Software technologies, such as model-based testing approaches, have specific characteristics and limitations that can affect their use in software projects. To make available knowledge regarding such technologies is i...
详细信息
ISBN:
(纸本)9781605580302
Software technologies, such as model-based testing approaches, have specific characteristics and limitations that can affect their use in software projects. To make available knowledge regarding such technologies is important to support the decision regarding their use in software projects. In particular, a choice of model-based testing approach can influence testing success or failure. Therefore, this paper aims at describing knowledge acquired from a systematic review regarding model-based testing approaches and proposing an infrastructure towards supporting their selection for software projects. Copyright 2008 ACM.
Teaching engineering and technology subjects involves conveying understanding of abstract information structures and processes such as complex telecommunications protocols, complex mathematical concepts, and data stru...
详细信息
Teaching engineering and technology subjects involves conveying understanding of abstract information structures and processes such as complex telecommunications protocols, complex mathematical concepts, and data structures. These are multidimensional and can be difficult to grasp quickly. Supported by a Hewlett-Packard (HP) Technology for Teaching grant, the School of engineering and Technology at National University has embarked on a project to enable students to grasp these complex concepts more quickly and easily, using continuous dialog among students and instructors as the structures are first introduced and then examined from multiple perspectives through real-time interaction among students, small groups, and instructors. HP Wireless Tablet PCs are used to discuss and experiment with diagrams and processes in realtime. This allows combining lectures and problem-solving sessions into a single class session. Our hypothesis is that: 1) an in-depth learning of theory is accomplished, and 2) student engagement is enhanced. Presentation of theory by the instructor is integrated with application while the theory is still in the student's short-term memory. Students no longer have to wait for a separate session such as a recitation session to apply the concepts. This approach often takes less time. In addition to accelerating the learning process, expert instructors find this approach more rewarding as students grasp new concepts more quickly. Analysis of data captured from both students and instructors are presented to support our hypotheses, and our results are compared with similar research carried out by other universities. In addition, the level of interaction enabled by the use of HP Tablets in on-line classes is discussed. The best teaching tools available in existing on-line teaching platforms are compared with the additional tools available in on-site courses when every student has a wireless Tablet PC and specific recommendations are made to on-line teachi
Experimental studies have been used as a mechanism to acquire knowledge through a scientific approach based on measurement of phenomena in different areas. However it is hard to run such studies when they require mode...
详细信息
Experimental studies have been used as a mechanism to acquire knowledge through a scientific approach based on measurement of phenomena in different areas. However it is hard to run such studies when they require models (simulation), produce amount of information, and explore science in scale. In this case, a computerized infrastructure is necessary and constitutes a complex system to be built. In this paper we discuss an experimentation environment that has being built to support large scale experimentation and scientific knowledge management in software engineering.
Secure provenance techniques are essential in generating trustworthy provenance records, where one is interested in protecting their integrity, confidentiality, and availability. In this work, we suggest an architectu...
详细信息
Secure provenance techniques are essential in generating trustworthy provenance records, where one is interested in protecting their integrity, confidentiality, and availability. In this work, we suggest an architecture to provide protection of authorship and temporal information in grid-enabled provenance systems. It can be used in the resolution of conflicting intellectual property claims, and in the reliable chronological reconstitution of scientific experiments. We observe that some techniques from public key infrastructures can be readily applied for this purpose. We discuss the issues involved in the implementation of such architecture and describe some experiments realized with the proposed techniques.
In this paper we present the architecture for the Personal Autonomic Desktop Manager, a self managing application designed to act on behalf of the user in several aspects: protection, healing, optimization and configu...
详细信息
In this paper we present the architecture for the Personal Autonomic Desktop Manager, a self managing application designed to act on behalf of the user in several aspects: protection, healing, optimization and configuration. The overall goal of this research is to improve the correlation of the autonomic self{sup}* properties and doing so also enhance the overall self-management capacity of the desktop (autonomicity). We introduce the Circulatory Computing (CC) model, a self-managing system initiative based on the biological metaphor of the cardiovascular system, and use its concepts in the design and implementation of the architecture.
