By using EAI and Script node, java and VRML are combined in this paper to develop a 3D interactive virtual scene. This scene overcomes the shortage of VRML in the aspect of interactivity and features the interaction b...
详细信息
One of the changes from DO-178B to DO-178C is supposedly to make it allowable to implement flight control systems in the java programming language [3]. This makes it important to learn of the reliability deficiencies ...
详细信息
One of the changes from DO-178B to DO-178C is supposedly to make it allowable to implement flight control systems in the java programming language [3]. This makes it important to learn of the reliability deficiencies of java, and possibly how to avoid them This paper is focused on one particular class of programming errors in java;privacy leaks from encapsulated data structures This mistake seems to be quite common. Even the "getter" generator in the popular java IDE Eclipse [2] makes the mistake for the programmers. This motivated me to put together a tool for identifying privacy leaking "getters" in java classes. The tool uses a java decompiler to generate a normalised form of the source code for the java classes, and then uses simple pattern matching to identify uses of the simple type "getter" pattern for composite, private attributes. One of the five goals in the creation of the java programming language is that it should be "robust and secure". The extent of privacy leaks in real-life java classes indicates that there is still quite a way to that goal.
Background: Expressed sequences (e.g. ESTs) are a strong source of evidence to improve gene structures and predict reliable alternative splicing events. When a genome assembly is available, ESTs are suitable to genera...
详细信息
Background: Expressed sequences (e.g. ESTs) are a strong source of evidence to improve gene structures and predict reliable alternative splicing events. When a genome assembly is available, ESTs are suitable to generate gene-oriented clusters through the well-established EasyCluster software. Nowadays, EST-like sequences can be massively produced using Next Generation Sequencing (NGS) technologies. In order to handle genome-scale transcriptome data, we present here EasyCluster2, a reimplementation of EasyCluster able to speed up the creation of gene-oriented clusters and facilitate downstream analyses as the assembly of full-length transcripts and the detection of splicing isoforms. Results: EasyCluster2 has been developed to facilitate the genome-based clustering of EST-like sequences generated through the NGS 454 technology. Reads mapped onto the reference genome can be uploaded using the standard GFF3 file format. Alignment parsing is initially performed to produce a first collection of pseudo-clusters by grouping reads according to the overlap of their genomic coordinates on the same strand. EasyCluster2 then refines read grouping by including in each cluster only reads sharing at least one splice site and optionally performs a Smith-Waterman alignment in the region surrounding splice sites in order to correct for potential alignment errors. In addition, EasyCluster2 can include unspliced reads, which generally account for >50% of 454 datasets, and collapses overlapping clusters. Finally, EasyCluster2 can assemble full-length transcripts using a Directed-Acyclic-Graph-based strategy, simplifying the identification of alternative splicing isoforms, thanks also to the implementation of the widespread AStalavista methodology. Accuracy and performances have been tested on real as well as simulated datasets. Conclusions: EasyCluster2 represents a unique tool to cluster and assemble transcriptome reads produced with 454 technology, as well as ESTs and full-length tran
The article deals with the problem of complex technical systems diagnostics. A fuzzy equations mathematics is suggested for the problem solution. Fuzzy equations set, used to formalize the problem, may be inconsistent...
详细信息
The article deals with the problem of complex technical systems diagnostics. A fuzzy equations mathematics is suggested for the problem solution. Fuzzy equations set, used to formalize the problem, may be inconsistent in certain cases. An approximate solution method is suggested to overcome the difficulty. Software in java programming language is presented.
GPUs and multicore CPUs are becoming common in today's embedded world of tablets and smartphones. With CPUs and GPUs getting more complex, maximizing hardware utilization and minimizing energy consumption are beco...
详细信息
ISBN:
(纸本)9781479931026
GPUs and multicore CPUs are becoming common in today's embedded world of tablets and smartphones. With CPUs and GPUs getting more complex, maximizing hardware utilization and minimizing energy consumption are becoming problematic. The challenges faced in GPGPU computing on embedded platforms are different from their desktop counterparts due to the memory and computational limitations. This study evaluates the advantages of offloading java applications to an embedded GPU. By employing two approaches namely, java Native Interface (JNI-OpenCL) and java bindings for OpenCL (JOCL) we allowed programmers to program an embedded GPU from java. Experiments were conducted on a Freescale ***6Q SabreLite board which contains a quad-core ARM Cortex A9 CPU and a Vivante GC 2000 GPU that supports the OpenCL 1.1 Embedded Profile. The results show up to an eight times increase in performance efficiency by consuming only one-third the energy compared to the CPU-only version of the java program. This paper demonstrates the performance and energy benefits achieved by offloading java programs onto an embedded GPU. To the best of our knowledge, this is the first work involving java acceleration on embedded GPUs.
The increased use of and reliance on computing devices elicits a desire to ensure the integrity of the software running on these devices. This desire is indeed well founded-malicious software has become a major proble...
详细信息
The increased use of and reliance on computing devices elicits a desire to ensure the integrity of the software running on these devices. This desire is indeed well founded-malicious software has become a major problem for today's computer systems. Consequently, we have developed the java Measurement Framework (JMF) for inspecting a running java program and ensuring the program's integrity. JMF provides a mechanism for writing integrity policies about java programs. Our implementation provides the capability to extract a measurement of the code and data of the running program and then evaluate this measurement against a policy. The result allows concerned parties to achieve a greater confidence in the integrity of the software running on their systems. We show how our system can be used on several real-world java programs and with adequate performance overhead.
The field of soft sensor data fusion deals with human sources of information, as opposed to more traditional approaches that deal primarily with information from hard (physics-based) sensors. To facilitate the collect...
详细信息
The field of soft sensor data fusion deals with human sources of information, as opposed to more traditional approaches that deal primarily with information from hard (physics-based) sensors. To facilitate the collection of data from soft sensors, a graphical user interface has been designed. Data that the user enters into the graphical user interface are represented numerically using fuzzy logic. Fuzzy logic is also used in order to fuse data from multiple users or from the same user at different points in time. The fusion system has been tested both in simulation and in the field using a hypothetical search and rescue problem.
Non-interference guarantees the absence of illicit information flow throughout program execution. It can be enforced by appropriate information flow type systems. Much of the previous work on type systems for non-inte...
详细信息
Non-interference guarantees the absence of illicit information flow throughout program execution. It can be enforced by appropriate information flow type systems. Much of the previous work on type systems for non-interference has focused on calculi or high-level programminglanguages, and existing type systems for low-level languages typically omit objects, exceptions and method calls. We define an information flow type system for a sequential JVM-like language that includes all these programming features, and we prove, in the Coq proof assistant, that it guarantees non-interference. An additional benefit of the formalisation is that we have extracted from our proof a certified lightweight bytecode verifier for information flow. Our work provides, to the best of our knowledge, the first sound and certified information flow type system for such an expressive fragment of the JVM.
The reflection technique is used by programs that need to examine or modify the runtime behavior of applications in the java Virtual Machine. This is a powerful instrument, but its use should bring some concerns relat...
详细信息
ISBN:
(纸本)9783642325472
The reflection technique is used by programs that need to examine or modify the runtime behavior of applications in the java Virtual Machine. This is a powerful instrument, but its use should bring some concerns related to performance overhead, security problems, exposing the private fields-which are not accessible through non-reflective code, losing benefits of compile-time type checking, reflective code being clumsy and verbose. This paper concentrates upon the performance overhead. Tests were made in order to analyze objects creation and method calls using primitive and reference arguments, both by direct and reflective invocation.
暂无评论