We explore the view of a computation as a relational section of a (trivial) fibre bundle: initial states lie in the base of the bundle and final states lie in the fibres located at their initial states. This leads us ...
详细信息
Source code querying tools allow programmers to explore relations between different parts of the code base. This paper describes such a tool, named CodeQuest. It combines two previous proposals, namely the use of logi...
详细信息
By now, the concept of program slicing has been known in the research community for around 25 years. As a research topic, it has enjoyed a fair share of popularity, evidenced by the number of articles published on the...
Separation of concerns in existing code can be achieved by specific refactoring techniques. Modern refactoring tools support a number of well-known refactoring transformations, including method extraction. In this pap...
详细信息
ISBN:
(纸本)1581138423
Separation of concerns in existing code can be achieved by specific refactoring techniques. Modern refactoring tools support a number of well-known refactoring transformations, including method extraction. In this paper, we examine how method extraction can be improved through program slicing. Furthermore, we show how a generalization of such slice extraction can be applied to untangle existing code by extracting aspects. Copyright 2004 ACM.
Over the last four years, a community of researchers working on Grid and High Performance computing technologies started discussing the barriers and opportunities that grid technologies must face and exploit for the d...
详细信息
ISBN:
(纸本)158603510X
Over the last four years, a community of researchers working on Grid and High Performance computing technologies started discussing the barriers and opportunities that grid technologies must face and exploit for the development of health-related applications. This interest lead to the first Healthgrid conference, held in Lyon, France, on January 16th–17th, 2003, with the focus of creating increased awareness about the possibilities and advantages linked to the deployment of grid technologies in health, ultimately targeting the creation of a European/international grid infrastructure for health. The topics of this conference converged with the position of the eHealth division of the European Commission, whose mandate from the Lisbon Meeting was "To develop an intelligent environment that enables ubiquitous management of citizens’ health status, and to assist health professionals in coping with some major challenges, risk management and the integration into clinical practice of advances in health knowledge." In this context "Health" involves not only clinical procedures but covers the whole range of information from molecular level (genetic and proteomic information) over cells and tissues, to the individual and finally the population level (social healthcare). Grid technology offers the opportunity to create a common working backbone for all different members of this large "health family" and will hopefully lead to an increased awareness and interoperability among disciplines. The first HealthGrid conference led to the creation of the Healthgrid association, a non-profit research association legally incorporated in France but formed from the broad community of European researchers and institutions sharing expertise in health grids. After the second Healthgrid conference, held in Clermont-Ferrand on January 29th–30th, 2004, the need for a "white paper" on the current status and prospective of health grids was raised. Over fifty experts from different areas of grid tec
In the paper it is argued that bridging the digital divide may cause a new ethical and social dilemma. Using Hardin's Tragedy of the Commons, we show that an improper opening and enlargement of the digital environ...
详细信息
This paper argues that an a priori semantic background knowledge base is essential for automatic audio-visual summarisation. We demonstrate experimentally that content-based metadata are relevant to the selection of e...
This paper argues that an a priori semantic background knowledge base is essential for automatic audio-visual summarisation. We demonstrate experimentally that content-based metadata are relevant to the selection of events to include in soccer highlights. However they do not provide the necessary context to select all interesting information to present to the viewer. Supported by preliminary results from an ongoing knowledge elicitation study, we also contend that summarised information presented within a narrative structure is more pleasing to the viewer.
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number of type flaw attacks have appeared in the...
详细信息
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number of type flaw attacks have appeared in the academic literature. In this paper we prove that type flaw attacks can be prevented using a simple technique of tagging each field with some information indicating its intended type.
This paper presents an overview of the Scale Saliency algorithm introduced in (Kadir and Brady, 2001). Scale Saliency is a novel method for measuring the saliency of image regions and selecting optimal scales for thei...
This paper presents an overview of the Scale Saliency algorithm introduced in (Kadir and Brady, 2001). Scale Saliency is a novel method for measuring the saliency of image regions and selecting optimal scales for their analysis. The model underlying the algorithm deems image regions salient if they are simultaneously unpredictable in some feature-space and over scale. The algorithm possesses a number of attractive properties: invariance to planar rotation, scaling, intensity shifts and translation; robustness to noise, changes in viewpoint, and intensity scalings. Moreover, the approach offers a more general model of feature saliency compared with conventional ones, such as those based on kernel convolution, for example wavelet analysis, since such techniques define saliency and scale only with respect to a particular set of basis morphologies. Finally, we present a generalised version of the original algorithm which is invariant to affine transformations.
暂无评论