首页 > 最新文献

29th Annual International Computer Software and Applications Conference (COMPSAC'05)最新文献

英文 中文
New method for dispatching waiting logical processors in virtual machine system 虚拟机系统中调度等待逻辑处理器的新方法
H. Umeno, M. Kiyama, T. Fukunaga, Takashige Kubo
A virtual machine system can run multiple conventional operating systems (OSs) in a single real host computer. A virtual machine is a logical computer with almost the same architecture as the host, and may contain several logical processors. A hypervisor is a control program to control this virtual machine system. Traditionally, the hypervisor has to receive an I/O interrupt pending for a waiting logical processor, and to simulate the I/O interrupt, consequently incurring the simulation overhead of the I/O interrupt. To avoid this overhead we present a new method which introduces a new self-wait state different from the conventional wait state, presents a new instruction for the hypervisor to detect the I/O interrupts pending for the logical processors in the self-wait state, and dispatches those logical processors on the detection ahead of the ready queue. This new method has eliminated the simulation overhead of those I/O interrupts, and enhanced the system performance to the near native.
虚拟机系统可以在一台真实主机上运行多个常规操作系统。虚拟机是一台逻辑计算机,其体系结构与主机几乎相同,并且可以包含多个逻辑处理器。管理程序是控制虚拟机系统的控制程序。传统上,管理程序必须接收等待逻辑处理器的I/O中断,并模拟I/O中断,从而导致I/O中断的模拟开销。为了避免这种开销,我们提出了一种新方法,该方法引入了一种不同于传统等待状态的新的自等待状态,为管理程序提供了一条新指令,用于检测处于自等待状态的逻辑处理器的I/O中断,并在检测到的逻辑处理器之前将这些逻辑处理器分派到就绪队列。该方法消除了I/O中断的仿真开销,将系统性能提高到接近本机的水平。
{"title":"New method for dispatching waiting logical processors in virtual machine system","authors":"H. Umeno, M. Kiyama, T. Fukunaga, Takashige Kubo","doi":"10.1109/COMPSAC.2005.112","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.112","url":null,"abstract":"A virtual machine system can run multiple conventional operating systems (OSs) in a single real host computer. A virtual machine is a logical computer with almost the same architecture as the host, and may contain several logical processors. A hypervisor is a control program to control this virtual machine system. Traditionally, the hypervisor has to receive an I/O interrupt pending for a waiting logical processor, and to simulate the I/O interrupt, consequently incurring the simulation overhead of the I/O interrupt. To avoid this overhead we present a new method which introduces a new self-wait state different from the conventional wait state, presents a new instruction for the hypervisor to detect the I/O interrupts pending for the logical processors in the self-wait state, and dispatches those logical processors on the detection ahead of the ready queue. This new method has eliminated the simulation overhead of those I/O interrupts, and enhanced the system performance to the near native.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116046007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Nearest neighbor queries on extensible grid files using dimensionality reduction 使用降维对可扩展网格文件进行最近邻查询
Ryosuke Miyoshi, T. Miura, I. Shioya
Nowadays there have several applications on spatial information which manage high dimensional data. Whenever we examine nearest neighbor search in these applications by multi-dimensional indexing structure, very often we must access all pages if dimensionality exceeds about 10. This is known as curse of dimensionality that says any indexing structure is outperformed by simple linear search. In this investigation, for high dimensional data, we propose a sophisticated access mechanism based on extensible grid files with dimensionality reduction (DR) technique. We analyze error estimation caused by DR and recover the search space on original dimension. We examine nearest neighbor search and discuss some empirical results to show the usefulness of our approach.
