the proceedings contain 19 papers. the special focus in this conference is on programming languages and Systems. the topics include: A Set-Based Context Model for program Analysis;algebraic and Coalgebraic Perspective...
ISBN:
(纸本)9783030644369
the proceedings contain 19 papers. the special focus in this conference is on programming languages and Systems. the topics include: A Set-Based Context Model for program Analysis;algebraic and Coalgebraic Perspectives on Interaction Laws;stack-Driven program Generation of WebAssembly;banyan: Coordination-Free Distributed Transactions over Mergeable Types;automatically Generating Descriptive Texts in Logging Statements: How Far Are We?;parameterized Synthesis with Safety Properties;relational Synthesis for pattern Matching;REFINITY to Model and Prove program Transformation Rules;a Counterexample-Guided Debugger for Non-recursive Datalog;a Symbolic Algorithm for the Case-Split Rule in String Constraint Solving;P3 : A Profiler Suite for Parallel Applications on the Java Virtual Machine;declarative Stream Runtime Verification (hLola);formal Verification of Atomicity Requirements for Smart Contracts;neural Networks, Secure by Construction: An Exploration of Refinement Types;A New Refinement Type System for Automated νHFLZ Validity Checking;behavioural Types for Memory and Method Safety in a Core Object-Oriented Language;syntactically Restricting Bounded Polymorphism for Decidable Subtyping.
Insider threat research at the CERT program has shown that many organizations fall into a vicious cycle of trust and insider threat: organizations do not detect any suspicious insider behavior, so they trust their ins...
详细信息
the use of hardware description languages to provide digital image processing results is a recent technique that offers a direct connection to reconfigurable hardware implementation. this paper presents a real time sy...
详细信息
ISBN:
(纸本)9781479946013
the use of hardware description languages to provide digital image processing results is a recent technique that offers a direct connection to reconfigurable hardware implementation. this paper presents a real time system for digital image processing using Verilog hardware description language that can be followed by immediate hardware implementation possibility. the image enhancement algorithms included in the described system were applied to an ultrasound image. the paper focuses on image enhancement methods such as contrast and brightness transformation, inverting and pseudo-coloring images, described and simulated using Verilog hardware description language. With our study we intend to contribute to the diagnoses of invasive and non-invasive methods in pre-operator stage, using modern VLSI technologies with applications in medical imaging.
the paper introduces three patterns for use by university managers and lecturers for creating of Master of Science (MSc) program in engineering and science faculties, developing entrepreneurial skills: • TECHNOLOGY EN...
详细信息
ISBN:
(纸本)9781446693636
the paper introduces three patterns for use by university managers and lecturers for creating of Master of Science (MSc) program in engineering and science faculties, developing entrepreneurial skills: • TECHNOLOGY ENTREPRENEURSHIP AND INNOVATION (TEI) CURRICULA - provide a valuable and computational set of courses to guarantee the competence of graduate students in the turbulent environment;• TEI MSc program - create the road map for successful implementation of the technology entrepreneurship graduate education;• TEACHERS TEAM - when the human capital is scarce, focus the stress on attracting and retains the best professionals in the fields. the authors experimented withthe MSc graduate Technology Entrepreneurship curriculum design and implementation of the program in the university master level teaching, and used a mix of methods and observation techniques to assess its feasibility and applicability for developing the winning strategy.
作者:
Leitao, AMUniv Tecn Lisboa
Dept Informat Engn Grp Inteligencia Artificial Inst Super Tecn P-1049001 Lisbon Portugal
Refactoring tools are extremely important to prevent errors in legacy systems restructuring. Unfortunately, to be effective, these tools require huge computer resources that cause unacceptable inefficiencies or limit ...
详细信息
ISBN:
(纸本)0769514383
Refactoring tools are extremely important to prevent errors in legacy systems restructuring. Unfortunately, to be effective, these tools require huge computer resources that cause unacceptable inefficiencies or limit the size of the restructured programs or even the programming language expressiveness. Previous approaches also made it difficult for the programmer to extend the tool with new refactoring operations. patternlanguages exist that describe several techniques to refactor a program. However they are usually described at a very abstract level that is understandable only by a human programmer and that is hard to implement in refactoring tools. We present a formal pattern language that solves these problems. the pattern language is used to define refactoring operations that can be as powerful as is computationally possible but that are very easy to write. the language simplicity also allows for the automatic learning of new refactoring operations from the observation of manual code transformations.
