Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Programming Languages and Compilers

Kb-Anonymity: A Model For Anonymized Behavior-Preserving Test And Debugging Data, Aditya Budi, David Lo, Lingxiao Jiang, Lucia Lucia Dec 2011

Kb-Anonymity: A Model For Anonymized Behavior-Preserving Test And Debugging Data, Aditya Budi, David Lo, Lingxiao Jiang, Lucia Lucia

David LO

It is often very expensive and practically infeasible to generate test cases that can exercise all possible program states in a program. This is especially true for a medium or large industrial system. In practice, industrial clients of the system often have a set of input data collected either before the system is built or after the deployment of a previous version of the system. Such data are highly valuable as they represent the operations that matter in a client's daily business and may be used to extensively test the system. However, such data often carries sensitive information and cannot …


Reflective Remote Method Invocation, George K. Thiruvathukal, Lovely S. Thomas, Andy T. Korczynski Nov 2011

Reflective Remote Method Invocation, George K. Thiruvathukal, Lovely S. Thomas, Andy T. Korczynski

George K. Thiruvathukal

Remote Method Invocation (RMI) is available in the current Java language design and implementation, providing the much-needed capability of allowing objects running in different Java processes to collaborate using a variation on the popular Remote Procedure Call (RPC). Although RMI provides features which are desirable for high-performance distributed computing, its design and implementation are deficient in key areas of importance to the high-performance computing community in general. This paper addresses the key deficiencies of RMI and how these deficiencies affect the design and implementation of distributed object applications. Reflective RMI (RRMI) is an open RMI implementation which makes better use …


Technologies For Ubiquitous Supercomputing: A Java Interface To The Nexus Communication System, Ian Foster, George K. Thiruvathukal, Steven Tuecke Nov 2011

Technologies For Ubiquitous Supercomputing: A Java Interface To The Nexus Communication System, Ian Foster, George K. Thiruvathukal, Steven Tuecke

George K. Thiruvathukal

We use the term ubiquitous supercomputing to refer to systems that integrate low- and mid-range computing systems, advanced networks and remote high-end computers with the goal of enhancing the computational power accessible from local environments. Such systems promise to enable new applications in areas as diverse as smart instruments and collaborative environments. However, they also demand tools for transporting code between computers and for establishing flexible, dynamic communication structures. In this article, we propose that these requirements be satisfied by introducing Java classes that implement the global pointer and remote service request mechanisms defined by a communication library called Nexus. …


Model Checking In The Absence Of Code, Model And Properties, David Lo, Siau-Cheng Khoo Nov 2011

Model Checking In The Absence Of Code, Model And Properties, David Lo, Siau-Cheng Khoo

David LO

Model checking is a major approach in ensuring software correctness. It verifies a model converted from code against some formal properties. However, difficulties and programmers ’ reluctance to formalize formal properties have been some hurdles to its widespread industrial adoption. Also, with the advent of commercial off-the-shelf (COTS) components provided by third party vendors, model checking is further challenged as often only a binary version of the code is provided by vendors. Interestingly, latest instrumentation tools like PIN and Valgrind have enable execution traces to be collected dynamically from a running program. In this preliminary study, we investigate what can …


Mining Scenario-Based Specifications With Value-Based Invariants, David Lo, Shahar Maoz Nov 2011

Mining Scenario-Based Specifications With Value-Based Invariants, David Lo, Shahar Maoz

David LO

There have been a number of studies on mining candidate specifications from execution traces. Some extract specifications corresponding to value-based invariants, while others work on inferring ordering constraints. In this work, we merge our previous work on mining scenario-based specifications, extracting ordering constraints in the form of live sequence charts (LSC), a visual specification language, with Daikon, a tool for mining value-based invariants. The resulting approach strengthens the expressive power of the mined scenarios by enriching them with scenario-specific value-based invariants. The concept is illustrated using a preliminary case study on a real application.


Top-C: A Task-Oriented Parallel C Interface, Gene D. Cooperman Jan 2011

Top-C: A Task-Oriented Parallel C Interface, Gene D. Cooperman

Gene D. Cooperman

The goal of this work is to simplify parallel application development, and thus ease the learning barriers faced by non-experts. It is especially useful where there is little data-parallelism to be recognized by a compiler. The applications programmer need learn the intricacies of only one primary subroutine in order to get the full benefits of the parallel interface. The applications programmer defines a high level concept, the task, that depends only on his application, and not on any particular parallel library. The task is defined by its three phases: (a) the task input, (b) sequential code to execute the task, …


Enhanced Indoor Locationing In A Congested Wi-Fi Environment, Hsiuping Lin, Ying Zhang, Martin Griss, Ilya Landa Jan 2011

Enhanced Indoor Locationing In A Congested Wi-Fi Environment, Hsiuping Lin, Ying Zhang, Martin Griss, Ilya Landa

Martin L Griss

Many context-aware mobile applications require a reasonably accurate and stable estimate of a user’s location. While the Global Positioning System (GPS) works quite well world-wide outside of buildings and urban canyons, locating an indoor user in a real-world environment is much more problematic. Several different approaches and technologies have been explored, some involving specialized sensors and appliances, and others using increasingly ubiquitous Wi- Fi and Bluetooth radios. In this project, we want to leverage existing Wi-Fi access points (AP) and seek efficient approaches to gain usefully high room-level accuracy of the indoor location prediction of a mobile user. The Redpin …


A Pattern Based Approach For The Derivation Of Base Forms Of Verbs From Participles And Tenses For Flexible Nlp, Ram Gopal Raj Jan 2011

A Pattern Based Approach For The Derivation Of Base Forms Of Verbs From Participles And Tenses For Flexible Nlp, Ram Gopal Raj

Ram Gopal Raj

Natural Language Processing (NLP) is an integral part of a conversation and by proxy an integral part of a chatterbot. Building a complete vocabulary for a chatterbot is a prohibitively time and effort intensive endeavor and thus makes a learning chatterbot a much more efficient alternative. Learning can be performed from many facets including individual words to phrases and concepts. From the perspective of words, the grammatical parts of speech become important since they allow meaning and structure to be derived from a sentence. Verbs tend to be unique since they have different forms, namely participles and tenses. As such …


A Model For Determining The Degree Of Contradictions In Information, Ram Gopal Raj Jan 2011

A Model For Determining The Degree Of Contradictions In Information, Ram Gopal Raj

Ram Gopal Raj

Conversational systems are gaining popularity rapidly. Consequently, the believability of the conversational systems or chatterbots is becoming increasingly important. Recent research has proven that learning chatterbots tend to be rated as being more believable by users. Based on Raj’s Model for Chatterbot Trust, we present a model for allowing chatterbots to determine the degree of contradictions in contradictory statements when learning thereby allowing them to potentially learn more accurately via a form of discourse. Some information that is learnt by a chatterbot may be contradicted by other information presented subsequently. Choosing correctly which information to use is critical in chatterbot …


A One-Mode-For-All Predictor For Text Messaging, Ram Gopal Raj Jan 2011

A One-Mode-For-All Predictor For Text Messaging, Ram Gopal Raj

Ram Gopal Raj

This paper discusses the enhancements made on the current mobile phone messaging software, namely the predictive text entry. In addition, the application also has a facility to abbreviate any unabbreviated words that exist in the dictionary, so that the message length can be reduced. The application was tested in a computer-simulated mobile environment and the results of the tests are presented here. These additional features will potentially enable users to send messages at a reduced length and thus reduce the cost of sending messages. Moreover, users who are not adept in using the abbreviations can now do so with features …