Open Computer Science最新文献

筛选
英文 中文
A DSL for Resource Checking Using Finite State Automaton-Driven Symbolic Execution 一种利用有限状态自动机驱动符号执行进行资源检查的DSL
IF 1.5
Open Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0120
Endre Fülöp, Norbert Pataki
{"title":"A DSL for Resource Checking Using Finite State Automaton-Driven Symbolic Execution","authors":"Endre Fülöp, Norbert Pataki","doi":"10.1515/comp-2020-0120","DOIUrl":"https://doi.org/10.1515/comp-2020-0120","url":null,"abstract":"Abstract Static analysis is an essential way to find code smells and bugs. It checks the source code without execution and no test cases are required, therefore its cost is lower than testing. Moreover, static analysis can help in software engineering comprehensively, since static analysis can be used for the validation of code conventions, for measuring software complexity and for executing code refactorings as well. Symbolic execution is a static analysis method where the variables (e.g. input data) are interpreted with symbolic values. Clang Static Analyzer is a powerful symbolic execution engine based on the Clang compiler infrastructure that can be used with C, C++ and Objective-C. Validation of resources’ usage (e.g. files, memory) requires finite state automata (FSA) for modeling the state of resource (e.g. locked or acquired resource). In this paper, we argue for an approach in which automata are in-use during symbolic execution. The generic automaton can be customized for different resources. We present our domain-specific language to define automata in terms of syntactic and semantic rules. We have developed a tool for this approach which parses the automaton and generates Clang Static Analyzer checker that can be used in the symbolic execution engine. We show an example automaton in our domain-specific language and the usage of generated checker.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0120","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45957105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On some innovations in teaching the formal semantics using software tools 软件工具在形式语义学教学中的一些创新
IF 1.5
Open Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0130
William Steingartner
{"title":"On some innovations in teaching the formal semantics using software tools","authors":"William Steingartner","doi":"10.1515/comp-2020-0130","DOIUrl":"https://doi.org/10.1515/comp-2020-0130","url":null,"abstract":"Abstract In this work we discuss the motivation for innovations and need of a teaching tool for the visualization of the natural semantics method of imperative programming languages. We present the rôle of the teaching software, its design, development and use in the teaching process. Our software module is able to visualize the natural semantics evaluation of programs. It serves as a compiler with environment that can visually interpret simple programming language Jane statements and to depict them into a derivation tree that represents the semantic method of natural semantics. A formal definition of programming language Jane used in the teaching of formal semantics and production rules in natural semantics for that language are shown as well. We present, how the presented teaching tool can provide particular visual steps in the process of finding the meaning of well-structured input program and to depict complete natural-semantic representation of an input program.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0130","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44963575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
LIRKIS Global Collaborative Virtual Environments: Current State and Utilization Perspective LIRKIS全球协作虚拟环境:现状与利用前景
IF 1.5
Open Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0124
M. Hudák, Š. Korečko, B. Sobota
{"title":"LIRKIS Global Collaborative Virtual Environments: Current State and Utilization Perspective","authors":"M. Hudák, Š. Korečko, B. Sobota","doi":"10.1515/comp-2020-0124","DOIUrl":"https://doi.org/10.1515/comp-2020-0124","url":null,"abstract":"Abstract Recent advances in the field of web technologies, including the increasing support of virtual reality hardware, have allowed for shared virtual environments, reachable by just entering a URL in a browser. One contemporary solution that provides such a shared virtual reality is LIRKIS Global Collaborative Virtual Environments (LIRKIS G-CVE). It is a web-based software system, built on top of the A-Frame and Networked-Aframe frameworks. This paper describes LIRKIS G-CVE and introduces its two original components. The first one is the Smart-Client Interface, which turns smart devices, such as smartphones and tablets, into input devices. The advantage of this component over the standard way of user input is demonstrated by a series of experiments. The second component is the Enhanced Client Access layer, which provides access to positions and orientations of clients that share a virtual environment. The layer also stores a history of connected clients and provides limited control over the clients. The paper also outlines an ongoing experiment aimed at an evaluation of LIRKIS G-CVE in the area of virtual prototype testing.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0124","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45480255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Selected tools for Java class and bytecode inspection in the educational environment 教育环境中用于Java类和字节码检查的选定工具
IF 1.5
Open Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0170
T. Dobravec
