首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Performance evaluation is increasingly relevant for Web Ontology Language (OWL) reasoners, due to the expanding availability of knowledge corpuses on the Web, the growing variety of applications, and the rise to prominence of mobile and pervasive computing. Motivated mainly by the difficulty of comparing reasoning engines in the Semantic Web of Things (SWoT), this paper introduces evOWLuator, a novel approach and a multiplatform framework devised to be both flexible and expandable. It features integration of traditional and mobile/embedded engines as well as ontology dataset management, reasoning test execution, and report generation. A case study consisting of an experimental setting for time, memory peak and energy footprint evaluation with eight reasoners and four different platforms allows showcasing usage and validating features and usability of the tool.  相似文献   

2.
A portable CPU-management framework for Java   总被引:1,自引:0,他引:1  
The Java resource accounting framework, second edition (J-RAF2), is a portable CPU-management framework for Java environments. It is based on fully automated program-transformation techniques applied at the bytecode level and can be used with every standard Java virtual machine. J-RAF2 modifies applications, libraries, and the Java development kit itself to expose details regarding thread execution. This article focuses on the extensible runtime APIs, which are designed to let developers tailor management policies to their needs.  相似文献   

3.
The advent of component‐based reflective applications raises the issue of protecting baselevel components from the actions performed by metalevel components. However, by their very nature, reflective applications are far more difficult to secure than non‐reflective applications, which certainly explains why the problem has received very little attention so far. In this paper we present a security framework for enforcing access control between metalevel components and the baselevel components they reflect on. Rather than designing a new security architecture from scratch, we extend the standard security architecture of Java to provide security for a fully‐functional proxy‐based MOP for Java. We implement a number of well‐known meta‐level behaviors and study their security requirements, the results of which support our design choices. Copyright © 2003 John Wiley & Sons, Ltd.  相似文献   

4.
This paper discusses some basic ideas about the implementation of GC, a constraint propagation system, with three different implementations of finite variables domains. As it has been our wish to develop a system that uses the OO approach, it is implemented in Java, although other application frameworks are also available for C++.The constraint propagation and variables domains are explained at the application and implementation level and some examples from the litterature are presented in order to clarify the construction of applications with GC.  相似文献   

5.
We present a framework for implementing massively distributed applications in symbolic computing. Using this framework, computations with massive resource requirements can be distributed and processed in parallel on a network of workstations or on a large scale network such as the Internet. For each concrete application only minimal code is needed to complement the generic framework in order to enable large scale distributed processing of the application.Our framework introduces a “divide and be conquered” model for massively distributed computations. We compare this model to a more traditional one, in a symbolic computing setting. We stress the major problems and propose solutions for some of them.  相似文献   

6.
消息中间件的性能与系统资源的消耗之间存在着一定的矛盾.一般采用人工配置的方法平衡矛盾,不仅难于配置,而且不能很好地适应系统的动态性.本文提出了一种基于模糊控制理论的自适应框架,可以在消息中间件的性能与其稳定性、可靠性之间作较好的平衡.本框架引入AOP的思想,可以与不同类型的消息中间件集成,具有一定的普适性.  相似文献   

7.
jMetal: A Java framework for multi-objective optimization   总被引:1,自引:0,他引:1  
This paper describes jMetal, an object-oriented Java-based framework aimed at the development, experimentation, and study of metaheuristics for solving multi-objective optimization problems. jMetal includes a number of classic and modern state-of-the-art optimizers, a wide set of benchmark problems, and a set of well-known quality indicators to assess the performance of the algorithms. The framework also provides support to carry out full experimental studies, which can be configured and executed by using jMetal’s graphical interface. Other features include the automatic generation of statistical information of the obtained results, and taking advantage of the current availability of multi-core processors to speed-up the running time of the experiments. In this work, we include two case studies to illustrate the use of jMetal in both solving a problem with a metaheuristic and designing and performing an experimental study.  相似文献   

