Open Access. Powered by Scholars. Published by Universities.®

Programming Languages and Compilers Commons

Open Access. Powered by Scholars. Published by Universities.®

538 Full-Text Articles 544 Authors 83663 Downloads 59 Institutions

All Articles in Programming Languages and Compilers

Faceted Search

538 full-text articles. Page 1 of 14.

Examining Bridges Between Informal And Formal Learning Environments: A Sequential Mixed Method Design, Dagen L. Valentine 2016 University of Nebraska - Lincoln

Examining Bridges Between Informal And Formal Learning Environments: A Sequential Mixed Method Design, Dagen L. Valentine

Theses, Dissertations, & Student Scholarship: Agricultural Leadership, Education & Communication Department

The purpose of this sequential mixed method study was to identify schools implementing a technology-based engineering design intervention in a way that connects or bridges formal learning environments of the school-day to informal learning environments such as afterschool programs. Further, this study investigated educators’ decisions that enabled or facilitated bridging between formal and informal learning environments. This cooperation and/or linking between informal and formal learning time is bridging. Participants included public schools (n=16) in Eastern Nebraska that incorporated the Nebraska Wearables Technology (WearTec) program at their school, club or Out-of-School-Time program during the 2015-2016 school year. Three of ...


Secure Declassification In Faceted Javascript, Tam Wing 2016 San Jose State University

Secure Declassification In Faceted Javascript, Tam Wing

Master's Projects

Information leaks currently represent a major security vulnerability. Malicious code, when injected into a trusted environment and executed in the context of the victim’s privileges, often results in the loss of sensitive information. To address this security issue, this paper focuses on the idea of information flow control using faceted execution [3]. This mechanism allows the interpreter to efficiently keep track of variables across multiple security levels, achieving termination-insensitive non-interference (TINI). With TINI, a program can only leak one bit of data, caused by the termination of a program. One key benefit of having faceted execution is that flow ...


Findapark Implementation, David Laratta 2016 La Salle University

Findapark Implementation, David Laratta

Mathematics and Computer Science Capstones

FindAPark is a web service application designed to help a user search for a local hike or vacation revolving around hiking or cycling. Workplan The workplan for this capstone is to create the System Proposal which includes detailed information about the completion of all the items in the System Proposal except the Functional, Structural, and Behavioral Models.


Taint And Information Flow Analysis Using Sweet.Js Macros, Prakasam Kannan 2016 San Jose State University

Taint And Information Flow Analysis Using Sweet.Js Macros, Prakasam Kannan

Master's Projects

JavaScript has been the primary language for application development in browsers and with the advent of JIT compilers, it is increasingly becoming popular on server side development as well. However, JavaScript suffers from vulnerabilities like cross site scripting and malicious advertisement code on the the client side and on the server side from SQL injection.

In this paper, we present a dynamic approach to efficiently track information flow and taint detection to aid in mitigation and prevention of such attacks using JavaScript based hygienic macros. We use Sweet.js and object proxies to override built-in JavaScript operators to track information ...


Mysql Database Of Web Based Attendance Management System, Dr. Muhammad Zubair Asghar, sahar hassan 2016 Gomal University D.I.Khan ,Pakistan

Mysql Database Of Web Based Attendance Management System, Dr. Muhammad Zubair Asghar, Sahar Hassan

Dr. Muhammad Zubair Asghar

It is MySQL database of my BSCS student: Sahar hassan' s project titled "Web based attendance management system


Modular Reasoning In The Presence Of Event Subtyping, Mehdi Bagherzadeh, Robert Dyer, Rex D. Fernando, Jose Sanchez, Hridesh Rajan 2016 Iowa State University

Modular Reasoning In The Presence Of Event Subtyping, Mehdi Bagherzadeh, Robert Dyer, Rex D. Fernando, Jose Sanchez, Hridesh Rajan

Computer Science Technical Reports

Separating crosscutting concerns while preserving modular reasoning is challenging. Type-based interfaces (event types) separate modularized crosscutting concerns (observers) and traditional object-oriented concerns (subjects). Event types paired with event specifications were shown to be effective in enabling modular reasoning about subjects and observers. Similar to class subtyping, organizing event types into subtyping hierarchies is beneficial. However, unrelated behaviors of observers and their arbitrary execution orders could cause unique, somewhat counterintuitive, reasoning challenges in the presence of event subtyping. These challenges threaten both tractability of reasoning and reuse of event types. This work makes three contributions. First, we pose and explain these ...