目前,在空间信息方面已经出现了几种对高维数据进行管理的应用。当我们通过多维索引结构检查这些应用程序中的最近邻搜索时,如果维度超过10,我们通常必须访问所有页面。这就是所谓的维数诅咒,即任何索引结构的性能都优于简单的线性搜索。本研究针对高维数据,提出了一种基于可扩展网格文件和降维(DR)技术的复杂访问机制。我们分析了DR引起的误差估计,并在原始维度上恢复搜索空间。我们研究了最近邻搜索,并讨论了一些实证结果,以显示我们的方法的有效性。
{"title":"Nearest neighbor queries on extensible grid files using dimensionality reduction","authors":"Ryosuke Miyoshi, T. Miura, I. Shioya","doi":"10.1109/COMPSAC.2005.111","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.111","url":null,"abstract":"Nowadays there have several applications on spatial information which manage high dimensional data. Whenever we examine nearest neighbor search in these applications by multi-dimensional indexing structure, very often we must access all pages if dimensionality exceeds about 10. This is known as curse of dimensionality that says any indexing structure is outperformed by simple linear search. In this investigation, for high dimensional data, we propose a sophisticated access mechanism based on extensible grid files with dimensionality reduction (DR) technique. We analyze error estimation caused by DR and recover the search space on original dimension. We examine nearest neighbor search and discuss some empirical results to show the usefulness of our approach.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125257371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A formal approach to designing a class-subclass structure using a partial-order on the functions 一种使用函数的偏序来设计类-子类结构的形式化方法
S. Kundu, N. Gwee
We present a formal method for designing the class structure based on a partial order on the functions, which is derived from the use-relationship between the functions and the various data items. We can regard this method as an initial step in building a theory of refactoring and design-patterns. Our method can identify the functions which should be factored into subfunctions, including their desired signatures and a reduced use-complexity, in order to simplify the class-subclass structure. A similar remark holds for the decomposition or consolidation of data items as well. We illustrate our method with several examples.
基于函数与各种数据项之间的使用关系,提出了一种基于函数偏序的类结构设计的形式化方法。我们可以将此方法视为构建重构和设计模式理论的第一步。我们的方法可以识别应该分解成子函数的函数,包括它们所需的签名和降低的使用复杂性,以简化类-子类结构。对于数据项的分解或合并也有类似的注释。我们用几个例子来说明我们的方法。
{"title":"A formal approach to designing a class-subclass structure using a partial-order on the functions","authors":"S. Kundu, N. Gwee","doi":"10.1109/COMPSAC.2005.23","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.23","url":null,"abstract":"We present a formal method for designing the class structure based on a partial order on the functions, which is derived from the use-relationship between the functions and the various data items. We can regard this method as an initial step in building a theory of refactoring and design-patterns. Our method can identify the functions which should be factored into subfunctions, including their desired signatures and a reduced use-complexity, in order to simplify the class-subclass structure. A similar remark holds for the decomposition or consolidation of data items as well. We illustrate our method with several examples.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"62 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113962382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Scoped broadcast in dynamic peer-to-peer networks 动态点对点网络中的范围广播
Hung-Chang Hsiao, C. King
Scoped broadcast disseminates a message to all the nodes within a designated physical/logical region in an overlay network. It can be a basic building block for applications such as information search, data broadcasting, and overlay structure diagnostic. In this paper, we study scoped broadcast in peer-to-peer (P2P) overlay networks based on distributed hash tables (DHT). Since P2P networks have very dynamic behavior due to peer joining and departure, it is interesting to know how many peers can be reached with one scoped broadcast. This depends mainly on the cost we would like to pay for maintaining the geometric structure of the DHT-based overlay. The maintenance cost is affected primarily by the failure detection and failure recovery mechanisms. We evaluated the effects of maintenance overhead on scoped broadcast via extensive simulations. The evaluation shows that it is important to exploit fresh nodes as the neighbors of a node. In addition, cooperative failure discovery and recovery can efficiently and effectively disseminate scoped broadcast messages.
