作者:
HALL, JON W.ANDERSON, MICHAEL D.USCGLCdr. Jon W. Hall
USCGenlisted in the U.S. Coast Guard in 1960 and subsequently served in a number of High Endurance Cutters as an Electronics Technician. In 1969. LCdr. Hall was commissioned an Ensign. U.S. Coast Guard. upon graduation from the Coast Guard Officer Candidate School Yorktown. Va.His first assignment as a commissioned officer was in theUSCGC Hamiltonas a Deck Watch Officer and Electronics Material Officer. He then served as the High Endurance Cutter Representative for Electronics in the First Coast Guard District. Boston Mass. and later at Coast Guard Headquarters in Washington D.C. In June 1978. he was assigned to the New Construction Section of Electronics Engineering. located in Coast Guard Headquarters. as a 270-foot WMEC Project Officer. Currently he is the Chief. New Cosntruction Section responsible for overseeing the development and installation of the 270-foot WMEC electronics package. LCdr. Hall is a graduate of Wentworth Institute Boston. Mass. and has an associate degree in Electronics Technology. Lt.(j. g.) Michael D. Anderson
USCGgraduated from the U.S. Coast Guard Academy. New London Conn. in June 1976. with a Bachelor's degree in Computer Science and Electrical Engineering. He served in theUSCGC Madronaas Deck Watch Officer. Communications Officer and Electronics Officer. In August 1977 he was assigned to the Electronics Engineering Division U.S. Coast Guard Headquarters. and until October 1978 held the Type Desk for Electronics Installations in Coast Guard Buoy Tenders Tugs and River Tenders. He is presently assigned to the Software Section. Electronics Engineering Division which is responsible for the procurement of the operational software for the 270-foot WMEC. Lt.(j. g.) Anderson currently is pursuing his Master's degree in Computer Science at The George Washington University.
The U.S. Coast Guard has undertaken a ship construction program to replace Cutters which are nearing 30 to 40 years of service. These replacement ships, classed as the 270‐foot Medium Endurance Cutters (MEC), are int...
Bug fixing holds significant importance in software development and maintenance. Recent research has made substantial strides in exploring the potential of large language models (LLMs) for automatically resolving soft...
详细信息
Bug fixing holds significant importance in software development and maintenance. Recent research has made substantial strides in exploring the potential of large language models (LLMs) for automatically resolving software bugs. However, a noticeable gap in existing approaches lies in the oversight of collaborative facets intrinsic to bug resolution, treating the process as a single-stage endeavor. Moreover, most approaches solely take the buggy code snippet as input for LLMs during the patch generation stage. To mitigate the aforementioned limitations, we introduce a novel stage-wise framework named PATCH. Specifically, we first augment the buggy code snippet with corresponding dependence context and intent information to better guide LLMs in generating the correct candidate patches. Additionally, by taking inspiration from bug management practices, we decompose the bug-fixing task into four distinct stages: bug reporting, bug diagnosis, patch generation, and patch verification. These stages are performed interactively by LLMs, aiming to simulate the collaborative behavior of programmers during the resolution of software bugs. By harnessing these collective contributions, PATCH effectively enhances the bug-fixing capability of LLMs. We implement PATCH by employing the powerful dialogue-based LLM ChatGPT. Our evaluation on the widely used bug-fixing benchmark BFP demonstrates that PATCH has achieved better performance than state-of-the-art LLMs.
This book constitutes the refereed proceedings of the 9th International Conference on Theory and Applications of Models of Computation, TAMC 2012, held in Beijing, China, in May 2012. The conference was combined with ...
详细信息
ISBN:
(数字)9783642299520
ISBN:
(纸本)9783642299513
This book constitutes the refereed proceedings of the 9th International Conference on Theory and Applications of Models of Computation, TAMC 2012, held in Beijing, China, in May 2012. The conference was combined with the Turing Lectures 2012, dedicated to celebrating Alan Turing’s unique impact on mathematics, computing, computerscience, informatics, morphogenesis, philosophy, and the wider scientific world. Eight Turing Lectures were given at the TAMC 2012.
The 40 revised full papers presented together with invited talks were carefully reviewed and selected from 86 submissions. The papers address 4 special sessions at TAMC 2012 which were algorithms and information in networks, complexity and cryptography, models of computing and networking, programming and verification.
This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presente...
详细信息
ISBN:
(数字)9783642252433
ISBN:
(纸本)9783642252426
This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security.
This book constitutes the refereed proceedings of the 8th International Conference on Active Media Technology, AMT 2012, held in Macau, China, in December 2012. The 65 revised full papers were carefully reviewed and s...
详细信息
ISBN:
(数字)9783642352362
ISBN:
(纸本)9783642352355
This book constitutes the refereed proceedings of the 8th International Conference on Active Media Technology, AMT 2012, held in Macau, China, in December 2012.
The 65 revised full papers were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on awareness multi-agent systems, data mining, ontology mining, web reasoning, social applications of active media, human-centered computing, personalization and adaptation, smart digital art and e-learning.
This book constitutes the refereed proceedings of the 11th Annual Conference on Theory and Applications of Models of Computation, TAMC 2014, held in Chennai, India, in April 2014. The 27 revised full papers presented ...
详细信息
ISBN:
(数字)9783319060897
ISBN:
(纸本)9783319060880
This book constitutes the refereed proceedings of the 11th Annual Conference on Theory and Applications of Models of Computation, TAMC 2014, held in Chennai, India, in April 2014. The 27 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers explore the algorithmic foundations, computational methods and computing devices to meet today's and tomorrow's challenges of complexity, scalability and sustainability, with wide-ranging impacts on everything from the design of biological systems to the understanding of economic markets and social networks.
The detection of anomaly status plays a pivotal role in the maintenance of public transportation and facilities in smart cities. Owing to the pervasively deployed sensing devices, one can collect and apply multi-dimen...
详细信息
The detection of anomaly status plays a pivotal role in the maintenance of public transportation and facilities in smart cities. Owing to the pervasively deployed sensing devices, one can collect and apply multi-dimensional sensing data to detect and analyze potential anomalies and react promptly. Current efforts concentrate on offline manners and fail to fit the situation in smart cities, where efficient and online solutions are expected. In this paper, a novel framework is designed for anomaly detection over edge-assisted Internet-of-Things (IoTs). The framework allows periodical data collection from sensors and continuous anomaly detection at the edge node. A novel efficient and unsupervised deep learning model is designed to balance the resource consumption and accuracy for anomaly detection, based on the combination of a convolutional autoencoder and adversarial training. Meanwhile, the proposed framework also adopts an adaptive strategy for continuous anomaly detection to reduce the overall resource consumption. According to theoretical analysis and evaluation on several real-world datasets, the proposed framework can discover the potential correlation features among multi-dimensional sensing data, and efficiently detect the abnormality of public transportation and facilities in smart cities.
This book constitutes the refereed proceedings of the 9th Chinese Conference on Biometric Recognition, CCBR 2014, held in Shenyang, China, in November 2014. The 60 revised full papers presented were carefully reviewed...
详细信息
ISBN:
(数字)9783319124841
ISBN:
(纸本)9783319124834
This book constitutes the refereed proceedings of the 9th Chinese Conference on Biometric Recognition, CCBR 2014, held in Shenyang, China, in November 2014. The 60 revised full papers presented were carefully reviewed and selected from among 90 submissions. The papers focus on face, fingerprint and palmprint, vein biometrics, iris and ocular biometrics, behavioral biometrics, application and system of biometrics, multi-biometrics and information fusion, other biometric recognition and processing.
暂无评论