Indoor gardening within sustainable buildings offers a transformative solution to urban food security and environmental sustainability. By 2030, urban farming, including Controlled Environment Agriculture (CEA) and ve...
详细信息
Deep learning can effectively extract latent information from data to enhance target-background separation in hyperspectral target detection (HTD). However, these models typically require extensive labeled samples, wh...
详细信息
David Parnas wrote several papers in the 1970's and 1980's that are now considered classics. The concepts he advocated such as information hiding and use of abstract interfaces are generally accepted as the ap...
详细信息
ISBN:
(纸本)1932415300
David Parnas wrote several papers in the 1970's and 1980's that are now considered classics. The concepts he advocated such as information hiding and use of abstract interfaces are generally accepted as the appropriate way to design nontrivial software systems. However, not all of what he proposed has been fully appreciated and assimilated into our practices. Many of his simple, elegant ideas have been lost amongst the hype surrounding the technologies and methods that have arisen in the past two decades. This paper examines Parnas's ideas, especially his emphasis on program families, and proposes that college-level computing science and software engineering curricula should renew their attention to these very important principles and techniques and present them in the context of contemporary software development.
The key to maintaining the confidentiality, integrity, and availability of an organizations information and informationsystems is controlling who accesses what information. This is accomplished by being able to ident...
详细信息
ISBN:
(纸本)1595930485
The key to maintaining the confidentiality, integrity, and availability of an organizations information and informationsystems is controlling who accesses what information. This is accomplished by being able to identify the requestor, verifying the requestor is not an impostor, and ensuring that the requestor has the proper level of clearance to access a given resource. There have always been those that attempt to by-pass this security mechanism through brute force or guile. In the past, those who use guile have been called confidence men and con artists. Today, these people are called social engineers, but the tactics remain the same even if the objectives have changed. Copyright 2005 ACM.
Drunk driving continues to be a substantial public health issue, leading to a multitude of accidents and deaths on a global scale. Conventional techniques for identifying drunk driving, such as breathalyzers and field...
详细信息
Requirements identification is a human-centric activity that involves interaction among multiple stakeholders. Traditional requirements engineering (RE) techniques addressing stakeholders' social interaction are m...
详细信息
The complexities of adverbs present an interesting challenge to computational linguistics. This paper describes our work in building an adverbial lexicon, which draws on the theoretical work of several linguists to he...
In this paper, we first provide a new theoretical understanding of the Evidence Pre-propagated Importance Sampling algorithm (EPIS-BN) (Yuan & Druzdzel 2003;2006b) and show that its importance function minimizes t...
详细信息
Code decay is a gradual process that negatively impacts the quality of a software system. Developers need trusted measurement techniques to evaluate whether their systems have decayed. This paper aims to assess code d...
详细信息
ISBN:
(纸本)9781510812277
Code decay is a gradual process that negatively impacts the quality of a software system. Developers need trusted measurement techniques to evaluate whether their systems have decayed. This paper aims to assess code decay by discovering software architectural violations. We propose a methodology that uses Lightweight Sanity Check for Implemented Architectures (LiSCIA) to derive architectural constraints represented by canuse and cannot-use phrases. Our methodology also uses a reverse engineering tool to discover architectural violations. We also introduce measures that indicate code decay in a software system. We conducted a case study of a proprietary system (14 versions) to demonstrate our methodology for assessing code decay. Resulting architectural constraints and architectural violations were validated by the expert of the system. The proposed code decay metrics can give managers datadriven insight into the process of software development, the history of the software product, and the status of unresolved violations. Our results and qualitative analysis showed that the methodology was effective and required a practical level of effort for moderate sized software systems.
Two π variants that restrict the use of received names are studied. For either variant the external characterization of the absolute equality is given using a family of bisimulations;the expressive completeness of th...
详细信息
暂无评论