Agile processes such as XP (eXtreme programming) have been recognised for their potential benefits of improving software. During adoption of the XP process, teams can misapply the XP principles by following them verba...
详细信息
Some concerns, such as debugging or logging functionality, cannot be captured cleanly, and are often tangled and scattered throughout the code base. These concerns are called crosscutting concerns. Aspect-Oriented Pro...
详细信息
ISBN:
(纸本)076952124X
Some concerns, such as debugging or logging functionality, cannot be captured cleanly, and are often tangled and scattered throughout the code base. These concerns are called crosscutting concerns. Aspect-Oriented programming (AOP) is a paradigm that enables developers to capture crosscutting concerns in separate aspect modules. The use of aspects has been shown to improve understandability and maintainability of systems. It has been shown that real-time concerns, such as memory management and thread scheduling, are crosscutting concerns [5, 6, 9, 11]. However it is unclear whether encapsulating these concerns provides benefits. We were interested in determining whether using AOP to encapsulate real-time crosscutting concerns afforded benefits in system properties such as understandability and maintainability. This paper presents research comparing the system properties of two systems: a real-time sentient traffic simulator and its Aspect-Oriented equivalent. An evaluation of AOP is presented indicating both benefits and drawbacks with this approach.
The phase boundary is defined as the interface that the physical state of the considered system changes. For example, the interface between ice and water is a typical example of the phase boundary. Generally, the beha...
详细信息
The phase boundary is defined as the interface that the physical state of the considered system changes. For example, the interface between ice and water is a typical example of the phase boundary. Generally, the behavior of the phase boundary is influenced by the outside state of the phase boundary, however, in a field of the material science, there is the case where the motion of the phase boundary depends on only its geometric shape. In this paper, focusing our attention on such a case and taking randomness like impurities in a material into consideration, we propose stochastic models of evolution of phase boundaries by the level set method. Level set equations treated here have strong nonlinearity, so introducing the stochastic viscosity solution, the level set equations are mathematically formulated. As the behaviors of phase boundaries, we consider two types of them. One is a growth with constant speed and the other is a mean curvature flow. The influence of disturbance on the motion of these two types of evolution of phase boundaries is studied by numerical simulations.
As one of important nonlinear problems in complex systems, a self-organization phenomenon is often cited. The self-organization phenomenon is one that spatial and/or temporal structure is formed of its own accord via ...
详细信息
As one of important nonlinear problems in complex systems, a self-organization phenomenon is often cited. The self-organization phenomenon is one that spatial and/or temporal structure is formed of its own accord via a nonequlibrium phase transition. For example, a phase separation in polymer mixtures, spiral and target patterns in the BZ(Belouzov-Zhabotinsky) reaction are famous as self-organization phenomena. Furthermore, in a bioengineering, some bacteria can create by themselves their colony depending on surrounding environmental situations such as concentration of nutrient and softness of medium. It is well known that the bacteria called Bacillus subtilis create several kinds of colony pattern depending on such environmental situations. Focusing our attention on colony patterns of Bacillus subtilis and taking fluctuation of a population density of bacteria and distribution of concentration of nutrient into consideration in this paper, we study a mathematical modeling of the bacterial colony formations by stochastic reaction diffusion equations. And the analysis of the created patterns and influence of disturbance on the colony patterns are studied by numerical simulations. As an application of the stochastic model proposed here, we also consider the influence of antibiotic stress on bacterial colony formations by simulations.
We propose a memory recall model based on the stochastic resonance using a hippocampal network model. The spatial pattern of CA1 pyramidal cell firing caused by stochastic resonance coincides with the memory pattern e...
详细信息
Using Genetic programming difficult optimization problems can be solved, even if the candidate solutions are complex objects. In such cases, it is a costly procedure to correct or replace the invalid individuals that ...
详细信息
This paper presents a dynamical solution of camera registration problem for on-road navigation applications via a 3D-2D parameterized model matching algorithm. The traditional camera'fs three dimensional (3D) posi...
详细信息
This paper proposes a reference management technique for closed-loop systems with state and/or control constraints. Using a so-called "blocking" operation and a multi-parametric programming, we obtain the ma...
详细信息
Cardiac magnetic resonance imaging (MRI) allows accurate and noninvasive measurements of left ventricular (LV) volumes. Nonetheless, chamber volume quantification is based on manual tracing of endocardial boundaries, ...
详细信息
Spontaneous formation of peer-to-peer agent-based data mining systems seems a plausible scenario in years to come. However, the emergence of peer-to-peer environments further exacerbates privacy and security concerns ...
详细信息
ISBN:
(纸本)9781586034528
Spontaneous formation of peer-to-peer agent-based data mining systems seems a plausible scenario in years to come. However, the emergence of peer-to-peer environments further exacerbates privacy and security concerns that arise when performing data mining tasks. We analyze potential threats to data privacy in a peer-topeer agent-based distributed data mining scenario, and discuss inference attacks which could compromise data privacy in a peer-to-peer distributed clustering scheme known as KDEC.
暂无评论