In order to accurately obtain the java program function callingpath, and for facilitating automated testing and automatic test cases generation, the article puts forward analgorithm of java function calling relation e...
详细信息
Phrase-based statistical machine translation approaches have been highly successful in translating between natural languages and are heavily used by commercial systems (e.g. Google Translate). The main objective of th...
详细信息
By using EAI and Script node, java and VRML are combined in this paper to develop a 3D interactive virtual scene. This scene overcomes the shortage of VRML in the aspect of interactivity and features the interaction b...
详细信息
One of the changes from DO-178B to DO-178C is supposedly to make it allowable to implement flight control systems in the java programming language [3]. This makes it important to learn of the reliability deficiencies ...
详细信息
One of the changes from DO-178B to DO-178C is supposedly to make it allowable to implement flight control systems in the java programming language [3]. This makes it important to learn of the reliability deficiencies of java, and possibly how to avoid them This paper is focused on one particular class of programming errors in java;privacy leaks from encapsulated data structures This mistake seems to be quite common. Even the "getter" generator in the popular java IDE Eclipse [2] makes the mistake for the programmers. This motivated me to put together a tool for identifying privacy leaking "getters" in java classes. The tool uses a java decompiler to generate a normalised form of the source code for the java classes, and then uses simple pattern matching to identify uses of the simple type "getter" pattern for composite, private attributes. One of the five goals in the creation of the java programming language is that it should be "robust and secure". The extent of privacy leaks in real-life java classes indicates that there is still quite a way to that goal.
The article deals with the problem of complex technical systems diagnostics. A fuzzy equations mathematics is suggested for the problem solution. Fuzzy equations set, used to formalize the problem, may be inconsistent...
详细信息
The article deals with the problem of complex technical systems diagnostics. A fuzzy equations mathematics is suggested for the problem solution. Fuzzy equations set, used to formalize the problem, may be inconsistent in certain cases. An approximate solution method is suggested to overcome the difficulty. Software in java programming language is presented.
GPUs and multicore CPUs are becoming common in today's embedded world of tablets and smartphones. With CPUs and GPUs getting more complex, maximizing hardware utilization and minimizing energy consumption are beco...
详细信息
ISBN:
(纸本)9781479931026
GPUs and multicore CPUs are becoming common in today's embedded world of tablets and smartphones. With CPUs and GPUs getting more complex, maximizing hardware utilization and minimizing energy consumption are becoming problematic. The challenges faced in GPGPU computing on embedded platforms are different from their desktop counterparts due to the memory and computational limitations. This study evaluates the advantages of offloading java applications to an embedded GPU. By employing two approaches namely, java Native Interface (JNI-OpenCL) and java bindings for OpenCL (JOCL) we allowed programmers to program an embedded GPU from java. Experiments were conducted on a Freescale ***6Q SabreLite board which contains a quad-core ARM Cortex A9 CPU and a Vivante GC 2000 GPU that supports the OpenCL 1.1 Embedded Profile. The results show up to an eight times increase in performance efficiency by consuming only one-third the energy compared to the CPU-only version of the java program. This paper demonstrates the performance and energy benefits achieved by offloading java programs onto an embedded GPU. To the best of our knowledge, this is the first work involving java acceleration on embedded GPUs.
The increased use of and reliance on computing devices elicits a desire to ensure the integrity of the software running on these devices. This desire is indeed well founded-malicious software has become a major proble...
详细信息
The increased use of and reliance on computing devices elicits a desire to ensure the integrity of the software running on these devices. This desire is indeed well founded-malicious software has become a major problem for today's computer systems. Consequently, we have developed the java Measurement Framework (JMF) for inspecting a running java program and ensuring the program's integrity. JMF provides a mechanism for writing integrity policies about java programs. Our implementation provides the capability to extract a measurement of the code and data of the running program and then evaluate this measurement against a policy. The result allows concerned parties to achieve a greater confidence in the integrity of the software running on their systems. We show how our system can be used on several real-world java programs and with adequate performance overhead.
The field of soft sensor data fusion deals with human sources of information, as opposed to more traditional approaches that deal primarily with information from hard (physics-based) sensors. To facilitate the collect...
详细信息
The field of soft sensor data fusion deals with human sources of information, as opposed to more traditional approaches that deal primarily with information from hard (physics-based) sensors. To facilitate the collection of data from soft sensors, a graphical user interface has been designed. Data that the user enters into the graphical user interface are represented numerically using fuzzy logic. Fuzzy logic is also used in order to fuse data from multiple users or from the same user at different points in time. The fusion system has been tested both in simulation and in the field using a hypothetical search and rescue problem.
Non-interference guarantees the absence of illicit information flow throughout program execution. It can be enforced by appropriate information flow type systems. Much of the previous work on type systems for non-inte...
详细信息
Non-interference guarantees the absence of illicit information flow throughout program execution. It can be enforced by appropriate information flow type systems. Much of the previous work on type systems for non-interference has focused on calculi or high-level programminglanguages, and existing type systems for low-level languages typically omit objects, exceptions and method calls. We define an information flow type system for a sequential JVM-like language that includes all these programming features, and we prove, in the Coq proof assistant, that it guarantees non-interference. An additional benefit of the formalisation is that we have extracted from our proof a certified lightweight bytecode verifier for information flow. Our work provides, to the best of our knowledge, the first sound and certified information flow type system for such an expressive fragment of the JVM.
暂无评论