This paper addresses the positive dynamic effects of the aspect-oriented implementation of database connection pooling in a Web application, through simulated experiments. In addition to the static positive effects of...
详细信息
This paper addresses the positive dynamic effects of the aspect-oriented implementation of database connection pooling in a Web application, through simulated experiments. In addition to the static positive effects of aspect-oriented programming (AOP) in yielding a robust design by ensuring encapsulation, reusability, efficiency, and extensibility, the dynamic positive effects of AOP in our experiments are emphasized and demonstrated elaborately in terms of some selected run-time performance measures. The latter issue is the main concern of our ongoing research work
Co-CreativePen toolkit is a pen-based 3D toolkit for children cooperatively designing virtual environment. This toolkit is used to construct different applications involved with distributed pen-based 3D interaction. I...
详细信息
ISBN:
(纸本)142440164X
Co-CreativePen toolkit is a pen-based 3D toolkit for children cooperatively designing virtual environment. This toolkit is used to construct different applications involved with distributed pen-based 3D interaction. In this toolkit, sketch method is encapsulated as kinds of interaction techniques. Children can use pen to construct 3D and IBR objects, to navigate in the virtual world, to select and manipulate virtual objects, and to communicate with other children. Children can use pen to select other children in the virtual world, and use pen to write message to children selected. The distributed architecture of Co-CreativePen toolkit is based on the CORBA. A common scene graph is managed in the server with several copies of this graph are managed in every client. Every changes of the scene graph in client will cause the change in the server and other client
In this paper, we present a Web interface to a Japanese-English rule-based machine translation system. One main feature of our translation system is that the transfer rules have not been designed by hand but are learn...
详细信息
ISBN:
(纸本)1424406730;1424406749
In this paper, we present a Web interface to a Japanese-English rule-based machine translation system. One main feature of our translation system is that the transfer rules have not been designed by hand but are learnt automatically from a parallel corpus. The user can customize the rule base by simply correcting translation results. In addition, it is possible to display token lists, parse trees, and transfer rules, which makes our system also a very useful tool for language students. The system has been implemented in Amzi! Prolog, using the Amzi logic server CGI interface to develop the Web application
Verification has become the major bottleneck of the design process. According to the latest report of the International Technology Roadmap for Semiconductors, the challenge is to develop new design-for-verifiability t...
详细信息
Verification has become the major bottleneck of the design process. According to the latest report of the International Technology Roadmap for Semiconductors, the challenge is to develop new design-for-verifiability techniques and verification methods for higher levels of abstraction. Several design-for-verifiability methodologies (DFV) have been proposed and assertion-based verification (ABV) is one of the most promising. In order to automatically verify assertions at the higher abstraction levels, it is necessary to improve the performances and capabilities of current constraint solvers. This paper presents a new technique based on non-linear solvers that automatically checks assertions in behavioral descriptions of hardware systems. These descriptions are modeled with a set of integer polynomial inequalities. These techniques have been verified with several control dominated modules of an MPEG decoder and with data dominated designs, such as Viterbi decoders or vocoder digital filters
Normally regular grammar, finite automata and regular expression are used to identify words. This paper puts forward that the derivation process for identifying words by regular grammar is a linear resolution substant...
详细信息
Normally regular grammar, finite automata and regular expression are used to identify words. This paper puts forward that the derivation process for identifying words by regular grammar is a linear resolution substantively. Furthermore, in certain condition, irregular grammar can be converted to regular one and the algorithm is given in this paper. Basically, after constituted the clause sets of regular grammar, we presented a method checking the correctness of sentence of formal language based on linear resolution, which was proved to be mature in this experiment. This measure was implemented in algorithm and program as well. The result shows that our method is better than regular grammar, etc. in some aspects, such as the speed of identifying words, the program code space and the coding difficultly
Automatic text summarization for dialogue style is a relatively new research area. Some key techniques are proposed in this paper, such as identifying whether or not the style of document is dialogue, identifying all ...
详细信息
Automatic text summarization for dialogue style is a relatively new research area. Some key techniques are proposed in this paper, such as identifying whether or not the style of document is dialogue, identifying all of questions and their corresponding answers and linking them to form question-answer pairs. Due to the interactive nature of dialogue documents, local regions of coherence often stretch across different speakers. An approach to automatically identify those regions of local coherence is presented. Firstly, we identify all question paragraphs in a given document. Secondly, we detect the answer paragraphs of each question paragraph and exploit text segmentation to form question-answer pairs. Lastly, we extract some sentences from the generic content and the question-answer pairs to generate a complete summary. Experimental results show that our approach is high efficient and improves significantly the coherency of the summary while not compromising informativeness
Source transfer for important electricity consuming customers has often been accomplished using discrete relays, such as overcurrent, overvoltage, undervoltage, differential and sync check, plus logic created out of a...
详细信息
Source transfer for important electricity consuming customers has often been accomplished using discrete relays, such as overcurrent, overvoltage, undervoltage, differential and sync check, plus logic created out of auxiliary relays and timers, or programmable logic controllers (PLCs). The advent of advanced digital protection systems with programmable logic capabilities and the proper I/O structure can now allow the entire transfer protection and control to be accomplished by a single intelligent electronic device (IED), thereby simplifying and enhancing the process. Simplification is the result of the protection and logic being linkable in software so all interlocking, timing and sequencing functions are made in a single or minimal amount of IEDs by programming. Enhancements include the elimination of discrete device interwiring, the ability to have concise event logging for all protection and logic functions to aid in documenting successful sequences, diagnosis of incomplete sequences and asset management of the switchgear involved in the transfer process. The transfer types discussed and illustrated include hot parallel (non-sequential), residual voltage and time delayed (sequential)
In this paper, we describe early results in the development of an alternative programming method which uses large, three-dimensional acrylic blocks to construct programming sequences. Computer-illiterate children can ...
详细信息
In this paper, we describe early results in the development of an alternative programming method which uses large, three-dimensional acrylic blocks to construct programming sequences. Computer-illiterate children can create a symbolic program to control a humanoid robot toy. We describe the physical design of the blocks, problems encountered, comments made by primary school participants, and make recommendations for further development.
JTAG/Boundary Scan tools for LXI 1 allow a powerful and flexible combination with other test methodologies. This paper shortly discusses benefits and shortcomings of JTAG/Boundary Scan and Functional Test and then ou...
详细信息
JTAG/Boundary Scan tools for LXI 1 allow a powerful and flexible combination with other test methodologies. This paper shortly discusses benefits and shortcomings of JTAG/Boundary Scan and Functional Test and then outlines possibilities of integrating Boundary Scan tools in a LXI based test environment. Advantages of such a combination of Boundary Scan and Functional Test equipment are illustrated. Furthermore, an introduction to JTAG/ Boundary Scan related Design-For-Testability will be provided.
This paper discusses the attempts to combine classical enterprise information systems development methodologies with component-based approach. It argues to use component-oriented paradigm for the development of system...
详细信息
This paper discusses the attempts to combine classical enterprise information systems development methodologies with component-based approach. It argues to use component-oriented paradigm for the development of systems at all three layers of enterprise. The paper presents principles and concepts of this paradigm in enterprise engineering context, proposes component abstraction as realization technique of most general engineering principles which can reduce the complexity of integrated enterprise information system development and maintenance The integrated enterprise information system components and their types are discussed
暂无评论