950 resultados para NiPAT, code pattern analysis, object-oriented programming languages


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Large read-only or read-write transactions with a large read set and a small write set constitute an important class of transactions used in such applications as data mining, data warehousing, statistical applications, and report generators. Such transactions are best supported with optimistic concurrency, because locking of large amounts of data for extended periods of time is not an acceptable solution. The abort rate in regular optimistic concurrency algorithms increases exponentially with the size of the transaction. The algorithm proposed in this dissertation solves this problem by using a new transaction scheduling technique that allows a large transaction to commit safely with significantly greater probability that can exceed several orders of magnitude versus regular optimistic concurrency algorithms. A performance simulation study and a formal proof of serializability and external consistency of the proposed algorithm are also presented.^ This dissertation also proposes a new query optimization technique (lazy queries). Lazy Queries is an adaptive query execution scheme which optimizes itself as the query runs. Lazy queries can be used to find an intersection of sub-queries in a very efficient way, which does not require full execution of large sub-queries nor does it require any statistical knowledge about the data.^ An efficient optimistic concurrency control algorithm used in a massively parallel B-tree with variable-length keys is introduced. B-trees with variable-length keys can be effectively used in a variety of database types. In particular, we show how such a B-tree was used in our implementation of a semantic object-oriented DBMS. The concurrency control algorithm uses semantically safe optimistic virtual "locks" that achieve very fine granularity in conflict detection. This algorithm ensures serializability and external consistency by using logical clocks and backward validation of transactional queries. A formal proof of correctness of the proposed algorithm is also presented. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Over the past five years, XML has been embraced by both the research and industrial community due to its promising prospects as a new data representation and exchange format on the Internet. The widespread popularity of XML creates an increasing need to store XML data in persistent storage systems and to enable sophisticated XML queries over the data. The currently available approaches to addressing the XML storage and retrieval issue have the limitations of either being not mature enough (e.g. native approaches) or causing inflexibility, a lot of fragmentation and excessive join operations (e.g. non-native approaches such as the relational database approach). ^ In this dissertation, I studied the issue of storing and retrieving XML data using the Semantic Binary Object-Oriented Database System (Sem-ODB) to leverage the advanced Sem-ODB technology with the emerging XML data model. First, a meta-schema based approach was implemented to address the data model mismatch issue that is inherent in the non-native approaches. The meta-schema based approach captures the meta-data of both Document Type Definitions (DTDs) and Sem-ODB Semantic Schemas, thus enables a dynamic and flexible mapping scheme. Second, a formal framework was presented to ensure precise and concise mappings. In this framework, both schemas and the conversions between them are formally defined and described. Third, after major features of an XML query language, XQuery, were analyzed, a high-level XQuery to Semantic SQL (Sem-SQL) query translation scheme was described. This translation scheme takes advantage of the navigation-oriented query paradigm of the Sem-SQL, thus avoids the excessive join problem of relational approaches. Finally, the modeling capability of the Semantic Binary Object-Oriented Data Model (Sem-ODM) was explored from the perspective of conceptually modeling an XML Schema using a Semantic Schema. ^ It was revealed that the advanced features of the Sem-ODB, such as multi-valued attributes, surrogates, the navigation-oriented query paradigm, among others, are indeed beneficial in coping with the XML storage and retrieval issue using a non-XML approach. Furthermore, extensions to the Sem-ODB to make it work more effectively with XML data were also proposed. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Protecting confidential information from improper disclosure is a fundamental security goal. While encryption and access control are important tools for ensuring confidentiality, they cannot prevent an authorized system from leaking confidential information to its publicly observable outputs, whether inadvertently or maliciously. Hence, secure information flow aims to provide end-to-end control of information flow. Unfortunately, the traditionally-adopted policy of noninterference, which forbids all improper leakage, is often too restrictive. Theories of quantitative information flow address this issue by quantifying the amount of confidential information leaked by a system, with the goal of showing that it is intuitively "small" enough to be tolerated. Given such a theory, it is crucial to develop automated techniques for calculating the leakage in a system. ^ This dissertation is concerned with program analysis for calculating the maximum leakage, or capacity, of confidential information in the context of deterministic systems and under three proposed entropy measures of information leakage: Shannon entropy leakage, min-entropy leakage, and g-leakage. In this context, it turns out that calculating the maximum leakage of a program reduces to counting the number of possible outputs that it can produce. ^ The new approach introduced in this dissertation is to determine two-bit patterns, the relationships among pairs of bits in the output; for instance we might determine that two bits must be unequal. By counting the number of solutions to the two-bit patterns, we obtain an upper bound on the number of possible outputs. Hence, the maximum leakage can be bounded. We first describe a straightforward computation of the two-bit patterns using an automated prover. We then show a more efficient implementation that uses an implication graph to represent the two- bit patterns. It efficiently constructs the graph through the use of an automated prover, random executions, STP counterexamples, and deductive closure. The effectiveness of our techniques, both in terms of efficiency and accuracy, is shown through a number of case studies found in recent literature. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