8.
MultiTel is a compositional framework for developing collaborative multimedia applications, and also designates a Web-based distributed platform that supports intercomponent communication. This article shows how compositional and coordination paradigms can be successfully applied to design cooperative Java applications with multimedia data exchange. The focus is on multimedia and network architectures, which define generic and specific components coordinated by connectors for resolving the resource management needs of collaborative applications. The MultiTel platform composes application components dynamically, providing mechanisms for building services with plug-and-play transport and multimedia resources  相似文献   

9.
With the advent of object‐oriented languages and the portability of Java, the development and use of class libraries has become widespread. Effective class reuse depends on class reliability which in turn depends on thorough testing. This paper describes a class testing approach based on modeling each test case with a tuple and then generating large numbers of tuples to thoroughly cover an input space with many interesting combinations of values. The testing approach is supported by the Roast framework for the testing of Java classes. Roast provides automated tuple generation based on boundary values, unit operations that support driver standardization, and test case templates used for code generation. Roast produces thorough, compact test drivers with low development and maintenance cost. The framework and tool support are illustrated on a number of non‐trivial classes, including a graphical user interface policy manager. Quantitative results are presented to substantiate the practicality and effectiveness of the approach. Copyright © 2002 John Wiley & Sons, Ltd.  相似文献   

10.
Teaching systematic object-oriented software development to undergraduate students is difficult: Students need to develop a lot of complex skills. These include technical skills in object-oriented software development, but also social skills—for example, how to collaborate with other developers as part of a team working towards a large and complex software system. To acquire these skills, students need hands-on development experiences—for example, through team-oriented project courses. Designing such project courses is a challenge in itself: They must be both sufficiently challenging and achievable within the limited time available. In our special situation (large numbers of students supervised by small numbers of staff) an important further requirement is scalability: Different projects should be easily comparable while allowing for different tasks for different teams to reduce the risk of plagiarism. The solution that in our experience satisfies all these requirements is to use an application framework for an everyday application domain—for example, the business domain.Since 1997, we have been using Salespoint, a Java-based framework for creating business applications, that has been jointly developed and maintained in Dresden and Munich. In this paper, we briefly recollect the educational background and aims of the courses and present in some detail Salespoint (and its most recent revision, Salespoint2010): central notions like catalogs and stocks, the functionality it offers to users (application control, data management, and much more), a technical overview of its architecture, an example application built with Salespoint, and some lessons learned so far.  相似文献   

11.
ContextExisting fault-localization techniques combine various program features and similarity coefficients with the aim of precisely assessing the similarities among the dynamic spectra of these program features to predict the locations of faults. Many such techniques estimate the probability of a particular program feature causing the observed failures. They often ignore the noise introduced by other features on the same set of executions that may lead to the observed failures. It is unclear to what extent such noise can be alleviated.ObjectiveThis paper aims to develop a framework that reduces the noise in fault-failure correlation measurements.MethodWe develop a fault-localization framework that uses chains of key basic blocks as program features and a noise-reduction methodology to improve on the similarity coefficients of fault-localization techniques. We evaluate our framework on five base techniques using five real-life median-scaled programs in different application domains. We also conduct a case study on subjects with multiple faults.ResultsThe experimental result shows that the synthesized techniques are more effective than their base techniques by almost 10%. Moreover, their runtime overhead factors to collect the required feature values are practical. The case study also shows that the synthesized techniques work well on subjects with multiple faults.ConclusionWe conclude that the proposed framework has a significant and positive effect on improving the effectiveness of the corresponding base techniques.  相似文献   

