首页 > 最新文献

Proceedings of the 2006 ACM symposium on Applied computing最新文献

英文 中文
Enhancing program verifications by restricting object types 通过限制对象类型来增强程序验证
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141705
Cong-Cong Xing
Object types are abstract specifications of object behaviors; object behaviors are abstractly indicated by object component interdependencies; and program verifications are based on object behaviors. In conventional object type systems, object component interdependencies are not taken into account. As a result, distinct behaviors of objects are confused, which can lead to fundamental typing/subtyping loopholes and program verification troubles. In this paper, we first identify a program verification problem which is caused by the loose conventional object typing/subtyping which is in turn caused by the overlooking of object component interdependencies. Then, as a new object typing scheme, we introduce object type graphs (OTG) in which object component interdependencies are integrated into object types. Finally, we show how the verification problem can be resolved under OTG.
对象类型是对象行为的抽象规范;对象行为抽象地表示为对象组件的相互依赖关系;程序验证是基于对象行为的。在传统的对象类型系统中,不考虑对象组件的相互依赖性。结果,对象的不同行为被混淆,这可能导致基本的类型/子类型漏洞和程序验证问题。在本文中,我们首先确定了一个程序验证问题,该问题是由松散的常规对象类型/子类型引起的,而这又是由于忽略了对象组件的相互依赖性而导致的。然后,作为一种新的对象类型方案,我们引入了对象类型图(OTG),其中对象组件的相互依赖关系被集成到对象类型中。最后,我们展示了如何在OTG下解决验证问题。
{"title":"Enhancing program verifications by restricting object types","authors":"Cong-Cong Xing","doi":"10.1145/1141277.1141705","DOIUrl":"https://doi.org/10.1145/1141277.1141705","url":null,"abstract":"Object types are abstract specifications of object behaviors; object behaviors are abstractly indicated by object component interdependencies; and program verifications are based on object behaviors. In conventional object type systems, object component interdependencies are not taken into account. As a result, distinct behaviors of objects are confused, which can lead to fundamental typing/subtyping loopholes and program verification troubles. In this paper, we first identify a program verification problem which is caused by the loose conventional object typing/subtyping which is in turn caused by the overlooking of object component interdependencies. Then, as a new object typing scheme, we introduce object type graphs (OTG) in which object component interdependencies are integrated into object types. Finally, we show how the verification problem can be resolved under OTG.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132764464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial: track reliable computations and their applications 编辑:跟踪可靠的计算及其应用
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141661
M. Ceberio, V. Kreinovich, M. Rueher
Many numerical computations, be they solutions to systems of differential equations or optimization problems coming from applied areas like protein folding, do not provide us with guaranteed computation results. In many situations, we have numerical solutions, we may even have a theorem guaranteeing that, eventually, this numerical solution tends to the actual precise one, but the algorithm itself does not provide us with guaranteed bounds on the difference between the numerical approximate solution and the desired actual one. Therefore, in some practical situations, numerical solutions are much farther from the actual (unknown) precise solutions than the users assume.
许多数值计算,无论是微分方程组的解还是来自蛋白质折叠等应用领域的优化问题,都不能为我们提供保证的计算结果。在很多情况下,我们有数值解,我们甚至可能有一个定理保证,最终,这个数值解趋向于实际的精确解,但是算法本身并没有为我们提供数值近似解和期望的实际解之间差的保证界。因此,在一些实际情况下,数值解与实际(未知)精确解的距离比用户假设的要远得多。
{"title":"Editorial: track reliable computations and their applications","authors":"M. Ceberio, V. Kreinovich, M. Rueher","doi":"10.1145/1141277.1141661","DOIUrl":"https://doi.org/10.1145/1141277.1141661","url":null,"abstract":"Many numerical computations, be they solutions to systems of differential equations or optimization problems coming from applied areas like protein folding, do not provide us with guaranteed computation results. In many situations, we have numerical solutions, we may even have a theorem guaranteeing that, eventually, this numerical solution tends to the actual precise one, but the algorithm itself does not provide us with guaranteed bounds on the difference between the numerical approximate solution and the desired actual one. Therefore, in some practical situations, numerical solutions are much farther from the actual (unknown) precise solutions than the users assume.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133225692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection and segmentation of tables and math-zones from document images 从文档图像中检测和分割表和数学区域
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141469
Sekhar Mandal, S. Chowdhury, A. Das, B. Chanda
We propose an algorithm to separate out tables and math-zones from document images. The algorithm relies on the spatial characteristics of tables and math-zones in a document. It has been observed that tables have distinct columns which imply that gaps between the fields are substantially larger than the gaps between the words in text lines and in math-zones the characters and symbols are less dense in comparison to normal text lines. These deceptively simple observations have led us to design a simple but powerful table and math-zone detection system with low computation cost.
