12 resultados para Call Graph

em CiencIPCA - Instituto Politécnico do Cávado e do Ave, Portugal


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Graphical user interfaces (GUIs) are critical components of todays software. Given their increased relevance, correctness and usability of GUIs are becoming essential. This paper describes the latest results in the development of our tool to reverse engineer the GUI layer of interactive computing systems. We use static analysis techniques to generate models of the user interface behaviour from source code. Models help in graphical user interface inspection by allowing designers to concentrate on its more important aspects. One particularly type of model that the tool is able to generate is state machines. The paper shows how graph theory can be useful when applied to these models. A number of metrics and algorithms are used in the analysis of aspects of the user interface's quality. The ultimate goal of the tool is to enable analysis of interactive system through GUIs source code inspection.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful in the areas of reverse engineering, program understanding, testing and software maintenance. Most slicing methods, usually oriented towards the imperative or object paradigms, are based on some sort of graph structure representing program dependencies. Slicing techniques amount, therefore, to (sophisticated) graph transversal algorithms. This paper proposes a completely different approach to the slicing problem for functional programs. Instead of extracting program information to build an underlying dependencies’ structure, we resort to standard program calculation strategies, based on the so-called Bird-Meertens formalism. The slicing criterion is specified either as a projection or a hiding function which, once composed with the original program, leads to the identification of the intended slice. Going through a number of examples, the paper suggests this approach may be an interesting, even if not completely general, alternative to slicing functional programs

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A large and growing amount of software systems rely on non-trivial coordination logic for making use of third party services or components. Therefore, it is of outmost importance to understand and capture rigorously this continuously growing layer of coordination as this will make easier not only the veri cation of such systems with respect to their original speci cations, but also maintenance, further development, testing, deployment and integration. This paper introduces a method based on several program analysis techniques (namely, dependence graphs, program slicing, and graph pattern analysis) to extract coordination logic from legacy systems source code. This process is driven by a series of pre-de ned coordination patterns and captured by a special purpose graph structure from which coordination speci cations can be generated in a number of di erent formalisms

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Current software development often relies on non-trivial coordination logic for combining autonomous services, eventually running on different platforms. As a rule, however, such a coordination layer is strongly woven within the application at source code level. Therefore, its precise identification becomes a major methodological (and technical) problem and a challenge to any program understanding or refactoring process. The approach introduced in this paper resorts to slicing techniques to extract coordination data from source code. Such data are captured in a specific dependency graph structure from which a coordination model can be recovered either in the form of an Orc specification or as a collection of code fragments corresponding to the identification of typical coordination patterns in the system. Tool support is also discussed

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The integration and composition of software systems requires a good architectural design phase to speed up communications between (remote) components. However, during implementation phase, the code to coordinate such components often ends up mixed in the main business code. This leads to maintenance problems, raising the need for, on the one hand, separating the coordination code from the business code, and on the other hand, providing mechanisms for analysis and comprehension of the architectural decisions once made. In this context our aim is at developing a domain-specific language, CoordL, to describe typical coordination patterns. From our point of view, coordination patterns are abstractions, in a graph form, over the composition of coordination statements from the system code. These patterns would allow us to identify, by means of pattern-based graph search strategies, the code responsible for the coordination of the several components in a system. The recovering and separation of the architectural decisions for a better comprehension of the software is the main purpose of this pattern language

Relevância:

10.00% 10.00%

Publicador:

Resumo:

What sort of component coordination strategies emerge in a software integration process? How can such strategies be discovered and further analysed? How close are they to the coordination component of the envisaged architectural model which was supposed to guide the integration process? This paper introduces a framework in which such questions can be discussed and illustrates its use by describing part of a real case-study. The approach is based on a methodology which enables semi-automatic discovery of coordination patterns from source code, combining generalized slicing techniques and graph manipulation

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful in the areas of reverse engineering, program understanding, testing and software maintenance. Most slicing methods, usually targeting either the imperative or the object oriented paradigms, are based on some sort of graph structure representing program dependencies. Slicing techniques amount, therefore, to (sophisticated) graph transversal algorithms. This paper proposes a completely different approach to the slicing problem for functional programs. Instead of extracting program information to build an underlying dependencies’ structure, we resort to standard program calculation strategies, based on the so-called Bird- Meertens formalism. The slicing criterion is specified either as a projection or a hiding function which, once composed with the original program, leads to the identification of the intended slice. Going through a number of examples, the paper suggests this approach may be an interesting, even if not completely general alternative to slicing functional programs

