966 resultados para Program Theory
Resumo:
This article advances the theoretical integration between securitization theory and the framing approach, resulting in a set of criteria hereby called security framing. It seeks to make a twofold contribution: to sharpen the study of the ideational elements that underlie the construction of threats, and to advance towards a greater assessment of the audience's preferences. The case study under examination is the 2011 military intervention of the countries of the Gulf Cooperation Council in Bahrain. The security framing of this case will help illuminate the dynamics at play in one of the most important recent events in Gulf politics.
Resumo:
Backcrossing has been little used in cacao breeding, particularly due to the long time required to transfer genes and recover the genetic background of the recurrent parent. The objective of this study was to select individuals, resulting from the backcross CEPEC-42 x SIC-19, genetically related to the recurrent parent SIC-19 by using RAPD molecular markers, among those with resistance to witches' broom. Of the 31 plants that clustered with SIC-19, 18 from the replanted material remained free of the disease in the field, with good vegetative aspect and, therefore can be used for backcross to reach the desired objective.
Resumo:
The influence of the dispersion of vapor grown carbon nanofibers (VGCNF) on the electrical properties of VGCNF/epoxy composites has been studied. A homogeneous dispersion of the VGCNF does not imply better electrical properties. The presence of well distributed clusters appears to be a key factor for increasing composite conductivity. It is also shown that the main conduction mechanism has an ionic nature for concentrations below the percolation threshold, while above the percolation threshold it is dominated by hopping between the fillers. Finally, using the granular system theory it is possible to explain the origin of conduction at low temperatures.
Resumo:
In this work the critical indices β, γ , and ν for a three-dimensional (3D) hardcore cylinder composite system with short-range interaction have been obtained. In contrast to the 2D stick system and the 3D hardcore cylinder system, the determined critical exponents do not belong to the same universality class as the lattice percolation,although they obey the common hyperscaling relation for a 3D system. It is observed that the value of the correlation length exponent is compatible with the predictions of the mean field theory. It is also shown that, by using the Alexander-Orbach conjuncture, the relation between the conductivity and the correlation length critical exponents has a typical value for a 3D lattice system.
Resumo:
This work demonstrates that the theoretical framework of complex networks typically used to study systems such as social networks or the World Wide Web can be also applied to material science, allowing deeper understanding of fundamental physical relationships. In particular, through the application of the network theory to carbon nanotubes or vapour-grown carbon nanofiber composites, by mapping fillers to vertices and edges to the gap between fillers, the percolation threshold has been predicted and a formula that relates the composite conductance to the network disorder has been obtained. The theoretical arguments are validated by experimental results from the literature.
Resumo:
Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful in the areas of reverse engineering, program understanding, testing and software maintenance. Most slicing methods, usually oriented towards the imperative or object paradigms, are based on some sort of graph structure representing program dependencies. Slicing techniques amount, therefore, to (sophisticated) graph transversal algorithms. This paper proposes a completely different approach to the slicing problem for functional programs. Instead of extracting program information to build an underlying dependencies’ structure, we resort to standard program calculation strategies, based on the so-called Bird-Meertens formalism. The slicing criterion is specified either as a projection or a hiding function which, once composed with the original program, leads to the identification of the intended slice. Going through a number of examples, the paper suggests this approach may be an interesting, even if not completely general, alternative to slicing functional programs
Resumo:
This paper reports on the development of specific slicing techniques for functional programs and their use for the identification of possible coherent components from monolithic code. An associated tool is also introduced. This piece of research is part of a broader project on program understanding and re-engineering of legacy code supported by formal methods
Resumo:
Abstract: in Portugal, and in much of the legal systems of Europe, «legal persons» are likely to be criminally responsibilities also for cybercrimes. Like for example the following crimes: «false information»; «damage on other programs or computer data»; «computer-software sabotage»; «illegitimate access»; «unlawful interception» and «illegitimate reproduction of protected program». However, in Portugal, have many exceptions. Exceptions to the «question of criminal liability» of «legal persons». Some «legal persons» can not be blamed for cybercrime. The legislature did not leave! These «legal persons» are v.g. the following («public entities»): legal persons under public law, which include the public business entities; entities utilities, regardless of ownership; or other legal persons exercising public powers. In other words, and again as an example, a Portuguese public university or a private concessionaire of a public service in Portugal, can not commit (in Portugal) any one of cybercrime pointed. Fair? Unfair. All laws should provide that all legal persons can commit cybercrimes. PS: resumo do artigo em inglês.