我们提出了一种从文档图像中分离表格和数学区域的算法。该算法依赖于文档中表和数学区域的空间特征。人们观察到,表有不同的列,这意味着字段之间的间隙比文本行中单词之间的间隙大得多,而在数学区中,字符和符号的密度比正常文本行要低。这些看似简单的观察结果使我们设计了一个简单但功能强大、计算成本低的表和数学区检测系统。
{"title":"Detection and segmentation of tables and math-zones from document images","authors":"Sekhar Mandal, S. Chowdhury, A. Das, B. Chanda","doi":"10.1145/1141277.1141469","DOIUrl":"https://doi.org/10.1145/1141277.1141469","url":null,"abstract":"We propose an algorithm to separate out tables and math-zones from document images. The algorithm relies on the spatial characteristics of tables and math-zones in a document. It has been observed that tables have distinct columns which imply that gaps between the fields are substantially larger than the gaps between the words in text lines and in math-zones the characters and symbols are less dense in comparison to normal text lines. These deceptively simple observations have led us to design a simple but powerful table and math-zone detection system with low computation cost.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134343209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A contingency view of organizational infrastructure requirements engineering 组织基础设施需求工程的偶然性观点
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141628
Karl Cox, S. Bleistein, P. Reynolds, A. Thorogood
Delivery of IT projects in today's rapidly changing business environment is a challenge. Conventional investment approaches result in lumpy capital allocations, which encourage managers to include many potential future business requirements in each capital request. This locks in the delivery of future requirements despite high market uncertainty. The resulting projects are large and complex from both a technical and management perspective. In the management literature, new frameworks are emerging that draw on Real Options valuations to justify early infrastructure investment and provide fine-grained control over business initiatives in an uncertain world. Business managers can then build on the infrastructure by selecting business initiatives to maximise option value. However, this requires engineering approaches that separates infrastructure and business requirements and minimises their dependencies. This paper explores a contingency approach to Requirements Engineering (RE) to minimise initial requirements and maximise future strategic options, challenging the research community's dominant paradigm of completeness, correctness and consistency.
在当今快速变化的业务环境中交付IT项目是一项挑战。传统的投资方法导致了不稳定的资本配置,这鼓励管理者在每个资本请求中包含许多潜在的未来业务需求。这锁定了未来需求的交付,尽管市场存在很大的不确定性。从技术和管理的角度来看,由此产生的项目既大又复杂。在管理文献中,新的框架正在出现,这些框架利用实物期权估值来证明早期基础设施投资的合理性,并在不确定的世界中提供对业务计划的细粒度控制。然后,业务经理可以通过选择业务计划来构建基础设施,以最大化期权价值。然而,这需要分离基础设施和业务需求并最小化它们的依赖性的工程方法。本文探讨了需求工程(RE)的偶然性方法,以最小化初始需求并最大化未来的战略选择,挑战研究界的完整性、正确性和一致性的主导范式。
{"title":"A contingency view of organizational infrastructure requirements engineering","authors":"Karl Cox, S. Bleistein, P. Reynolds, A. Thorogood","doi":"10.1145/1141277.1141628","DOIUrl":"https://doi.org/10.1145/1141277.1141628","url":null,"abstract":"Delivery of IT projects in today's rapidly changing business environment is a challenge. Conventional investment approaches result in lumpy capital allocations, which encourage managers to include many potential future business requirements in each capital request. This locks in the delivery of future requirements despite high market uncertainty. The resulting projects are large and complex from both a technical and management perspective. In the management literature, new frameworks are emerging that draw on Real Options valuations to justify early infrastructure investment and provide fine-grained control over business initiatives in an uncertain world. Business managers can then build on the infrastructure by selecting business initiatives to maximise option value. However, this requires engineering approaches that separates infrastructure and business requirements and minimises their dependencies. This paper explores a contingency approach to Requirements Engineering (RE) to minimise initial requirements and maximise future strategic options, challenging the research community's dominant paradigm of completeness, correctness and consistency.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133154737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Editorial message 编辑信息
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141684
Stefan Gruner, Sung-uk Shin
For the fourth time in a sequence the annual ACM-SAC symposium is hosting this Software Engineering track. A few changes have taken place since last year: From last year's SE-Track team only Sung Shin and Stefan Gruner are continuing to organise this track and, at the occasion of the 21st SAC symposium, the track's previous subtitle "Methods, Practices and Tools" was modified to "Sound Solutions for the 21st Century". Moreover: For the very first time this track is not only supported by the ACM via the SAC symposium but also endorsed by two further Software Engineering societies, namely Formal Methods Europe (FME) and the European Association of Software Science and Technology (EASST).
