The paper presents the systematic top-down design of a slown-down component that spreads an incoming stream of almost synchronous messages such that each two proper messages in the output stream are separated by at le...
详细信息
The construction and development of "two-oriented society" in Wuhan city circle should be combined with the development of colleges and universities in the region. It's necessary to update the concept an...
详细信息
In the emerging field of Ambient Intelligence (AmI), software is deployed in wireless open networks of mobile devices. Such open networks require stringent security measures as unknown and untrusted hosts may join the...
详细信息
ISBN:
(纸本)1595932836
In the emerging field of Ambient Intelligence (AmI), software is deployed in wireless open networks of mobile devices. Such open networks require stringent security measures as unknown and untrusted hosts may join the network. In an object-oriented language, where objects are distributed and moved across the network, it thus becomes important to be able to enforce object encapsulation. In contemporary object-oriented programming languages, powerful operations such as object extension (inheritance), cloning and reflection, are typically provided via omnipotent language operators that fail to uphold object encapsulation, because they can be applied without the explicit consent of the concerned object. This paper formulates a language design principle -extreme encapsulation- that precludes the use of such harmful operators, and proposes a corresponding language feature -method attributes- that makes it possible to provide the flexibility of object extension, cloning and reflection without compromising on object encapsulation. Although some existing object-based languages can be said to support extreme encapsulation, our contribution is to support it in a delegation-based, prototype-based language named ChitChat. Copyright 2005 ACM.
As a crucial parameter for a few-cycle laser pulse, the carrier envelope phase(CEP) substantially determines the laser waveform. We propose a method to directly describe the CEP of an isolated attosecond pulse(IAP) by...
详细信息
As a crucial parameter for a few-cycle laser pulse, the carrier envelope phase(CEP) substantially determines the laser waveform. We propose a method to directly describe the CEP of an isolated attosecond pulse(IAP) by the vortex-shaped momentum pattern, which is generated from the tunneling ionization of a hydrogen atom by a pair of time-delayed, oppositely and circularly polarized IAP-IR pulses. Superior to the angular streaking method that characterizes the CEP in terms of only one streak, our method describes the CEP of an IAP by the features of multiple streaks in the vortex pattern. The proposed method may open the possibility of capturing sub-cycle extreme ultraviolet dynamics.
Writing ambient-oriented software for mobile devices connected through wireless network connections provides new challenges in the field of exception handling. It involves dealing with issues such as asynchronous comm...
详细信息
Peer-to-peer (P2P) networks such as Gnutella and BitTorrent have revolutionised Internet based applications. P2P approaches provide a number of benefits, however most cycle stealing projects, such as SETI@home, have c...
详细信息
This paper presents linguistic primitives for publish/subscribe programming using events and objects. We integrate our primitives into a strongly typed object-oriented language through four mechanisms: (1) serializati...
详细信息
This paper presents linguistic primitives for publish/subscribe programming using events and objects. We integrate our primitives into a strongly typed object-oriented language through four mechanisms: (1) serialization, (2) multiple subtyping, (3) closures, and (4) deferred code evaluation. We illustrate our primitives through Java, showing how we have overcome its respective lacks. A precompiler transforms statements based on our publish/subscribe primitives into calls to specifically generated typed adapters, which resemble the typed stubs and skeletons generated by the rmic precompiler for remote method invocations in Java.
Object-oriented software can be described in many different ways. In this extended abstract of [MMSH97] we focus on the question how these different software descriptions can best be combined in order to facilitate re...
详细信息
Data gathering is an active research topic for wireless sensor networks WSNs with internet of things IoTs. Optimal data gathering enables collecting sensor data efficiently with minimum cost and energy consumption for...
详细信息
暂无评论