Multi-user graphical applications currently require the creation of a set of interface objects to maintain each participating display. the concept of shared objects allows a single object instance to be used in multip...
详细信息
ISBN:
(纸本)0769509649
Multi-user graphical applications currently require the creation of a set of interface objects to maintain each participating display. the concept of shared objects allows a single object instance to be used in multiple contexts concurrently. this provides a novel way of reducing collaborative overheads by requiring the maintenance of only a single set of interface objects. this paper presents the concept of a shared-object collaborative framework and illustrates how the concept can be incorporated into an existing object-oriented toolkit.
the integration of alias analysis with type information increases the precision of alias detection, especially for inheritance among classes. this paper presents a compile-time flow-sensitive context-insensitive alias...
详细信息
ISBN:
(纸本)0769509649
the integration of alias analysis with type information increases the precision of alias detection, especially for inheritance among classes. this paper presents a compile-time flow-sensitive context-insensitive alias analysis algorithm with type information for Java. First, we propose an aliased element representation for an object to compute aliases efficiently. Second, the algorithm computes aliases for shadowed valuables by regarding constructors as functions. third, it performs type inference for each reference variable. the inferred type information increases the precision of subsequent alias analysis by building a complete calling graph, not only for overridden methods but also for both shadowed variables and constructors. Fourth, it presents algorithms to compute aliases for each statement. As a result, the precision and efficiency of the algorithm is improved.
Current use of software metrics in the industry focuses on the cost and effort estimation, while some research was carried out in the direction of their use as fault indicators. Empirical studies in software measureme...
详细信息
ISBN:
(纸本)0769511864
Current use of software metrics in the industry focuses on the cost and effort estimation, while some research was carried out in the direction of their use as fault indicators. Empirical studies in software measurement are scarce, especially in the realm of object-oriented metrics, while there is no record of management system assessment using these metrics. In this paper we discuss an approach to using established object-oriented software metrics as complexity/coupling and thus risk indicators early in the system development lifecycle. Further, we subject a medium-scale inter-domain network and service management system, developed in UML, to the metric assessment, and present an analysis of these measurements. this system was developed in an european Commission-sponsored ACTS research project TRUMPET Results indicate that the highest level of complexity, and thus also risk, is exhibited at major interconnection points between autonomous management domains. Moreover, the results imply a strong ordinal correlation between the metrics.
the proceedings contain 35 papers. the special focus in this conference is on Advances in Artificial Intelligence. the topics include: Towards first-order temporal resolution;approximating most specific concepts in de...
ISBN:
(纸本)9783540454229
the proceedings contain 35 papers. the special focus in this conference is on Advances in Artificial Intelligence. the topics include: Towards first-order temporal resolution;approximating most specific concepts in description logics with existential restrictions;Bayesian learning and evolutionary parameter optimization;abductive partial order planning with dependent fluents;constraint-based optimization of priority schemes for decoupled path planning techniques;possible worlds semantics for credulous and contraction inference;the point algebra for branching time revisited;exploiting conditional equivalences in connection calculi;propositional satisfiability in answer-set programming;prediction of regular search tree growth by spectral analysis;theory and practice of time-space trade-offs in memory limited search;hierarchical diagnosis of large configurator knowledge bases;finding optimal solutions to atomix;history-based diagnosis templates in the framework of the situation calculus;a defense model for games with incomplete information;towards inferring labelling heuristics for CSP application domains;extracting situation facts from activation value histories in behavior-based robots;learning search control knowledge for equational theorem proving;intelligent structuring and reducing of association rules with formal concept analysis;comparing two models for software debugging;inferring implicit state knowledge and plans with sensing actions;multi-agent systems as intelligent virtual environments;a reason-able ontology editor for the semantic web;experiments with an agent-oriented reasoning system;a model-based diagnosis kernel and its application and semantic networks in a knowledge management portal.
this paper extends previous work on the representation and analysis of Java programs for diagnosis in a new direction by providing a description and analysis of the issues arising from handling object references in de...
详细信息
the proceedings contain 24 papers. the special focus in this conference is on Distributed Components, UML, Testing and Formal Methods. the topics include: Metamodelling and conformance checking with PVS;proving deadlo...
