Structures of hardware and software of real time operating system of the SATELLITE programmable controller are considered. In the processor module the microprocessor based on ARM Cortex-M4F kernel is used. The user ap...
详细信息
ISBN:
(纸本)9781509014743
Structures of hardware and software of real time operating system of the SATELLITE programmable controller are considered. In the processor module the microprocessor based on ARM Cortex-M4F kernel is used. The user application program is developed in the environment of CODESYS, and executed under control of the RTS program of 3S-Smart Software Solutions GmbH. For contact of RTS with hardware the ARM RL-RTX kernel is used. Realization of data exchange and the interface channels is considered. Results of development and testing of the controller software are given.
object oriented programming (OOP) recently became the most influential programming paradigm. Several studies [2, 3, 4] indicated deficiencies in learning introductory OOP courses. In King Abdulaziz University - Saudi ...
详细信息
ISBN:
(纸本)9781509033942
object oriented programming (OOP) recently became the most influential programming paradigm. Several studies [2, 3, 4] indicated deficiencies in learning introductory OOP courses. In King Abdulaziz University - Saudi Arabia, based on a survey that had been designed and distributed to female students of introductory OOP course, results showed that students faced difficulties in understanding OOP, specifically 47% of students faced difficulties in Polymorphism. Visualization tools visualize the execution of programs, using visual hints, and interactivity to improve the students' understanding in programming concepts. This paper proposes the development of "OOPVisual", a 3D interactive visualization tool that will simulate OOP concepts to help students with their understanding.
In this paper we introduce a new programming model of multi-threaded actors which feature the parallel processing of their messages. In this model an actor consists of a group of active objects which share a message q...
详细信息
In this paper we introduce a new programming model of multi-threaded actors which feature the parallel processing of their messages. In this model an actor consists of a group of active objects which share a message queue. We provide a formal operational semantics, and a description of a Java-based implementation for the basic programming abstractions describing multi-threaded actors. Finally, we evaluate our proposal by means of an example application.
Current binary-level Control-Flow Integrity (CFI) techniques are weak in determining the set of valid targets for indirect control flow transfers on the forward edge. In particular, the lack of source code forces exis...
详细信息
ISBN:
(纸本)9781509008247
Current binary-level Control-Flow Integrity (CFI) techniques are weak in determining the set of valid targets for indirect control flow transfers on the forward edge. In particular, the lack of source code forces existing techniques to resort to a conservative address-taken policy that over-approximates this set. In contrast, source-level solutions can accurately infer the targets of indirect callsites and thus detect malicious control-flow transfers more precisely. Given that source code is not always available, however, offering similar quality of protection at the binary level is important, but, unquestionably, more challenging than ever: recent work demonstrates powerful attacks, such as Counterfeit object-orientedprogramming (COOP), which made the community believe that protecting software against control-flow diversion attacks at the binary level is impossible. In this paper, we propose binary-level analysis techniques to significantly reduce the number of possible targets for indirect callsites. More specifically, we reconstruct a conservative approximation of target function prototypes by means of use-def analysis at possible callees. We then couple this with liveness analysis at each indirect callsite to derive a many-to-many relationship between callsites and target callees with a much higher precision compared to prior binary-level solutions. Experimental results on popular server programs and on SPEC CPU2006 show that TypeArmor, a prototype implementation of our approach, is efficient-with a runtime overhead of less than 3%. Furthermore, we evaluate to what extent TypeArmor can mitigate COOP and other advanced attacks and show that our approach can significantly reduce the number of targets on the forward edge. Moreover, we show that TypeArmor breaks published COOP exploits, providing concrete evidence that strict binary-level CFI can still mitigate advanced attacks, despite the absence of source information or C++ semantics.
In applications where the user interface is the main constituent, du-plication of business entities while moving data between application con-Texts/layers or comparison of business entities between each other to prese...
详细信息
In applications where the user interface is the main constituent, du-plication of business entities while moving data between application con-Texts/layers or comparison of business entities between each other to preserve application level data integrity may be needed. In this work the use cases, archi-Tecture, performance measurements and rooms for improvement for the Busi-ness Entity Framework which provides copy, compare, versioning and un-do/redo capabilities to business entities by means of the meta-data defined with a domain specific language is presented.
Recent years have seen increasing success in building large formal proof developments using interactive theorem provers (ITPs). Some proofs have involved many authors, years of effort, and resulted in large, complex i...
详细信息
ISBN:
(纸本)9783662496657;9783662496640
Recent years have seen increasing success in building large formal proof developments using interactive theorem provers (ITPs). Some proofs have involved many authors, years of effort, and resulted in large, complex interdependent sets of proof "source code" files. Developing these in the first place, and maintaining and extending them afterwards, is a considerable challenge. It has prompted the idea of Proof Engineering as a new sub-field, to find methods and tools to help. It is natural to try to borrow ideas from Software Engineering for this. In this paper we investigate the idea of defining proof metrics by analogy with software metrics. We seek metrics that may help to monitor and compare formal proof developments, which might be used to guide good practice, locate likely problem areas, or suggest refactorings. Starting from metrics that have been proposed for object-oriented design, we define analogues for formal proofs. We show that our metrics enjoy reasonable properties, and we demonstrate their behaviour with some practical experiments, showing changes over time as proof developments evolve, and making comparisons across between different ITPs.
Derived values are values calculated from base values. They can be expressed in object-oriented languages by means of getters calculating the derived value, and in relational or logic databases by means of (materializ...
详细信息
Which comes first: the object or the class? Language designers enjoy the conceptual simplicity of object-based languages (such as Emerald or Self) while many programmers prefer the pragmatic utility of classical inher...
详细信息
Static Single Assignment (SSA) intermediate representation is widely used to optimize and compile code in imperative and object-oriented languages, but it can also be useful for static type analysis. We introduce FJSS...
详细信息
LJGS is a lightweight Java core calculus with a gradual security type system. The calculus guarantees secure information flow for sequential, class-based, typed object-orientedprogramming with mutable objects and vir...
详细信息
暂无评论