A tutorial for an engineering application such as the power software ATP (Alternative Transients Program) is presented to demonstrate the power of the Internet and java. The difficulties in creating an input data file...
详细信息
As a rule, developing a new programminglanguage is not a good idea. Of all the myriad languages that have been devised to programme computers relatively few survive, and popular wisdom holds that the world needs yet ...
详细信息
As a rule, developing a new programminglanguage is not a good idea. Of all the myriad languages that have been devised to programme computers relatively few survive, and popular wisdom holds that the world needs yet another language like a hole in the head. In 1995, US computer company Sun Microsystems threw popular wisdom to the wind and launched java-a new object-oriented programminglanguage. Today, java has become arguably the most discussed and hyped technology in the IT business, a status attributable to the remarkable fit between the unique features of java and the computing landscape of today. java can be used to distribute executable content across the Internet, an ability that has led some to conclude that it may transform the nature of computing. The java programming language is revolutionising the capabilities of the Internet and the World Wide Web.
Private data is used on daily basis by a variety of applications where machine learning algorithms predict our shopping patterns and movie preferences among other things. Principal component analysis (PCA) is a widely...
详细信息
ISBN:
(纸本)9781509055692
Private data is used on daily basis by a variety of applications where machine learning algorithms predict our shopping patterns and movie preferences among other things. Principal component analysis (PCA) is a widely used method to reduce the dimensionality of data. Reducing the data dimension is essential for data visualization, preventing overfitting and resisting reconstruction attacks. In this paper, we propose methods that would enable the PCA computation to be performed on horizontally-partitioned data among multiple data owners without requiring them to stay online for the execution of the protocol. To address this problem, we propose a new protocol for computing the total scatter matrix using additive homomorphic encryption, and performing the Eigen decomposition using Garbled circuits. Our hybrid protocol does not reveal any of the data owner's input;thus protecting their privacy. We implemented our protocols using java and Obliv-C, and conducted experiments using public datasets. We show that our protocols are efficient, and preserve the privacy while maintaining the accuracy.
In this paper we present a technique that allows combining the best out of three worlds: component orientation, formal specification in SDL and Visual Bean composition SDL components are specified with Bean-like conve...
详细信息
ISBN:
(纸本)0769510868
In this paper we present a technique that allows combining the best out of three worlds: component orientation, formal specification in SDL and Visual Bean composition SDL components are specified with Bean-like conventions. From the SDL Bean specifications, skeleton java Beans are generated and visually composed in an existing Visual Bean environment. From this composition, a SDL system is generated that wires the SDL Beans and that can be executed or simulated.
To evaluate applications for Vehicular Ad-Hoc Networks (VANETs) simulations are a widely used alternative to potentially costly and complex field tests. For authentic results, simulations of realistic vehicular moveme...
详细信息
ISBN:
(纸本)9781479976607
To evaluate applications for Vehicular Ad-Hoc Networks (VANETs) simulations are a widely used alternative to potentially costly and complex field tests. For authentic results, simulations of realistic vehicular movement and communication environment are mandatory. Usually, a traffic simulator and a network simulator are used for the first and second requirement, respectively. Some VANET simulators combine independent simulators of both domains while others implement the necessary functionality themselves. However, due to different scopes of functionality, available protocols, etc., the choice of a VANET simulator has an impact on the result. Unfortunately, VANET applications are typically implemented based on a certain VANET simulator's API. Thus, applications have to be adapted when switching between simulators. To solve this problem, we developed a framework which allows for executing VANET applications in different environments without modification. We further defined a VANET API which aims at enabling portability for VANET applications. Hence, applications can be implemented independently of the used VANET simulator and can be even run on real hardware unmodified.
Feature Models are used in different stages of software development and are recognized to be an important asset in model transformation techniques and software product line development. The automated analysis of featu...
