XML has recently emerged as a standard for exchanging data between different software applications. We present an approach for automatic code generation to interpret information in an XML document. The approach is bas...
详细信息
XML has recently emerged as a standard for exchanging data between different software applications. We present an approach for automatic code generation to interpret information in an XML document. The approach is based on a user-defined mapping of the XML document's structure onto the application's API. This mapping is declarative in nature, and thus easy to specify, and is used by code generator that applies advanced code generation and manipulation techniques to generate the appropriate code. The approach relieves developers from the time-consuming and error-prone task of writing the interpreter themselves, and complements existing XML technologies such as XSLT.
The photoionization by two elliptically polarized, time delayed attosecond pulses is investigated to display a momentum distribution having the helical vortex or ring structuresi The results are obtained by the strong...
详细信息
The photoionization by two elliptically polarized, time delayed attosecond pulses is investigated to display a momentum distribution having the helical vortex or ring structuresi The results are obtained by the strong field approximation method and analyzed by the pulse decomposition. The ellipticities and time delay of the two attosecond pulses are found to determine the rotational symmetry and the number of vortex arms. For observing these vortex patterns, the energy bandwidth and temnoral duration of the attosecond pulses are ideal.
This paper introduced the optimization and deoptimization technologies for Escape analysis in open world. These technologies are used in a novel Escape analysis framework that has been implemented in Open runtime plat...
详细信息
This paper introduced the optimization and deoptimization technologies for Escape analysis in open world. These technologies are used in a novel Escape analysis framework that has been implemented in Open runtime platform, Intel's open-source Java virtual machine. We introduced the optimization technologies for synchronization removal and object stack allocation, as well as the runtime deoptimization and compensation work. The deoptimization and compensation technologies are crucial for a practical Escape analysis in open world. We evaluated the runtime efficiency of the deoptimization and compensation work on benchmarks like SPECjbb2000 and SPECjvm98.
This paper provides an experience report on the use of aspect-oriented technology as a means to modularize the implementation of business rules in an object-oriented, large scale case study. The goal of this refactori...
详细信息
This paper provides an experience report on the use of aspect-oriented technology as a means to modularize the implementation of business rules in an object-oriented, large scale case study. The goal of this refactoring of the system was to provide a proof-of-concept implementation of how such an aspect-oriented solution can improve the modularity and the extensibility of the business rule implementation. This paper focusses on the approach taken in refactoring the system and the difficulties of integrating the aspect solution into the build process.
Background. During the last three decades EEG-based biofeedback (neurofeedback) was used as an alternative treatment for reducing symptoms of ADHD. The goal of this study was to objectively assess the efficacy of biof...
详细信息
This paper proposes a notion, the 'ambit' of an action, that allows the degree of distribution of an action in a multiagent system to be quantified without regard to its functionality. It demonstrates the use ...
详细信息
ISBN:
(纸本)9780769528564
This paper proposes a notion, the 'ambit' of an action, that allows the degree of distribution of an action in a multiagent system to be quantified without regard to its functionality. It demonstrates the use of that notion in the design, analysis and implementation of dynamically-reconfigurable multi-agent systems. It distinguishes between the extensional (or system) view and intensional (or agent-based) view of such a system and shows how, using the notion of ambit, the step-wise derivation paradigm of Formal Methods can be used to derive the latter from the former In closing it addresses the manner in which these ideas inform studies in the ethics of systems of artificial agents.
The first implementation of the programming language FX-87, a polymorphic typed functional language based on a system for static program analysis, is described. This polymorphic effect system integrates type checking ...
详细信息
The first implementation of the programming language FX-87, a polymorphic typed functional language based on a system for static program analysis, is described. This polymorphic effect system integrates type checking and side-effect analysis into a single framework and allows the automatic detection of parallelizable expressions at compile-time. In FX-87, every expression has two static properties: a type and an effect. Type and effect polymorphism permits the behavior of first-class procedures to be statically modeled. The integration of type and effect analysis has resulted in the first system that is able (by accurate modeling of the side-effects of procedure values and masking of unobservable effects in the heap) to detect a compile-time, parallelizable constructs in both functional and imperative programs.< >
Finding a document that is similar to a specified query document within a large document database is one of important issues in the Big Data era, as most data available is in the form of unstructured texts. Our testin...
详细信息
Networking technology, undoubtedly, plays a vital role in modern warfare especially in Network Centric Operations (NCOs) and Global Information Grid (GIG) concept. However, the current popular network infrastructure, ...
详细信息
Networking technology, undoubtedly, plays a vital role in modern warfare especially in Network Centric Operations (NCOs) and Global Information Grid (GIG) concept. However, the current popular network infrastructure, mainly TCP/IP architecture, is in fact unsuitable with advanced military communication especially in tactical operation networks. The key characteristics of military communications are classified as delay/disruption/disconnection tolerant networks (DTNs) which are long and variable delays, high error rates and greatly heterogeneous. As a result a call for new type of network architecture emerges to support such peculiar characteristics of military communication network. This paper reviews the current approaches in network technology of military communication and proposes the conceptual design of Virtualization Network (VN) for military communication to address the limitation of current network infrastructure. The implementation of Military Network Virtualization Environment (MVNE) introduces the crucial two new key features of military tactical network: information classification and movable nodes. These features along with essential research challenges must be analyzed to realize a viable virtualization network for military communications.
暂无评论