General note: Title and date provided by Bettye Lane.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The locative project is in a condition of emergence, an embryonic state in which everything is still up for grabs, a zone of consistency yet to emerge. As an emergent practice locative art, like locative media generally, it is simultaneously opening up new ways of engaging in the world and mapping its own domain. (Drew Hemment, 2004) Artists and scientists have always used whatever emerging technologies existed at their particular time throughout history to push the boundaries of their fields of practice. The use of new technologies or the notion of ‘new’ media is neither particularly new nor novel. Humans are adaptive, evolving and will continue to invent and explore technological innovation. This paper asks the following questions: what role does adaptive and/or intelligent art play in the future of public spaces, and how does this intervention alter the relationship between theory and practice? Does locative or installation-based art reach more people, and does ‘intelligent’ or ‘smart’ art have a larger role to play in the beginning of this century? The speakers will discuss their current collaborative prototype and within the presentation demonstrate how software art has the potential to activate public spaces, and therefore contribute to a change in spatial or locative awareness. It is argued that the role and perhaps even the representation of the audience/viewer is left altered through this intervention. 1. A form of electronic imagery created by a collection of mathematically defined lines and/or curves. 2. An experiential form of art which engages the viewer both from within a specific location and in response to their intentional or unintentional input.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As users continually request additional functionality, software systems will continue to grow in their complexity, as well as in their susceptibility to failures. Particularly for sensitive systems requiring higher levels of reliability, faulty system modules may increase development and maintenance cost. Hence, identifying them early would support the development of reliable systems through improved scheduling and quality control. Research effort to predict software modules likely to contain faults, as a consequence, has been substantial. Although a wide range of fault prediction models have been proposed, we remain far from having reliable tools that can be widely applied to real industrial systems. For projects with known fault histories, numerous research studies show that statistical models can provide reasonable estimates at predicting faulty modules using software metrics. However, as context-specific metrics differ from project to project, the task of predicting across projects is difficult to achieve. Prediction models obtained from one project experience are ineffective in their ability to predict fault-prone modules when applied to other projects. Hence, taking full benefit of the existing work in software development community has been substantially limited. As a step towards solving this problem, in this dissertation we propose a fault prediction approach that exploits existing prediction models, adapting them to improve their ability to predict faulty system modules across different software projects.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Nowadays, World Heritage Sites (WHS) have been facing new challenges, partially due to a different tourism consumption patterns. As it is highlighted in a considerable amount of studies, visits to these sites are almost justified by this prestigious classification and motivations are closely associated with their cultural aspects and quality of the overall environment (among others, Marujo et al, 2012). However, a diversity of tourists’ profiles have been underlined in the literature. Starting from the results obtained in a previous study about cultural tourists’ profile, conducted during the year 2009 in the city of Évora, Portugal, it is our intend to compare the results with a recent survey applied to the visitors of the same city. Recognition of Évora by UNESCO in 1986 as “World Heritage” has fostered not only the preservation of heritage but also the tourist promotion of the town. This study compares and examined tourists’ profile, regarding from the tourists’ expenditure patterns in Évora. A total of 450 surveys were distributed in 2009, and recently, in 2015, the same numbers of surveys were collected. Chi-squared Automatic Interaction Detection (CHAID) was applied to model consumer patterns of domestic and international visitors, based on socio demographic, trip characteristics, length of stay and the degree of satisfaction of pull factors. CHAID allowed find a population classification in groups that able to describe the dependent variable, average daily tourist expenditure. Results revealed different patterns of daily average expenditure amongst the years, 2009 and 2015, even if primarily results not revealed significant variations in socio-demographic and trip characteristics among the visitors’ core profile. Local authorities should be aware of this changing expensive behavior of cultural visitors and should formulate strategies accordingly. Policy and managerial recommendations are discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study investigates tourists’ expenditure patterns in the city of Évora, a world heritage site (WHS) classified by UNESCO. The use of chi-squared automatic interaction detection (CHAID) was chosen, allowing the identification of distinct segments based on expenditure patterns. Visitors’ expenditure patterns have proven to be a pertinent element for a broader understanding of visitors’ behaviour at cultural destinations. Visitors’ expenditure patterns were revealed to be increasing within years studied.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