一年一度的ACM-SAC研讨会连续第四次主办这个软件工程专题。自去年以来发生了一些变化:从去年的SE-Track团队中,只有Sung Shin和Stefan Gruner继续组织这一曲目,在第21届SAC研讨会上,曲目之前的副标题“方法,实践和工具”被修改为“21世纪的声音解决方案”。此外,这是第一次不仅通过SAC研讨会得到ACM的支持,而且还得到了另外两个软件工程协会的支持,即欧洲正式方法协会(FME)和欧洲软件科学与技术协会(EASST)。
{"title":"Editorial message","authors":"Stefan Gruner, Sung-uk Shin","doi":"10.1145/1141277.1141684","DOIUrl":"https://doi.org/10.1145/1141277.1141684","url":null,"abstract":"For the fourth time in a sequence the annual ACM-SAC symposium is hosting this Software Engineering track. A few changes have taken place since last year: From last year's SE-Track team only Sung Shin and Stefan Gruner are continuing to organise this track and, at the occasion of the 21st SAC symposium, the track's previous subtitle \"Methods, Practices and Tools\" was modified to \"Sound Solutions for the 21st Century\". Moreover: For the very first time this track is not only supported by the ACM via the SAC symposium but also endorsed by two further Software Engineering societies, namely Formal Methods Europe (FME) and the European Association of Software Science and Technology (EASST).","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123009132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dominance and ranking issues applying interval techniques in pre-negotiations for services 在服务前谈判中应用间隔技术的优势和排名问题
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141482
P. Tsvetinov, A. Underwood, Taizan Chan
The study looks at the application of preference programming approaches and techniques for decision support during prenegotiations over services. In hierarchical decision analysis models the need for multi-attribute evaluation techniques that may incorporate uncertainties directly in the modeling phase has resulted in the use of the 'interval' approach. With such an approach, preference judgments are presented as ranges including all possible value estimates. This paper reports the results of applying an interval preference programming approach and technique in decision support scenarios for reasoning during pre-negotiations over services. The aim has been to critically evaluate the approach and establish its applicability for ranking multi-dimensional service offers. Our experimental results using interval SMART, in pre-negotiation decision making scenarios, showed that while the dominance relations among alternatives remained unchanged following the introduction of uncertainty intervals, the rank order and dominance relations of the alternatives may vary as a result of the addition or dropping of new alternatives with inferior values.