范围广播将消息传播到覆盖网络中指定物理/逻辑区域内的所有节点。它可以作为信息搜索、数据广播和覆盖结构诊断等应用程序的基本构建块。本文研究了基于分布式哈希表(DHT)的P2P覆盖网络中的范围广播。由于P2P网络由于节点的加入和离开而具有非常动态的行为,因此了解一次范围广播可以到达多少个节点是很有趣的。这主要取决于我们想要为维护基于dht的覆盖层的几何结构而支付的成本。维护成本主要受故障检测和故障恢复机制的影响。我们通过广泛的模拟评估了维护开销对范围广播的影响。结果表明,利用新节点作为节点的邻居是非常重要的。此外,协同故障发现和恢复可以高效有效地传播有范围的广播消息。
{"title":"Scoped broadcast in dynamic peer-to-peer networks","authors":"Hung-Chang Hsiao, C. King","doi":"10.1109/COMPSAC.2005.134","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.134","url":null,"abstract":"Scoped broadcast disseminates a message to all the nodes within a designated physical/logical region in an overlay network. It can be a basic building block for applications such as information search, data broadcasting, and overlay structure diagnostic. In this paper, we study scoped broadcast in peer-to-peer (P2P) overlay networks based on distributed hash tables (DHT). Since P2P networks have very dynamic behavior due to peer joining and departure, it is interesting to know how many peers can be reached with one scoped broadcast. This depends mainly on the cost we would like to pay for maintaining the geometric structure of the DHT-based overlay. The maintenance cost is affected primarily by the failure detection and failure recovery mechanisms. We evaluated the effects of maintenance overhead on scoped broadcast via extensive simulations. The evaluation shows that it is important to exploit fresh nodes as the neighbors of a node. In addition, cooperative failure discovery and recovery can efficiently and effectively disseminate scoped broadcast messages.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127747335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Extended symbolic transition graphs with assignment 带赋值的扩展符号转换图
Weijia Deng, Huimin Lin
An extension of symbolic transition graphs with assignment is proposed which combines the advantages of both the assignment-before-action and the assignment-after-action approaches: like the former it allows a simple set of rules to be designed for generating finite symbolic graphs from regular value-passing process descriptions; like the later it avoids creating multiple copies in the graph for a recursive process definition. Experiences show that, in most cases, considerable reductions in verification time and space can be achieved using the new approach.
提出了一种具有赋值的符号转移图的扩展,它结合了行动前赋值和行动后赋值方法的优点:与前者一样,它允许设计一组简单的规则来从规则的值传递过程描述生成有限的符号图;与后者一样,它避免在图中为递归过程定义创建多个副本。经验表明,在大多数情况下,使用新方法可以大大减少核查时间和空间。
{"title":"Extended symbolic transition graphs with assignment","authors":"Weijia Deng, Huimin Lin","doi":"10.1109/COMPSAC.2005.76","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.76","url":null,"abstract":"An extension of symbolic transition graphs with assignment is proposed which combines the advantages of both the assignment-before-action and the assignment-after-action approaches: like the former it allows a simple set of rules to be designed for generating finite symbolic graphs from regular value-passing process descriptions; like the later it avoids creating multiple copies in the graph for a recursive process definition. Experiences show that, in most cases, considerable reductions in verification time and space can be achieved using the new approach.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133980605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The vital few versus the trivial many: examining the Pareto principle for software 重要的少数vs微不足道的许多:检查软件的帕累托原则
Mechelle Gittens, Y. Kim, David Godwin
This paper discusses the Pareto principle as it relates to the distribution of software defects in code. We look at evidence in the context of both the software test team, and users of the software. We also investigate two related principles. The first principle is that the distribution of defects in code relates to the distribution of complexity in code. The second principle is that how we define complexity relates to the distribution of defects in code. We present this work as an empirical study of three general hypotheses investigated for large production-level software; we show that the essence of the principle holds, while precise percentages do not.
