software applications often contain implicit knowledge in addition to functionality which is inherently object-oriented. Many approaches and systems exist that focus on separating rule-based knowledge from object-orie...
详细信息
ISBN:
(纸本)9781581138122
software applications often contain implicit knowledge in addition to functionality which is inherently object-oriented. Many approaches and systems exist that focus on separating rule-based knowledge from object-oriented functionality and representing it explicitly in a logic reasoning system. Support for seamless integration of this knowledge with the object-oriented functionality improves software development and evolution. Our hypothesis is that a linguistic symbiosis is required between the logic reasoning and object-oriented programming paradigms in order to achieve seamless integration. This paper presents a symbiotic extension of SOUL, a system which implements a logic programming language and a production system in Smalltalk. The presence of these two logic reasoning systems in SOUL ensures a comprehensive coverage of rule-based reasoning styles, more specifically forward and backward chaining. Our approach is evaluated by means of two case studies. We summarise a comprehensive survey, which shows that existing systems do not fully support seamless integration.
One of the popular network security programs supporting host access control is the 'TCP Wrapper' [13]. TCP Wrapper is a software-only system and many computers connected to the Internet are using it. But, TCP ...
详细信息
One of the popular network security programs supporting host access control is the 'TCP Wrapper' [13]. TCP Wrapper is a software-only system and many computers connected to the Internet are using it. But, TCP Wrapper does 'IP address-based' access control. IP address is not such a reliable source when authenticating a host. In this paper, we point out two possible attacks against the TCP Wrapper, propose a new way to prevent them, and describe the prototype implementation, Ethernet Wrapper. By adding an 'ethernet address check', we augmented the TCP Wrapper. The test results showed that Ethernet Wrapper can prevent such attacks effectively.
This working group met as part of the 1998 Workshop on Industrial-Strength Formal Specification Techniques (WIFT '98) in Boca Raton, Florida. As the working group title suggests, we discussed lessons learned, open...
详细信息
This working group met as part of the 1998 Workshop on Industrial-Strength Formal Specification Techniques (WIFT '98) in Boca Raton, Florida. As the working group title suggests, we discussed lessons learned, open issues and general suggestions surrounding the incorporation of formal methods in industrial development processes.
This paper presents the application of automated code generation to the development of marshalling code (also known as presentation conversion code). The techniques and automated tools as well as the results of an ind...
详细信息
This paper presents the application of automated code generation to the development of marshalling code (also known as presentation conversion code). The techniques and automated tools as well as the results of an industrial application are described. Marshalling code amounts to approximately half of the signalling software in subscriber radio, and as such constitutes approximately 20% of the total software in a radio. Development of marshalling code is considered to be a difficult, error-prone, and labor-intensive task. We have successfully developed significant portions of the infrastructure and subscriber software for the TETRA (Terrestrial Trunked Radio) protocol standard through automated code generation techniques using the process outlined in this paper.
This paper suggests component outsourcing method, the Fanning methodology, in which the software components in the distributed object such as the manager and the agent are created in the component type, and they are m...
详细信息
This paper suggests component outsourcing method, the Fanning methodology, in which the software components in the distributed object such as the manager and the agent are created in the component type, and they are maintained in the Platform Independent Class Repository(PICR). The Farming methodology is the methodology that executes these componentwares by downloading to the distributed object dynamically or statically if necessary. In case of composing the agent in TMN system, this methodology defines the function blocks of the distributed object as the framework list in order to perform the given role, composes the distributed object framework by transplanting the software components that composes this framework list from PICR, and composes the whole agent by outsourcing data component needed for the execution of the agent. Especially, OLB is executed by downloading it from PICR to the agent on demand dynamically. This methodology is based on the Farmer model. The Farmer model is the frame structure .model that introduces the concept of the system entity structure. The main purpose of the Farmer model is to separate and extract the comonent elements that compose the agent by analyzing the agent to be actually designed by the aspect. In this paper, the design and implementation of TMN agent constructor are described by using the Farming methodology.
Graph pattern mining is essential for deciphering complex networks. In the real world, graphs are dynamic and evolve over time, necessitating updates in mining patterns to reflect these changes. Traditional methods us...
详细信息
Graph pattern mining is essential for deciphering complex networks. In the real world, graphs are dynamic and evolve over time, necessitating updates in mining patterns to reflect these changes. Traditional methods use fine-grained incremental computation to avoid full re-mining after each update, which improves speed but often overlooks potential gains from examining inter-update interactions holistically, thus missing out on overall efficiency *** this paper, we introduce Cheetah, a dynamic graph mining system that processes updates in a coarse-grained manner by leveraging exploration domains. These domains exploit the community structure of real-world graphs to uncover data reuse opportunities typically missed by existing approaches. Exploration domains, which encapsulate extensive portions of the graph relevant to updates, allow multiple updates to explore the same regions efficiently. Cheetah dynamically constructs these domains using a management module that identifies and maintains areas of redundancy as the graph changes. By grouping updates within these domains and employing a neighbor-centric expansion strategy, Cheetah minimizes redundant data accesses. Our evaluation of Cheetah across five real-world datasets shows it outperforms current leading systems by an average factor of 2.63 ×.
暂无评论