32,527 research outputs found
Invertible Program Restructurings for Continuing Modular Maintenance
When one chooses a main axis of structural decompostion for a software, such
as function- or data-oriented decompositions, the other axes become secondary,
which can be harmful when one of these secondary axes becomes of main
importance. This is called the tyranny of the dominant decomposition. In the
context of modular extension, this problem is known as the Expression Problem
and has found many solutions, but few solutions have been proposed in a larger
context of modular maintenance. We solve the tyranny of the dominant
decomposition in maintenance with invertible program transformations. We
illustrate this on the typical Expression Problem example. We also report our
experiments with Java and Haskell programs and discuss the open problems with
our approach.Comment: 6 pages, Early Research Achievements Track; 16th European Conference
on Software Maintenance and Reengineering (CSMR 2012), Szeged : Hungary
(2012
Leveraging Program Comprehension with Concern-oriented Source Code Projections
In this paper we briefly introduce our concern-oriented source code projections that enable looking at same source code in multiple different ways. The objective of this paper is to discuss projection creation process in detail and to explain benefits of using projections to aid program comprehension. We achieve this objective by showing a case study that illustrates using projections on examples. Presented case study was done using our prototypical tool that is implemented as a plugin for NetBeans IDE. We briefly introduce the tool and present an experiment that we have conducted with a group of students at our university. The results of the experiment indicate that projections have positive effect on program comprehension
The Larch Environment - Python programs as visual, interactive literature
The Larch Environment' is designed for the creation of programs that take the
form of interactive technical literature. We introduce a novel approach to combined
textual and visual programming by allowing visual, interactive objects
to be embedded within textual source code, and segments of source code to be
further embedded within those objects. We retain the strengths of text-based
source code, while enabling visual programming where it is bene�cial. Additionally,
embedded objects and code provide a simple object-oriented approach
to extending the syntax of a language, in a similar fashion to LISP macros. We
provide a rapid prototyping and experimentation environment in the form of
an active document system which mixes rich text with executable source code.
Larch is supported by a simple type coercion based presentation protocol that
displays normal Java and Python objects in a visual, interactive form. The
ability to freely combine objects and source code within one another allows for
the construction of rich interactive documents and experimentation with novel
programming language extensions
Transportation, Terrorism and Crime: Deterrence, Disruption and Resilience
Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or “lone wolf terrorist”), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks.
This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and the possible mitigation or response tactics that may be effective in deterring attacks or saving lives in the event of an attack. It includes case studies that can be used as educational tools for understanding terrorist methodologies, as well as ordinary emergencies that might become a terrorist’s blueprint
Afterlife: the post-research affect and effect of software
Software plays an important role in contemporary research. Aside from its use for administering traditional instruments like surveys and in data analysis, the widespread use of mobile and web apps for social, medical and lifestyle engagement has led to software becoming a research intervention in its own right. For example, it is not unusual to find apps being studied for their utility as interventions in health and social life. Since the software may persist in use beyond the life of an investigation, this raises questions as to the extent of ethical duties for researchers involved in its production and/or study towards the participants involved. Key factors identified include the extent of affect created by the software, the effect it has on a participant’s life, the length of investigation, cost of maintenance and participant agency. In this article we discuss the issues raised in such situations, considering them in the context of post-research duties of care and suggesting strategies to balance the burden on researchers with the need for ongoing participant support
Information security
https://egrove.olemiss.edu/aicpa_guides/1470/thumbnail.jp
- …