Design derivation, a correct-by-construction system design method, specifies behavior with abstract datatypes. Refining these abstract datatypes is necessary for architectural decomposition. A new transformation primi...
详细信息
The notion of an algorithm is fundamental in computerscience. Yet, it is not always fully conceived by novices. This paper focuses on a particular facet of algorithm conception - the relationship between an algorithm...
详细信息
ISBN:
(纸本)1595930248
The notion of an algorithm is fundamental in computerscience. Yet, it is not always fully conceived by novices. This paper focuses on a particular facet of algorithm conception - the relationship between an algorithmic problem, its analysis, and its desired algorithmic solution. The paper displays evidence that novices demonstrate cognitive obstacles regarding the notion of an algorithm, which relate to a process-object duality phenomena [13] and inadequate classroom norms of communication. Copyright 2005 ACM.
computer security incidents cost companies billions of dollars each year and cause untold numbers of individuals considerable inconvenience and data loss. There are many common practices that companies can put in plac...
详细信息
ISBN:
(纸本)1932415823
computer security incidents cost companies billions of dollars each year and cause untold numbers of individuals considerable inconvenience and data loss. There are many common practices that companies can put in place to help reduce their vulnerability to a computer security incident but a single negligent employee can bring down an entire network. Colleges and universities have recognized the need to incorporate computer knowledge into almost every discipline in an effort to better prepare students for employment. This raises the question - are college students aware of common security precautions? This study surveyed over 100 students to determine their awareness and compliance with accepted security principles. The results indicate reason for concern. A significant number of the students were not following or did not know if they were following common security practices. Security awareness training and mandatory compliance are among the recommendations for improving this situation.
A special program in Software Engineering (SE) for high school has been in operation in Israel whose aim is to expose young students to the field of computing. During their studies the students are required to develop...
详细信息
ISBN:
(纸本)1595930248
A special program in Software Engineering (SE) for high school has been in operation in Israel whose aim is to expose young students to the field of computing. During their studies the students are required to develop a software project, and thus gain experience in software design. Usually the development processes do not fulfill essential professional requirements, and the students' products are rarely applicable to real world situations. This motivated the initiation of an educational program designated for advanced students. In the first stage of the program, a regional out-of-school class attends an enrichment workshop. In the second stage students develop projects under the apprenticeship-based supervision of professional instructors from academia and industry. The project is currently being implemented for the first time and is being evaluated.
Purpose - Aims to present the ontology engineering methodology DILIGENT, a methodology focussing on the evolution of ontologies instead of the initial design, thus recognizing that knowledge is a tangible and moving t...
详细信息
We give a decomposition of the Hardy space Hz^1(Ω) into "div-curl" quantities for Lipschitz domains in R^n. We also prove a decomposition of Hz^1(Ω) into Jacobians det Du, u ∈ W0^1,2 (Ω,R^2) for Ω in R^2....
详细信息
We give a decomposition of the Hardy space Hz^1(Ω) into "div-curl" quantities for Lipschitz domains in R^n. We also prove a decomposition of Hz^1(Ω) into Jacobians det Du, u ∈ W0^1,2 (Ω,R^2) for Ω in R^2. This partially answers a well-known open problem.
This paper introduced a technique for authenticating the vehicle engines. It has been compared by the images of the imprints of the identification number acquired when the vehicle was first registered and the ones acq...
详细信息
This paper introduced a technique for authenticating the vehicle engines. It has been compared by the images of the imprints of the identification number acquired when the vehicle was first registered and the ones acquired from the routine yearly vehicle inspection. Hough Transform algorithm was used to extract line feature from the images of the imprints, which characterized the identification number. Furthermore, line feature was combined with tolerance relation on a set, an algorithm based on inexact graph matching for authentication was presented. This had dealt with incomplete data owing to lots of artificial. The experiments showed an accuracy rate close to 83%.
Over the years educators have been debating about the most appropriate paradigm for teaching an introductory course in computerscience (CS). Specifically, the pedagogical approach known as "objects early" o...
详细信息
ISBN:
(纸本)1595930248
Over the years educators have been debating about the most appropriate paradigm for teaching an introductory course in computerscience (CS). Specifically, the pedagogical approach known as "objects early" or "objects first" is controversial [2,3,4]. One important reason for educators to argue against the objects early approach is their concern that starting with objects results in the learning of algorithmic problem-solving to be neglected [4]. In this poster we present a pedagogical framework for an introductory multiple-goal course in OOP based on weaving algorithmic pattern-based problem solving activities into OOD/P instruction [5].
This research investigates continuous forecasting queries with alterable forecasting-step over data streams. A novel Adaptive Precision forecasting method to forecasting single attribute value of item in a single stea...
详细信息
We report the first formal verification of a reintegration protocol for a safety-critical distributed embedded system. A reintegration protocol increases system survivability by allowing a transiently-faulty node to r...
详细信息
ISBN:
(纸本)1595930914
We report the first formal verification of a reintegration protocol for a safety-critical distributed embedded system. A reintegration protocol increases system survivability by allowing a transiently-faulty node to regain state. The protocol is verified in the Symbolic Analysis Laboratory (SAL), where bounded model-checking and decision procedures are used to verify infinite-state systems by k-induction. The protocol and its environment are modeled using a recently-developed explicit real-time model. Because k-induction has exponential complexity, we optimize this model to reduce the size of k necessary for the verification and to make k invariant to the number of nodes. A corollary of the verification is that a clique avoidance property is satisfied. Copyright 2005 ACM.
暂无评论