948 resultados para IP-code


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A survey of hybridization in proper names and commercial signs. CODE-SWITCHING is commonly seen as more typical of the spoken language. But there are some areas of language use, including business names (e.g. restaurants), where foreign proper names, common nouns and sometimes whole phrases are imported into the written language too. These constitute a more stable variety of code-switching than the spontaneous and more unpredictable code-switching in the spoken language.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Let g be the genus of the Hermitian function field H/F(q)2 and let C-L(D,mQ(infinity)) be a typical Hermitian code of length n. In [Des. Codes Cryptogr., to appear], we determined the dimension/length profile (DLP) lower bound on the state complexity of C-L(D,mQ(infinity)). Here we determine when this lower bound is tight and when it is not. For m less than or equal to n-2/2 or m greater than or equal to n-2/2 + 2g, the DLP lower bounds reach Wolf's upper bound on state complexity and thus are trivially tight. We begin by showing that for about half of the remaining values of m the DLP bounds cannot be tight. In these cases, we give a lower bound on the absolute state complexity of C-L(D,mQ(infinity)), which improves the DLP lower bound. Next we give a good coordinate order for C-L(D,mQ(infinity)). With this good order, the state complexity of C-L(D,mQ(infinity)) achieves its DLP bound (whenever this is possible). This coordinate order also provides an upper bound on the absolute state complexity of C-L(D,mQ(infinity)) (for those values of m for which the DLP bounds cannot be tight). Our bounds on absolute state complexity do not meet for some of these values of m, and this leaves open the question whether our coordinate order is best possible in these cases. A straightforward application of these results is that if C-L(D,mQ(infinity)) is self-dual, then its state complexity (with respect to the lexicographic coordinate order) achieves its DLP bound of n /2 - q(2)/4, and, in particular, so does its absolute state complexity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We compared the quality of realtime fetal ultrasound images transmitted using ISDN and IP networks. Four experienced obstetric ultrasound specialists viewed standard recordings in a randomized trial and rated the appearance of 30 fetal anatomical landmarks, each on a seven-point scale. A total of 12 evaluations were performed for various combinations of bandwidths (128, 384 or 768 kbit/s) and networks (ISDN or IF). The intraobserver coefficient of variation was 2.9%, 5.0%, 12.7% and 14.7% for the four observers. The mean overall ratings by each of the four observers were 4.6, 4.8, 5.0 and 5.3, respectively (a rating of 4 indicated satisfactory visualization and 7 indicated as good as the original recording). Analysis of variance showed that there were no significant interobserver variations nor significant differences in the mean scores for the different types of videoconferencing machines used. The most significant variable affecting the mean score was the bandwidth used. For ISDN, the mean score was 3.7 at 128 kbit/s, which was significantly worse than the mean score of 4.9 at 384 kbit/s, which was in turn significantly worse than the mean score of 5.9 at 768 kbit/s. The mean score for transmission using IP was about 0.5 points lower than that using ISDN across all the different bandwidths, but the differences were not significant. It appears that IP transmission in a private (non-shared) network is an acceptable alternative to ISDN for fetal tele-ultrasound and one deserving further study.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Smart State is a Queensland Government initiative that recognises the central role of knowledge-based economic growth. In this context, the management of intellectual property (IP) within Queensland and Australian government research and development agencies has changed dramatically over recent years. Increasing expectations have been placed on utilising public sector IP to both underpin economic development and augment taxes by generating new revenues. Public sector research and development (R&D) management has come under greater scrutiny to commercialise and/or corporatise their activities. In a study of IP management issues in the Queensland Public Sector we developed a framework to facilitate a holistic audit of IP management in government agencies. In this paper we describe this framework as it pertains to one large public sector Agriculture R&D Agency, the Queensland Department of Primary Industries (QDPI). The four overlapping domains of the framework are: IP Generation; IP Rights; IP Uptake; and Corporate IP Support. The audit within QDPI, conducted in 2000 near the outset of Smart State, highlighted some well developed IP management practices within QDPI's traditional areas of focus of innovation (IP Generation) and IP ownership and licensing (IP Rights). However, further management practice developments are required to improve the domains of IP Uptake and Corporate IP Support.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Graphical user interfaces (GUIs) are critical components of todays software. Given their increased relevance, correctness and usability of GUIs are becoming essential. This paper describes the latest results in the development of our tool to reverse engineer the GUI layer of interactive computing systems. We use static analysis techniques to generate models of the user interface behaviour from source code. Models help in graphical user interface inspection by allowing designers to concentrate on its more important aspects. One particularly type of model that the tool is able to generate is state machines. The paper shows how graph theory can be useful when applied to these models. A number of metrics and algorithms are used in the analysis of aspects of the user interface's quality. The ultimate goal of the tool is to enable analysis of interactive system through GUIs source code inspection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

