Recognizing graphic objects from binary images is an important task in many real-life applications. Generally, there are two ways to do the graphics recognition: one-step methods and two-step methods. The former recog...
详细信息
A previously unknown form of compromising emanations has been discovered. LED status indicators on data communication equipment, under certain conditions, are shown to carry a modulated optical signal that is signific...
详细信息
Modern enterprises are irreversibly dependent on large-scale, adaptive, component-based information systems whose complexity frequently exceeds current engineering capabilities for intellectual control, resulting in p...
详细信息
Process improvement studies have tended to focus on software process improvement (SPI) framework such as the generic „best practices" models (e.g., CMM and SPICE), SPI Models (e.g., PDCA and IDEAL), and Quality I...
详细信息
It is common in client/server architectures for components to have SQL statements embedded in their source code. Components submit queries to relational databases using such standards as Universal Data Access (UDA) an...
详细信息
It is common in client/server architectures for components to have SQL statements embedded in their source code. Components submit queries to relational databases using such standards as Universal Data Access (UDA) and Open Database Connectivity (ODBC). The API that implements these standards is complex and requires the embedding of SQL statements in the language that is used to write the components. Such programming practices are widespread and result in increased complexity in maintaining systems. We propose an approach that eliminates the embedding of SQL in programming languages, thereby enabling the automation of important software maintenance tasks.
Formal methods, especially model checking, are an indispensable part of the softwareengineering process. With large software systems currently beyond the range of fully automatic verification, however, a combination ...
详细信息
Formal methods, especially model checking, are an indispensable part of the softwareengineering process. With large software systems currently beyond the range of fully automatic verification, however, a combination of decomposition and abstraction techniques is needed. To model check components of a system, a standard approach is to close the component with an abstraction of its environment. To make it useful in practice, the closing of the component should be automatic, both for data and for control abstraction. Specifically for model checking asynchronous open systems, external input queues should be removed, as they are a potential source of a combinatorial state explosion. In this paper we close a component synchronously by embedding the external environment directly into the system to avoid the external queues, while for the data, we use a two-valued abstraction, namely data influenced from the outside or not. This gives a more precise analysis than that investigated by Ioustinova et al. (2002). To further combat the state explosion problem, we combine this data abstraction with a static analysis to remove superfluous code fragments. The static analysis we use is reminiscent of that presented by Ioustinova et al., but we use a combination of a may and a must-analysis instead of a may-analysis.
The application of Hough Transform (HT) has been limited to small-size images for a long time. For large-size images, the peak detection and the line verification become much more time-consuming. Many HT-based line de...
详细信息
A storage area network (SAN) is a high-speed special-purpose network (or subnetwork) that interconnects different kinds of data storage devices with associated data servers on behalf of a larger network of users. In S...
详细信息
ISBN:
(纸本)9608052629
A storage area network (SAN) is a high-speed special-purpose network (or subnetwork) that interconnects different kinds of data storage devices with associated data servers on behalf of a larger network of users. In SAN, computers service local file requests directly from shared storage devices. Direct device access eliminates the server machines as bottlenecks to performance and availability. Communication is unnecessary between computers, since each machine views the storage as being locally attached. SAN provides us to very large physical storage up to 64-bit address space, but traditional file systems can't adapt to the file system for SAN because they have the limitation of scalability. In this paper we propose a new mechanism for file system using dynamic bitmap assignment. While traditional file systems rely on a fixed bitmap structures for metadata such as super block, inode, and directory entries, the proposed file system allocates bitmap and allocation area depend on file system features. Our approaches give a solution of the problem that the utilization of the file system depends on the file size in the traditional file systems. We show that the dynamic bitmap mechanism this improves the efficiency of disk usage in file system when compared to the conventional file systems.
This paper discusses the development of softwareengineering class projects that have produced tools which have been used to enrich the educational experience of engineering students, the end users of the software. Th...
详细信息
This paper discusses the development of softwareengineering class projects that have produced tools which have been used to enrich the educational experience of engineering students, the end users of the software. The projects have involved the creation, maintenance and evolution of software that helps the students determine their major, understand their learning style, develop a semester-by-semester plan of study, and formulate a class schedule each semester. The evolution of the structure of the softwareengineering project process is first presented. Having "internal" clients (i.e. those who are employees of the university) for projects that directly benefit engineering students is then compared to having "external" clients. The benefits gained by all stakeholders through these projects and data supporting the satisfaction levels of those stakeholders is presented. Finally, there is a discussion of funded research projects that have been spun off from of these projects, and the plans for the further educational software development through these grants.
Currently, a large gap exists between the number of open softwareengineering positions and the number of qualified software engineers to fill those positions. The Industry/University (I/U) subgroup of the Working Gro...
暂无评论