Instantiation information of the design pattern which exists in the design model is always lost in the program, so the comprehension and reversion of the program become very difficult. We have proposed an approach to ...
详细信息
ISBN:
(纸本)9780769532636
Instantiation information of the design pattern which exists in the design model is always lost in the program, so the comprehension and reversion of the program become very difficult. We have proposed an approach to identify the design pattern information based on Java annotations. This approach defines the meta model of the design pattern, and uses Java annotation technology to annotate these meta information in the program. Two typical applications of this approach are presented: (i) visualization of the pattern instantiation information in the program; (ii) automatic checking of the structural properties of the pattern instance. These two examples are used to illustrate this approach.
The Modeling in softwareengineering (MiSE) workshops are a collaboration between the ICSE and MoDELS research communities, with a focus on using models to facilitate software development.
ISBN:
(纸本)9781605580791
The Modeling in softwareengineering (MiSE) workshops are a collaboration between the ICSE and MoDELS research communities, with a focus on using models to facilitate software development.
In todaypsilas world, where new technologies emerge and advance at a very fast pace every year, many professional societies are discussing moving to a Master level program as a ldquofirst professional degreerdquo, ant...
详细信息
In todaypsilas world, where new technologies emerge and advance at a very fast pace every year, many professional societies are discussing moving to a Master level program as a ldquofirst professional degreerdquo, anticipating graduates with advances skills for tomorrowpsilas demanding and advanced industry. In this context, the education at the master level is becoming more and more important. Another key issue in todaypsilas world is the impact of globalization process (needs of multinational corporations). The engineering education must address the impact of global hiring. The graduates entering the global workplace must possess besides the essential technical skills, also cultural, social and communication skills, enabling them to work and interact in international environments, bringing creativity and innovative development in multi-cultural groups. In this context, exchange programs between different universities, located in different countries and continents are flourishing, the universities trying to integrate study-abroad components in their programs. This paper is presenting as a ldquoWork in Progressrdquo, the first steps related to an exchange program at the graduate level in the area of Microelectronics, between two prestigious universities located in USA (Rose Hulman institute of technology, Terre Haute, IN) and Sweden (Royal institute of technology, Stockholm). A Joint Degree or Dual Degree program at the Master Level is envisaged in the near future.
With the development of market demands and pressures of competition, enterprise need to maintain highly flexible manufacturing system to cope with a complex manufacturing environment. The concept of Holonic Manufactur...
详细信息
With the development of market demands and pressures of competition, enterprise need to maintain highly flexible manufacturing system to cope with a complex manufacturing environment. The concept of Holonic Manufacturing Systems (HMS) is the key to meet future demands of highly dynamic production environments. In this paper, dynamic re-configuration and task allocation method with some constriction of holonic manufacturing systems (HMS) based on multi-agent system is proposed. A task-oriented clustering mechanism and a corresponding optimization algorithm are presented as an efficient approach to the holonic control in the HMS domain, a hybrid algorithm based on particle swarm optimization(PSO) for Holon task allocation is described to support the optimum organization of a holarchy. Simulation results show that the proposed model and algorithm are effective.
Clustering is a data mining technique that allows the grouping of data points on the basis of their similarity with respect to multiple dimensions of measurement. It has also been applied in the softwareengineering d...
详细信息
Clustering is a data mining technique that allows the grouping of data points on the basis of their similarity with respect to multiple dimensions of measurement. It has also been applied in the softwareengineering domain, in particular to support software quality assessment based on source code metrics. Unfortunately, since clusters emerge from metrics at the source code level, it is difficult to interpret the significance of clusters at the level of the quality of the entire system. In this paper, we propose a method for interpreting source code clusters using the ISO/IEC 9126 software product quality model. Several methods have been proposed to perform quantitative assessment of software systems in terms of the quality characteristics defined by ISO/IEC 9126. These methods perform mappings of low-level source code metrics to high-level quality characteristics by various aggregation and weighting procedures. We applied such a method to obtain quality profiles at various abstraction levels for each generated source code cluster. Subsequently, the plethora of quality profiles obtained is visualized such that conclusions about different quality problems in various clusters can be obtained at a glance.
Aspect composition in the aspect-oriented software may lead to the structural conflict and behavioral conflict, which are two key issues must be solved in the trusted aspect-oriented software development. The paper in...
详细信息
Aspect composition in the aspect-oriented software may lead to the structural conflict and behavioral conflict, which are two key issues must be solved in the trusted aspect-oriented software development. The paper introduces an approach to solve the problems of the structural conflict in the architecture level, based on the reflection mechanism, and brings forward an approach based on the concepts of design by contract and behavioral subtyping to achieve the automatic detection of the behavioral conflict at runtime.
The Modeling in softwareengineering (MiSE) workshops are a collaboration between the ICSE and MoDELS research communities, with a focus on using models to facilitate software development.
ISBN:
(纸本)9781605580791
The Modeling in softwareengineering (MiSE) workshops are a collaboration between the ICSE and MoDELS research communities, with a focus on using models to facilitate software development.
Embedded operating systems (EOS) manage the resources of the system and control device operations, and play an important role on optimizing system energy consumption. This paper proposes a new approach to estimate and...
详细信息
Embedded operating systems (EOS) manage the resources of the system and control device operations, and play an important role on optimizing system energy consumption. This paper proposes a new approach to estimate and optimize the energy consumption of the EOS and the applications at a fine-grained level. The approach is based on a micro-architectural power model and a new estimation model for operating system energy consumption. We apply the approach to an Intel Strong-Arm architecture platform running embedded Linux 2.4.18, analyzing its energy characteristics and also trying to optimize energy of the applications on it based on the analyzing results. The experiments demonstrate that the approach can identify energy consumption of fine-grained software components correctly and be used to optimize the energy consumption of EOS and applications.
In this paper, we propose a blind watermark detection scheme for digital cinema which is robust against D-A/A-D conversion attack. D-A/A-D conversion attack commonly happens during capturing cinema with a camera and i...
详细信息
In this paper, we propose a blind watermark detection scheme for digital cinema which is robust against D-A/A-D conversion attack. D-A/A-D conversion attack commonly happens during capturing cinema with a camera and is composed of various geometrical distortions as well as signal processing distortions. In many video applications, geometric distortions have been compensated by utilizing auto-correlation function (ACF). Since the ACF cannot resist projective transform but affine transform, we present a robust watermark detection scheme utilizing local auto-correlation function (LACF) with a mathematical model. Also, we suggest a way to design watermark pattern to improve performance of the LACF. We demonstrate robustness of the presented scheme against D-A/A- D conversion attacks for digital cinema as well as common video processing attacks.
Description logic based semantic query needs complete information from sources of knowledge where available information is often incomplete. To solve such incomplete reasoning problem, this paper embedded default logi...
详细信息
ISBN:
(纸本)9780769532639
Description logic based semantic query needs complete information from sources of knowledge where available information is often incomplete. To solve such incomplete reasoning problem, this paper embedded default logic into the description logic knowledge base, meanwhile prioritized the default rules, which preferred more specific default rules over more general ones. Then, an original incomplete query could be transformed into a complete query relative to the extended knowledge base, by checking default satisfiability of complex concept in accord with the query. Furthermore, the default satisfiability can be detected through a new extended tableau algorithm.
暂无评论