Voltage spikes are ubiquitous in biological nervous systems. How spikes can be used to encode signals, facilitate communication, and implement important computations is an important question of contemporary neuroscien...
详细信息
Voltage spikes are ubiquitous in biological nervous systems. How spikes can be used to encode signals, facilitate communication, and implement important computations is an important question of contemporary neuroscience. Acoustic processing tasks provide a rich range of applications for this encoding scheme. As a summary of the Ph.D. research of the first author, we present two analog VLSI spike-based example systems that process acoustic information using spikes: a model of the neural signal processing involved in bat echolocation, and a low-power, time-domain acoustic periodicity detector.
To support our ongoing work in modeling bat echolocation, an artificial bat head was designed and fabricated using a 3D printer, an ultrasonic cochlea-like filter bank with 16 channels was designed with moderate quali...
详细信息
To support our ongoing work in modeling bat echolocation, an artificial bat head was designed and fabricated using a 3D printer, an ultrasonic cochlea-like filter bank with 16 channels was designed with moderate quality (Q) factor, and 128 spiking neurons convert these signals to spike trains. A two-dimensional address-event arbiter is used to transmit these spikes off of the chip. We demonstrate that the population of spiking neurons can be decoded to estimate azimuth and elevation of ultrasonic chirps. This chip was fabricated in a commercially-available 0.5(mu)m CMOS process and consumes approximately 36(mu)W.
Recommendation accuracy is especially important in mobile e-commerce environments due to the limited screen size of mobile devices and relatively expensive connection costs. Mobile content tends to be fashionable and ...
详细信息
ISBN:
(纸本)1601320639
Recommendation accuracy is especially important in mobile e-commerce environments due to the limited screen size of mobile devices and relatively expensive connection costs. Mobile content tends to be fashionable and are geared for young users. This paper presents a novel method of building a more accurate recommender system for mobile content in a mobile ecommerce environment. The method is based on collaborative filtering, and models content diffusion and user preference transition and incorporates them in constructing pseudo ratings from implicit feedback data. In a variety of experiments, recommender systems based on the method showed significantly better recommendation accuracy than a pure collaborative filtering-based recommender system.
One of the most known applications of Discrete Optimization is on scheduling. In contrast, one of the most known applications of Continuous Nonlinear Optimization is on the control of dynamic systems. In this paper, w...
详细信息
ISBN:
(纸本)9789955282839
One of the most known applications of Discrete Optimization is on scheduling. In contrast, one of the most known applications of Continuous Nonlinear Optimization is on the control of dynamic systems. In this paper, we combine both views, solving scheduling problems as dynamic systems, modeled as discrete-time nonlinear optimal control problems with state and control continuous variables subjected to upper and lower bounds. The proposed formulation has the following advantages over discrete (mixedinteger) models: a smaller number of variables is employed, and no 0-1 variable is needed. Therefore, the scheduling problem can be solved as a standard continuous nonlinear program. Complementarity constraints are used to represent scheduling decisions, defining a nonconvex problem, which can be solved with Global Optimization (GO) and Nonlinear programming (NLP) methods. Applications with a continuous process background are discussed, such as the ones from petroleum and water & wastewater industries, because they pose challenging issues, with a combination of nonlinear and combinatorial aspects. One example we discuss in detail is the crude oil scheduling in ports, with tanks, pipelines, jetties, and tanker vessels and blending operations. The recent literature on this problem is rich in mixedinteger linear programming (MILP) models, therefore we developed a procedure to reformulate certain mixed-integer constraints as complementarity constraints, discarding the associated binary variables. The resulting NLP model is equivalent to the original MILP, in a sense that a feasible point in the NLP is also a feasible point in the MILP. A number of numerical cases are discussed to illustrate the validity of this approach. Despite obtaining good results with the NLP approach, we acknowledge that the MILP has the desirable feature of having only global optima, whereas the NLP is non-convex. Therefore, we present an hybrid NLP-MILP scheme that uses the NLP to generate new MILP inte
暂无评论