PRISM is a visual instrument that improves a person's cognitive reasoning by facilitating the process of thinking. Its origins stem from efforts and experiences of psychotherapeutics in the early 1990s. Meanwhile ...
详细信息
the proceedings contain 32 papers. the topics discussed include: enterprise architecture management patterns for enterprise architecture visioning;roles in a software project;applied pattern for strategy management of...
the proceedings contain 32 papers. the topics discussed include: enterprise architecture management patterns for enterprise architecture visioning;roles in a software project;applied pattern for strategy management of technology entrepreneurship and innovation MSc program;performance of open source projects;the role of analysis patterns in systems analysis;a service for software pattern selection;applying architectural patterns for parallel programming: solving the one-dimensional heat equation;towards formalized adaptation patterns for adaptive interactive systems;a pattern driven approach against architectural knowledge vaporization;reusable architectural decisions for DSL design: foundational decisions in DSL projects;a pattern vocabulary for product distribution;business patterns for knowledge audit implementation;applying distributed development patterns;and software design reviews.
At the International Test conference 2002 several low cost test solutions were presented. All of these solutions promised to establish a close link between Automatic Test pattern Generation, ATE based testing and Faul...
详细信息
ISBN:
(纸本)0769519083
At the International Test conference 2002 several low cost test solutions were presented. All of these solutions promised to establish a close link between Automatic Test pattern Generation, ATE based testing and Fault Diagnosis/Analysis by using the IEEE 1450 Standard Test Interface Language (STIL). However, the reality is different. this paper describes the integration of a STIL based tester into the standard Motorola test program generation flow. the expected benefits of this very low cost test approach are measured against the problems which had to be solved in order to achieve a high degree of automation. All remaining problems described in this paper need to be addressed by the EDA vendors, the ATE companies and the different STIL committees. Only when these issues are resolved STIL will become a success for the test world.
Resource management is important because of the rising diversity and the resource constraints, like energy, of embedded systems. Energy-constraints are especially challenging in mobile systems like smart phones. A sol...
详细信息
ISBN:
(纸本)9781450334655
Resource management is important because of the rising diversity and the resource constraints, like energy, of embedded systems. Energy-constraints are especially challenging in mobile systems like smart phones. A solution to deal withthese constraints are power-management techniques that are often only general design principles. Consequently, implementation is often done by experts only. One common approach is to optimize hardware and software until the energy-constraints are fulfilled. this leads to resulting solutions working only for one specific use case. So why shouldn't we mine and use design patterns for power-management in embedded systems from these individual solutions. In contribution, we extended the dynamics and consequence section of the pattern structure to be able to describe the impact to the power consumption. We used the extended structure and mined an example pattern called Energy Valve as a start for mining others.
Textual patterns have been used effectively to extract information from large text collections. However they rely heavily on textual redundancy in the sense that facts have to be mentioned in a similar manner in order...
详细信息
ISBN:
(纸本)9783540749752
Textual patterns have been used effectively to extract information from large text collections. However they rely heavily on textual redundancy in the sense that facts have to be mentioned in a similar manner in order to be generalized to a textual pattern. Data sparseness thus becomes a problem when trying to extract information from hardly redundant sources like corporate intranets, encyclopedic works or scientific databases. We present results on applying a weakly supervised pattern induction algorithm to Wikipedia to extract instances of arbitrary relations. In particular, we apply different configurations of a basic algorithm for pattern induction on seven different datasets. We show that the lack of redundancy leads to the need of a large amount of training data but that integrating Web extraction into the process leads to a significant reduction of required training data while maintaining the accuracy of Wikipedia. In particular we show that, though the use of the Web can have similar effects as produced by increasing the number of seeds, it leads overall to better results. Our approach thus allows to combine advantages of two sources: the high reliability of a closed corpus and the high redundancy of the Web.
暂无评论