9,192 research outputs found

    Type-Directed Program Transformations for the Working Functional Programmer

    Get PDF
    We present preliminary research on Deuce+, a set of tools integrating plain text editing with structural manipulation that brings the power of expressive and extensible type-directed program transformations to everyday, working programmers without a background in computer science or mathematical theory. Deuce+ comprises three components: (i) a novel set of type-directed program transformations, (ii) support for syntax constraints for specifying "code style sheets" as a means of flexibly ensuring the consistency of both the concrete and abstract syntax of the output of program transformations, and (iii) a domain-specific language for specifying program transformations that can operate at a high level on the abstract (and/or concrete) syntax tree of a program and interface with syntax constraints to expose end-user options and alleviate tedious and potentially mutually inconsistent style choices. Currently, Deuce+ is in the design phase of development, and discovering the right usability choices for the system is of the highest priority

    The XII century towers, a benchmark of the Rome countryside almost cancelled. The safeguard plan by low cost uav and terrestrial DSM photogrammetry surveying and 3D Web GIS applications

    Get PDF
    “Giving a bird-fly look at the Rome countryside, throughout the Middle Age central period, it would show as if the multiple city towers has been widely spread around the territory” on a radial range of maximum thirty kilometers far from the Capitol Hill center (Carocci and Vendittelli, 2004). This is the consequence of the phenomenon identified with the “Incasalamento” neologism, described in depth in the following paper, intended as the general process of expansion of the urban society interests outside the downtown limits, started from the half of the XII and developed through all the XIII century, slowing down and ending in the following years. From the XIX century till today the architectural finds of this reality have raised the interest of many national and international scientists, which aimed to study and catalog them all to create a complete framework that, cause of its extension, didn’t allow yet attempting any element by element detailed analysis. From the described situation has started our plan of intervention, we will apply integrated survey methods and technologies of terrestrial and UAV near stereo-photogrammetry, by the use of low cost drones, more than action cameras and reflex on extensible rods, integrated and referenced with GPS and topographic survey. In the final project we intend to produce some 3D scaled and textured surface models of any artifact (almost two hundreds were firstly observed still standing), to singularly study the dimensions and structure, to analyze the building materials and details and to formulate an hypothesis about any function, based even on the position along the territory. These models, successively georeferenced, will be imported into a 2D and 3D WebGIS and organized in layers made visible on basemaps of reference, as much as on historical maps

    Bridging the divide in language and approach between pedagogy and programming: the case of IMS Learning Design

    Get PDF
    Even though the IMS Learning Design (IMS LD) specification has offered a way for expressing multiple-learner scenarios, the language thus provided is far from the language, teaching practitioners use. To bridge this divide, we have developed IMS LD authoring software that translates from the learning designer perspective to the technical perspective. To aid adequate software developments, an analysis was performed to identify uses of level B properties in expert units of learning. In a second analysis, which is described in this paper, these uses were matched with demands of typical pedagogical methods. Some restrictions of the IMS LD specification are pointed out in this regard. As an outcome of the analyses, interfaces employing pedagogical language were integrated in the IMS LD authoring software in order to provide teaching practitioners access to level B functionalities despite their highly technical nature

    A Framework for collaborative writing with recording and post-meeting retrieval capabilities

    Get PDF
    From a HCI perspective, elucidating and supporting the context in which collaboration takes place is key to implementing successful collaborative systems. Synchronous collaborative writing usually takes place in contexts involving a “meeting” of some sort. Collaborative writing meetings can be face-to-face or, increasingly, remote Internet-based meetings. The latter presents software developers with the possibility of incorporating multimedia recording and information retrieval capabilities into the collaborative environment. The collaborative writing that ensues can be seen as an activity encompassing asynchronous as well as synchronous aspects. In order for revisions, information retrieval and other forms of post-meeting, asynchronous work to be effectively supported, the synchronous collaborative editor must be able to appropriately detect and record meeting metadata. This paper presents a collaborative editor that supports recording of user actions and explicit metadata production. Design and technical implications of introducing such capabilities are discussed with respect to document segmentation, consistency control, and awareness mechanisms

    USBcat - Towards an Intrusion Surveillance Toolset

    Full text link
    This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary's techniques and objectives are an important element in network and computer security. With the appropriate toolset, security investigators would be permitted to perform both live and stealthy counter-intelligence operations by observing the behaviour and communications of the intruder. Subsequently a more complete picture of the attacker's identity, objectives, capabilities, and infiltration could be formulated than is possible with present technologies. This research focused on developing an extensible framework to permit the covert investigation of malware. Additionally, a Universal Serial Bus (USB) Mass Storage Device (MSD) based covert channel was designed to enable remote command and control of the framework. The work was validated through the design, implementation and testing of a toolset.Comment: In Proceedings AIDP 2014, arXiv:1410.322

    A Survey of User Interfaces for Computer Algebra Systems

    Get PDF
    AbstractThis paper surveys work within the Computer Algebra community (and elsewhere) directed towards improving user interfaces for scientific computation during the period 1963–1994. It is intended to be useful to two groups of people: those who wish to know what work has been done and those who would like to do work in the field. It contains an extensive bibliography to assist readers in exploring the field in more depth. Work related to improving human interaction with computer algebra systems is the main focus of the paper. However, the paper includes additional materials on some closely related issues such as structured document editing, graphics, and communication protocols
    corecore