979 resultados para program code generation
Resumo:
Esse trabalho teve como objetivo analisar os efeitos relacionados ?? mobilidade social e ao empoderamento das benefici??rias do Programa Bolsa Fam??lia em Minas Gerais. Foram utilizados procedimentos metodol??gicos anal??ticos, em um estudo de caso m??ltiplo com abordagem quantitativa. Foi realizada a valida????o dos constructos de mobilidade social e empoderamento, permitindo-se mensurar a intensidade da rela????o entre essas diferentes dimens??es. Os resultados demonstram a melhoria significativa na vida das benefici??rias, o que pode possibilitar ascend??ncia social. Contudo, observou-se, como fator limitante, o baixo grau de escolaridade das benefici??rias, mostrando-se a necessidade de conex??o dos programas sociais com atividades educacionais e de gera????o de trabalho e renda, para inser????o das mulheres no mercado de trabalho. Dessa forma, considera-se que o Programa Bolsa Fam??lia pode influenciar significativamente tanto no empoderamento quanto na mobilidade social das benefici??rias. Ademais, a articula????o com atividades educacionais e produtivas pode avigorar os resultados de pol??ticas p??blicas que defendam a justi??a social e a diminui????o das desigualdades existentes entre g??neros e classes sociais.
Resumo:
O presente trabalho tem como objetivo descrever um Programa de Desenvolvimento oferecido pela Universidade Corporativa de empresa mineradora, com atuação em Vitória/ES, e compreender as possíveis relações deste Programa com o desenvolvimento das competências profissionais esperadas pela Organização. A Empresa Gama, que assim será identificada durante todo o trabalho, teve o início de sua Universidade Corporativa no ano de 2003, sob o propósito de transformar vidas desenvolvendo pessoas, e é vista pela Empresa Gama como fator importante para a geração de competitividade, para evolução nos negócios e aumento da sinergia organizacional. Dentre todos os Programas ofertados, opta-se pelo estudo do Programa “Trilha de Gestão e Liderança”, lançado em 2004, e voltado para a formação de gestores da Empresa Gama. Para a realização desta pesquisa qualitativa, foram entrevistados quatro Supervisores da Empresa Gama, que tiveram a oportunidade de participar da “Trilha de Gestão e Liderança”. Foram realizadas entrevistas semi-estruturadas e pesquisa documental para obtenção de dados. Opta-se pela Analise de Conteúdo como método de análise. Compreende-se que, para a Empresa Gama, o Programa “Trilha de Gestão e Liderança” é uma importante ferramenta para o desenvolvimento das competências esperadas pela organização. Contudo, não se trata da principal ferramenta, estando nítido que este desenvolvimento vai muito além dos Programas oferecidos por sua Universidade Corporativa.
Resumo:
Backcrossing has been little used in cacao breeding, particularly due to the long time required to transfer genes and recover the genetic background of the recurrent parent. The objective of this study was to select individuals, resulting from the backcross CEPEC-42 x SIC-19, genetically related to the recurrent parent SIC-19 by using RAPD molecular markers, among those with resistance to witches' broom. Of the 31 plants that clustered with SIC-19, 18 from the replanted material remained free of the disease in the field, with good vegetative aspect and, therefore can be used for backcross to reach the desired objective.
Resumo:
Abstract — The analytical methods based on evaluation models of interactive systems were proposed as an alternative to user testing in the last stages of the software development due to its costs. However, the use of isolated behavioral models of the system limits the results of the analytical methods. An example of these limitations relates to the fact that they are unable to identify implementation issues that will impact on usability. With the introduction of model-based testing we are enable to test if the implemented software meets the specified model. This paper presents an model-based approach for test cases generation from the static analysis of source code.
Resumo:
Graphical user interfaces (GUIs) are critical components of todays software. Given their increased relevance, correctness and usability of GUIs are becoming essential. This paper describes the latest results in the development of our tool to reverse engineer the GUI layer of interactive computing systems. We use static analysis techniques to generate models of the user interface behaviour from source code. Models help in graphical user interface inspection by allowing designers to concentrate on its more important aspects. One particularly type of model that the tool is able to generate is state machines. The paper shows how graph theory can be useful when applied to these models. A number of metrics and algorithms are used in the analysis of aspects of the user interface's quality. The ultimate goal of the tool is to enable analysis of interactive system through GUIs source code inspection.
Resumo:
When developing interactive applications, considering the correctness of graphical user interfaces (GUIs) code is essential. GUIs are critical components of today's software, and contemporary software tools do not provide enough support for ensuring GUIs' code quality. GUIsurfer, a GUI reverse engineering tool, enables evaluation of behavioral properties of user interfaces. It performs static analysis of GUI code, generating state machines that can help in the evaluation of interactive applications. This paper describes the design, software architecture, and the use of GUIsurfer through an example. The tool is easily re-targetable, and support is available to Java/Swing, and WxHaskell. The paper sets the ground for a generalization effort to consider rich internet applications. It explores the GWT web applications' user interface programming toolkit.
Resumo:
Graphical user interfaces (GUIs) are critical components of today's software. Developers are dedicating a larger portion of code to implementing them. Given their increased importance, correctness of GUIs code is becoming essential. This paper describes the latest results in the development of GUISurfer, a tool to reverse engineer the GUI layer of interactive computing systems. The ultimate goal of the tool is to enable analysis of interactive system from source code.