O presente artigo traz uma avaliação sobre um processo de implementação do PBL que ocorreu no curso de Engenharia Informática na Faculdade de Engenharia da Universidade Eduardo Mondlane em Moçambique. Por este processo ser novo no contexto de ensino de Engenharia em Moçambique foram os desafios encontrados por parte dos docentes e estudantes relativos a implementação, coordenação e adequação do currículo a metodologia do PBL, fazendo com que o processo de implementação fosse gradual. Assim no primeiro semestre de 2014 foi implementado um processo PBL piloto envolvendo as disciplinas de Programação Orientada à Objetos 1 e Base de Dados 1, que foram disciplinas escolhidas pelo facto de seus currículos terem matérias comuns, todos desafios e comentários dados pelos estudantes foram levados em conta no desenho do segundo processo PBL para o segundo semestre de 2014 que envolveu as disciplinas de Programação Orientada à Objetos 2, Base de Dados 2 e Sistemas de Multimídia fazendo com que houvesse mais informação para o terceiro processo envolvendo as disciplinas de Engenharia de Software 1 e Programação em Web. A avaliação do processo por parte dos estudantes, veio através de inquiridos onde os estudantes fizeram chegar as suas preocupações e ideias a respeito do PBL e dos moldes em que este estava a ser implementado no currículo. O processo de implementação do PBL pode ser considerado uma experiência bem sucedida e com futuro promissor e que de certeza vai ajudar a inovar os processos de ensino de engenharia em Moçambique.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Os limites entre os domínios do software e do hardware são cada vez mais ténues, pelo que técnicas inicialmente experimentadas no software têm vindo a ser gradualmente aplicadas no hardware. Este artigo pretende descrever o estado actual da utilização da tecnologia de programação orientada por objectos no projecto de hardware digital. São analisadas as vantagens e implicações quando se introduzem conceitos ligados à tecnologia orientada por objectos em projectos de hardware e é apresentado um exemplo utilizando uma das extensões orientadas por objectos da linguagem VHDL.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

L'objectiu és una aplicació que permeti realitzar el càlcul del volum de terres disponibles en el subsòl d'un àrea seleccionada. L'objectiu final del projecte serà crear un Sistema d'Informació Geogràfica SIG que ajudi a valorar quines parcel¿les de l'àrea seleccionada són les que disposen de més volum de terres per iniciar la seva explotació. Per a això, es disposa del programari gvSIG i les seves extensions (SEXTANTE) i de tota la informació que es pugui obtenir sobre els SIG, Cartografia, Geodèsia... Per dur a terme aquest projecte es necessita tenir experiència en Bases de dades, Programació Orientada a Objectes i seria recomanable tenir coneixements sobre Enginyeria del Programador. El projecte se centrarà en la utilització de gvSIG, com un exemple concret de programari SIG de lliure accés, solució desenvolupada per la ¿Conselleria d%o2019Obris Publiquis de la Generalitat Valenciana¿. Una part d'aquest projecte consistirà a avaluar aquest programari. El resultat final serà l'obtenció dels coneixements necessaris per poder treballar amb dades espacials a més d'una aplicació SIG per al càlcul del volum de terres d'un àrea seleccionada.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

En el presente proyecto se ha desarrollado una aplicación para gestionar una instalación deportiva. Esta aplicación ha sido elaborada siguiendo el ciclo de vida en cascada. El software obtenido es de tipo cliente/servidor y ha sido realizado con la tecnología orientada a objetos utilizando Java como lenguaje de programación, RMI como mecanismo para acceder a las operaciones del sistema de forma remota, y proporcionando a los usuarios una interfaz muy clara y amigable.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Aquest treball de final de carrera pretén cobrir una necessitat divulgativa del món de l'espeleologia, proporcionant al col·lectiu espeleològic una aplicació basada en web que permeti publicar, de forma cooperativa, ressenyes de cavitats incorporant dades textuals, fotografies, topografies i mapes d'ubicació.El projecte s'ha desenvolupat com a Treball de Final de Carrera de l'àrea J2EE de l'Enginyeria Tècnica en Informàtica de Gestió. La seva implementació, per tant, està basada en Programació Orientada a Objectes amb llenguatge Java i tecnologies J2EE.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

L'objectiu que es proposa aquest document és conèixer la problemàtica de la persistència dels objectes, trobar i estudiar les diferents solucions existents i estudiar-ne una de concreta, la capa de persistència JDO.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

En aquest projecte s'ha desenvolupat un sistema de comunicació (xat) segur.