A java-based tool-supported software development and analysis framework is presented, where monitoring is a foundational principle. Expressive requirements specification formalisms can be included into the framework v...
详细信息
ISBN:
(纸本)3540253335
A java-based tool-supported software development and analysis framework is presented, where monitoring is a foundational principle. Expressive requirements specification formalisms can be included into the framework via logic plug-ins, allowing one to refer not only to the current state, but also to both past and future states.
The box model is a component model for the object-oriented paradigm, that defines components (the boxes) with clear encapsulation boundaries. Having well-defined boundaries is crucial in component-based software devel...
详细信息
ISBN:
(纸本)9783642134135
The box model is a component model for the object-oriented paradigm, that defines components (the boxes) with clear encapsulation boundaries. Having well-defined boundaries is crucial in component-based software development, because it enables to argue about the interference and interaction between a component and its context. In general, boxes contain several objects and inner boxes, of which some are local to the box and cannot be accessed from other boxes and some can be accessible by other boxes. A trait is a set of methods divorced from any class hierarchy. Traits can be composed together to form classes or other traits. We present a calculus for boxes and traits. Traits are units of fine-grained reuse, whereas boxes can be seen as units of coarse-grained reuse. The calculus is equipped with an ownership type system and allows us to combine coarse- and fine-grained reuse of code by maintaining encapsulation of components.
We offer a preliminary description and evaluation of an Android application that can be used to characterize user exposure to electromagnetic fields emitted by an 802.11ax mobile device. The system used consists of a ...
详细信息
ISBN:
(纸本)9781665403085
We offer a preliminary description and evaluation of an Android application that can be used to characterize user exposure to electromagnetic fields emitted by an 802.11ax mobile device. The system used consists of a DUT (Device Under Test - Huawei P40 Pro) connected to a wireless router. A measurement system composed of a small isotropic antenna connected to a spectrum analyzer and remotely controlled via a custom designed Python application was used to measure the field strength. Higher field levels were observed during file upload as compared to file download. Based on the measurements recorded by the Android application we performed an analysis of the field changes according to the number of transmitted/received bits and RSSI. We observed direct field strength variation with upload/download speed. We have also introduced the dosimetric indicator of power density/unit of information and proved its validity in highlighting different usage profiles. Further investigations have to be carried out in order to provide large scale data on Wi-Fi user exposure in the case of realistic operating scenarios.
The preventive approach of software security is the basis of what is referred to as secure by design. The principle is to avoid vulnerabilities as soon as the system is designed. Several research work are aimed to thi...
详细信息
ISBN:
(纸本)9781728145389
The preventive approach of software security is the basis of what is referred to as secure by design. The principle is to avoid vulnerabilities as soon as the system is designed. Several research work are aimed to this objective. Most of them rely on empirical studies which need a realistic corpus. This corpus holds applications with different vulnerabilities and others without any known vulnerability. To the best of our knowledge, such a security corpus does not exist. In this paper, we present a novel approach based on an automatic annotation process to build a security corpus for real java applications. Our approach takes advantage of several existing code scanners in order to annotate the corpus. We applied our process of vulnerability annotation on a well-known corpus, namely Qualitas Corpus, from the software engineering research community. We provide the resulting security corpus, namely SecureQualitas, to the research community. The experiments we conducted demonstrate that our approach gives better results than the scanners taken alone.
This paper presents an implementation of a novel microprocessor architecture for executing byte compiled java programs directly in hardware. The processor features two programming models, a java model and a RISC model...
详细信息
ISBN:
(纸本)0769512402
This paper presents an implementation of a novel microprocessor architecture for executing byte compiled java programs directly in hardware. The processor features two programming models, a java model and a RISC model. The entities share a common data path and may operate independently although not in parallel. This combination facilitates access to hardware-near instructions and provides,powerful interrupt and instruction trapping capabilities. Our processor targets medium to small embedded applications where performance in the sense of through put is not the primary design objective, but rather the ability to execute java code on a processor core with small die size and acceptable power consumption characteristics.
Code metrics can be used to assess the internal quality of software systems, and in particular their adherence to good design principles. While providing hints about code quality, metrics are difficult to interpret. I...