12.
This is a review of The Core Test Wrapper Handbook, by Francisco da Silva, Teresa McLaurin, and Tom Waayers.  相似文献   

13.
Malware replicates itself and produces offspring with the same characteristics but different signatures by using code obfuscation techniques. Current generation Anti-Virus (AV) engines employ a signature-template type detection approach where malware can easily evade existing signatures in the database. This reduces the capability of current AV engines in detecting malware. In this paper we propose a hybrid framework for malware detection by using the hybrids of Support Vector Machines Wrapper, Maximum-Relevance–Minimum-Redundancy Filter heuristics where Application Program Interface (API) call statistics are used as a malware features. The novelty of our hybrid framework is that it injects the filter’s ranking score in the wrapper selection process and combines the properties of both wrapper and filters and API call statistics which can detect malware based on the nature of infectious actions instead of signature. To the best of our knowledge, this kind of hybrid approach has not been explored yet in the literature in the context of feature selection and malware detection. Knowledge about the intrinsic characteristics of malicious activities is determined by the API call statistics which is injected as a filter score into the wrapper’s backward elimination process in order to find the most significant APIs. While using the most significant APIs in the wrapper classification on both obfuscated and benign types malware datasets, the results show that the proposed hybrid framework clearly surpasses the existing models including the independent filters and wrappers using only a very compact set of significant APIs. The performances of the proposed and existing models have further been compared using binary logistic regression. Various goodness of fit comparison criteria such as Chi Square, Akaike’s Information Criterion (AIC) and Receiver Operating Characteristic Curve ROC are deployed to identify the best performing models. Experimental outcomes based on the above criteria also show that the proposed hybrid framework outperforms other existing models of signature types including independent wrapper and filter approaches to identify malware.  相似文献   

14.
15.
16.
The Internet of Everything and Semantic Web can be joined by giving more intelligence to pervasive systems. To that end, reasoning capabilities should be enabled even for very resource-constrained embedded devices. This paper presents Tiny-ME (the Tiny Matchmaking Engine), a matchmaking and reasoning engine for the Web Ontology Language (OWL), designed and implemented with a compact and portable C core. Main features are high resource efficiency and multiplatform support, spanning containerized microservices, desktops, mobile devices, and embedded boards. The OWLlink interface has been extended to enable non-standard reasoning services for matchmaking in Web, Cloud, and Edge computing. A prototype evaluation is proposed, including a case study on the Pixhawk Unmanned Aerial Vehicle (UAV) autopilot and performance highlights.  相似文献   

17.
The three access modifiers—public, protected, and private—control the accessibility of the members of a type in the Java programming language. Furthermore, the accessibility may be transmitted along the two structures—package structure and inheritance structure. It is difficult to identify the weaknesses of the access modifiers from the informal semantics stated in the language manual. We develop a formal framework for specifying the accessibility in Java programs based on attribute grammars. With the help of this framework, we found several situations in the language specification that are irregular or counter-intuitive or ambiguous. These situations may confuse the programmers and hence may create weaknesses in Java programs.  相似文献   

18.
Java编程题自动判分软件框架的设计   总被引:2,自引:0,他引:2  
通过分析面向对象程序及其判分规则的特点,提出了一种基于反射机制、以class文件为评判对象、判分项为基本评111单元的Java编程题自动判分技术.该技术克服了现有自动判分技术存在的不足,遵循了面向对象程序固有的特征;以此为基础设计并实现了一个Java编程题自动判分软件框架.借助此框架,可以快速搭建各类涉及Java编程题自动判分功能的考试系统和作业评判系统.最后通过一个实际系统的开发表明了该框架的有效性.  相似文献   

19.
Sync: a Java framework for mobile collaborative applications   总被引:1,自引:0,他引:1  
Munson  J.P. Dewan  P. 《Computer》1997,30(6):59-66
Introducing the factors of wireless mobile systems into the development of collaborative applications complicates developers' lives significantly. Application frameworks targeted for coordinating wireless mobile applications simplify development. The authors describe Sync, a development framework that provides high-level primitives that enable programmers to create arbitrarily complex, synchronized, replicated data objects. Designed for wireless networks, Sync enables applications to share changes at a granularity as small as updates to basic types and so enables better performance on low-bandwidth connections  相似文献   

20.
J% is an extension of the Java programming language that efficiently supports the integration of domain-specific languages. In particular, J% allows the embedding of domain-specific language code into Java programs in a syntax-checked and type-safe manner. This paper presents J%׳s support for the sql language. J% checks the syntax and semantics of sql statements at compile-time. It supports query validation against a database schema or through execution to a live database server. The J% compiler generates code that uses standard jdbc api calls, enhancing runtime efficiency and security against sql injection attacks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号