本文讨论了帕累托原则,因为它与代码中软件缺陷的分布有关。我们在软件测试团队和软件用户的上下文中查看证据。我们还研究了两个相关的原则。第一个原则是代码中缺陷的分布与代码中复杂性的分布相关。第二个原则是我们如何定义复杂性与代码中缺陷的分布有关。我们将这项工作作为对大型生产级软件调查的三个一般假设的实证研究;我们表明,原则的本质是成立的,而精确的百分比则不是。
{"title":"The vital few versus the trivial many: examining the Pareto principle for software","authors":"Mechelle Gittens, Y. Kim, David Godwin","doi":"10.1109/COMPSAC.2005.153","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.153","url":null,"abstract":"This paper discusses the Pareto principle as it relates to the distribution of software defects in code. We look at evidence in the context of both the software test team, and users of the software. We also investigate two related principles. The first principle is that the distribution of defects in code relates to the distribution of complexity in code. The second principle is that how we define complexity relates to the distribution of defects in code. We present this work as an empirical study of three general hypotheses investigated for large production-level software; we show that the essence of the principle holds, while precise percentages do not.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134382180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Software Test Selection Patterns and Elusive Bugs 软件测试选择模式和难以捉摸的bug
W. Howden
Traditional white and black box testing methods are effective in revealing many kinds of defects, but the more elusive bugs slip past them. Model-based testing incorporates additional application concepts in the selection of tests, which may provide more refined bug detection, but does not go far enough. Test selection patterns identify defect-oriented contexts in a program. They also identify suggested tests for risks associated with a specified context. A context and its risks is a kind of conceptual trap designed to corner a bug. The suggested tests will find the bug if it has been caught in the trap.
传统的白盒和黑盒测试方法在揭示多种缺陷方面是有效的,但是更难以捉摸的bug会溜过它们。基于模型的测试在测试的选择中包含了额外的应用程序概念,这可能提供更精细的错误检测,但还远远不够。测试选择模式识别程序中面向缺陷的上下文。它们还确定与特定上下文相关的风险的建议测试。上下文及其风险是一种概念陷阱,旨在将错误置于角落。建议的测试将发现在陷阱中捕获的错误。
{"title":"Software Test Selection Patterns and Elusive Bugs","authors":"W. Howden","doi":"10.1109/COMPSAC.2005.143","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.143","url":null,"abstract":"Traditional white and black box testing methods are effective in revealing many kinds of defects, but the more elusive bugs slip past them. Model-based testing incorporates additional application concepts in the selection of tests, which may provide more refined bug detection, but does not go far enough. Test selection patterns identify defect-oriented contexts in a program. They also identify suggested tests for risks associated with a specified context. A context and its risks is a kind of conceptual trap designed to corner a bug. The suggested tests will find the bug if it has been caught in the trap.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124832206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Transitioning from product line requirements to product line architecture 从产品线需求过渡到产品线架构
J. Savolainen, I. Oliver, M. Mannion, Hailang Zuo
Software product line development is a compromise between customer requirements, existing product line architectural constraints and commercial needs. Managing variability is the key to a successful product line development. Product line models of requirements and features can be constructed that contain variation points. New products can be driven by making requirement selections from a product line model of requirements but as the product line evolves selections are constrained by the design of the existing product line architecture and the cost of making these changes. We present a set of rules that map the selection constraint values of requirements to the selection constraint values of features which in turn map on to the selection constraint values of architectural assets. We illustrate the application of the rules using a worked example.
软件产品线开发是客户需求、现有产品线架构约束和商业需求之间的妥协。管理可变性是成功的产品线开发的关键。可以构造包含变化点的需求和特性的产品线模型。新产品可以通过从需求的产品线模型中做出需求选择来驱动,但是随着产品线的发展,选择受到现有产品线架构的设计和做出这些更改的成本的限制。我们提出了一组规则,将需求的选择约束值映射到特征的选择约束值,而特征又映射到架构资产的选择约束值。我们使用一个工作示例来说明这些规则的应用。
{"title":"Transitioning from product line requirements to product line architecture","authors":"J. Savolainen, I. Oliver, M. Mannion, Hailang Zuo","doi":"10.1109/COMPSAC.2005.160","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.160","url":null,"abstract":"Software product line development is a compromise between customer requirements, existing product line architectural constraints and commercial needs. Managing variability is the key to a successful product line development. Product line models of requirements and features can be constructed that contain variation points. New products can be driven by making requirement selections from a product line model of requirements but as the product line evolves selections are constrained by the design of the existing product line architecture and the cost of making these changes. We present a set of rules that map the selection constraint values of requirements to the selection constraint values of features which in turn map on to the selection constraint values of architectural assets. We illustrate the application of the rules using a worked example.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134629960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Self-configuring communication middleware model for multiple network interfaces 多网络接口自配置通信中间件模型
N. Mohamed
Communication middleware such as MuniCluster provides high-level communication mechanisms for networked applications through hiding the low-level communication details from the applications. The MuniCluster model provides mechanisms to enhance the network performance properties through message separations and parallel transfer. However, the configurations of such its services require various measurements and setups to efficiently utilize the availability of the multiple network interfaces. In this paper we introduce and evaluate a self-configuring model that allows applications to transparently utilize the existence of multiple network interfaces and networks. Here we present enhancements to the MuniCluster model by adding the self-configuration mechanism. Using network resource discovery and deciding on how to efficiently utilize the multiple networks, the model enhances overall communications performance. The proposed techniques deal with the heterogeneity of interfaces and networks to enhance communication performance transparent form the applications.
