One major problem in service design is the limited availability of information gathered during the development process. In particular, information on end-user requirements is difficult for designers, developers, and m...
详细信息
ISBN:
(纸本)9781479925056
One major problem in service design is the limited availability of information gathered during the development process. In particular, information on end-user requirements is difficult for designers, developers, and maintainers to access. Here, we provide a mechanism that supports the gathering and modeling of various types of information throughout the service and software development life cycle. As various existing tools focus on a particular part of the life cycle, essential information is not available, or it is more difficult to obtain in later stages. The linkage between information collected in the different stages is often lost. The implemented tool support enables the modeling of requirements;the abstraction of these requirements in the form of the required system functionalities, which can also be modeled;and the connection with component-based software engineering to support the design of ICT-enabled services.
Paraphrase is the process of writing a sentence in another form. It relates to computing the similarity between sentences which are not lexicographically similar. This paper proposed an efficient method to estimate pa...
详细信息
Paraphrase is the process of writing a sentence in another form. It relates to computing the similarity between sentences which are not lexicographically similar. This paper proposed an efficient method to estimate paraphrase. Specifically this paper defines various word co-occurrence in the sentence measured and its synonyms are also identified using web. By using the algorithm, similarity has been measured. This research focuses on evaluating the paraphrase between the sentences. In this paper, an approach for detecting paraphrase is tested by counting tokens. It processes token matching with the help of synonym of tokens, and produces the result with SVM classifier using Plagiarism detection corpus (PAN). Thus the SVM produces the output as +1 if the given text is paraphrased, - 1 if the given text is not paraphrased. This approach may also be used to identify Plagiarism of documents and to eliminate duplicates in a text repository.
The power of objects lies in the flexibility of their interconnection structure. But this flexibility conies at a cost. Because an object can be modified via any alias, object-oriented programs are hard to understand,...
详细信息
ISBN:
(纸本)9783642020469
The power of objects lies in the flexibility of their interconnection structure. But this flexibility conies at a cost. Because an object can be modified via any alias, object-oriented programs are hard to understand, maintain, and analyze. Aliasing makes objects depend on their environment in unpredictable ways, breaking the encapsulation necessary for reliable software components, making it, difficult to reason about and optimize programs, obscuring the flow of information between objects, and introducing security problems. Aliasing is a fundamental difficulty, but, we accept its presence. Instead we seek techniques for describing, reasoning about, restricting, analyzing, and preventing the connections between objects and/or the flow of information between them. Promising approaches to these problems are based on ownership, confinement, information flow, sharing control, escape analysis, argument independence, read-only references, effects systems. and access control mechanisms.
Although generics became quite popular in mainstream object-oriented languages and several specification languages exist that support the description of generic components, conformance relations between object-oriente...
详细信息
ISBN:
(数字)9783642046940
ISBN:
(纸本)9783642046933
Although generics became quite popular in mainstream object-oriented languages and several specification languages exist that support the description of generic components, conformance relations between object-oriented programs and formal specifications that have been established so far do not address genericity. In this paper we propose a notion of refinement mapping that allows to define correspondences between parameterized specifications and generic Java classes. Based on Such mappings, we put forward a conformance notion useful for the extension of CONGU, a tool-based approach we have been developing to Support runtime conformance checking of Java programs against algebraic specifications, so that it becomes applicable to a more comprehensive range of situations, namely those that appear in the context of a typical Algorithms and Data Structures Course.
One of the key mechanisms of object-orientedprogramming is inheritance. Some empirical studies show that classes inheriting behavior from more classes (i.e., ancestors) are more defect prone than the other classes. S...
详细信息
One of the key mechanisms of object-orientedprogramming is inheritance. Some empirical studies show that classes inheriting behavior from more classes (i.e., ancestors) are more defect prone than the other classes. Since various collaborations are found among the instances of classes, classes are not isolated within the source code of object-oriented systems. In this paper, we investigate if classes using classes inheriting behaviour from other classes are more change and defect prone than the other classes. We analyze at least three releases of every system belonging to a suite of seven open source systems and investigate the relations between classes that use/do not use class hierarchies and study the change and defect proneness of those classes. The results frequently show that the clients of classes which inherit behaviour are more change and defect prone. These findings show a new type of correlation between the clients of class hierarchies and changes/defects, bringing evidence related to an increased likelihood of exhibiting changes and defects for the clients of class hierarchies. We believe that the inferred correlations are due to an improper usage of class hierarchies but further studies are needed for confirmation.
object-orientedprogramming is the state-of-the-art programming paradigm for developing large and complex software systems. To support the development of maintainable and evolvable code, a developer can rely on differ...
