Poverty subsidy is a subsidy policy set up by national and local colleges and universities to help students with family difficulties. However, with the growth of population and the expansion of student groups, the tra...
详细信息
Poverty subsidy is a subsidy policy set up by national and local colleges and universities to help students with family difficulties. However, with the growth of population and the expansion of student groups, the traditional assessment methods are difficult to meet the current needs, and the identification of subsidies gradually leads to problems such as huge labor consumption and complex and difficult identification process. In order to solve this problem, with the help of big data, a financial aid evaluation system for poor college students is designed. The front end of the system uses MyEclipse development tool, java programming language and JSP web page technology, adopts MVC mode, designs system function modules and builds big data analysis and evaluation model, and the back end uses MySQL database. The system mainly includes user registration, student information management, subsidy application, counselor information management, application approval and other functional modules. The application of this system can realize the scientificization and standardization of poverty identification, save a lot of time for teachers and students, improve the efficiency and quality of school work, and help solve the problems existing in college subsidies.
A recurring issue in generative approaches, in particular if they generate code for multiple target languages, is logging. How to ensure that logging is performed consistently for all the supported languages? How to e...
详细信息
ISBN:
(纸本)9781728125350
A recurring issue in generative approaches, in particular if they generate code for multiple target languages, is logging. How to ensure that logging is performed consistently for all the supported languages? How to ensure that the specific semantics of the source language, e.g. a modeling language or a domain-specific language, is reflected in the logs? How to expose logging concepts directly in the source language, so as to let developers specify what to log? This paper reports on our experience developing a concrete logging approach for ThingML, a textual modeling language built around asynchronous components, statecharts and a first-class action language, as well as a set of "compilers" targeting C, Go, java and javaScript.
Researchers have proposed many automated program repair techniques for imperative languages, e.g. java. However, little work has been done to repair programs written in declarative languages, e.g. Alloy. We proposed A...
详细信息
ISBN:
(纸本)9781728117645
Researchers have proposed many automated program repair techniques for imperative languages, e.g. java. However, little work has been done to repair programs written in declarative languages, e.g. Alloy. We proposed ARepair, the first automated program repair technique for faulty Alloy models. ARepair takes as input a faulty Alloy model and a set of tests that capture the desired model properties, and produces a fixed model that passes all tests. ARepair uses tests written for the recently introduced AUnit framework, which provides a notion of unit testing for Alloy models. In this paper, we describes our java implementation of ARepair, which is a command-line tool, released as an open-source project on GitHub. Our experimental results show that ARepair is able to fix 28 out of 38 real-world faulty models we collected.
The preventive approach of software security is the basis of what is referred to as secure by design. The principle is to avoid vulnerabilities as soon as the system is designed. Several research work are aimed to thi...
详细信息
ISBN:
(纸本)9781728145389
The preventive approach of software security is the basis of what is referred to as secure by design. The principle is to avoid vulnerabilities as soon as the system is designed. Several research work are aimed to this objective. Most of them rely on empirical studies which need a realistic corpus. This corpus holds applications with different vulnerabilities and others without any known vulnerability. To the best of our knowledge, such a security corpus does not exist. In this paper, we present a novel approach based on an automatic annotation process to build a security corpus for real java applications. Our approach takes advantage of several existing code scanners in order to annotate the corpus. We applied our process of vulnerability annotation on a well-known corpus, namely Qualitas Corpus, from the software engineering research community. We provide the resulting security corpus, namely SecureQualitas, to the research community. The experiments we conducted demonstrate that our approach gives better results than the scanners taken alone.
In this paper, we propose a type system to detect non-terminating stream operations in java programs using Stream API. java Stream API makes it possible to write programs processing data collections in a declarative m...
详细信息
Planning an efficient construction site layout increases safety and productivity of operations. As opposed to considering only confined construction sites, this paper optimizes site layout for linear infrastructure pr...
