Undergraduates are influenced by modern technology such as smart-phone apps, social networks and the Internet. Technology is perceived to be "cool" and students are often interested in gaining expertise in t...
详细信息
ISBN:
(纸本)9781479918294
Undergraduates are influenced by modern technology such as smart-phone apps, social networks and the Internet. Technology is perceived to be "cool" and students are often interested in gaining expertise in them. However, most of them lack access to the tools/knowledge needed for a developer level involvement and several lack the opportunity to experience the research that creates the "cool stuff" of the future. This research project aims at providing both the tools and the opportunity to undergraduates at a minority serving institution. Through two phases: training and research that spanned from July to December 2014, several undergraduates were engaged in cutting edge Internet and mobile networks research. The training and research objective were to develop android based applications for the MobilityFirst future Internet architecture. The training phase consisted of two 8-week long workshops. The first workshop was to discuss current research in Future Internet Architecture while the second provided training in java programming language and Android application development. In the research phase, nine students participated in developing geo-social network applications that generated content and shared locally in a geographic region. These applications used Wi-Fi Direct and/or MobilityFirst future Internet architecture for communication without the need for wide-area network connectivity.
The readability of identifiers is a major factor of program comprehension and an aim of naming convention guidelines. Due to their semantic content, identifiers are also used in feature and bug location, among other s...
详细信息
ISBN:
(纸本)9781467381598
The readability of identifiers is a major factor of program comprehension and an aim of naming convention guidelines. Due to their semantic content, identifiers are also used in feature and bug location, among other software maintenance tasks. Looking at how names are used in practice may lead to insights on potential problems for comprehension and for programming support tools that process identifiers. Class and method names are already well represented in the literature. This paper presents an investigation of java field, formal argument and local variable names, which we collectively call reference names. These names cannot be ignored because they constitute over half the unique names and almost 70% of the name declarations in the corpus investigated. We analysed the forms of 3.5 million reference name declarations in 60 well known java projects, examining the phrasal structure of names composed of known words and acronyms. The structures found in practice were evaluated against those given in the literature. The use of unknown abbreviations and words, which may pose a problem for program comprehension, was also identified. Based on our observations of the rich diversity of reference names, we suggest issues to be taken into account for future academic research and for improving tools that rely on names as sources of information.
In this paper, we present the design of a new java based, cycle-accurate, heterogeneous architectural simulator, Tejas. Tejas is a trace driven simulator, which is platform-independent. It can simulate binaries in any...
详细信息
ISBN:
(纸本)9781467394192
In this paper, we present the design of a new java based, cycle-accurate, heterogeneous architectural simulator, Tejas. Tejas is a trace driven simulator, which is platform-independent. It can simulate binaries in any ISA and corresponding to virtually any operating system. It can itself run on virtually any machine. It is one of the fastest cycle accurate simulators available in academia. This is achieved through employing optimized data structures, improving the simulator's cache locality, and reducing the amount of wasteful work done. Tejas offers a rich library of architectural features that are modular and highly configurable. Tejas has been validated against real hardware (Dell PowerEdge R620 server) and has been shown to be more accurate than some of the most popular architectural simulators.
In the paper the idea of the visual self-localization of mobile robots based on the estimation of image similarity is discussed. It is assumed that a rough position of the mobile robot is known e.g. from the built-in ...
详细信息
ISBN:
(纸本)9781479987016
In the paper the idea of the visual self-localization of mobile robots based on the estimation of image similarity is discussed. It is assumed that a rough position of the mobile robot is known e.g. from the built-in GPS device. Assuming known orientation of the robot, the main advantage of the application of image analysis algorithms is the increase of the self-localization accuracy. The basic idea of our approach is related to the use of image similarity metrics for the estimation of the distance to the known positions associated with the images stored in the database. In order to verify the the validity of the proposed approach for the images containing textures characteristic for urban areas, some experiments have been conducted in java based Simbad environment. As the result of applying various image similarity metrics for this purpose, the noticeable increase of the localization accuracy has been obtained for the artificial model of the urban area developed in Simbad environment. Nevertheless, achieved results are encouraging for further experiments utilizing natural images captured by real cameras also in the presence of various image distortions.
Pairing-based cryptography have begun to draw attention ever since the work of Boneh and Franklin in 2001 proposing the first identity-based encryption scheme using bilinear pairings. In 2010, Tan et al. developed a p...