{"title":"Selected tools for Java class and bytecode inspection in the educational environment","authors":"T. Dobravec","doi":"10.1515/comp-2020-0170","DOIUrl":"https://doi.org/10.1515/comp-2020-0170","url":null,"abstract":"Abstract Java is not only a modern, powerful, and frequently used programming language, but together with Java Virtual Machine it represents a novel dynamic approach of writing and executing computer programs. The fact that Java programs are executed in a controlled environment has several important implications that define the nature of the language and makes it different from the traditional C-like languages. Knowing the detailed differences between the two types of languages and execution environments is a part of the holistic education of a computer engineer. In this paper, we present some behind-the-scene details about the Java Virtual Machine and we show how these details could be used in the educational process to demonstrate the differences and to emphasise the advantages of the dynamic programming approach when compared to the static one. After presenting some information about class files and about the internal structure and operation of the Java Virtual Machine we demonstrate the usage of public domain programs that could be used in the educational process to put these theoretical concepts into practice.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0170","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43238530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preface to Special Issue “Informatics 2019” 《信息学2019》特刊前言
IF 1.5
Open Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0216
William Steingartner
{"title":"Preface to Special Issue “Informatics 2019”","authors":"William Steingartner","doi":"10.1515/comp-2020-0216","DOIUrl":"https://doi.org/10.1515/comp-2020-0216","url":null,"abstract":"The conference was held in Poprad, Slovakia, November 20-22, 2019. It became a significant international forum for academic scientists, engineers, researchers and young IT experts together to exchange and share their experiences and research results about most aspects of science and social research, discuss the practical challenges encountered and the solutions adopted and bringing new ideas. The research in computer science and technology has been growing so exponentially over the recent years. Computer science has a large potential impact on interdisciplinary collaboration. Moreover, computer technologies are often central to much scientific research. The main purpose of the conference was, in particular, to bring together people active in the area of computer science and related sciences and to present new research results. A lot of interesting papers were presented at the conference, so the selection process was not easy. The program committee formulated criteria for the first round of the selections process, then the selectionswere confirmedby sessions chairs in the second round. After the careful selection process for this special issue, 19 articles were recommended for further publishing. All articles in this edition have been significantly expanded by the authors with new scientific results and have been reviewed again. The topics covered in this special issue include theoretical computer science, artificial intelligence, programming paradigms, software engineering, applied informatics, computer networks, simulation, computer graphics and virtual reality. This volume focuses on actual problems in computer science and related fields, and it presents both theoretical and practical results and applications thus exploiting the innovative approaches. It reflects the main thrust of research in computer science and related fields and establishes contactswith experts of these fields. I would like to express my appreciation to the authors of all papers for their important contribution. Due to their fruitful research andhelpful cooperation, it was possible to provide such broad coverage of this area of scientific research. I also would like to thank all reviewers for their valuable opinions and recommendations. Thanks to their expertise andexperience, theyhave contributed to increasing the impact of the submitted articles. My special thanks go to the journal’s management for their kind cooperation and willingness to helpwith this special issue, as well as for thewonderful cooperation, which has become a nice tradition.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0216","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42113514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-standard situation detection in smart water metering 智能水表中的非标准状态检测
IF 1.5
Open Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0190
O. Kainz, E. Karpiel, R. Petija, M. Michalko, F. Jakab
{"title":"Non-standard situation detection in smart water metering","authors":"O. Kainz, E. Karpiel, R. Petija, M. Michalko, F. Jakab","doi":"10.1515/comp-2020-0190","DOIUrl":"https://doi.org/10.1515/comp-2020-0190","url":null,"abstract":"Abstract In this paper an algorithm for detection of nonstandard situations in smart water metering based on machine learning is designed. The main categories for nonstandard situation or anomaly detection and two common methods for anomaly detection are analyzed. The proposed solution needs to fit the requirements for correct, efficient and real-time detection of non-standard situations in actual water consumption with minimal required consumer intervention to its operation. Moreover, a proposal to extend the original hardware solution is described and implemented to accommodate the needs of the detection algorithm. The final implemented and tested solution evaluates anomalies in water consumption for a given time in specific day and month using machine learning with a semi-supervised approach.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0190","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45633156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An experimental evaluation of refinement techniques for the subgraph isomorphism backtracking algorithms 子图同构回溯算法改进技术的实验评价
IF 1.5
Open Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0149
J. Mihelic, U. Cibej