详细信息
ISBN:
(数字)9780784482421
ISBN:
(纸本)9780784482421
Planning an efficient construction site layout increases safety and productivity of operations. As opposed to considering only confined construction sites, this paper optimizes site layout for linear infrastructure projects in congested inner cities roads ( i. e., road maintenance). The construction site location of these projects dynamically changes as the work progresses. Therefore, selecting construction facilities locations ( CFL) is a major problem prior to organizing these facilities. The presented work optimizes CFL selection in inner-cities congested roads, using uniform-cost search ( UCS) as an optimization tool, through minimizing the ( 1) resources transportation cost, ( 2) land renting cost, and ( 3) facilities relocation cost. The proposed model is coded in java using NetBeans IDE 8.1 platform. A hypothetical case study with a solution space of 243 solutions was conducted to demonstrate the model's benefits. The model succeeded in finding the optimal CFL for road segments in under 1,100 milliseconds using an 8 GB RAM, 2.00 GHz machine.
This report describes the 2019 Competition on Software Verification (SV-COMP), the 8th edition of a series of comparative evaluations of fully automatic software verifiers for C programs, and now also for java program...
详细信息
ISBN:
(纸本)9783030175023;9783030175016
This report describes the 2019 Competition on Software Verification (SV-COMP), the 8th edition of a series of comparative evaluations of fully automatic software verifiers for C programs, and now also for java programs. The competition provides a snapshot of the current state of the art in the area, and has a strong focus on replicability of its results. The repository of benchmark verification tasks now supports a new, more flexible format for task definitions (based on YAML), which was a precondition for conveniently benchmarking java programs in the same controlled competition setting that was successfully applied in the previous years. The competition was based on 10 522 verification tasks for C programs and 368 verification tasks for java programs. Each verification task consisted of a program and a property (reachability, memory safety, overflows, termination). SV-COMP 2019 had 31 participating verification systems from 14 countries.
Companies adopt Bring Your Own Device (BYOD) policies extensively, for both convenience and cost management. The compelling way of putting private and business related applications (apps) on the same device leads to t...
详细信息
ISBN:
(纸本)9781728100562
Companies adopt Bring Your Own Device (BYOD) policies extensively, for both convenience and cost management. The compelling way of putting private and business related applications (apps) on the same device leads to the widespread usage of employee owned devices to access sensitive company data and services. Such practices create a security risk as a legitimate app may send business-sensitive data to third party servers through detrimental app functions or packaged libraries. In this paper, we propose BORDERPATROL, a system for extracting contextual data that businesses can leverage to enforce access control in BYOD-enabled corporate networks through fine-grained policies. BORDERPATROL extracts contextual information, which is the stack trace of the app function that generated the network traffic, on provisioned user devices and transfers this data in IP headers to enforce desired policies at network routers. BORDERPATROL provides a way to selectively prevent undesired functionalities, such as analytics activities or advertisements, and help enforce information dissemination policies of the company while leaving other functions of the app intact. Using 2,000 apps, we demonstrate that BORDERPATROL is effective in preventing packets which originate from previously identified analytics and advertisement libraries from leaving the network premises. In addition, we show BORDERPATROL's capability in selectively preventing undesirable app functions using case studies.
java components' reference to the complex dependencies brought by third-party libraries may cause multiple versions of the libraries to exist. When this happens, the JVM will only load one of these versions, which...
详细信息
ISBN:
(数字)9781728168739
ISBN:
(纸本)9781728168746
java components' reference to the complex dependencies brought by third-party libraries may cause multiple versions of the libraries to exist. When this happens, the JVM will only load one of these versions, which may cause a runtime exception. In many cases, it is difficult to troubleshoot exactly what is going wrong, and sometimes it takes a lot of trouble to solve such problems, even for people with rich experience. This article discusses several common methods for resolving dependency conflicts, explains their principles, summarizes their advantages and disadvantages, and puts forward comments for empirical solution.
暂无评论