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The adoption of the “new public management” in the hospital sector brought about greater presence and power to professional managers in hospitals, thus increasing the risk of conflict in the doctor-manager relationship. Aiming to enrich the discussion on the factors that could be the bases for this conflict and considering the role of accounting, the study presented here corresponds, basically, to what we call “content analysis” of qualitative studies. The results demonstrate that the Portuguese doctors as the sample studied accept, in essence, the principles of enterprise management and recognize the use of accounting information in the scope of their functions as long as they are called to participate as legitimate actors, and authorities respect their desires to preserve a practice which they consider of quality.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present article aims to analyze the Judgment no. º 63/2006 of the Constitutional Court, of January 24, 2006, verifying the characteristics of the case, under reference abstract and concrete, of the constitutional principle of the prohibition of retroactive tax. It also examines the core aspects of the temporal validity of the legal and tax rules, brevitatis causa of legal and fiscal standards. Thus, it scrutinizes the call application of tax rules (and / or tax) within the application in time, consisting brief notes on the legal tradition-Lusitanian, from the standpoint of doctrine, from 1976 to 1985 including, recalling the Thesis Salazar on non-retroactivity of tax law. § O presente artigo pretende analisar o Acórdão do Tribunal Constitucional n.º 63/2006, de 24 de Janeiro de 2006, verificando de forma sintética as características do caso concreto, sob referência abstracta e concreta, do princípio constitucional da proibição de imposto retroativos, analisando ainda os aspectos nucleares da eficácia temporal das normas jurídico-tributárias, brevitatis causa, das normas jurídico-fiscais. Para tanto, se averigua a chamada aplicação das normas fiscais (e/ou tributárias) no seio da aplicação no tempo, constando breves notas sobre a tradição jurídico-lusitana, do ponto de vista da doutrina, a partir de 1976, designadamente até 1985, recordando a Tese de Salzar sobre a não retroatividade da lei fiscal.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Graphical user interfaces (GUIs) are critical components of today's open source software. Given their increased relevance, the correctness and usability of GUIs are becoming essential. This paper describes the latest results in the development of our tool to reverse engineer the GUI layer of interactive computing open source systems. We use static analysis techniques to generate models of the user interface behavior from source code. Models help in graphical user interface inspection by allowing designers to concentrate on its more important aspects. One particular type of model that the tool is able to generate is state machines. The paper shows how graph theory can be useful when applied to these models. A number of metrics and algorithms are used in the analysis of aspects of the user interface's quality. The ultimate goal of the tool is to enable analysis of interactive system through GUIs source code inspection.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As formas de definir «corrupção e fraude» são infinitas, pelo que a aplicação do Direito penal constitucional pode ficar prejudicada. A comunicação e o comentário público e política são por vezes feitos em termos profundamente equivocados. Recentemente, em Portugal, destacados políticos e comentadores chegaram a apelar à «criminalização do enriquecimento ilícito», nem que fosse com o sacrifício da própria Constituição ou do Estado de Direito. É a democracia que passa a estar em perigo. Ao mesmo tempo que se defende com fanatismo quase teológico o sistema económico capitalista, procura-se consagrar na lei a sua destruição. Ou seja, há uma certa demagogia política que quer ter tudo ao mesmo tempo como se isso fosse possível. Perante isto, resta ao cidadão comum agir se for necessário sob as possibilidades das causas de justificação e fazendo uso do direito constitucional de resistência. ABSTRACT Ways to define «corruption and fraud» are endless, so the application of constitutional criminal law may be impaired. The communication and public comment and politics are sometimes done in terms profoundly mistaken. Recently, in Portugal, prominent politicians and commentators have come to call the «criminalization of illicit enrichment» (embezzlement) even if it was at the sacrifice of the Constitution or the rule of law. It is democracy that happens to be in danger. At the same time it defends itself with almost theological fanaticism the capitalist economic system, seeking to enshrine in law its destruction. That is, there is a certain political demagoguery that wants to have everything at the same time as if that were possible. Given this, it remains to ordinary act if necessary under the scope of defenses and making use of the constitutional right of resistance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A chamada Lei do Branqueamento de Capitais - Lei 25/2008, de 5/6 e alterações -, considera que estão sujeitas a especiais obrigações os “Notários, conservadores de registos, advogados, solicitadores e outros profissionais independentes, constituídos em sociedade ou em prática individual, que intervenham ou assistam, por conta de um cliente ou noutras circunstâncias, em operações: § vi) De alienação e aquisição de direitos sobre praticantes de actividades desportivas profissionais;”. Estamos a pensar, como é óbvio, nas transferências de jogadores de futebol, nomeadamente na Europa, as quais atingem somas astronómicas e muitas vezes ocultas. São por demais evidentes as notícias da comunicação social que dão conta que, em muitos dos casos, os verdadeiros valores envolvidos não são os declarados. Quer para fugir aos impostos, quer para esconder o pagamento de avultadas comissões extraordinárias; Abstract: The Call of the Money Laundering Law - Law 25/2008, of 5/6 and change - considers that are subject to the special obligations "notaries, registrars, lawyers, solicitors and other independent professionals, made in society or in practice individual, that participating or assisting, on behalf of a client or other circumstances in operations: § vi) sale and acquisition of rights to practitioners of professional sports activities; ". We are thinking, of course, transfers of football players, particularly in Europe, which reach astronomical sums and often hidden. Are all too apparent the news media that realize that in many cases the true values involved are not declared. Want to evade taxes or to hide the payment of large exceptional fees.