This paper introduces a representation of melody and harmony for a live coding javaScript library, Konduktiva, capable of generating and playing music in real time. That representation further targets flexibility and ...
详细信息
ISBN:
(纸本)9798400709685
This paper introduces a representation of melody and harmony for a live coding javaScript library, Konduktiva, capable of generating and playing music in real time. That representation further targets flexibility and integration with Konduktiva's agents. By improving Konduktiva to provide an API that is compatible with basic music theory and designed for ease of use in live coding, we have produced a platform for music production and future research on live coding and algorithmic composition.
Companies adopt Bring Your Own Device (BYOD) policies extensively, for both convenience and cost management. The compelling way of putting private and business related applications (apps) on the same device leads to t...
详细信息
ISBN:
(纸本)9781728100562
Companies adopt Bring Your Own Device (BYOD) policies extensively, for both convenience and cost management. The compelling way of putting private and business related applications (apps) on the same device leads to the widespread usage of employee owned devices to access sensitive company data and services. Such practices create a security risk as a legitimate app may send business-sensitive data to third party servers through detrimental app functions or packaged libraries. In this paper, we propose BORDERPATROL, a system for extracting contextual data that businesses can leverage to enforce access control in BYOD-enabled corporate networks through fine-grained policies. BORDERPATROL extracts contextual information, which is the stack trace of the app function that generated the network traffic, on provisioned user devices and transfers this data in IP headers to enforce desired policies at network routers. BORDERPATROL provides a way to selectively prevent undesired functionalities, such as analytics activities or advertisements, and help enforce information dissemination policies of the company while leaving other functions of the app intact. Using 2,000 apps, we demonstrate that BORDERPATROL is effective in preventing packets which originate from previously identified analytics and advertisement libraries from leaving the network premises. In addition, we show BORDERPATROL's capability in selectively preventing undesirable app functions using case studies.
This paper is focused on the performance analysis;sis, comparison and optimization of the most important distributed object models for java: RMI (Remote Method Invocation) and RMI-IIOP (Remote Method invocation over I...
详细信息
ISBN:
(纸本)0769505686
This paper is focused on the performance analysis;sis, comparison and optimization of the most important distributed object models for java: RMI (Remote Method Invocation) and RMI-IIOP (Remote Method invocation over Internet Intel-ORB Protocol). The paper presents the following contributions to the research on distributed object performance. First, a detailed performance analysis of both models is provided with the in-depth comparison. These results help to understand how the models perform, Second, an overhead analysis and the bottleneck identification is presented with the explanation why there are differences in performance. Third, optimizations and the results for performance improved post-beta RMI-IIOP versions are presented. These show considerably beta performance in all areas compared to the original beta release, with RMI-IIOP having equivalent or better performance to RMI in almost all cases.
While the availability of platform-independent code on the Internet is increasing, third-party code rarely exhibits all of the features desired by end users. Unfortunately, developers cannot foresee and provide for al...
详细信息
ISBN:
(纸本)1880446944
While the availability of platform-independent code on the Internet is increasing, third-party code rarely exhibits all of the features desired by end users. Unfortunately, developers cannot foresee and provide for all possible extensions. In this paper, we describe load-time transformation, a stage in the program development lifecycle in which classes are modified at load time according to user-supplied directives. This allows the users to select transformations that add new features, customize the implementation of existing features, and apply the changes to all classes in the environment. The java Object Instrumentation Environment (JOIE) is a toolkit for constructing transformations of java classes. An enhanced class loader calls user-supplied transformers that specify rules for transforming target classes. We describe some applications of load-time transformation, including extending the java environment, integrating classes with specialized environments, and adding functionality directly to classes.
This paper describes a project suitable for a software engineering or object-oriented design course. The project consists of asking students to design an application programming interface (API) for a particular range ...
详细信息
ISBN:
(纸本)1581133294
This paper describes a project suitable for a software engineering or object-oriented design course. The project consists of asking students to design an application programming interface (API) for a particular range of applications. An API-design project has several features not always found in application-design projects: It forces students to focus carefully on the distinction between the programming and the user interfaces;it provides a good justification for studying existing APIs as model code;it provides a natural way to divide tasks between different groups of designers/programmers;and, the final product can be used as the basis for programming projects in other courses. In this case the particular project we describe is the design of an API for implementing Historical Cipher algorithms.