Software Improvements To Parint, A Parallel Integration Software Package, Lawrence Cuneaz 2016 Western Michigan University

Software Improvements To Parint, A Parallel Integration Software Package, Lawrence Cuneaz

Honors Theses

The best software is easy to configure and compile, is expandable and is well tested. Development of the ParInt software package for parallel integration stopped a number of years ago. When handed the software, parts of the package no longer configured or compiled consistently. Furthermore it relied on one random number generator and had no functional testing. The team tuned the auto configuration so that the program would configure and build on current systems, created expandable functionality to add new random number generators and created two functional test packs. Now ParInt can be developed with confidence knowing that it compiles ...


Make A Twitter Bot In Python: Iterative Code Examples, Robin Camille Davis, Mark E. Eaton 2016 CUNY John Jay College

Make A Twitter Bot In Python: Iterative Code Examples, Robin Camille Davis, Mark E. Eaton

Publications and Research

A tutorial based upon the LACUNY Emerging Technologies Committee’s “Build Your Own Twitter Bot” day in December 2015, which was billed as a gentle introduction to programming in Python.


Masm Emulator, Dr. Muhammad Zubair Asghar 2016 ICIT, Gomal University, Dera Ismail Khan

Masm Emulator, Dr. Muhammad Zubair Asghar

Dr. Muhammad Zubair Asghar

Masm emulator is uploaded for educational purpose to test assembly language programs taught in microprocessor and assembly language course offered in BSCS and MCS programs in ICIT, Gomal University


Cracking The Code Of Success: The Coding Academy, 2016 DePaul University

Cracking The Code Of Success: The Coding Academy

DePaul Magazine

BLUE1647 is a nonprofit technology and entrepreneurship innovation center—a type of tech incubator, but with a difference. The seven-day-a-week coworking space welcomes engineers and developers, but also provides technology education to young people and college students through strategic partnerships with DePaul, Chicago Public Schools and other organizations. BLUE1647 offers MBA social enterprise and undergraduate entrepreneurship students an experiential learning project called the Coding Academy, a tuition-based program offered on a full-scholarship basis to DePaul student cohorts.


Front Matter: Proceedings Of The Maics 2016 Conference, University of Dayton 2016 University of Dayton

Front Matter: Proceedings Of The Maics 2016 Conference, University Of Dayton

Content presented at the MAICS conference

Front matter contains:

  • A list of program chairs and committee members
  • Foreword to the proceedings by James P. Buckley, conference chair; Saverio Perugini, general chair

Editors: Phu H. Phung, University of Dayton; Ju Shen, University of Dayton; Michael Glass, Valparaiso University


Towards A Pedagogy Of Comparative Visualization In 3d Design Disciplines, James Birt, Jonathan Nelson, Dirk Hovorka 2016 Bond University

Towards A Pedagogy Of Comparative Visualization In 3d Design Disciplines, James Birt, Jonathan Nelson, Dirk Hovorka

Jonathan J Nelson

Spatial visualization and interpretation are important skills for designers. However, these skills generally require significant experiential development over the course of years. Visualizations allow the human brain to convey complex spatial concepts in intuitive, navigable and manipulable forms improving learner outcomes and perceptions. But often these visualizations are studied as single modality solutions. Dual modality and multimedia presentation studies show positive improvements in learner outcomes but dual modality is often difficult to compare. This paper presents ongoing research in the use of comparative multimodal visualizations produced with emerging technology solutions in 3D Design classrooms. Presented are previous findings from multimedia ...


A Reflection On Types, Simon. Peyton Jones, Stephanie Weirich, Richard A. Eisenberg, Dimitrios Vytiniotis 2016 Bryn Mawr College

A Reflection On Types, Simon. Peyton Jones, Stephanie Weirich, Richard A. Eisenberg, Dimitrios Vytiniotis

Computer Science Faculty Research and Scholarship

The ability to perform type tests at runtime blurs the line between statically-typed and dynamically-checked languages. Recent developments in Haskell’s type system allow even programs that use reflection to themselves be statically typed, using a type-indexed runtime representation of types called \𝗍𝖾𝗑𝗍𝗂𝗍{𝖳𝗒𝗉𝖾𝖱𝖾𝗉}\textit{TypeRep}. As a result we can build dynamic types as an ordinary, statically-typed library, on top of \𝗍𝖾𝗑𝗍𝗂𝗍{𝖳𝗒𝗉𝖾𝖱𝖾𝗉}\textit{TypeRep} in an open-world context.


Towards Improving Interface Modularity In Legacy Java Software Through Automated Refactoring, Raffi T. Khatchadourian, Olivia Moore, Hidehiko Masuhara 2016 CUNY New York City College of Technology

Towards Improving Interface Modularity In Legacy Java Software Through Automated Refactoring, Raffi T. Khatchadourian, Olivia Moore, Hidehiko Masuhara

Publications and Research

The skeletal implementation pattern is a software design pattern consisting of defining an abstract class that provides a partial interface implementation. However, since Java allows only single class inheritance, if implementers decide to extend a skeletal implementation, they will not be allowed to extend any other class. Also, discovering the skeletal implementation may require a global analysis. Java 8 enhanced interfaces alleviate these problems by allowing interfaces to contain (default) method implementations, which implementers inherit. Java classes are then free to extend a different class, and a separate abstract class is no longer needed; developers considering implementing an interface need ...