ISBN:
(纸本)3540418636
the proceedings contain 24 papers. the special focus in this conference is on Distributed Components, UML, Testing and Formal Methods. the topics include: Metamodelling and conformance checking with PVS;proving deadlock freedom in component-based programming;a real-time execution semantics for UML activity diagrams;strengthening UML collaboration diagrams by state transformations;on use cases and their relationships in the unified modelling-language;on the importance of inter-scenario relationships in hierarchical state machine design;library-based design and consistency checking of system-level industrial test cases;demonstration of an automated integrated testing environment for CTI systems;semantics of architectural specifications in CASL;a logic for the java modeling language JML;a formal object-oriented analysis for software reliability and specification and analysis of the AER/NCA active network protocol suite in real-time Maude.
the proceedings contain 27 papers. the special focus in this conference is on Foundations of Software Science and Computation Structures. the topics include: Secrecy types for asymmetric communication;type isomorphism...
ISBN:
(纸本)3540418644
the proceedings contain 27 papers. the special focus in this conference is on Foundations of Software Science and Computation Structures. the topics include: Secrecy types for asymmetric communication;type isomorphisms and proof reuse in dependent type theory;on the duality between observability and reachability;the finite graph problem for two-way alternating automata;high-level Petri nets as type theories in the join calculus;temporary data in shared dataspace coordination languages;the complexity of model checking mobile ambients;synchronized tree languages revisited and new applications;computational completeness of programming languages based on graph transformation;class analysis of object-oriented programs through abstract interpretation;foundations for a graph-based approach to the specification of access control policies;categories of processes enriched in final coalgebras;on regular message sequence chart languages and relationships to mazurkiewicz trace theory;decidability of weak bisimilarity for a subset of basic parallel processes;an axiomatic semantics for the synchronous language gentzen and MARRELLA and the verification of an embedded system.
the proceedings contain 86 papers. the special focus in this conference is on Algebraic, Circuit Complexity, Algorithm Analysis, Approximation and Optimization. the topics include: Languages, rewriting systems, and ve...
ISBN:
(纸本)3540422870
the proceedings contain 86 papers. the special focus in this conference is on Algebraic, Circuit Complexity, Algorithm Analysis, Approximation and Optimization. the topics include: Languages, rewriting systems, and verification of infinite-state systems;integrating semantics for object-oriented system models;theoretical aspects of evolutionary algorithms;improvements of the Alder-Strassen bound;on generating all minimal integer solutions for a monotone system of linear inequalities;a framework for index bulk loading and dynamization;a characterization of temporal locality and its portability across memory hierarchies;the complexity of constructing evolutionary trees using experiments;combinatorics and algorithms on low-discrepancy roundings of a real sequence;all-pairs shortest paths computation in the BSP model;approximating the minimum spanning tree weight in sublinear time;approximation hardness of tsp with bounded metrics;approximation algorithms for partial covering problems;exponential speed-up for planar graph problems;subexponential parameterized algorithms collapse the w-hierarchy;improved lower bounds on the randomized complexity of graph properties;recognizing more unsatisfiable random 3-SAT instances efficiently;on interactive proofs with a laconic prover;quantum complexities of ordered searching, sorting, and element distinctness;axiomatizations for probabilistic bisimulation;distributed controller synthesis for local specifications;towards quantitative verification of probabilistic transition systems;efficient generation of plane triangulations without repetitions;the longest common subsequence problem for sequences with nested arc annotations;permutation editing and matching via embeddings;decidable properties of graphs of all-optical networks and rational transformations of formal power series.
Preventing abusive resource consumption is indispensable for all kinds of systems that execute untrusted mobile coee, such as mobile object sytems, extensible web servers, and web browsers. To implement the required d...
详细信息
ISBN:
(纸本)1581133359
Preventing abusive resource consumption is indispensable for all kinds of systems that execute untrusted mobile coee, such as mobile object sytems, extensible web servers, and web browsers. To implement the required defense mechanisms, some support for resource control must be available: accounting and limiting the usage of physical resources like CPU and memory, and of logical resources like threads. Java is the predominant implementation language for the kind of systems envisaged here, even though resource control is a missing feature on standard Java platforms. this paper describes the model and implementation mechanisms underlying the new resource-aware version of the J-SEAL2 mobile object kernel. Our fundamental objective is to achieve complete portability, and our approach is therefore based on Java bytecode transformations. Whereas resource control may be targeted towards the provision of quality of service or of usage-based billing, the focus of this paper is on security, and more specificlly on prevention of denial-of-service attacks orginating from hostile or poorly implemented mobile code.
暂无评论