ACM-SE 45最新文献

筛选
英文 中文
Security patterns and secure systems design 安全模式和安全系统设计
ACM-SE 45 Pub Date : 2007-03-23 DOI: 10.1007/978-3-540-75294-3_18
E. Fernández
{"title":"Security patterns and secure systems design","authors":"E. Fernández","doi":"10.1007/978-3-540-75294-3_18","DOIUrl":"https://doi.org/10.1007/978-3-540-75294-3_18","url":null,"abstract":"","PeriodicalId":427658,"journal":{"name":"ACM-SE 45","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128679317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
When less is more: implementing optional features 少即是多:实现可选功能
ACM-SE 45 Pub Date : 2007-03-23 DOI: 10.1145/1233341.1233348
John M. Hunt, J. McGregor
{"title":"When less is more: implementing optional features","authors":"John M. Hunt, J. McGregor","doi":"10.1145/1233341.1233348","DOIUrl":"https://doi.org/10.1145/1233341.1233348","url":null,"abstract":"The ability to produce products that can be easily adapted to a variety of customers is becoming increasingly important. A key element for adaptable software products is the ability to include or omit features for different product variants. Even when a design method supports feature adaptation there remains the task of actually implementing the modules. In this paper we consider how to implement features in a product context using a variety of techniques and present an analysis of the tradeoffs involved in providing optional features. We will also discuss how to implement feature interactions to accommodate optional features. This paper provides specific advice about implementing program features, using the Java language enhanced with XVCL and AspectJ, when some of the features are optional and when some combinations of features exhibit interactions.","PeriodicalId":427658,"journal":{"name":"ACM-SE 45","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127007557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Simulating a virtual fisheye lens for the production of full-dome animations 模拟虚拟鱼眼镜头的生产全穹顶动画
ACM-SE 45 Pub Date : 2007-03-23 DOI: 10.1145/1233341.1233394
Daniel Ott, T. Davis
{"title":"Simulating a virtual fisheye lens for the production of full-dome animations","authors":"Daniel Ott, T. Davis","doi":"10.1145/1233341.1233394","DOIUrl":"https://doi.org/10.1145/1233341.1233394","url":null,"abstract":"With the development of new projector systems and high bandwidth computing, dome theaters are emerging that immerse the audience's visual senses with large, 180° field-of-view animations. These theaters are seeking new and exciting custom content from artists, yet the production of such content is technically cumbersome and time-consuming. This paper discusses popular methods for creating 3D dome animations and explains how to implement a virtual fisheye camera lens for commercial 3D rendering packages to simplify the production process. In addition, we provide a method for previewing dome animations in a virtual dome theater using 3D software. Using these techniques, artists can recover technical production time that can be better spent enhancing the overall quality of the final animation.","PeriodicalId":427658,"journal":{"name":"ACM-SE 45","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131020512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A taxonomy of discovery services and gap analysis for ultra-large scale systems 超大规模系统的发现服务分类和差距分析
ACM-SE 45 Pub Date : 2007-03-23 DOI: 10.1145/1233341.1233406
Joe Hoffert, Shanshan Jiang, D. Schmidt
{"title":"A taxonomy of discovery services and gap analysis for ultra-large scale systems","authors":"Joe Hoffert, Shanshan Jiang, D. Schmidt","doi":"10.1145/1233341.1233406","DOIUrl":"https://doi.org/10.1145/1233341.1233406","url":null,"abstract":"Timely discovery of services in ultra-large scale (ULS) systems plays a vital role in critical areas, such as national power grids, homeland security, and health care. This paper develops a taxonomy for classifying discovery services and presents an overview of existing discovery service technologies. It then classifies these discovery services using the taxonomy and performs a gap analysis for discovery services with respect to emerging ULS systems. Our results show that while discovery services are fairly mature and broadly applicable to today's systems much R&D remains to support emerging systems of ultra-large scale effectively.","PeriodicalId":427658,"journal":{"name":"ACM-SE 45","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127830756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
High-performance, low-cost grid computing through community cooperation 通过社区合作实现高性能、低成本的网格计算