详细信息
ISBN:
(纸本)9781479989966
Pairing-based cryptography have begun to draw attention ever since the work of Boneh and Franklin in 2001 proposing the first identity-based encryption scheme using bilinear pairings. In 2010, Tan et al. developed a pairing library that has running times that is as competitive as Pairing-Based Crypto (PBC) library. However, since Tan et al's pairing library was written in java, it was not known to work for other platforms such as iOS. In this work, we adapt Tan et al's java library for iOS through the implementation of a pairing-based identity-based identification (IBI) scheme.
The paper presents a software system for newspaper distribution. The system contains a central server, an Android client application and a web application for data administration. Application data (customer database, ...
详细信息
ISBN:
(纸本)9781467393881
The paper presents a software system for newspaper distribution. The system contains a central server, an Android client application and a web application for data administration. Application data (customer database, distributor profiles, distributions, etc.) is managed by the system administrators using the web application. The application also generates statistics and provides opportunity to create checklists for verification. The mobile client application is used by the distributors. Using this application, they can view their task list, the nearest addresses where they have to deliver newspapers and they can report feedback related to deliveries.
We investigate the correctness of TimSort, which is the main sorting algorithm provided by the java standard library. The goal is functional verification with mechanical proofs. During our verification attempt we disc...
详细信息
ISBN:
(纸本)9783319216904;9783319216898
We investigate the correctness of TimSort, which is the main sorting algorithm provided by the java standard library. The goal is functional verification with mechanical proofs. During our verification attempt we discovered a bug which causes the implementation to crash. We characterize the conditions under which the bug occurs, and from this we derive a bug-free version that does not compromise the performance. We formally specify the new version and mechanically verify the absence of this bug with KeY, a state-of-the-art verification tool for java.
The present paper introduces the initial implementation of a software exploration tool targeting graphical user interface (GUI) driven applications. GUITracer facilitates the comprehension of GUI-driven applications b...
详细信息
ISBN:
(纸本)9781467375269
The present paper introduces the initial implementation of a software exploration tool targeting graphical user interface (GUI) driven applications. GUITracer facilitates the comprehension of GUI-driven applications by starting from their most conspicuous artefact - the user interface itself. The current implementation of the tool can be used with any java-based target application that employs one of the AWT, Swing or SWT toolkits. The tool transparently instruments the target application and provides real time information about the GUI events fired. For each event, call relations within the application are displayed at method, class or package level, together with detailed coverage information. The tool facilitates feature location, program comprehension as well as GUI test creation by revealing the link between the application's GUI and its underlying code. As such, GUITracer is intended for software practitioners developing or maintaining GUI-driven applications. We believe our tool to be especially useful for entry-level practitioners as well as students seeking to understand complex GUI-driven software systems. The present paper details the rationale as well as the technical implementation of the tool. As a proof-of-concept implementation, we also discuss further development that can lead to our tool's integration into a software development workflow.
Context: Mobile devices, typically battery driven, require new efforts to improve the energy efficiency of both hardware and software designs. Goal: The goal of this work is to analyze the energy efficiency of differe...
详细信息
ISBN:
(纸本)9781467378994
Context: Mobile devices, typically battery driven, require new efforts to improve the energy efficiency of both hardware and software designs. Goal: The goal of this work is to analyze the energy efficiency of different sorting algorithms implementations. Method: We set up an experiment on an ARM based device, measuring the energy consumption of different sorting algorithms implemented in different programminglanguages. Result: The algorithms and languages exhibit significantly different energy consumption, the ARM assembly language implementation of Counting sort is the greenest solution. Conclusion: We provide the basic information to select algorithms, and we identified the main factors affecting energy consumption.
Software evolution projects need to be supported by integrated toolchains, yet can suffer from inadequate tool interoperability. Practitioners are forced to deal with technical integration issues, instead of focusing ...
详细信息
ISBN:
(纸本)9781467379359
Software evolution projects need to be supported by integrated toolchains, yet can suffer from inadequate tool interoperability. Practitioners are forced to deal with technical integration issues, instead of focusing on their projects' actual objectives. Lacking integration support, the resulting toolchains are rigid and inflexible, impeding project progress. This paper presents SENSEI, a service-oriented support framework for toolchain-building, that clearly separates software evolution needs from implementing tools and interoperability issues. It aims to improve interoperability using component-based principles, and provides model-driven code generation to partly automate the integration process. The approach has been prototypically implemented, and was applied in the context of the Q-MIG project, to build parts of an integrated software migration and quality assessment toolchain.
暂无评论