Search results for " programmi"
showing 10 items of 1629 documents
Automated source code transformations on fourth generation languages
2004
To control the operation of large application suites or to tailor a special purpose application to particular need, developers frequently use application specific languages, such as batch, scripting, and query languages. These languages which are also referred to as fourth generation languages (4GLs) therefore play an important role in today's economy. Incompatibilities between different versions of 4GLs and changing requirements may make massive changes on a company's library of 4GL programs necessary. Here, we explore possibilities for performing mass changes on 4GLs and show how the transformation of programs written in 4GLs compares to the transformation of mainstream programming langua…
Tree Based Domain-Specific Mapping Languages
2012
Model transformation languages have been mainly used by researchers --- the software engineering industry has not yet widely accepted the model driven software development (MDSD). One of the main reasons is the complexity of metamodelling principles the developers are required to know to actually use model transformations in the way the OMG has stated. We offer the basic principles how to create domain-specific model transformation languages which can be used by developers relying only on familiar modelling concepts. We propose to use simple graphical mappings to specify the correspondence between source and target models which are represented using trees based on the concrete syntax of und…
Model Transformation Languages and Their Implementation by Bootstrapping Method
2008
In this paper a sequence of model transformation languages L0, L1, L2 is defined. The first language L0 is very simple, and for this language it is easy to build an efficient compiler to C++. The next language L1 is an extension of L0, and it contains powerful pattern definition facilities. The last language L2 is of sufficiently high level and can be used for implementation of traditional pattern-based high level model transformation languages, as well as for the development of model transformations directly. For languages L1 and L2 efficient compilers have been built using the bootstrapping method: L1 to L0 in L0, and L2 to L1 in L1. The results confirm the efficiency of model transformat…
On-line monitoring of food fermentation processes using electronic noses and electronic tongues: A review
2013
Fermentation processes are often sensitive to even slight changes of conditions that may result in unacceptable end-product quality. Thus, close follow-up of this type of processes is critical for detecting unfavorable deviations as early as possible in order to save downtime, materials and resources. Nevertheless the use of traditional analytical techniques is often hindered by the need for expensive instrumentation and experienced operators and complex sample preparation. In this sense, one of the most promising ways of developing rapid and relatively inexpensive methods for quality control in fermentation processes is the use of chemical multisensor systems. In this work we present an ov…
MAC-Engine
2011
In this demo, we prove that the flexibility supported by off-the-shelf IEEE 802.11 hardware can be significantly extended if we move the control of the MAC programming interface from the driver to the firmware, i.e. from the host CPU to the card CPU. To this purpose, we introduce the concept of MAC--Engine, that is an executor of Programmable Finite State Machines (PFSM) implemented at the firmware level: we show how the card itself can support different protocol logics thanks to PFSM bytecode representations that can be dynamically injected inside the card memory at run-time without incurring in down time issues or network disconnect events. We provide different PFSM examples in order to t…
Tevatron Run II combination of the effective leptonic electroweak mixing angle
2018
The Ministry of Science and Innovation and the Consolider-Ingenio 2010 Program and the European Union community Marie Curie Fellowship Contract No. 302103.
E-Learning in Pharmacology and Pharmacy
2011
Computer-based learning facilitates a shift from externally controlled to self-directed learning. Universities and other educational institutions are challenged by these developments and must react appropriately to meet the requirements of education. The term e-learning has been coined to describe a wide range of diverse learning and teaching strategies based on the use of electronic devices. Recently developed concepts in the science of education and learning provide appropriate frameworks for novel e-learning scenarios. The present review introduces strategies and concepts for the implementation of e-learning in academic and non-academic programs and gives an overview of current e-learnin…
Impulsively-controlled systems and reverse dwell time: A linear programming approach
2015
We present a receding horizon algorithm that converges to the exact solution in polynomial time for a class of optimal impulse control problems with uniformly distributed impulse instants and governed by so-called reverse dwell time conditions. The cost has two separate terms, one depending on time and the second monotonically decreasing on the state norm. The obtained results have both theoretical and practical relevance. From a theoretical perspective we prove certain geometrical properties of the discrete set of feasible solutions. From a practical standpoint, such properties reduce the computational burden and speed up the search for the optimum thus making the algorithm suitable for th…
Quantized Dissensus in Networks of Agents subject to Death and Duplication
2012
Dissensus is a modeling framework for networks of dynamic agents in competition for scarce resources. Originally inspired by biological cells behaviors, it fits also marketing, finance and many other application areas. Competition is often unstable in the sense that strong agents, those having access to large resources, gain more and more resources at the expense of weak agents. Thus, strong agents duplicate when reaching a critical amount of resources, whereas weak agents die when loosing all their resources. To capture all these phenomena we introduce systems with a discrete time gossip and unstable state dynamics interrupted by discrete events affecting the network topology. Invariancy o…
Optimal Usage of Multiple Network Connections
2008
In the future mobile networks, a mobile terminal is able to select the best suitable network for each data transmission. The selection of a network connection to be used has been under a lot of study. In this paper, we consider a more extensive case in which we do not select a network connection but use several network connections simultaneously to transfer data. When data is transferred using multiple network connections, a network connection has to be selected for each component of the data. We have modelled this problem as a multiobjective optimization problem and developed a heuristic to solve the problem fast in a static network environment. In this paper, we discuss solving the proble…