One of the major problems faced by software developers and managers is the estimation of efforts for the development and maintenance of a programming system. In this paper, estimation of efforts needed to update progr...
详细信息
ISBN:
(纸本)9783319420899
One of the major problems faced by software developers and managers is the estimation of efforts for the development and maintenance of a programming system. In this paper, estimation of efforts needed to update programs according to a given requirement change has been discussed for the objectoriented (OO) environment. Since the demand for these changes has to be met quickly, a method is required to estimate the efforts for making the required changes. Methods exist for estimating the efforts in OO environment but none of them cater to the needs of updating requirements. We have proposed an up-gradation to the approach for effort estimation, which makes use of certain characteristics of the OO paradigm, specifically Inheritance and Encapsulation. We found that the degree of inheritance has to be considered for effort estimation because it plays an important role for identifying which methods need to be modified and others to be reused as it is.
There is the bottom-up approach proposed and implemented for the Manufacturing Execution System in the paper. The developed Manufacturing Execution System was testes in a real production line composed of MPS stations ...
详细信息
ISBN:
(纸本)9781509017874
There is the bottom-up approach proposed and implemented for the Manufacturing Execution System in the paper. The developed Manufacturing Execution System was testes in a real production line composed of MPS stations by Festo Didactic. Production of pneumatic cylinders The MES software was written in object oriented programming way in C# language with the use of Microsoft Visual Studio. The structure of the database tables is presented and the role of the tables in the system is described briefly. The classes developed and implemented were presented and described.
Structures of hardware and software of real time operating system of the SATELLITE programmable controller are considered. In the processor module the microprocessor based on ARM Cortex-M4F kernel is used. The user ap...
详细信息
ISBN:
(纸本)9781509014743
Structures of hardware and software of real time operating system of the SATELLITE programmable controller are considered. In the processor module the microprocessor based on ARM Cortex-M4F kernel is used. The user application program is developed in the environment of CODESYS, and executed under control of the RTS program of 3S-Smart Software Solutions GmbH. For contact of RTS with hardware the ARM RL-RTX kernel is used. Realization of data exchange and the interface channels is considered. Results of development and testing of the controller software are given.
object oriented programming (OOP) recently became the most influential programming paradigm. Several studies [2, 3, 4] indicated deficiencies in learning introductory OOP courses. In King Abdulaziz University - Saudi ...
详细信息
ISBN:
(纸本)9781509033942
object oriented programming (OOP) recently became the most influential programming paradigm. Several studies [2, 3, 4] indicated deficiencies in learning introductory OOP courses. In King Abdulaziz University - Saudi Arabia, based on a survey that had been designed and distributed to female students of introductory OOP course, results showed that students faced difficulties in understanding OOP, specifically 47% of students faced difficulties in Polymorphism. Visualization tools visualize the execution of programs, using visual hints, and interactivity to improve the students' understanding in programming concepts. This paper proposes the development of "OOPVisual", a 3D interactive visualization tool that will simulate OOP concepts to help students with their understanding.
In this paper we introduce a new programming model of multi-threaded actors which feature the parallel processing of their messages. In this model an actor consists of a group of active objects which share a message q...
详细信息
In this paper we introduce a new programming model of multi-threaded actors which feature the parallel processing of their messages. In this model an actor consists of a group of active objects which share a message queue. We provide a formal operational semantics, and a description of a Java-based implementation for the basic programming abstractions describing multi-threaded actors. Finally, we evaluate our proposal by means of an example application.
Current binary-level Control-Flow Integrity (CFI) techniques are weak in determining the set of valid targets for indirect control flow transfers on the forward edge. In particular, the lack of source code forces exis...
详细信息
ISBN:
(纸本)9781509008247
Current binary-level Control-Flow Integrity (CFI) techniques are weak in determining the set of valid targets for indirect control flow transfers on the forward edge. In particular, the lack of source code forces existing techniques to resort to a conservative address-taken policy that over-approximates this set. In contrast, source-level solutions can accurately infer the targets of indirect callsites and thus detect malicious control-flow transfers more precisely. Given that source code is not always available, however, offering similar quality of protection at the binary level is important, but, unquestionably, more challenging than ever: recent work demonstrates powerful attacks, such as Counterfeit object-orientedprogramming (COOP), which made the community believe that protecting software against control-flow diversion attacks at the binary level is impossible. In this paper, we propose binary-level analysis techniques to significantly reduce the number of possible targets for indirect callsites. More specifically, we reconstruct a conservative approximation of target function prototypes by means of use-def analysis at possible callees. We then couple this with liveness analysis at each indirect callsite to derive a many-to-many relationship between callsites and target callees with a much higher precision compared to prior binary-level solutions. Experimental results on popular server programs and on SPEC CPU2006 show that TypeArmor, a prototype implementation of our approach, is efficient-with a runtime overhead of less than 3%. Furthermore, we evaluate to what extent TypeArmor can mitigate COOP and other advanced attacks and show that our approach can significantly reduce the number of targets on the forward edge. Moreover, we show that TypeArmor breaks published COOP exploits, providing concrete evidence that strict binary-level CFI can still mitigate advanced attacks, despite the absence of source information or C++ semantics.
In applications where the user interface is the main constituent, du-plication of business entities while moving data between application con-Texts/layers or comparison of business entities between each other to prese...
详细信息
In applications where the user interface is the main constituent, du-plication of business entities while moving data between application con-Texts/layers or comparison of business entities between each other to preserve application level data integrity may be needed. In this work the use cases, archi-Tecture, performance measurements and rooms for improvement for the Busi-ness Entity Framework which provides copy, compare, versioning and un-do/redo capabilities to business entities by means of the meta-data defined with a domain specific language is presented.
Recent years have seen increasing success in building large formal proof developments using interactive theorem provers (ITPs). Some proofs have involved many authors, years of effort, and resulted in large, complex i...
详细信息
ISBN:
(纸本)9783662496657;9783662496640
Recent years have seen increasing success in building large formal proof developments using interactive theorem provers (ITPs). Some proofs have involved many authors, years of effort, and resulted in large, complex interdependent sets of proof "source code" files. Developing these in the first place, and maintaining and extending them afterwards, is a considerable challenge. It has prompted the idea of Proof Engineering as a new sub-field, to find methods and tools to help. It is natural to try to borrow ideas from Software Engineering for this. In this paper we investigate the idea of defining proof metrics by analogy with software metrics. We seek metrics that may help to monitor and compare formal proof developments, which might be used to guide good practice, locate likely problem areas, or suggest refactorings. Starting from metrics that have been proposed for object-oriented design, we define analogues for formal proofs. We show that our metrics enjoy reasonable properties, and we demonstrate their behaviour with some practical experiments, showing changes over time as proof developments evolve, and making comparisons across between different ITPs.
Derived values are values calculated from base values. They can be expressed in object-oriented languages by means of getters calculating the derived value, and in relational or logic databases by means of (materializ...
详细信息
Which comes first: the object or the class? Language designers enjoy the conceptual simplicity of object-based languages (such as Emerald or Self) while many programmers prefer the pragmatic utility of classical inher...
详细信息
暂无评论