accurate acoustic features for speech synthesis of the target language than the monolingual BLSTM that is trained with only the data from the target language. Subjective test also indicates that multilingual BLSTM outperforms the monolingual BLSTM in generating higher quality synthetic speech.
We have recently introduced object propositions as a modular verification technique that combines abstract predicates and fractional permissions. The Oprop tool implements the theory of object propositions and verifie...
详细信息
ISBN:
(纸本)9781450337229
We have recently introduced object propositions as a modular verification technique that combines abstract predicates and fractional permissions. The Oprop tool implements the theory of object propositions and verifies programs written in a simplified version of Java, augmented with the object propositions specifications. Our tool parses the input files and automatically translates them into the intermediate verification language Boogie, which is verified by the Boogie verifier. We present the details of our implementation, the lessons that we learned and a number of examples that we have verified using the Oprop tool.
Petri nets represent a prominent formal method for modeling distributed systems both visually and with sound mathematics. They are very successful in modeling different workflow processes. In particular, Petri nets ca...
详细信息
ISBN:
(纸本)9781509047024
Petri nets represent a prominent formal method for modeling distributed systems both visually and with sound mathematics. They are very successful in modeling different workflow processes. In particular, Petri nets can be used to model curricula including causal dependencies of courses, necessary and optional courses etc. Having a Petri net model of single courses and the model of the whole curriculum in a particular field, each run of the Petri net model will represent a possible individual learnflow of a student. In this survey we show how to construct Petri net models of courses, models of the whole curriculum and models of individual learnflows. The presented method is suitable both for planning, management and control of e-learning courses and study programs as well as for classroom courses and study programs.
Alias analysis has been an interesting research topic in verification and optimization of programs. The undecidability of determining whether two expressions in a program may reference to the same object is the main s...
详细信息
ISBN:
(数字)9783319175812
ISBN:
(纸本)9783319175812;9783319175805
Alias analysis has been an interesting research topic in verification and optimization of programs. The undecidability of determining whether two expressions in a program may reference to the same object is the main source of the challenges raised in alias analysis. In this paper we propose an extension of a previously introduced alias calculus based on program expressions, to the setting of unbounded program executions such as infinite loops and recursive calls. Moreover, we devise a corresponding executable specification in the K-framework. An important property of our extension is that, in a non-concurrent setting, the corresponding alias expressions can be over-approximated in terms of a notion of regular expressions. This further enables us to show that the associated K-machinery implements an algorithm that always stops and provides a sound over-approximation of the "may aliasing" information, where soundness stands for the lack of false negatives. As a case study, we analyze the integration and further applications of the alias calculus in SCOOP. The latter is an object-orientedprogramming model for concurrency, recently formalized in Maude;K definitions can be compiled into Maude for execution.
Given a program whose functionality depends on access to certain external resources, we investigate the question of how to gracefully degrade functionality when a subset of those resources is unavailable. The concrete...
详细信息
ISBN:
(纸本)9781450336895
Given a program whose functionality depends on access to certain external resources, we investigate the question of how to gracefully degrade functionality when a subset of those resources is unavailable. The concrete setting motivating this problem statement is mobile applications, which rely on contextual data (e.g., device identifiers, user location and contacts, etc.) to fulfill their functionality. In particular, we focus on the Android platform, which mediates access to resources via an installation-time permission model. On the one hand, granting an app the permission to access a resource (e.g., the device ID) entails privacy threats (e.g., releasing the device ID to advertising servers). On the other hand, denying access to a resource could render the app useless (e.g., if inability to read the device ID is treated as an error state). Our goal is to specialize an existing Android app in such a way that it is disabled from accessing certain sensitive resources (or contextual data) as specified by the user, while still being able to execute functionality that does not depend on those resources. We present SHAMDROID, a program transformation algorithm, based on specialized forms of program slicing, backwards static analysis and constraint solving, that enables the use of Android apps with partial permissions. We rigorously state the guarantees provided by SHAMDROID w.r.t. functionality maximization. We provide an evaluation over the top 500 Google Play apps and report on an extensive comparative evaluation of SHAMDROID against three other state-of-theart solutions (APM, XPrivacy, and Google App Ops) that mediate resource access at the system (rather than app) level. SHAMDROID performs better than all of these tools by a significant margin, leading to abnormal behavior in only 1 out of 27 apps we manually investigated, compared to the other solutions, which cause crashes and abnormalities in 9 or more of the apps. This demonstrates the importance of performing a
There has been a long debate on which programming language can help write better object-oriented programs. However, to date little response is given to this issue with empirical evidence. In this paper, we perform a c...
详细信息
With its more realistic simulation effects, the dynamic-based three dimensional clothes animation technique has very broad applications in e-commerce, virtual reality. As an essential part of clothes animation, the dr...
详细信息
ISBN:
(纸本)9781509007691
With its more realistic simulation effects, the dynamic-based three dimensional clothes animation technique has very broad applications in e-commerce, virtual reality. As an essential part of clothes animation, the dressing process also has important impact to the overall system performance and applicability. Especially in the virtual network dressing room of clothes e-commerce system, it is still a problem how to dress various clothes more simply and efficiently. By reusing the collision detection module in our clothes animation system, this paper proposes an automatic dressing method, which greatly reduces the workload of programming. More importantly, compared with other existing dressing technologies, our proposed method is more easy to implement, operate, and can meet the needs of network virtual fitting for common consumers more practically.
The use of Cloud Service Providers to store and manage records has introduced a new challenge to establishing the authenticity of digital records. Not only are these records removed from their systems of creation, but...
详细信息
ISBN:
(纸本)9781509000487
The use of Cloud Service Providers to store and manage records has introduced a new challenge to establishing the authenticity of digital records. Not only are these records removed from their systems of creation, but they are then placed into a dynamic, co-tenancy environment that can span both technological and geographic boundaries. To overcome the challenges these changes present to determining the authenticity of records in the Cloud, the author is proposing the creation of preservation model objects that leverage Archival Diplomatics concepts within the object-orientedprogramming paradigm that is utilized by most modern programming languages. By basing the creation of digital records stored within Cloud-based systems on an Archival Diplomatics based view of authentic digital records, such as the extensive research by InterPARES, the preservation objects will possess sufficient evidence to support their presumption of authenticity regardless of movement across time and space.
暂无评论