这项研究着眼于在服务谈判前的决策支持中应用偏好规划方法和技术。在分层决策分析模型中,由于需要在建模阶段直接包含不确定性的多属性评估技术,因此使用了“区间”方法。使用这种方法,偏好判断呈现为包括所有可能的价值估计的范围。本文报告了将区间偏好规划方法和技术应用于服务预协商过程中推理的决策支持场景的结果。目的是批判性地评估该方法,并确定其对多维服务提供排序的适用性。在预协商决策场景下,我们使用区间SMART的实验结果表明,在引入不确定性区间后,方案之间的优势关系保持不变,但由于新方案的增加或减少,具有劣值的方案的秩序和优势关系可能会发生变化。
{"title":"Dominance and ranking issues applying interval techniques in pre-negotiations for services","authors":"P. Tsvetinov, A. Underwood, Taizan Chan","doi":"10.1145/1141277.1141482","DOIUrl":"https://doi.org/10.1145/1141277.1141482","url":null,"abstract":"The study looks at the application of preference programming approaches and techniques for decision support during prenegotiations over services. In hierarchical decision analysis models the need for multi-attribute evaluation techniques that may incorporate uncertainties directly in the modeling phase has resulted in the use of the 'interval' approach. With such an approach, preference judgments are presented as ranges including all possible value estimates. This paper reports the results of applying an interval preference programming approach and technique in decision support scenarios for reasoning during pre-negotiations over services. The aim has been to critically evaluate the approach and establish its applicability for ranking multi-dimensional service offers. Our experimental results using interval SMART, in pre-negotiation decision making scenarios, showed that while the dominance relations among alternatives remained unchanged following the introduction of uncertainty intervals, the rank order and dominance relations of the alternatives may vary as a result of the addition or dropping of new alternatives with inferior values.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124276052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatically discovering design patterns and assessing concern separations for applications 自动发现设计模式并评估应用程序的关注点分离
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141647
G. Pappalardo, E. Tramontana
In this paper we present a tool that assists in the automated analysis of a Java application, aimed at two purposes: (i) identifying class structure and, within this, micro-architectures that conform to known design patterns; (ii) providing visual representations of classes, concerns and their relationships. This affords a more abstract view of the analysed application, letting its structure emerge more clearly and its components be separately understood. As a result, it becomes easier for developers to assess whether well-known desirable characteristics, notably those favouring modularity and concern separation, or rather bad design choices, have been incorporated into the application.The proposed approach can be helpful both within the undertaking of a new development effort, and reverse engineering of an existing application in view of its evolution.
在本文中,我们提供了一个工具,它可以帮助对Java应用程序进行自动化分析,目的有两个:(i)识别类结构,并在其中识别符合已知设计模式的微体系结构;(ii)提供类别、关注事项及其关系的视觉表现。这为分析的应用程序提供了一个更抽象的视图,让它的结构更清晰地显现出来,并且它的组件可以被单独理解。因此,开发人员可以更容易地评估应用程序中是否包含了众所周知的理想特性,特别是那些支持模块化和关注点分离的特性,或者更确切地说是糟糕的设计选择。所建议的方法可以在新的开发工作中提供帮助,并且根据其演变对现有应用程序进行逆向工程。
{"title":"Automatically discovering design patterns and assessing concern separations for applications","authors":"G. Pappalardo, E. Tramontana","doi":"10.1145/1141277.1141647","DOIUrl":"https://doi.org/10.1145/1141277.1141647","url":null,"abstract":"In this paper we present a tool that assists in the automated analysis of a Java application, aimed at two purposes: (i) identifying class structure and, within this, micro-architectures that conform to known design patterns; (ii) providing visual representations of classes, concerns and their relationships. This affords a more abstract view of the analysed application, letting its structure emerge more clearly and its components be separately understood. As a result, it becomes easier for developers to assess whether well-known desirable characteristics, notably those favouring modularity and concern separation, or rather bad design choices, have been incorporated into the application.The proposed approach can be helpful both within the undertaking of a new development effort, and reverse engineering of an existing application in view of its evolution.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133862450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Design and implementation of a kernel resource protector for robustness of Linux module programming Linux模块编程鲁棒性内核资源保护器的设计与实现
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141621
Jongmoo Choi, Seungjae Baek, Sung Y. Shin
Loadable kernel modules supported by Linux provides lots of benefits such as a small-sized kernel, on-demand loading, and easy software upgrading. However, since modules are executed in a privileged mode, trivial misuses in a module may cause critical system halts or deadlock situations. This paper presents a kernel resource protector which prevents kernel from faults generated by modules. The protector models the system in two objects: module object and resource object. By observing the interrelations between the two objects, the protector can detect misuses of modules and take actions to resolve the erroneous situations. Implementation study has shown that the protector can find out memory leaks wasted by modules and can reclaim leaks without degrading system performance. The proposed protector makes Linux more robust, which is required indispensably in the system equipped with NVRAM (Non Volatile RAM) such as FRAM and PRAM.
