We present the vision of an actor-oriented database. Its goal is to integrate database abstractions into an actor-orientedprogramming language for interactive, stateful, scalable, distributed applications that use cl...
详细信息
ISBN:
(纸本)9781538655207
We present the vision of an actor-oriented database. Its goal is to integrate database abstractions into an actor-orientedprogramming language for interactive, stateful, scalable, distributed applications that use cloud storage.
The proceedings contain 53 papers. The topics discussed include: detecting redundant CSS rules in HTML5 applications: a tree rewriting approach;SATCheck: SAT-directed stateless model checking for SC and TSO;stateless ...
ISBN:
(纸本)9781450336895
The proceedings contain 53 papers. The topics discussed include: detecting redundant CSS rules in HTML5 applications: a tree rewriting approach;SATCheck: SAT-directed stateless model checking for SC and TSO;stateless model checking of event-driven applications;synthesis of layout engines from relational constraints;a sound and optimal incremental build system with dynamic dependencies;conditionally correct superoptimization;selective control-flow abstraction via jumping;automating grammar comparison;reasoning about the POSIX file system: Local Update and Global Pathnames;ShamDroid: gracefully degrading functionality in the presence of limited resource access;finding deep compiler bugs via guided stochastic program mutation;vectorization of apply to reduce interpretation overhead of R;and fast, multicore-scalable, low-fragmentation memory allocation through large virtual memory and global data structures.
The proceedings contain 118 papers. The topics discussed include: use of agent-based modeling for wildfire situations simulation;modeling of a solar arrays deployment process at ground tests of mechanical devices on a...
ISBN:
(纸本)9781538675311
The proceedings contain 118 papers. The topics discussed include: use of agent-based modeling for wildfire situations simulation;modeling of a solar arrays deployment process at ground tests of mechanical devices on active gravity compensation systems;design concept of the intelligent information and telecommunication system of university security;object identification on raster images by user query;model synthesis and model-orientedprogramming: a new technology for high performance agent-based modeling;services and cloud infrastructure to support interdisciplinary scientific research;ontology-based model of object field concerning individual's capabilities for self-development;application of the case-based reasoning approach for identification of acoustic-emission control signals of complex technical objects;automatic error detection and hint generation in the teaching of formal languages syntax using correctwriting question type for moodle LMS;and decision support system for designing an effective configuration of a computing network for distributed complex problem solving.
The Internet of Things (IoT) has gained wide popularity both in academic and industrial contexts. As IoT devices become increasingly powerful, they can run more and more complex applications written in higher-level la...
详细信息
Modularity in object-oriented (OO) applications has been a major concern since the early years of OO programminglanguages. Migrating existing OO applications to Component-Based (CB) ones can contribute to improve mod...
详细信息
ISBN:
(纸本)1891706411
Modularity in object-oriented (OO) applications has been a major concern since the early years of OO programminglanguages. Migrating existing OO applications to Component-Based (CB) ones can contribute to improve modularity, and therefore maintainability and reuse. In this paper, we propose a method for source code transformation (refactoring) in order to perform this migration. This method enhances decoupling by considering that some dependencies between classes should be set through abstract types (interfaces) like in CB applications. In addition, some anticipated instantiations of these classes "buried" in the source code are extracted and replaced by declarative statements (like connectors in CB applications) which are processed by a dependency injection mechanism. For doing so, a set of "Bad Smells", i.e., modularity-violating symptoms, has been defined. These are first detected in the source code. Then, some refactoring operations are applied for their elimination. An implementation of the method was successfully experimented on a set of open source Java projects. The results of this experimentation are reported in this paper.
Perpetrators might employ computer programs (software) to perform their offenses or to cover their wrongdoings. Program's source code, in particular variables and their values diverge in their scope and duration i...
详细信息
ISBN:
(纸本)9781538637319
Perpetrators might employ computer programs (software) to perform their offenses or to cover their wrongdoings. Program's source code, in particular variables and their values diverge in their scope and duration in RAM. objectorientedlanguages encapsulate variables and operations in classes and allow for objects to be instantiated, which simplify software design but add to the complexity of its execution behavior and its data and control flow. This paper explores execution behaviors and information left by program execution in support for legal actions against perpetrators in the court of law. Our investigation model assumes no information is provided by the operating system;only raw RAM dumps. Our methodology employs information from the presumed program source code and its objectoriented design. It explores various execution states and scenarios to uncover the evidence of potential software usage. These scenarios are designed to show that scope, access modifiers, and storage information of various source code variables can be used to identify program's activities. Results show that investigators have good chances locating various variables' values that are uniquely corresponded to the presumed software and its execution states. In some cases, values are successfully identified in memory dumps even after the process is stopped.
The proceedings contain 52 papers. The topics discussed include: checking correctness of typescript interfaces for JavaScript libraries;determinacy in static analysis for jQuery;Eventbreak: analyzing the responsivenes...
ISBN:
(纸本)9781450325851
The proceedings contain 52 papers. The topics discussed include: checking correctness of typescript interfaces for JavaScript libraries;determinacy in static analysis for jQuery;Eventbreak: analyzing the responsiveness of user interfaces through performance-guided test generation;Tardis: affordable time-travel debugging in managed runtimes;Phosphor: illuminating dynamic data flow in commodity JVMs;Rubah: DSU for Java on a stock JVM;fast conservative garbage collection;region-based memory management for GPU programminglanguages: enabling rich data structures on a Spartan host;StreamJIT: a commensal compiler for high-performance stream programming;SurveyMan: programming and automatically debugging surveys;refactoring Java generics by inferring wildcards, in practice;continuously measuring critical section pressure with the free-lunch profiler;understanding energy behaviors of thread management constructs;and distributed REScala: an update algorithm for distributed reactive programming.
The component-based software development enables to construct applications from reusable components providing particular functionalities and simplifies application evolution. To ensure the correct functioning of a giv...
详细信息
ISBN:
(纸本)9788394625375
The component-based software development enables to construct applications from reusable components providing particular functionalities and simplifies application evolution. To ensure the correct functioning of a given component-based application and its preservation across evolution steps, it is necessary to test not only the functional properties of the individual components but also the correctness of their mutual interactions and cooperation. This is complicated by the fact that third-party components often come without source code and/or documentation of functional and interaction properties. In this paper, we describe an approach for performing rigorous semi-automated testing of software components with unavailable source code. Utilizing an automated analysis of the component interfaces, scenarios invoking methods with generated parameter values are created. When they are performed on a stable application version and their runtime effects (component interactions) are recorded, the resulting scenarios with recorded effects can be used for accurate regression testing of newly installed versions of selected components. Our experiences with a prototype implementation show that the approach has acceptable demands on manual work and computational resources.
The majority of modern programminglanguages provide concurrency and object-orientation in some form. However, object-oriented concurrency remains cumbersome in many situations. We introduce the language OrcO, Orc wit...
详细信息
Aliasing is a known source of challenges in the context of imperative object-orientedlanguages, which have led to important advances in type systems for aliasing control. However, their large-scale adoption has turne...
详细信息
暂无评论