When developing interactive applications, considering the correctness of graphical user interfaces (GUIs) code is essential. GUIs are critical components of today's software, and contemporary software tools do not provide enough support for ensuring GUIs' code quality. GUIsurfer, a GUI reverse engineering tool, enables evaluation of behavioral properties of user interfaces. It performs static analysis of GUI code, generating state machines that can help in the evaluation of interactive applications. This paper describes the design, software architecture, and the use of GUIsurfer through an example. The tool is easily re-targetable, and support is available to Java/Swing, and WxHaskell. The paper sets the ground for a generalization effort to consider rich internet applications. It explores the GWT web applications' user interface programming toolkit.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Graphical user interfaces (GUIs) are critical components of today's software. Developers are dedicating a larger portion of code to implementing them. Given their increased importance, correctness of GUIs code is becoming essential. This paper describes the latest results in the development of GUISurfer, a tool to reverse engineer the GUI layer of interactive computing systems. The ultimate goal of the tool is to enable analysis of interactive system from source code.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

More and more current software systems rely on non trivial coordination logic for combining autonomous services typically running on different platforms and often owned by different organizations. Often, however, coordination data is deeply entangled in the code and, therefore, difficult to isolate and analyse separately. COORDINSPECTOR is a software tool which combines slicing and program analysis techniques to isolate all coordination elements from the source code of an existing application. Such a reverse engineering process provides a clear view of the actually invoked services as well as of the orchestration patterns which bind them together. The tool analyses Common Intermediate Language (CIL) code, the native language of Microsoft .Net Framework. Therefore, the scope of application of COORDINSPECTOR is quite large: potentially any piece of code developed in any of the programming languages which compiles to the .Net Framework. The tool generates graphical representations of the coordination layer together and identifies the underlying business process orchestrations, rendering them as Orc specifications

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current software development relies increasingly on non-trivial coordination logic for com- bining autonomous services often running on di erent platforms. As a rule, however, in typical non-trivial software systems, such a coordination layer is strongly weaved within the application at source code level. Therefore, its precise identi cation becomes a major methodological (and technical) problem which cannot be overestimated along any program understanding or refactoring process. Open access to source code, as granted in OSS certi cation, provides an opportunity for the devel- opment of methods and technologies to extract, from source code, the relevant coordination information. This paper is a step in this direction, combining a number of program analysis techniques to automatically recover coordination information from legacy code. Such information is then expressed as a model in Orc, a general purpose orchestration language

Relevância:

20.00% 20.00%

Publicador:

Resumo:

SUMÁRIO: A tomada de consciência da mulher na luta pelos seus direitos teve particular preponderância em finais do séc. XIX princípios do séc. XX, em Portugal, na sequência das movimentações republicanas. Várias personalidades se tornaram símbolos de um feminismo nascente, mas nos dias de hoje ainda se pode considerar uma especificidade feminina causa bastante para situações de exclusão? Apresentamos o caso do Instituto de Gestão Financeira da Segurança Social, IP (IGFSS, IP), caracterizado por 76% de coadjutoras num universo de 450 funcionários. Que razões haverá para esta predominância feminina, pelo menos em números? Reflectirá uma verdadeira mudança da condição feminina na sociedade? Ou constituirá antes a continuação de um preconceito que impele o sexo feminino para panoramas de exploração e subvalorização que se irão reflectir nos apoios sociais do Estado? ABSTRACT: The awareness of woman in the struggle for her rights had particular preponderance at the end of the 19th century and the beginning of the 20th century, in Portugal, in the sequence of the republican bustle. Several personalities became symbols of a growing feminism, but in nowadays can we still consider a feminine specificity cause enough for exclusion? Here we present a case-study of the Instituto de Gestão Financeira da Segurança Social, IP (IGFSS, IP), characterised by 76% of women employees in a total of 450 workers. What could be the reasons for this female predominance, at least in numbers? Does it reflect a real change in female conditions in our society? Or will be instead the maintenance of the prejudice that propels women to scenarios of exploitation and undervaluation that will have reflexes on State social supports?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One of the major problems that prevents the spread of elections with the possibility of remote voting over electronic networks, also called Internet Voting, is the use of unreliable client platforms, such as the voter's computer and the Internet infrastructure connecting it to the election server. A computer connected to the Internet is exposed to viruses, worms, Trojans, spyware, malware and other threats that can compromise the election's integrity. For instance, it is possible to write a virus that changes the voter's vote to a predetermined vote on election's day. Another possible attack is the creation of a fake election web site where the voter uses a malicious vote program on the web site that manipulates the voter's vote (phishing/pharming attack). Such attacks may not disturb the election protocol, therefore can remain undetected in the eyes of the election auditors. We propose the use of Code Voting to overcome insecurity of the client platform. Code Voting consists in creating a secure communication channel to communicate the voter's vote between the voter and a trusted component attached to the voter's computer. Consequently, no one controlling the voter's computer can change the his/her's vote. The trusted component can then process the vote according to a cryptographic voting protocol to enable cryptographic verification at the server's side.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Orientador: Mestre Alberto Couto