通信中间件(如MuniCluster)通过向应用程序隐藏低级通信细节,为网络应用程序提供高级通信机制。MuniCluster模型提供了通过消息分离和并行传输来增强网络性能的机制。然而,这种服务的配置需要各种测量和设置,以有效地利用多个网络接口的可用性。在本文中,我们介绍并评估了一个自配置模型,该模型允许应用程序透明地利用存在的多个网络接口和网络。这里我们通过添加自配置机制来增强MuniCluster模型。该模型利用网络资源发现和决定如何有效利用多个网络,提高了整体通信性能。所提出的技术处理接口和网络的异构性,以提高应用程序的透明性。
{"title":"Self-configuring communication middleware model for multiple network interfaces","authors":"N. Mohamed","doi":"10.1109/COMPSAC.2005.138","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.138","url":null,"abstract":"Communication middleware such as MuniCluster provides high-level communication mechanisms for networked applications through hiding the low-level communication details from the applications. The MuniCluster model provides mechanisms to enhance the network performance properties through message separations and parallel transfer. However, the configurations of such its services require various measurements and setups to efficiently utilize the availability of the multiple network interfaces. In this paper we introduce and evaluate a self-configuring model that allows applications to transparently utilize the existence of multiple network interfaces and networks. Here we present enhancements to the MuniCluster model by adding the self-configuration mechanism. Using network resource discovery and deciding on how to efficiently utilize the multiple networks, the model enhances overall communications performance. The proposed techniques deal with the heterogeneity of interfaces and networks to enhance communication performance transparent form the applications.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116166844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
MetaWSL and meta-transformations in the FermaT transformation system FermaT转换系统中的元wsl和元转换
Martin P. Ward, H. Zedan
A program transformation is an operation which can be applied to any program (satisfying the transformations applicability conditions) and returns a semantically equivalent program. In the FermaT transformation system program transformations are carried out in a wide spectrum language, called WSL, and the transformations themselves are written in an extension of WSL called MetaWSL which was specifically designed to be a domain-specific language for writing program transformations. As a result, FermaT is capable of transforming its own source code via meta-transformations. This paper introduces MetaWSL and describes some applications of meta-transformations in the FermaT system.
程序转换是一种可以应用于任何程序(满足转换适用性条件)并返回语义等效程序的操作。在FermaT转换系统中,程序转换是用一种称为WSL的广谱语言执行的,而转换本身是用WSL的扩展(称为MetaWSL)编写的,该扩展被专门设计为用于编写程序转换的领域特定语言。因此,FermaT能够通过元转换转换自己的源代码。本文介绍了元wsl,并描述了元变换在费马系统中的一些应用。
{"title":"MetaWSL and meta-transformations in the FermaT transformation system","authors":"Martin P. Ward, H. Zedan","doi":"10.1109/COMPSAC.2005.107","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.107","url":null,"abstract":"A program transformation is an operation which can be applied to any program (satisfying the transformations applicability conditions) and returns a semantically equivalent program. In the FermaT transformation system program transformations are carried out in a wide spectrum language, called WSL, and the transformations themselves are written in an extension of WSL called MetaWSL which was specifically designed to be a domain-specific language for writing program transformations. As a result, FermaT is capable of transforming its own source code via meta-transformations. This paper introduces MetaWSL and describes some applications of meta-transformations in the FermaT system.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121222209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
29th Annual International Computer Software and Applications Conference (COMPSAC'05)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1