software developers spend a lot of their time finding and composing pre-existing functions from various libraries. Almost all developers today use general-purpose search engines for this search. Specialized search eng...
详细信息
ISBN:
(纸本)9798400711039
software developers spend a lot of their time finding and composing pre-existing functions from various libraries. Almost all developers today use general-purpose search engines for this search. Specialized search engines such as Hoogle for Haskell additionally use type information to improve this search, and have been successful for some typed functional programming languages. the options currently available for type-directed search for mainstream object-oriented languages is limited. Existing approaches for these languages do not have first-class support for subtyping or parametric polymorphism. the splitting and composition of a desired functionality into and from a number of pre-existing functions is also a task that needs to be done manually. In this paper we present a proof-search-based approach to type-directed search with first-class support for subtyping, parametric polymorphism, splitting, and composition. the approach is language agnostic, and can be specialized to simultaneously support multiple typed object-oriented languages. Given that most mainstream languages fall under this category, this approach would extend the benefits of type-directed search to the majority of programmers. As a proof of concept, we provide a running implementation of the core language-agnostic approach and extend it to support the Java programming language. Further extensions would allow the tool to simultaneously support multiple programming languages using the same query syntax.
the proceedings contain 6 papers. the topics discussed include: PAID: perturbed image attacks analysis and intrusion detection mechanism for autonomous driving systems;a practical intrusion detection system trained on...
ISBN:
(纸本)9798400700903
the proceedings contain 6 papers. the topics discussed include: PAID: perturbed image attacks analysis and intrusion detection mechanism for autonomous driving systems;a practical intrusion detection system trained on ambiguously labeled data for enhancing IIoT security;anomaly detection framework for securing next generation networks of platoons of autonomous vehicles in a vehicle-to-everything system;blind concealment from reconstruction-based attack detectors for industrial control systems via backdoor attacks;preventing reverse engineering of control programs in industrial control systems;and ICSML: industrial control systems ML framework for native inference using IEC 61131-3 code.
In order to effectively solve the ecological problem of global desertification, and aimed at the inadequate existing desertification combating technologies, Solidworks modeling software was used to design a people-ori...
详细信息
Due to a lack of expertise in the radar field and intelligent technology, testers typically rely on their personal experience and knowledge to generate reliable test cases. this approach is highly subjective and lacks...
详细信息
the Alternating Current Optimal Power Flow (AC OPF) is crucial for power system analysis, yet existing algorithms face challenges in meeting the diverse requirements of practical applications. this paper presents a Py...
详细信息
the basis of intelligent control of contactor is mostly realized by DC control and high-frequency PWM control. In order to further optimize the control algorithm for problems such as bounce and contact arc, parameter ...
详细信息
Electric Vehicle (EV) adoption is surging globally, with sales accelerating as battery costs fall and consumer awareness increases. this has led to an increase in the demand for EV charging, which brought a significan...
详细信息
An uncontrollable increase in abnormal cells in brain tissue produces the brain tumors. there are two types of tumors. they are benign and malignant. Adjacent cells are not affected by benign type of tumor cells, wher...
详细信息
this case study investigates the use of 360 Image Viewer software to improve product immersion in interior design presentations. the goal is to determine how the utilization of 360-degree photography technology may en...
详细信息
Withthe rapid development of computer technology and the Internet of things (IoT), a large amount of data containing both healthy and faulty states can be collected from existing devices in factories. However, the us...
详细信息
暂无评论