Over the Years, java (TM) has become a popular language for standalone as well as web based applications. Portability and security are the major reasons for java (TM)'s success and increased level of adoption in v...
详细信息
ISBN:
(纸本)9780769537924
Over the Years, java (TM) has become a popular language for standalone as well as web based applications. Portability and security are the major reasons for java (TM)'s success and increased level of adoption in various application domains. When evaluating security, Forensics is another area with continuous increasing interest. With research progress of the previous Years efficient tools for reconstructing data from improperly deleted documents are available and opened the door for a whole new, set Of concerns to look at to insure security. In this paper we are describing our work in progress that is related to establishing a java (TM) framework that evaluates the traces left by java (TM) applications in order to then be able to design forensics resistant java (TM) applications.
In this paper the necessity and possibility of the system-integration on flood-control decision-support system is demonstrated, and its ideology, rules and relevant key solutions is discussed. Based on the research fo...
详细信息
ISBN:
(纸本)9780769535708
In this paper the necessity and possibility of the system-integration on flood-control decision-support system is demonstrated, and its ideology, rules and relevant key solutions is discussed. Based on the research for Biliuhe Reservoir an integrated system for flood-control decision-support is designed under the environment of Browser/Server mode and network database. Under unified WebGIS platform, this system, which is distributed, transplantable and extendable, is programmed with java. It is expected that system-integration will be a key subject.
Manual reviews and inspections of software artefacts are time consuming and thus, automated analysis tools have been developed to support the quality assurance of software artefacts. Usually, software analysis tools a...
详细信息
ISBN:
(纸本)9781424437757
Manual reviews and inspections of software artefacts are time consuming and thus, automated analysis tools have been developed to support the quality assurance of software artefacts. Usually, software analysis tools are implemented for analysing only one specific language as target and for performing only one class of analyses. Furthermore, most software analysis tools support only common programminglanguages, but not those domain-specific languages that are used in a test process. As a solution, a framework for software analysis is presented that is based oil a flexible, yet high-level facade layer that mediates between analysis rules and the underlying tat-get software artefact: the analysis rules are specified using high-level XQuery, expressions. Hence, further rules can be quickly added and new types of software artefacts can be analysed without needing to adapt the existing analysis rules. The applicability of this approach is demonstrated by examples from using this framework to calculate metrics and detect bad smells in java source code, in UML models, and in test specifications written using the Testing and Test Control Notation (TTCN-3).
We present an agent-based approach to Dantzig-Wolfe column generation (a decomposition approach), which is applied to an integrated production, inventory, and distribution routing optimization problem. The decompositi...
详细信息
ISBN:
(纸本)9783642016646
We present an agent-based approach to Dantzig-Wolfe column generation (a decomposition approach), which is applied to an integrated production, inventory, and distribution routing optimization problem. The decomposition model has been implemented in the java programming language, using the java Agent DEvelopment Framework (JADE) and the ILOG CPLEX mixed integer linear optimization problem solver. The model has been validated oil a set of realistic scenarios and based on the results, we estimate the potential performance improvement which can be obtained by using a completely distributed implementation. We analyze the overhead, in terms of communication costs, that is imposed by an agent-based approach.
Prevailing approaches to analyze embedded software performance either require the deployment of the software on the embedded target, which can be tedious and may be impossible in an early development phase, or rely on...
详细信息
ISBN:
(纸本)9780769538082
Prevailing approaches to analyze embedded software performance either require the deployment of the software on the embedded target, which can be tedious and may be impossible in an early development phase, or rely on simulation, which can be extremely slow. We promote cross-profiling as an alternative approach, which is particularly well suited for embedded java processors. The embedded software is profiled in any standard java Virtual Machine in a host environment, but the generated cross-profile estimates the execution time on the target. We implemented our approach in the customizable cross-profiler CProf, which generates calling-context cross-profiles. Each calling-context stores dynamic metrics, such as the estimated CPU cycle consumption on the target. We visualize the generated calling-context cross-profiles as ring charts, where callee methods are represented in segments surrounding the caller's segment. As the size of each segment corresponds to the relative CPU consumption of the corresponding calling-context, the visualization eases the location of performance bottlenecks in embedded java software, revealing hot methods, as well as their callers and callees, at one glance.
In this paper we investigate the feasibility of a demonstrably correct compiler for java bytecode. We first examine the suitability of adapting the existing high assurance compiler DECCo for the Pascal-like language P...
详细信息
ISBN:
(纸本)9783642041662
In this paper we investigate the feasibility of a demonstrably correct compiler for java bytecode. We first examine the suitability of adapting the existing high assurance compiler DECCo for the Pascal-like language PASP, based on a Z formalisation of the compiler manually transcribed to Prolog. During the investigation we have uncovered several problematic issues and argue that these can be avoided by formally deriving the code of the compiler from the formal specification, rather than manually transcribing it. We have conducted a case study, developing a compiler for a subset of java bytecode to an idealised RISC processor using the B-method. We show that refinement is a natural way to model compilation and that the B-method can in principle be used to develop a demonstrably correct compiler. In particular, the tool support for B turned out to be extremely valuable: animation, automated refinement checking, and proof each uncovered a series of mistakes.
This paper describes basic features of a client library called Persistence API that provides access point to knowledge repositories based on RDF standard. Persistence API (P-API) has been implemented within FP6 IST pr...
详细信息
ISBN:
(纸本)9781424438013
This paper describes basic features of a client library called Persistence API that provides access point to knowledge repositories based on RDF standard. Persistence API (P-API) has been implemented within FP6 IST project called Knowledge Practices Laboratory in order to separate business logic from data representation in RDF. This approach enables simple integration and communication between end-user applications and knowledge repository. The development of P-API is still ongoing, with new features such as support for Search services implemented in recent releases.
Parallelizing existing sequential programs to run efficiently on multicores is hard. The java 5 package *** (j. u. c.) supports writing concurrent programs. To use this package, programmers still need to refactor exis...
详细信息
ISBN:
(纸本)9781424434947
Parallelizing existing sequential programs to run efficiently on multicores is hard. The java 5 package *** (j. u. c.) supports writing concurrent programs. To use this package, programmers still need to refactor existing code. This is tedious, error-prone, and omission-prone. This demo presents our tool, CONCURRENCER, which enables programmers to refactor sequential code into parallel code that uses j. u. c. concurrent utilities. CONCURRENCER does not require any program annotations, although the transformations span several, non-adjacent, program statements and use custom program analysis. A find-and-replace tool can not perform such transformations. Empirical evaluation shows that CONCURRENCER refactors code effectively: CONCURRENCER correctly identifies and applies transformations that some open-source developers overlooked, and the converted code exhibits good speedup.
This report gives an overview of the 10th Workshop on Formal Techniques for java-like Programs at ECOOP 2008. It explains the motivation for the workshop, and summarizes the presentations and discussions.
ISBN:
(纸本)9783642020469
This report gives an overview of the 10th Workshop on Formal Techniques for java-like Programs at ECOOP 2008. It explains the motivation for the workshop, and summarizes the presentations and discussions.
J% (J-mod), is a javalanguage extension that supports integration with Domain-Specific languages. The integration is realized through an architecture that permits external modules to support DSLs. The DSL statements ...
详细信息
ISBN:
(纸本)9780769537887
J% (J-mod), is a javalanguage extension that supports integration with Domain-Specific languages. The integration is realized through an architecture that permits external modules to support DSLs. The DSL statements can be syntactically checked at compile-time. An additional facility allows the static type checking of java variables that appear within DSL code. To support this process each DSL module comes as a library that is used both at compile time and during program execution.
暂无评论