ACM-SE 45 Pub Date : 2007-03-23 DOI: 10.1145/1233341.1233403
David Vestal, T. Thoma, Rebecca Harris, J. Schmitt
{"title":"High-performance, low-cost grid computing through community cooperation","authors":"David Vestal, T. Thoma, Rebecca Harris, J. Schmitt","doi":"10.1145/1233341.1233403","DOIUrl":"https://doi.org/10.1145/1233341.1233403","url":null,"abstract":"Computationally complex grid-based applications can require expensive high-end computer equipment, forming an effective barrier to many small companies. However, if a grid-based problem can be decomposed into many smaller problems, each solvable on a moderately powerful consumer PC, such PCs could in aggregate provide a solution to the performance barrier. Thus, the problem becomes one of procurement; where can so many PCs be obtained? In this paper, we describe a low-cost, highperformance grid developed by Noregon Systems using excess computational power from the computers of the local school system. We present a case study of how Noregon Systems and Targacept, Inc. used this grid for state-of-the-art molecular simulation. We demonstrate the feasibility and scalability of such a grid for other high-granularity calculations, and present software architecture capable of supporting multiple grid middleware tools and multiple applications.","PeriodicalId":427658,"journal":{"name":"ACM-SE 45","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131656397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A brief study of information security and ethics awareness as an imperative component of management information systems 信息安全和道德意识作为管理信息系统不可或缺的组成部分的简要研究
ACM-SE 45 Pub Date : 2007-03-23 DOI: 10.1145/1233341.1233441
M. North, R. George, S. North
{"title":"A brief study of information security and ethics awareness as an imperative component of management information systems","authors":"M. North, R. George, S. North","doi":"10.1145/1233341.1233441","DOIUrl":"https://doi.org/10.1145/1233341.1233441","url":null,"abstract":"In today's global economy, information security and awareness is an absolutely essential component of any management information system. Furthermore, the importance of information security and awareness is even more vital in university environments. Like other organizations, universities provide users with access to an immense amount of information and resources. As such, it is supremely important for students and faculty to be aware of security and ethical issues associated with the usage of these information resources. This paper briefly examines the data collected from a survey of computer science majors and non-majors enrolled in an introductory computer literacy course. The preliminary results of this survey reports that computer science majors were equally or slightly more aware of information security and ethics than non-majors. Finally, authors provide brief recommendations. This is a work in progress; detailed results and conclusions will be provided in future publications.","PeriodicalId":427658,"journal":{"name":"ACM-SE 45","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114228974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Experiences with tracking the effects of changing requirements on Morphbank: a web-based bioinformatics application 跟踪Morphbank需求变化影响的经验:一个基于网络的生物信息学应用程序
ACM-SE 45 Pub Date : 2007-03-23 DOI: 10.1145/1233341.1233416
Subhajit Datta, R. Engelen, David Gaitros, Neelima Jammigumpula
{"title":"Experiences with tracking the effects of changing requirements on Morphbank: a web-based bioinformatics application","authors":"Subhajit Datta, R. Engelen, David Gaitros, Neelima Jammigumpula","doi":"10.1145/1233341.1233416","DOIUrl":"https://doi.org/10.1145/1233341.1233416","url":null,"abstract":"In this paper, we present a case study of applying the metrics Mutation Index, Component Set, Dependency Index [1] on Morphbank- a web based bioinformatics application - to track the effects of changing requirements on a software system and suggest design modifications to mitigate such impact. Morphbank is \"an open web repository of biological images documenting specimen-based research in comparative anatomy, morphological phylogenetics, taxonomy and related fields focused on increasing our knowledge about biodiversity\" [2]. This paper discusses the context of the case study, analyzes the results, highlights observations and learning, and mentions directions of future work.","PeriodicalId":427658,"journal":{"name":"ACM-SE 45","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116063938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tartan Troubles 格子呢的麻烦
