Before performing a modification task, a developer usually has to investigate the source code of a system to understand how to carry out the task. Discovering the code relevant to a change task is costly because it is...
详细信息
ISBN:
(纸本)1595930140
Before performing a modification task, a developer usually has to investigate the source code of a system to understand how to carry out the task. Discovering the code relevant to a change task is costly because it is an inherently human activity whose success depends on a large number of unpredictable factors, such as intuition and luck. Although studies have shown that effective developers tend to explore a program by following structural dependencies, no methodology is available to guide their navigation through the typically hundreds of dependency paths found in a non-trivial program. In this paper, we propose a technique to automatically propose and rank program elements that are potentially interesting to a developer investigating source code. Our technique is based on an analysis of the topology of structural dependencies in a program. It takes as input a set of program elements of interest to a developer and produces a fuzzy set describing other elements of potential interest. Empirical evaluation of our technique indicates that it can help developers quickly select program elements worthy of investigation while avoiding less interesting ones. Copyright 2005 ACM.
Code generators are increasingly used in an industrial context to translate graphical models into executable code. Since the code is often deployed in safety-related environments, the quality of the code generators is...
详细信息
An architecture and implementation of a high performance Gaussian random number generator (GRNG) is described. The GRNG uses the Ziggurat algorithm which divides the area under the probability density function into th...
详细信息
In this paper, the queueing performance of a type-II hybrid ARQ (automatic Repeat reQuest) scheme in a TDMA system over a Markovian channel is analyzed by assuming infinite queue size. The system of interest can be de...
详细信息
If current trends in cellular phone technology, personal digital assistants, and wireless networking are indicative of the future, we can expect our environments to contain an abundance of networked computational devi...
详细信息
ISBN:
(纸本)0769522769
If current trends in cellular phone technology, personal digital assistants, and wireless networking are indicative of the future, we can expect our environments to contain an abundance of networked computational devices and resources. We envision these devices acting in an orchestrated manner to meet users' needs, pushing the level of interaction away from particular devices and towards interactions with the environment as a whole. Computation will be based not only on input explicitly provided by the user, but also on contextual information passively collected by networked sensing devices. Configuring the desired responses to different situations will need to be easy for users. However, we anticipate that the triggering situations for many desired automation policies will be complex, unforeseen functions of low-level contextual information. This is problematic since users, though easily able to perceive triggering situations, will not be able to define them as functions of the devices' available contextual information, even when such a function (or a close approximation) does exist. In this paper, we present an alternative approach for specifying the automation rules of a pervasive computing environment using machine learning techniques. Using this approach, users generate training data for an automation policy through demonstration, and, after training is completed, a learned function is employed for future automation. This approach enables users to automate the environment based on changes in the environment that are complex, unforeseen combinations of contextual information. We developed our learning service within Gaia, our pervasive computing system, and deployed it within our prototype pervasive computing environment. Using the system, we were able to have users demonstrate how sound and lighting controls should adjust to different applications used within the environment, the users present, and the locations of those users and then automate those demonstrat
This paper proposes an intelligent aircraft automatic landing controller that uses fuzzy-neural controller with particle swarm optimization to improve the performance of conventional automatic landing system. Control ...
详细信息
The key of automatic change detection between multi-temporal images is these images' matching accuracy should reach sub-pixel level. Nevertheless, due to the influence of various factors of geometrical distortion,...
详细信息
The key of automatic change detection between multi-temporal images is these images' matching accuracy should reach sub-pixel level. Nevertheless, due to the influence of various factors of geometrical distortion, remote sensing images after precise geometrical correction always still have pixel-level geometrical distortion. Therefore, ideal result of automatic change detection can't be achieved by these images directly. This paper proposes a new automatic change detection approach based on least square image matching. Using least square method to correct images' distortion, we get the Maximum correlation coefficient by iteration and obtain the optimal match point. By correlation coefficient, whether change or not can also be estimated. This approach resolves the multi-temporal image matching accuracy's influence to the change detection result, by which the accuracy of automatic change detection is guaranteed. The experiment results are provided, which indicate the effectiveness and the reliability of the approach.
This paper presents an autonomic system in which two managers with different responsibilities collaborate to achieve an overall objective. The first, a node group manager, uses modeling and optimization algorithms to ...
详细信息
ISBN:
(纸本)0769522769
This paper presents an autonomic system in which two managers with different responsibilities collaborate to achieve an overall objective. The first, a node group manager, uses modeling and optimization algorithms to allocate server processes and individual requests among a set of server machines grouped into node groups, and also estimates its ability to fulfill its service-level objectives as a function of the number of server machines available in each node group. The second, a provisioning manager, consumes these estimates from one or more node group managers, and uses them to allocate machines to node groups over a longer timescale. We describe the operation of both managers and the information that flows between them, and present the results of a simple experiment demonstrating the effectiveness of our technique. Furthermore, we relate our architecture to a general autonomic computing architecture based on self-managing resources and patterns of inter-resource collaboration. We also discuss some of the issues involved in incorporating our implementation into existing products in the short term, and describe a number of further directions for this research.
Currently many organizations are adopting MDD to describe their software systems. Model based techniques can bring many benefits as an embedded software development process but they also expose the development team to...
详细信息
Currently many organizations are adopting MDD to describe their software systems. Model based techniques can bring many benefits as an embedded software development process but they also expose the development team to different and new risks. In this document we will describe three case studies of successful utilization of Model Driven Development methodologies and automatic code generation techniques within various Siemens Business Units while summarizing the common best practices to succeed with these new software development technologies.
This work aims to investigate the automatic generation of Verilog code, representing digital circuits through Grammatical Evolution (GE). Preliminary tests using a simple full adder generation problem have been perfor...
详细信息
暂无评论