7 resultados para GENERAL PROGRAM

em CiencIPCA - Instituto Politécnico do Cávado e do Ave, Portugal


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful in the areas of reverse engineering, program understanding, testing and software maintenance. Most slicing methods, usually oriented towards the imperative or object paradigms, are based on some sort of graph structure representing program dependencies. Slicing techniques amount, therefore, to (sophisticated) graph transversal algorithms. This paper proposes a completely different approach to the slicing problem for functional programs. Instead of extracting program information to build an underlying dependencies’ structure, we resort to standard program calculation strategies, based on the so-called Bird-Meertens formalism. The slicing criterion is specified either as a projection or a hiding function which, once composed with the original program, leads to the identification of the intended slice. Going through a number of examples, the paper suggests this approach may be an interesting, even if not completely general, alternative to slicing functional programs

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Guimarães has hosted, during the year of 2012, one of the European Capital of Culture (ECOC). The evaluation of the event is needed as public, private and community funds are involved. The approach considers the tourists (domestic and international) as external and independent stakeholders who assessed the cultural activities developed during the event and the attributes of the city. The results of the survey show that hosting the 2012 ECOC was a major contribution for attracting new visitors to the city, although many of them just for a short period of time. The main source of general information collected by tourists was the Internet, and the traditional media. Only a small amount of respondents demonstrated a specialized knowledge of the cultural program. The most cited and appreciated performances came from the areas of music, exhibitions, and theatre. According to the perceptions of tourists, the tangible assets were clearly detached from the set of attributes of Guimarães, including buildings, churches and chapels, whereas intangible assets were less noted. Overall, Guimarães received a very positive evaluation related to city image and stay and is highly recommended by tourists to friends and relatives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on the development of specific slicing techniques for functional programs and their use for the identification of possible coherent components from monolithic code. An associated tool is also introduced. This piece of research is part of a broader project on program understanding and re-engineering of legacy code supported by formal methods

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract: in Portugal, and in much of the legal systems of Europe, «legal persons» are likely to be criminally responsibilities also for cybercrimes. Like for example the following crimes: «false information»; «damage on other programs or computer data»; «computer-software sabotage»; «illegitimate access»; «unlawful interception» and «illegitimate reproduction of protected program». However, in Portugal, have many exceptions. Exceptions to the «question of criminal liability» of «legal persons». Some «legal persons» can not be blamed for cybercrime. The legislature did not leave! These «legal persons» are v.g. the following («public entities»): legal persons under public law, which include the public business entities; entities utilities, regardless of ownership; or other legal persons exercising public powers. In other words, and again as an example, a Portuguese public university or a private concessionaire of a public service in Portugal, can not commit (in Portugal) any one of cybercrime pointed. Fair? Unfair. All laws should provide that all legal persons can commit cybercrimes. PS: resumo do artigo em inglês.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current software development relies increasingly on non-trivial coordination logic for com- bining autonomous services often running on di erent platforms. As a rule, however, in typical non-trivial software systems, such a coordination layer is strongly weaved within the application at source code level. Therefore, its precise identi cation becomes a major methodological (and technical) problem which cannot be overestimated along any program understanding or refactoring process. Open access to source code, as granted in OSS certi cation, provides an opportunity for the devel- opment of methods and technologies to extract, from source code, the relevant coordination information. This paper is a step in this direction, combining a number of program analysis techniques to automatically recover coordination information from legacy code. Such information is then expressed as a model in Orc, a general purpose orchestration language

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful in the areas of reverse engineering, program understanding, testing and software maintenance. Most slicing methods, usually targeting either the imperative or the object oriented paradigms, are based on some sort of graph structure representing program dependencies. Slicing techniques amount, therefore, to (sophisticated) graph transversal algorithms. This paper proposes a completely different approach to the slicing problem for functional programs. Instead of extracting program information to build an underlying dependencies’ structure, we resort to standard program calculation strategies, based on the so-called Bird- Meertens formalism. The slicing criterion is specified either as a projection or a hiding function which, once composed with the original program, leads to the identification of the intended slice. Going through a number of examples, the paper suggests this approach may be an interesting, even if not completely general alternative to slicing functional programs

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nanotechnology is the manipulation of matter on na almost atomic scale to produce new structures, materials, and devices. As potential occupational exposure to nanomaterials (NMs) becomes more prevalente, it is importante that the principles of medical surveillance and risk management be considered for workers in the nanotechnology industry.However, much information about health risk is beyond our current knowledge. Thus, NMs presente new challenges to understanding, predicting, andmanageing potential health risks. First, we briefly describe some general features of NMs and list the most importante types of NMs. This review discusses the toxicological potential of NMs by comparing possible injury mechanism and know, or potentially adverse, health effects. We review the limited research to date for occupational exposure to these particles and how a worker might be exposed to NMs. The principles of medical surveillance are reviewed to further the discussion of occupational health surveillance are reviewed to further the discussion of occupational health surveillance for workers exposed to NMs. We outlinehow occupational health professionals could contribute to a better knowledge of health effects by the utilization of a health surveillance program and by minimizing exposure. Finally, we discuss the early steps towards regulation and the difficulties facing regulators in controlling potentially harmful exposures in the absence of suficiente scientific evidence.