Linux支持的可加载内核模块提供了许多好处,例如小型内核、按需加载和易于软件升级。但是,由于模块是在特权模式下执行的,因此模块中的轻微误用可能会导致严重的系统停止或死锁情况。提出了一种内核资源保护器,可以防止内核因模块故障而产生故障。保护器将系统建模为两个对象:模块对象和资源对象。通过观察两个对象之间的相互关系,保护器可以检测模块的误用,并采取措施解决错误情况。实现研究表明,该保护器可以在不降低系统性能的前提下发现模块浪费的内存泄漏并回收泄漏。所提出的保护器使Linux更加健壮,这在配备FRAM和PRAM等NVRAM(非易失性RAM)的系统中是必不可少的。
{"title":"Design and implementation of a kernel resource protector for robustness of Linux module programming","authors":"Jongmoo Choi, Seungjae Baek, Sung Y. Shin","doi":"10.1145/1141277.1141621","DOIUrl":"https://doi.org/10.1145/1141277.1141621","url":null,"abstract":"Loadable kernel modules supported by Linux provides lots of benefits such as a small-sized kernel, on-demand loading, and easy software upgrading. However, since modules are executed in a privileged mode, trivial misuses in a module may cause critical system halts or deadlock situations. This paper presents a kernel resource protector which prevents kernel from faults generated by modules. The protector models the system in two objects: module object and resource object. By observing the interrelations between the two objects, the protector can detect misuses of modules and take actions to resolve the erroneous situations. Implementation study has shown that the protector can find out memory leaks wasted by modules and can reclaim leaks without degrading system performance. The proposed protector makes Linux more robust, which is required indispensably in the system equipped with NVRAM (Non Volatile RAM) such as FRAM and PRAM.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117271275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Supporting transparent evolution of component interfaces 支持组件接口的透明演化
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141658
Emanuela P. Lins, U. Schultz
Component-oriented programming facilitates the development of reusable application parts encapsulated by well-defined interfaces. There is however a tension between compatibility and evolution, since the interface of a component may constrain refactoring or require manual development of multiple, ad-hoc adaptation layers when an interface is evolved. We here present the declarative language VIDL for specifying component interface evolution. VIDL allows evolution of components with automatic generation of efficient adapter code that statically guarantees interface compatibility with other components that rely on anterior versions of the interface.
面向组件的编程促进了由定义良好的接口封装的可重用应用程序部件的开发。然而,兼容性和演进之间存在矛盾,因为组件的接口可能会限制重构,或者在接口演进时需要手动开发多个特别的自适应层。我们在此提出用于指定组件接口演变的声明性语言VIDL。VIDL允许通过自动生成高效适配器代码来改进组件,这些代码静态地保证了接口与依赖于接口前版本的其他组件的兼容性。
{"title":"Supporting transparent evolution of component interfaces","authors":"Emanuela P. Lins, U. Schultz","doi":"10.1145/1141277.1141658","DOIUrl":"https://doi.org/10.1145/1141277.1141658","url":null,"abstract":"Component-oriented programming facilitates the development of reusable application parts encapsulated by well-defined interfaces. There is however a tension between compatibility and evolution, since the interface of a component may constrain refactoring or require manual development of multiple, ad-hoc adaptation layers when an interface is evolved. We here present the declarative language VIDL for specifying component interface evolution. VIDL allows evolution of components with automatic generation of efficient adapter code that statically guarantees interface compatibility with other components that rely on anterior versions of the interface.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121300854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Static analysis of time bounded reactive properties of Boolean symbols 布尔符号有界反应性质的静态分析
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141707
Guillaume Capron
We present a method for checking if macro-definitions written in C respect their specification. We are interested in simple time-bounded reactive properties. We use the abstract interpretation framework and a compact representation of sets of traces to provide a formalization of the specification, the semantics and the algorithms allowing us to build a representation of the set of traces.
我们提出了一种检查用C编写的宏定义是否符合其规范的方法。我们感兴趣的是简单的有时间限制的反应性质。我们使用抽象解释框架和轨迹集的紧凑表示来提供规范的形式化,语义和算法允许我们构建轨迹集的表示。
{"title":"Static analysis of time bounded reactive properties of Boolean symbols","authors":"Guillaume Capron","doi":"10.1145/1141277.1141707","DOIUrl":"https://doi.org/10.1145/1141277.1141707","url":null,"abstract":"We present a method for checking if macro-definitions written in C respect their specification. We are interested in simple time-bounded reactive properties. We use the abstract interpretation framework and a compact representation of sets of traces to provide a formalization of the specification, the semantics and the algorithms allowing us to build a representation of the set of traces.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121332183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2006 ACM symposium on Applied computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1