{"title":"An experimental evaluation of refinement techniques for the subgraph isomorphism backtracking algorithms","authors":"J. Mihelic, U. Cibej","doi":"10.1515/comp-2020-0149","DOIUrl":"https://doi.org/10.1515/comp-2020-0149","url":null,"abstract":"Abstract In this paper, we study a well-known computationally hard problem, called the subgraph isomorphism problem where the goal is for a given pattern and target graphs to determine whether the pattern is a subgraph of the target graph. Numerous algorithms for solving the problem exist in the literature and most of them are based on the backtracking approach. Since straightforward backtracking is usually slow, many algorithmic refinement techniques are used in practical algorithms. The main goal of this paper is to study such refinement techniques and to determine their ability to speed up backtracking algorithms. To do this we use a methodology of experimental algorithmics. We perform an experimental evaluation of the techniques and their combinations and, hence, demonstrate their usefulness in practice.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0149","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45945038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weak Berge Equilibrium in Finite Three-person Games: Conception and Computation 有限三人对策中的弱Berge平衡:概念与计算
IF 1.5
Open Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0210
K. Kudryavtsev, U. Malkov
{"title":"Weak Berge Equilibrium in Finite Three-person Games: Conception and Computation","authors":"K. Kudryavtsev, U. Malkov","doi":"10.1515/comp-2020-0210","DOIUrl":"https://doi.org/10.1515/comp-2020-0210","url":null,"abstract":"Abstract The paper proposes the concept of a weak Berge equilibrium. Unlike the Berge equilibrium, the moral basis of this equilibrium is the Hippocratic Oath “First do no harm”. On the other hand, any Berge equilibrium is a weak Berge equilibrium. But, there are weak Berge equilibria, which are not the Berge equilibria. The properties of the weak Berge equilibrium have been investigated. The existence of the weak Berge equilibrium in mixed strategies has been established for finite games. The weak Berge equilibria for finite three-person non-cooperative games are computed.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0210","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42674173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unit Under Test Identification Using Natural Language Processing Techniques 利用自然语言处理技术识别被测单元
IF 1.5
Open Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0150
Matej Madeja, J. Porubän
{"title":"Unit Under Test Identification Using Natural Language Processing Techniques","authors":"Matej Madeja, J. Porubän","doi":"10.1515/comp-2020-0150","DOIUrl":"https://doi.org/10.1515/comp-2020-0150","url":null,"abstract":"Abstract Unit under test identification (UUT) is often difficult due to test smells, such as testing multiple UUTs in one test. Because the tests best reflect the current product specification they can be used to comprehend parts of the production code and the relationships between them. Because there is a similar vocabulary between the test and UUT, five NLP techniques were used on the source code of 5 popular Github projects in this paper. The collected results were compared with the manually identified UUTs. The tf-idf model achieved the best accuracy of 22% for a right UUT and 57% with a tolerance up to fifth place of manual identification. These results were obtained after preprocessing input documents with java keywords removal and word split. The tf-idf model achieved the best model training time and the index search takes within 1s per request, so it could be used in an Integrated Development Environment (IDE) as a support tool in the future. At the same time, it has been found that, for document preprocessing, word splitting improves accuracy best and removing java keywords has just a small improvement for tf-idf model results. Removing comments only slightly worsens the accuracy of Natural Language Processing (NLP) models. The best speed provided the word splitting with average 0.3s preprocessing time per all documents in a project.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0150","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42762344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimality and Complexity Analysis of a Branch-and-Bound Method in Solving Some Instances of the Subset Sum Problem 分支定界法求解子集和问题若干实例的最优性和复杂性分析
IF 1.5
Open Computer Science Pub Date : 2020-12-17 DOI: 10.1515/comp-2020-0212
R. Kolpakov, M. Posypkin
{"title":"Optimality and Complexity Analysis of a Branch-and-Bound Method in Solving Some Instances of the Subset Sum Problem","authors":"R. Kolpakov, M. Posypkin","doi":"10.1515/comp-2020-0212","DOIUrl":"https://doi.org/10.1515/comp-2020-0212","url":null,"abstract":"Abstract In this paper we study the question of parallelization of a variant of Branch-and-Bound method for solving of the subset sum problem which is a special case of the Boolean knapsack problem. The following natural approach to the solution of this question is considered. At the first stage one of the processors (control processor) performs some number of algorithm steps of solving a given problem with generating some number of subproblems of the problem. In the second stage the generated subproblems are sent to other processors for solving (one subproblem per processor). Processors solve completely the received subproblems and return their solutions to the control processor which chooses the optimal solution of the initial problem from these solutions. For this approach we define formally a model of parallel computing (frontal parallelization scheme) and the notion of complexity of the frontal scheme. We study the asymptotic behavior of the complexity of the frontal scheme for two special cases of the subset sum problem.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0212","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44053560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信