详细信息
ISBN:
(纸本)9781538649695
Code metrics can be used to assess the internal quality of software systems, and in particular their adherence to good design principles. While providing hints about code quality, metrics are difficult to interpret. Indeed, they take a code component as input and assess a quality attribute (e.g., code readability) by providing a number as output. However, it might be unclear for developers whether that value should be considered good or bad for the specific code at hand. We present RETICULA (REal TIme Code qUaLity Assessment), a plugin for the IntelliJ IDE to assist developers in perceiving code quality during software development. RETICULA compares the quality metrics for a project (or a single class) under development in the IDE with those of similar open source systems (classes) previously analyzed. With the visualized results, developers can gain insights about the quality of their code. A video illustrating the features of RETICULA can be found at: https://***/.
Software Defined Networking (SDN) is seen as one way to solve some problems of the Internet including security, managing complexity, multi-casting, load balancing, and energy efficiency. SDN is an architectural paradi...
详细信息
ISBN:
(纸本)9781479933518
Software Defined Networking (SDN) is seen as one way to solve some problems of the Internet including security, managing complexity, multi-casting, load balancing, and energy efficiency. SDN is an architectural paradigm that separates the control plane of a networking device (e.g., a switch / router) from its data plane, making it feasible to control, monitor, and manage a network from a centralized node (the SDN controller). However, today there exists many SDN controllers including POX, FloodLight, and OpenDaylight. The question is, which of the controllers is to be selected and used? To find out the answer to this question, a decision making template is proposed in this paper to help researchers choose the SDN controller that best fits their needs. The method works as follows;first, several existing open-source controllers are analyzed to collect their properties. For selecting the suitable controller based on the derived requirements (for example, a "java" interface must be provided by the controller), a matching mechanism is used to compare the properties of the controllers with the requirements. Additionally, for selecting the best controller based on optional requirements (for example, GUI will be extremely preferred over the age of the controller), a Multi-Criteria Decision Making (MCDM) method named Analytic Hierarchy Process (AHP) has been adapted by a monotonic interpolation / extrapolation mechanism which maps the values of the properties to a value in a pre-defined scale. By using the adapted AHP, the topmost five controllers have been compared and "Ryu" is selected to be the best controller based on our requirements.
The ability to think abstractly about the components of a computer program is critical for computer science students. A student who has not yet developed this ability tends to view a program as an unstructured collect...
详细信息
ISBN:
(纸本)1581133294
The ability to think abstractly about the components of a computer program is critical for computer science students. A student who has not yet developed this ability tends to view a program as an unstructured collection of statements and expressions. Introductory computer science textbooks promote the use of pre-conditions, post-conditions, and abstraction functions as techniques for fostering abstract thinking. Existing programminglanguages and tools, however, do not generally support these techniques. Consequently, we have built and are beginning to experiment with Javiva. Javiva extracts pre-conditions, post-conditions, and abstraction functions-included as stylized comments in java source files-and uses them to create instrumented class files. When these instrumented class files are run, they automatically diagnose and report violations by methods of pre- and post-conditions. These classes also exploit abstraction functions to automatically produce abstract visualizations of their objects.
Cement industry in Central java distributes cement by train to meet daily demand in Yogyakarta and Central java area. There are five destination stations. For each destination station, there is a warehouse to load cem...
详细信息
ISBN:
(纸本)9781510858855
Cement industry in Central java distributes cement by train to meet daily demand in Yogyakarta and Central java area. There are five destination stations. For each destination station, there is a warehouse to load cements. Decision maker of cement industry have a plan to redesign the infrastructure and transportation system. The aim is to determine how many locomotives, train wagons, and containers and how to arrange train schedules with subject to the delivery time. For this purposes, we consider an integer programming to minimize the total of operational cost. Further, we will discuss a case study and the solution the problem can be calculated by LINGO software.
This document will present an educational videogame called Ashy. alRescate () that aims to teach the subject of object-oriented programming (OOP) in java programming language through the mixture of a baseline story of...
详细信息
ISBN:
(纸本)9781538692332
This document will present an educational videogame called Ashy. alRescate () that aims to teach the subject of object-oriented programming (OOP) in java programming language through the mixture of a baseline story of the videogame with the implementation of programming code. The student programs the classes of the characters, their methods, attributes among others, for providing functionality to the characters. The results tested on university students show that there are improvements either in learners with only previous knowledge in C programming and in learners which have pursued an OOP course.
暂无评论