This paper presents an implementation of a novel microprocessor architecture for executing byte compiled java programs directly in hardware. The processor features two programming models, a java model and a RISC model...
详细信息
ISBN:
(纸本)0769512402
This paper presents an implementation of a novel microprocessor architecture for executing byte compiled java programs directly in hardware. The processor features two programming models, a java model and a RISC model. The entities share a common data path and may operate independently although not in parallel. This combination facilitates access to hardware-near instructions and provides,powerful interrupt and instruction trapping capabilities. Our processor targets medium to small embedded applications where performance in the sense of through put is not the primary design objective, but rather the ability to execute java code on a processor core with small die size and acceptable power consumption characteristics.
A major challenge of maintaining object-oriented programs is to find a means of evolving software that already has a distributed client base. This should be easier for java developers than for most, because dynamic li...
详细信息
ISBN:
(数字)9783540454403
ISBN:
(纸本)3540438475
A major challenge of maintaining object-oriented programs is to find a means of evolving software that already has a distributed client base. This should be easier for java developers than for most, because dynamic linking has been designed into the runtime system. It turns out however that things are not so straightforward as they seem, since a given modification can leave a remote client in one of a number of states, not all of which are tolerable, let alone desirable. In this paper we attempt to delineate these states, and to consider ways of avoiding the worst of them. We describe our utility, which offers library developers a transparent version control system, to protect their remote clients.
We present Multijava, a backward-compatible extension to java supporting open classes and symmetric multiple dispatch. Open classes allow one to add to the set of methods that an existing class supports without creati...
详细信息
We present Multijava, a backward-compatible extension to java supporting open classes and symmetric multiple dispatch. Open classes allow one to add to the set of methods that an existing class supports without creating distinct subclasses or editing existing code. Unlike the "Visitor" design pattern, open classes do not require advance planning, and open classes preserve the ability to add new subclasses modularly and safely. Multiple dispatch offers several well-known advantages over the single dispatching of conventional object-oriented languages, including a simple solution to some kinds of "binary method" problems. Multijava's multiple dispatch retains java's existing class-based encapsulation properties. We adapt previous theoretical work to allow compilation units to be statically typechecked modularly and safely, ruling out any link-time or run-time type errors. We also present a novel compilation scheme that operates modularly and incurs performance overhead only where open classes or multiple dispatching are actually used.
A wide range of techniques for supporting software maintenance tasks rely on representations of program control flow. The accuracy of these representations can be important to the effectiveness and efficiency of these...
详细信息
ISBN:
(纸本)9781424426133
A wide range of techniques for supporting software maintenance tasks rely on representations of program control flow. The accuracy of these representations can be important to the effectiveness and efficiency of these techniques. The java programming language has introduced structured exception handling features that complicate the task of representing control flow. Previous work has attempted to address these complications by using type inference algorithms to analyze the control flow effects of exceptions, but to date, there has been no study of whether the use of these algorithms is justified In this paper we report results of an empirical study addressing this issue. We find that type inference algorithms can lead to more accurate representations of control flow, but this improvement does not necessarily translate into benefits for maintenance techniques that use them. It follows that type inference algorithms should not just automatically be applied;rather the tradeoffs of applying them must first be assessed with respect to particular maintenance techniques and workloads.
In recent years, a system that can flexibly accommodate and resolve difficulties is necessary for network service users because of the rapid development of information technology. Accordingly, agent-oriented computing...
详细信息
ISBN:
(纸本)9781479960811
In recent years, a system that can flexibly accommodate and resolve difficulties is necessary for network service users because of the rapid development of information technology. Accordingly, agent-oriented computing, a technique for generating an agent that operates autonomously according to behavior knowledge, is receiving much attention. Various frameworks are used to develop and operate agent systems. A repository-based agent framework, the DASH framework, has no system that guarantees agent persistency. Therefore, we propose Snapshot Management Mechanism for Agent Framework DASH, which is able to make agent systems operate again under the same circumstances. Herein, we explain the DASH framework and the proposed Snapshot Management Mechanism. Moreover, we demonstrate the effectiveness of the proposed method.
暂无评论