详细信息
ISBN:
(纸本)354045778X
Feature Models are used in different stages of software development and are recognized to be an important asset in model transformation techniques and software product line development. The automated analysis of feature models is being recognized as one of the key challenges for automated software development in the context of Software Product Lines. In our previous work we explained how a feature model can be transformed into a constraint satisfaction problem. However cardinalities were not considered. In this paper we present how a cardinality-based feature model can be also translated into a constraint satisfaction problem. In that connection, it is possible to use off-the-shelf tools to automatically accomplish several tasks such as calculating the number of possible feature configurations and detecting possible conflicts. In addition, we present a performance test between two off-the-shelf java constraint solvers. To the best of our knowledge, this is the first time a performance test is presented using solvers for feature modelling proposes
This paper describes how to use Easy java Simulations (Ejs for short), a software tool designed to create interactive simulations in java, to turn existing models created using Simulink into really dynamic, interactiv...
详细信息
ISBN:
(纸本)0780395670
This paper describes how to use Easy java Simulations (Ejs for short), a software tool designed to create interactive simulations in java, to turn existing models created using Simulink into really dynamic, interactive virtual labs. The user basically needs to connect variables in the Ejs model to variables in the Simulink model using an easy-to-use, very natural interface. Ejs takes then care of all the technical tasks required to keep a perfect synchronization between both tools. The main advantage is that existing Simulink models can benefit of the extended graphic capabilities of Ejs for a more realistic visualization and for enhanced interactive possibilities.
Program verification plays an important role in assuring the reliability of software systems. This paper presents a novel verification methodology for java programs based on the higher-order logic theorem proving syst...
详细信息
ISBN:
(纸本)0769526551
Program verification plays an important role in assuring the reliability of software systems. This paper presents a novel verification methodology for java programs based on the higher-order logic theorem proving system HOL The soundness of a java program in accordance with its specification in annotation is established in HOLA. A Hoare-logic based verification methodology (WHY) guides the verification process. As a case study, a java program with four methods is specified in JML annotation and proved in HOL. The flexible manipulation of pure method call in annotation is presented in the HOL proof mechanism. This work may constitute the first attempt on using the proving system HOL for java programs. The experience demonstrates the effectiveness and the promising results of the approach.
Modern computer applications, especially at enterprise-level, are commonly deployed with a big number of clustered instances to achieve a higher system performance, in which case single machine based solutions are les...
详细信息
ISBN:
(纸本)9781479959198
Modern computer applications, especially at enterprise-level, are commonly deployed with a big number of clustered instances to achieve a higher system performance, in which case single machine based solutions are less cost-effective. However, how to effectively manage these clustered applications has become a new challenge. A common approach is to deploy a front-end load balancer to optimise the workload distribution between each clustered application. Since then, many research efforts have been carried out to study effective load balancing algorithms which can control the workload based on various resource usages such as CPU and memory. The aim of this paper is to propose a new load balancing approach to improve the overall distributed system performance by avoiding potential performance impacts caused by Major java Garbage Collection. The experimental results have shown that the proposed load balancing algorithm can achieve a significant higher throughput and lower response time compared to the round-robin approach. In addition, the proposed solution only has a small overhead introduced to the distributed system, where unused resources are available to enable other load balancing algorithms together to achieve a better system performance.
java has become a popular paradigm in software development. It is widely used in embedded systems and network computing because of its excellent robustness, modularity and security. Its built-in garbage collection aut...
详细信息
ISBN:
(纸本)9780769527840
java has become a popular paradigm in software development. It is widely used in embedded systems and network computing because of its excellent robustness, modularity and security. Its built-in garbage collection automatically reclaims unused memory space. Current generational garbage collector works well with programs containing massive short-lived objects. However, the existence of hot-mature (i.e. frequently-accessed and long-lived) objects inhibits object reclamation. In this paper, we present two methodologies to exploit the locality for these objects. Firstly, we employ an on-chip scratchpad memory in memory hierarchy to preserve young and hot-mature objects. This reduces energy consumption and data accessing cycles for java execution. Secondly, we introduce a pretenuring technique to segregate objects into separated memory regions based on the object lifetimes and reference densities, which minimizes the amount of object copying during garbage collections.
暂无评论