Resumo:
Program slicing is a well known family of techniques intended to identify and isolate code fragments which depend on, or are depended upon, specific program entities. This is particularly useful in the areas of reverse engineering, program understanding, testing and software maintenance. Most slicing methods, and corresponding tools, target either the imperative or the object oriented paradigms, where program slices are computed with respect to a variable or a program statement. Taking a complementary point of view, this paper focuses on the slicing of higher-order functional programs under a lazy evaluation strategy. A prototype of a Haskell slicer, built as proof-of-concept for these ideas, is also introduced
Resumo:
COORDINSPECTOR is a Software Tool aiming at extracting the coordination layer of a software system. Such a reverse engineering process provides a clear view of the actually invoked services as well as the logic behind such invocations. The analysis process is based on program slicing techniques and the generation of, System Dependence Graphs and Coordination Dependence Graphs. The tool analyzes Common Intermediate Language (CIL), the native language of the Microsoft .Net Framework, thus making suitable for processing systems developed in any .Net Framework compilable language. COORDINSPECTOR generates graphical representations of the coordination layer together with business process orchestrations specified in WSBPEL 2.0
Resumo:
A large and growing amount of software systems rely on non-trivial coordination logic for making use of third party services or components. Therefore, it is of outmost importance to understand and capture rigorously this continuously growing layer of coordination as this will make easier not only the veri cation of such systems with respect to their original speci cations, but also maintenance, further development, testing, deployment and integration. This paper introduces a method based on several program analysis techniques (namely, dependence graphs, program slicing, and graph pattern analysis) to extract coordination logic from legacy systems source code. This process is driven by a series of pre-de ned coordination patterns and captured by a special purpose graph structure from which coordination speci cations can be generated in a number of di erent formalisms
Resumo:
Current software development often relies on non-trivial coordination logic for combining autonomous services, eventually running on different platforms. As a rule, however, such a coordination layer is strongly woven within the application at source code level. Therefore, its precise identification becomes a major methodological (and technical) problem and a challenge to any program understanding or refactoring process. The approach introduced in this paper resorts to slicing techniques to extract coordination data from source code. Such data are captured in a specific dependency graph structure from which a coordination model can be recovered either in the form of an Orc specification or as a collection of code fragments corresponding to the identification of typical coordination patterns in the system. Tool support is also discussed
Resumo:
Abstract: in Portugal, and in much of the legal systems of Europe, «legal persons» are likely to be criminally responsibilities also for cybercrimes. Like for example the following crimes: «false information»; «damage on other programs or computer data»; «computer-software sabotage»; «illegitimate access»; «unlawful interception» and «illegitimate reproduction of protected program». However, in Portugal, have many exceptions. Exceptions to the «question of criminal liability» of «legal persons». Some «legal persons» can not be blamed for cybercrime. The legislature did not leave! These «legal persons» are v.g. the following («public entities»): legal persons under public law, which include the public business entities; entities utilities, regardless of ownership; or other legal persons exercising public powers. In other words, and again as an example, a Portuguese public university or a private concessionaire of a public service in Portugal, can not commit (in Portugal) any one of cybercrime pointed. Fair? Unfair. All laws should provide that all legal persons can commit cybercrimes. PS: resumo do artigo em inglês.
Resumo:
Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful in the areas of reverse engineering, program understanding, testing and software maintenance. Most slicing methods, usually targeting either the imperative or the object oriented paradigms, are based on some sort of graph structure representing program dependencies. Slicing techniques amount, therefore, to (sophisticated) graph transversal algorithms. This paper proposes a completely different approach to the slicing problem for functional programs. Instead of extracting program information to build an underlying dependencies’ structure, we resort to standard program calculation strategies, based on the so-called Bird- Meertens formalism. The slicing criterion is specified either as a projection or a hiding function which, once composed with the original program, leads to the identification of the intended slice. Going through a number of examples, the paper suggests this approach may be an interesting, even if not completely general alternative to slicing functional programs
Resumo:
Thermal degradation of as electrospun chitosan membranes and samples subsequently treated with ethanol and cross-linked with glutaraldehyde (GA) have been studied by thermogravimetry (TG) coupled with an infrared spectrometer (FTIR). The influence of the electrospinning process and cross-linking in the electrospun chitosan thermal stability was evaluated. Up to three degradation steps were observed in the TG data, corresponding to water dehydration reaction at temperatures below 100 ºC, loss of side groups formed between the amine groups of chitosan and trifluoroacetic acid between 150 – 270 ºC and chitosan thermal degradation that starts around 250 ºC and goes up to 400 ºC. The Kissinger model was employed to evaluate the activation energies of the electrospun membranes during isothermal experiments and revealed that thermal degradation activation energy increases for the samples processed by electrospinning and subsequent neutralization and cross-linking treatments with respect to the neat chitosan powder.
Resumo:
This paper presents a catalog of smells in the context of interactive applications. These so-called usability smells are indicators of poor design on an application’s user interface, with the potential to hinder not only its usability but also its maintenance and evolution. To eliminate such usability smells we discuss a set of program/usability refactorings. In order to validate the presented usability smells catalog, and the associated refactorings, we present a preliminary empirical study with software developers in the context of a real open source hospital management application. Moreover, a tool that computes graphical user interface behavior models, giving the applications’ source code, is used to automatically detect usability smells at the model level.