详细信息
ISBN:
(纸本)9781450313094
object-orientedprogramming is the state-of-the-art programming paradigm for developing large and complex software systems. To support the development of maintainable and evolvable code, a developer can rely on different mechanisms and concepts such as inheritance and design patterns. Recently, feature-orientedprogramming (FOP) gained attention, specifically for developing software product lines (SPLs). Although FOP is an own paradigm with dedicated language mechanisms, it partly relies on object-orientedprogramming. However, only little is known about feature-oriented design and how object-oriented design mechanisms and design principles are used within FOP. In this paper, we want to raise awareness on design patterns in FOP and stimulate discussion on related topics. To this end, we present an exemplary review of using OO design patterns in FOP and limitations thereof from our perspective. Subsequently, we formulate questions that are open and that we think are worth to discuss in the context of feature-oriented design. Copyright 2012 ACM.
At present there are still some problems in the automatic test paper-making-system: The first is about the test question including graphs;The second is about the test question including formula;The third is about the ...
详细信息
Component-based development is a relatively new paradigm for software development, compared to more established approaches such as object-oriented analysis and design. The authors conducted a study to examine the ease...
详细信息
Component-based development is a relatively new paradigm for software development, compared to more established approaches such as object-oriented analysis and design. The authors conducted a study to examine the ease-of-reuse perceptions of analysts in modeling business systems using a library of components versus a library of objects. A survey of the IT professionals who participated in the study showed that perceived components to be much easier to reuse than objects. Users also expressed significantly higher satisfaction with components and, by a large majority, a preference for reusing components to reusing objects. [ABSTRACT FROM PUBLISHER]
In [14] an axiomatic approach towards the semantics of FJI, Featherweight Java with Inner classes, essentially a subset of the Java-programming language, is presented. In this way the authors contribute to an ambitiou...
详细信息
In [14] an axiomatic approach towards the semantics of FJI, Featherweight Java with Inner classes, essentially a subset of the Java-programming language, is presented. In this way the authors contribute to an ambitious project: to give an axiomatic definition of the semantics of programming language Java.(1) At a first glance the approach of reducing Java's semantics to that of FJI seems promising. We are going to show that several questions have been left unanswered. It turns out that the theory how to elaborate or bind types and thus to determine direct superclasses as proposed in [14] has different models. Therefore the suggestion that the formal system of [14] defines the (exactly one) semantics of Java is not justified. We present our contribution to the project showing that it must be attacked from another starting point. Quite frequently one encounters a set of inference rules and a claim that a semantics is defined by the rules. Such a claim should be proved. One should present arguments: 1(0) that the system has a model and hence it is a consistent system, and 2(0) that all models are isomorphic. Sometimes such a proposed system contains a rule with a premise which reads: there is no proof of something. One should notice that this is a metatheoretic property. It seems strange to accept a metatheorem as a premise, especially if such a system does not offer any other inference rules which would enable a proof of the premise. We are going to study the system in [14]. We shall show that it has many non-isomorphic models. We present a repair of Igarashi's and Pierce's calculus such that their ideas are preserved as close as possible.
Guaranteeing that the parties of a network application respect a given protocol is a crucial issue. Session types offer a method for abstracting and validating structured communication sequences (sessions). object-ori...
详细信息
Guaranteeing that the parties of a network application respect a given protocol is a crucial issue. Session types offer a method for abstracting and validating structured communication sequences (sessions). object-orientedprogramming is an established paradigm for large scale applications. Union types, which behave as the least common supertypes of a set of classes, allow the implementation of unrelated classes with similar interfaces without additional programming. We have previously developed an integration of the features above into a class-based core language for building network applications, and this successfully amalgamated sessions and methods so that data can be exchanged flexibly according to communication protocols (session types). The first aim of the work reported in this paper is to provide a full proof of the type safety property for that core language by renewing syntax, typing and semantics. In this way, static typechecking guarantees that after a session has started, computation cannot get stuck on a communication deadlock. The second aim is to define a constraint-based type system that reconstructs the appropriate session types of session declarations instead of assuming that session types are explicitly given by the programmer. Such an algorithm can save programming work, and automatically presents an abstract view of the communications of the sessions.
暂无评论