4 research outputs found

    Abstract XQueryP: An XML Application Development Language

    No full text
    The three main parts of a typical business application are storage, logic, and presentation. XML is playing an increasing role in storage (using XML databases) and presentation (using AJAX and similar web technologies). Application logic, however, still relies to a large extent on traditional programming languages such as Java. Operating on XML data with a traditional programming language leads to a serious "impedance mismatch " because the type system of the programming language is not based on XML. This paper explores ways of eliminating this impedance mismatch by extending XQuery, an XML query language, to implement business logic. This approach can potentially support XML-based applications with a unified type system and programming environment. 1

    Proceedings of CC 2016: The 25th International Conference on Compiler Construction

    No full text
    © 2016 ACM.This paper presents SVF, a tool that enables scalable and precise interprocedural Static Value-Flow analysis for C programs by leveraging recent advances in sparse analysis. SVF, which is fully implemented in LLVM, allows value-flow construction and pointer analysis to be performed in an iterative manner, thereby providing increasingly improved precision for both. SVF accepts pointsto information generated by any pointer analysis (e.g., Andersen's analysis) and constructs an interprocedural memory SSA form, in which the def-use chains of both top-level and address-taken variables are captured. Such value-flows can be subsequently exploited to support various forms of program analysis or enable more precise pointer analysis (e.g., flow-sensitive analysis) to be performed sparsely. By dividing a pointer analysis into three loosely coupled components: Graph, Rules and Solver, SVF provides an extensible interface for users to write their own solutions easily. SVF is publicly available at http://unsw-corg.github.io/SVF

    BIM security: A critical review and recommendations using encryption strategy and blockchain

    No full text
    Security of information in collaborative BIM platforms is crucial particularly for critical projects such as that of government buildings, prisons, and power plants. Inappropriate distribution and loss of sensitive information may potentially lead to physical security threats, financial loss, and loss of trust and reputation. Therefore, this paper identifies the information security requirements of collaborative BIM platforms considering the characteristics related to data security of collaborative BIM platforms through a literature review and as a result, identifies seven components of BIM security, based on which defines three levels of BIM security. Existing cybersecurity facilitating technologies such as encryption protocols, distributed database technology, and blockchain technology are reviewed to assess applicability to BIM security. This review shows that although the technologies to support BIM security are available in research and on market, they are not customized in existing collaborative BIM platforms to support BIM security. Therefore, two conceptual frameworks are proposed – (1) an encryption strategy-based framework to facilitate secure storage and distribution of BIM and (2) a blockchain-based framework to record BIM changes in a tamper-proof ledger for the non-trusting environment of construction projects. Discussions on cost and functionality are provided, which will be further extended in the future
    corecore