Intelligent Systems Development In A Non Engineering Curriculum, Emily Brand, William Honig, Matthew Wojtowicz 2016 Loyola University Chicago

Intelligent Systems Development In A Non Engineering Curriculum, Emily Brand, William Honig, Matthew Wojtowicz

William L Honig

Much of computer system development today is programming in the large - systems of millions of lines of code distributed across servers and the web. At the same time, microcontrollers have also become pervasive in everyday products, economical to manufacture, and represent a different level of learning about system development. Real world systems at this level require integrated development of custom hardware and software.

How can academic institutions give students a view of this other extreme - programming on small microcontrollers with specialized hardware? Full scale system development including custom hardware and software is expensive, beyond the range of any but the ...


Teaching And Assessing Programming Fundamentals For Non Majors With Visual Programming, William Honig 2016 Loyola University Chicago

Teaching And Assessing Programming Fundamentals For Non Majors With Visual Programming, William Honig

William L Honig

Visual programming tools and mobile device applications are a natural tool to engage university students; but, are they effective in teaching quantitative thinking skills to non computer science majors? Answering this question can be based on careful assessment of the learning outcomes. This paper reports the results from teaching over 100 students mobile app development with App Inventor in a university core course. Results were measured using an assessment process motivated by Bloom's Taxonomy that included student self assessment, ratings by instructors, and comparisons of the two results. The categories in the assessment were mapped to specific levels of ...


Building And Safety Department Android Mobile Application, Nary Simms 2016 La Salle University

Building And Safety Department Android Mobile Application, Nary Simms

Mathematics and Computer Science Capstones

Research has found that Americans spend 4.5 hours watching television, 1.5 hours listening to the radio, about half an hour reading print and spend a whooping five plus hours per day in digital media (online, mobile, other). Out of these five hours, two hours and twenty minutes are spent on a mobile device (phone or tablet), which is a massive increase of about 575 percent from the twenty-four minutes that was reported in 2010. Flurry, an analytic app company, released data about their tracking of more than 300,000 apps in 2013, and they found the average time ...


Archive - A Data Management Program, James Devilbiss, C. Steven Whisnant, Yasmeen Shorish 2016 James Madison University

Archive - A Data Management Program, James Devilbiss, C. Steven Whisnant, Yasmeen Shorish

Yasmeen Shorish

To meet funding agency requirements, a portable data management solution is presented for small research groups. The database created is simple, searchable, robust, and can reside across multiple hard drives. Employing a standard metadata schema for all data, the database ensures a high level of standardization, findability, and organization. The software is written in Perl, runs on UNIX, and presents a web-based user interface. It uses a fast, portable log-in scheme, making it easy to export to other locations. As research continues to move towards more open data sharing and reproducibility, this database solution is agile enough to accommodate external ...


Visible Type Application, Richard A. Eisenberg, Stephanie Weirich, Hamidhasan G. Ahmed 2016 Bryn Mawr College

Visible Type Application, Richard A. Eisenberg, Stephanie Weirich, Hamidhasan G. Ahmed

Computer Science Faculty Research and Scholarship

The Hindley-Milner HM type system automatically infers the types at which polymorphic functions are used. In HM, the inferred types are unambiguous, and every expression has a principal type. Type annotations make HM compatible with extensions where complete type inference is impossible, such as higher-rank polymorphism and type-level functions. However, programmers cannot use annotations to explicitly provide type arguments to polymorphic functions, as HM requires type instantiations to be inferred.

We describe an extension to HM that allows visible type application. Our extension requires a novel type inference algorithm, yet its declarative presentation is a simple extension to HM. We ...


Safe Zero-Cost Coercions For Haskell, Joachim Breitner, Richard A. Eisenberg, Simon Peyton Jones, Stephanie Weirich 2016 Bryn Mawr College

Safe Zero-Cost Coercions For Haskell, Joachim Breitner, Richard A. Eisenberg, Simon Peyton Jones, Stephanie Weirich

Computer Science Faculty Research and Scholarship

Generative type abstractions – present in Haskell, OCaml, and other languages – are useful concepts to help prevent programmer errors. They serve to create new types that are distinct at compile time but share a run-time representation with some base type. We present a new mechanism that allows for zero-cost conversions between generative type abstractions and their representations, even when such types are deeply nested. We prove type safety in the presence of these conversions and have implemented our work in GHC.


Digital Commons powered by bepress