This paper looks at the development of a java application programming interface (API) for performing unbounded Polynomial Arithmetic. It shows how java can be used to perform large integer mathematical operations by u...
详细信息
ISBN:
(纸本)9780954414511
This paper looks at the development of a java application programming interface (API) for performing unbounded Polynomial Arithmetic. It shows how java can be used to perform large integer mathematical operations by using the BigInteger class. By demonstrating how the API might be used in a real application the paper shows how easy the API is to use with very little knowledge of polynomial arithmetic.
In the state-of-practice, developing web applications requires dealing with multiple programming languages or codebases. To address this issue, researchers have proposed multi-tier languages such as Hop or Links that ...
详细信息
The tale of Goldilocks and the Three Bears has been used as a scenario for the introduction of fundamental object-oriented programming concepts and their implementation in java. The rationale for the approach stems fr...
详细信息
ISBN:
(纸本)9780954414511
The tale of Goldilocks and the Three Bears has been used as a scenario for the introduction of fundamental object-oriented programming concepts and their implementation in java. The rationale for the approach stems from the observation of the innate ability of young children to build abstract models of the world around them. This very natural approach is rarely exploited -- the scenario given develops a virtual world in which students participate physically as well as intellectually.
In this paper, we propose an extension of the Jaffar-Lassez Constraint Logic programming scheme that operates with unions of constraint theories with different signatures and decides the satisfiability of mixed constr...
详细信息
Digital imaging in java has been supported since its first release, through the *** and *** class packages. Now there are three distinct java imaging APIs namely, the basic AWT imaging API, java2D API andjava Advanc...
ISBN:
(纸本)9780954414511
Digital imaging in java has been supported since its first release, through the *** and *** class packages. Now there are three distinct java imaging APIs namely, the basic AWT imaging API, java2D API andjava Advance Imaging (JAI) API. This paper firstly summarizes and compares important features of AWT, java2D and JAI APIs. Then the java2D and JAI technologies are compared based on practical results obtained by evaluation of convolution.
Over the last decade, the widespread demand and use of the internet has changed the direction of the telecommunications industry as it was recognized that the internet could be used as an inexpensive way to handle not...
ISBN:
(纸本)9780954414511
Over the last decade, the widespread demand and use of the internet has changed the direction of the telecommunications industry as it was recognized that the internet could be used as an inexpensive way to handle not only data but also voice communications. This paper describes the creation of a Unified Messaging System (UMS) that unites both voice and data messaging forms and asks if java may be the programming language of choice for developing UMS applications.
We report on a continuing study into teaching programming to pre-teens school-children, with some as young as seven years old. As part of the study we aim to test childrens' algorithmic understanding through their...
ISBN:
(纸本)9780954414511
We report on a continuing study into teaching programming to pre-teens school-children, with some as young as seven years old. As part of the study we aim to test childrens' algorithmic understanding through their ability to solve puzzles and play games; and to turn this understanding into working code. We review a project in which children have programmed (in java) AI players for the game of Noughts and Crosses. This code is then incorporated into a 'programmable' java Applet for use as an educational tool in primary (junior) schools.
A java implementation of a key collision attack on DES suggested by Eli Biham, [1], is discussed. Storage space minimization and fast searching techniques to speed up the attack are described. We also demonstrate the ...
详细信息
ISBN:
(纸本)9780954414511
A java implementation of a key collision attack on DES suggested by Eli Biham, [1], is discussed. Storage space minimization and fast searching techniques to speed up the attack are described. We also demonstrate the suitability of java for large data cryptographic attacks and illustrate the extensive cryptographic features of the language.
Compared to imperative programming languages like Pascal or Basic, or functional programming languages like ML or Haskell learning java is hampered by the fact that to get even the simplest running program the learner...
详细信息
ISBN:
(纸本)9780954414511
Compared to imperative programming languages like Pascal or Basic, or functional programming languages like ML or Haskell learning java is hampered by the fact that to get even the simplest running program the learner has to define a public class and a method with a certain signature. We present both a stand-alone and a web-based interpreter which execute java fragments and relieve the learner from programming all the extra code. The implementation of these interpreters extremely differs from other java interpreters and exploits the java compiler as much as possible to preserve the original semantics of java and allow access to all features and APIs of java. By virtue of these interpreters the learner can explore primitive values, variables, expressions, assignments, and control-flow statements before even knowing about classes and methods. The web-based interpreter has been integrated into an online tutorial for learning javaprogramming from basic principles.
This work presents a general meta CLP architecture which can be built by adding CLP solvers as meta levels reasoning on the constraints of the underlying object system. We propose two specializations on finite domains...
详细信息
暂无评论