A song’s backbone is its chord progressions, a series of chords that improve the harmony and add to the overall composition. For individuals ranging from beginners to creative artists, comprehending and implementing ...
详细信息
The use of computer programminglanguage, java and open source in enterprise resource planning systems, is discussed. Virtually every company has some sort of management IT system. One can automate what might have bee...
详细信息
The use of computer programminglanguage, java and open source in enterprise resource planning systems, is discussed. Virtually every company has some sort of management IT system. One can automate what might have been a manual process by building business rules into the software. It is observed that more powerful hardware and more sophisticated software have together enabled a whole new level of functionality that can seriously change businesses for the better.
We describe the prototype of an application that in actual use would allow GPs to find out more information about consultants at hospitals. This would aid the GP in making the decision about which consultant a patient...
详细信息
We describe the prototype of an application that in actual use would allow GPs to find out more information about consultants at hospitals. This would aid the GP in making the decision about which consultant a patient should be referred to. The requirements of the application from the GP's perspective are described, together with some of the issues that have to be resolved before hospitals can provide the necessary information in a standard format. The application is implemented as a client-server system using standard Internet technologies such as java and HTML. This architecture has a number of advantages but also revealed some issues concerning security and the format of data, among other things. The project showed that there is a desire for such a system and that that desire can be fulfilled at a relatively low cost.
The Safety Critical java and Mission Critical java standard efforts were developed. Safety critical java prunes the RTSJ, keeping it functional while reducing complexity. The new standard also makes a number of additi...
详细信息
The Safety Critical java and Mission Critical java standard efforts were developed. Safety critical java prunes the RTSJ, keeping it functional while reducing complexity. The new standard also makes a number of additions such as address scoped memory and other eliminated features. It was found that java can span the market from a static, fixed allocation embedded environment to a dynamic, server based Web service.
Modern day studies show a high degree of correlation between high yielding crop varieties and plants with upright leaf angles. It is observed that plants with upright leaf angles intercept more light than those withou...
详细信息
Events are used in distributed systems for monitoring purposes since internal states are often hidden from the observer. Composite events are recursively defined events upon conditions involving other events and occur...
详细信息
Events are used in distributed systems for monitoring purposes since internal states are often hidden from the observer. Composite events are recursively defined events upon conditions involving other events and occur whenever those conditions are satisfied. In systems where conditions on the occurrences of multiple events need to be monitored, composite events are extremely useful for clarifying the semantics of the conditions to be monitored and the correlation of simpler events. In this paper, we present a composite event package in java called JEM, which accepts and monitors the composite events specified in a java Event Specification language (JESL). JESL is developed based on a unified formalism presented in [14] for composite event and timing constraint specification. The system structure of JEM and its major components, i.e. Event Subscription Server;Composite Event Compiler and Monitor, are described in the paper. Some performance experiment results and the scalability issue of JEM are also discussed. The paper also demonstrates the practicality of JEM by explaining how a network event correlation application is built using JEM.
Pretenuring can reduce copying costs in garbage collectors by allocating long-lived objects into regions that the garbage collector with rarely, if ever, collect. We extend previous work on pretenuring as follows. (1)...
详细信息
ISBN:
(纸本)1581133359
Pretenuring can reduce copying costs in garbage collectors by allocating long-lived objects into regions that the garbage collector with rarely, if ever, collect. We extend previous work on pretenuring as follows. (1) We produce pretenuring advice that is neutral with respect to the garbage collector algorithm and configuration. We thus can and do combine advice from different applications. We find that predictions using object lifetimes at each allocation site in java prgroams are accurate, which simplifies the pretenuring implementation. (2) We gather and apply advice to applications and the Jalapeno JVM, a compiler and run-time system for java written in java. Our results demonstrate that building combined advice into Jalapeno from different application executions improves performance regardless of the application Jalapeno is compiling and executing. This build-time advice thus gives user applications some benefits of pretenuring without any application profiling. No previous work pretenures in the run-time system. (3) We find that application-only advice also improves performance, but that the combination of build-time and application-specific advice is almost always noticeably better. (4) Our same advice improves the performance of generational and Older First colleciton, illustrating that it is collector neutral.
Several in progress real-time (RT) java projects by various companies are discussed. Two military programs are in progress and implementing RT java, while the Navy's DDX program aims to develop future warships, th...
详细信息
Several in progress real-time (RT) java projects by various companies are discussed. Two military programs are in progress and implementing RT java, while the Navy's DDX program aims to develop future warships, the Army's net-centric battlefield program links soldiers wearing helmets festooned with video cameras with each other and the battlefield commanders. Nortel and Ericsson each have used RT java to develop telecom equipment and basestations. NASA and Sun are also developing real-time specification for java (RTSJ) based control software for a Mars rover that could be deployed later in this decade.
Code language Models (CLMs), particularly those leveraging deep learning, have achieved significant success in code intelligence domain. However, the issue of security, particularly backdoor attacks, is often overlook...
详细信息
Code language Models (CLMs), particularly those leveraging deep learning, have achieved significant success in code intelligence domain. However, the issue of security, particularly backdoor attacks, is often overlooked in this process. The previous research has focused on designing backdoor attacks for CLMs, but effective defenses have not been adequately addressed. In particular, existing defense methods from natural language processing, when directly applied to CLMs, are not effective enough and lack generality, working well in some models and scenarios but failing in others, thus fall short in consistently mitigating backdoor attacks. To bridge this gap, we first confirm the phenomenon of "early learning" as a general occurrence during the training of CLMs. This phenomenon refers to that a model initially focuses on the main features of training data but may become more sensitive to backdoor triggers over time, leading to overfitting and susceptibility to backdoor attacks. We then analyze that overfitting to backdoor triggers results from the use of the cross-entropy loss function, where the unboundedness of cross-entropy leads the model to increasingly concentrate on the features of the poisoned data. Based on this insight, we propose a general and effective loss function DeCE (Deceptive Cross-Entropy) by blending deceptive distributions and applying label smoothing to limit the gradient to bounded, which prevents the model from overfitting to backdoor triggers and then enhances the security of CLMs against backdoor attacks. To evaluate the effectiveness of our defense method, we select four code-related tasks as our experiments scenes and conduct experimental analyses on both natural language and two programminglanguages (java and Python). Our experiments across multiple models with different sizes (from 125M to 7B) and poisoning ratios demonstrate the applicability and effectiveness of DeCE in enhancing the security of CLMs. The findings emphasize the potent
In this study, we assess the efficacy of employing the ChatGPT language model to generate solutions for coding exercises within an undergraduate javaprogramming course. ChatGPT, a large-scale, deep learning-driven na...
详细信息
暂无评论