ACM-SE 45 Pub Date : 2007-03-23 DOI: 10.1145/1233341.1233463
Martin Furness, J. Orara, John L. Kundert-Gibbs, S. Bushman, Vinz Tan, N. Marra, John R. Van Winkle, Nicholas McElveen
{"title":"Tartan Troubles","authors":"Martin Furness, J. Orara, John L. Kundert-Gibbs, S. Bushman, Vinz Tan, N. Marra, John R. Van Winkle, Nicholas McElveen","doi":"10.1145/1233341.1233463","DOIUrl":"https://doi.org/10.1145/1233341.1233463","url":null,"abstract":"Tartan Troubles tells the tragic tale of man, man's best friend ... and a dog. Set in the scenic Scottish highlands, our hero, MacJohnson the piper, plays his pipes to wake the nearby village, and the melodic sound of his playing attracts a small Westy, who comes to investigate. Mesmerized by the swaying pipes, Westy teaches MacJohnson that there's a fine line between art and the jaws of defeat. Will MacJohnson survive his encounter with the ravages of an adoring audience? Will his pipes ring out over the hills again? In this classic story of man versus beast, art versus the quotidian, the winner will be the one who can think outside the boxers!","PeriodicalId":427658,"journal":{"name":"ACM-SE 45","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115949566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An intelligent method for computer-aided trauma decision making system 一种计算机辅助创伤决策系统的智能方法
ACM-SE 45 Pub Date : 2007-03-23 DOI: 10.1145/1233341.1233377
Soo-Yeon Ji, T. Huynh, K. Najarian
{"title":"An intelligent method for computer-aided trauma decision making system","authors":"Soo-Yeon Ji, T. Huynh, K. Najarian","doi":"10.1145/1233341.1233377","DOIUrl":"https://doi.org/10.1145/1233341.1233377","url":null,"abstract":"Based on the National Vital Statistics Reports 2001, nearly 115,200 lives are cut short annually because of traumatic injuries and many patients who survive traumatic events have to face the future with life-long disabilities that negatively affect them and their families [29]. Moreover, U.S. trauma center reports suggest that the annual death rate, as well as permanent disabilities, can be reduced when medical treatments are performed rapidly. To provide a certain kinds of medical treatment, a decision has to be made based on the outcomes (discharge status and intensive care unit days). Moreover, predicting the patient's outcome is useful when determining the most reliable transport method: ambulance or helicopter.\u0000 In this paper, we focus on creating an appropriate decision making process on helicopter transport. Although helicopter transport provides a high level of medical care as well as rapid transport service to trauma patients, the cost of helicopter transport is highly expensive. So there is a question still remains that the use of helicopter transport for trauma patients makes any change in patients' survival and the transport cost. To answer this question, we designed a computer aided decision making system for trauma patients' helicopter transport. The decision making is accomplished by using Decision Tree (DT). Especially, Nonlinear Regression and Classification Tree (CART) is used to create reliable rules. The rules is designed by using a large number of features captured from all available patients' informative attributes. The quality of the extracted rules is also evaluated. Therefore, the computer aided system support making predictions/and recommendations on the outcomes of trauma patients.","PeriodicalId":427658,"journal":{"name":"ACM-SE 45","volume":"431 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122872280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An investigation of discrete adjoints for flux-limited numerical schemes 有限通量数值格式的离散伴随型研究
ACM-SE 45 Pub Date : 2007-03-23 DOI: 10.1145/1233341.1233409
M. Alexe, Adrian Sandu
{"title":"An investigation of discrete adjoints for flux-limited numerical schemes","authors":"M. Alexe, Adrian Sandu","doi":"10.1145/1233341.1233409","DOIUrl":"https://doi.org/10.1145/1233341.1233409","url":null,"abstract":"In this paper we investigate the construction of discrete adjoints of flux-limited numerical schemes for the advection equation. Discrete adjoints are attractive since they can be generated easily via automatic differentiation. However, a careful analysis is needed in order to understand their properties. We discuss several issues posed by the differentiation of the limiter functions and propose an alternative implementation of the forward model that leads to stable discrete adjoint solutions.","PeriodicalId":427658,"journal":{"name":"ACM-SE 45","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125460492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书