Search results for "Object-oriented programming"
showing 10 items of 282 documents
Differences in Technical Development and Playing Space in Three UEFA Champions Leagues
2021
[Abstract] The analysis of football grows exponentially, with many researchers adopting it as an object of study. The thematic range that addresses it, as well as the different methodologies used, are of a very different nature—physical, psychological, technical, tactical—enriching every day the knowledge, and understanding of the game itself. The objective of this study has been to identify the differences between the different styles of play that lead to becoming the champion of the UEFA Champions League in the last 3 years of the pre-COVID stage, by analyzing the spatial performance developed, the association between the players that make up the different lines of the game system and the…
Automated Synthesis of Application-layer Connectors from Automata-based Specifications
2019
Abstract Ubiquitous and Pervasive Computing, and the Internet of Things, promote dynamic interaction among heterogeneous systems. To achieve this vision, interoperability among heterogeneous systems represents a key enabler, and mediators are often built to solve protocol mismatches. Many approaches propose the synthesis of mediators. Unfortunately, a rigorous characterization of the concept of interoperability is still lacking, hence making hard to assess their applicability and soundness. In this paper, we provide a framework for the synthesis of mediators that allows us to: (i) characterize the conditions for the mediator existence and correctness; and (ii) establish the applicability bo…
One-Counter Verifiers for Decidable Languages
2013
Condon and Lipton (FOCS 1989) showed that the class of languages having a space-bounded interactive proof system (IPS) is a proper subset of decidable languages, where the verifier is a probabilistic Turing machine. In this paper, we show that if we use architecturally restricted verifiers instead of restricting the working memory, i.e. replacing the working tape(s) with a single counter, we can define some IPS’s for each decidable language. Such verifiers are called two-way probabilistic one-counter automata (2pca’s). Then, we show that by adding a fixed-size quantum memory to a 2pca, called a two-way one-counter automaton with quantum and classical states (2qcca), the protocol can be spac…
Animated Corpses: Communicating with Post Mortals in an Anatomical Exhibition
2006
‘Plastinates’ (i.e. corpses conserved through plastics) are lab created artifacts which since the nineties have been the subject of a cultural field experiment via an anatomical exhibition. Similarly to brain-dead or digitalized bodies, they constitute an ambiguous form of post-mortem existence. The article inquires after the ways in which the ontological status of these entities is constituted through the practices of body donors, anatomists and visitors. Plastinates owe their ambiguity to an oscillation between two different frames of perception. Their meaning is determined by the extent to which an anatomy exhibition can impose a ‘medical gaze’ over a non-professional way of perception, …
Does size matter? Entrepreneurial orientation and performance in Spanish sports clubs
2021
Despite its importance, entrepreneurship in organizations has not been widely addressed in the sports association sector (sports clubs). In this context, this study analyses the relationships of en...
The Strategy and the Reasons of the Republic of Moldova's Association with European Union
2014
Abstract The European Union and the Republic of Moldova negotiated an Association Agreement (AA) in 2010, and a Deep and Comprehensive Free Trade Area (DCFTA) in 2012. After completion of negotiations and initialling of AA, before the full Agreement can enter into force, action is needed to ensure that the Parties are able to enjoy the full benefits of the Agreement. SMEs play a focal role in the implementation of the future DCFTA. The article describes the economic and political basis for association/integration, outlining the importance of SMEs. This article is reasoning for future PhD research in this area.
DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign
2017
Domain Name System (DNS) plays an important role as a translation protocol in everyday use of the Internet. The purpose of DNS is to translate domain names into IP addresses and vice versa. However, its simple architecture can easily be misused for malicious activities. One huge security threat concerning DNS is tunneling, which helps attackers bypass the security systems unnoticed. A DNS tunnel can be used for three purposes: as a command and control channel, for data exfiltration or even for tunneling another protocol through it. In this paper, we surveyed different techniques for DNS tunneling detection. We classified those first based on the type of data and then within the categories b…
A Distributed approach to the Remote Control and Programming Improvement
2006
The remote control of industrial plants through networks is becoming very important nowadays but it involves several issues that can degrade the performance and usability of the remote plant. This paper presents a distributed architecture improving a remote programming system which allows users to control and to program a plant remotely. The control system is based on a client/server architecture with many user interfaces that control the plant. The remote programming language is a mix of Java and client/server protocol in order to simplify the developing and to avoid the protocol/language translation. In order to obtain more efficiency, the program is developed in the client side and it is…
A framework for data quality handling in enterprise service bus
2013
Enterprise Service Bus (ESB) is proposed to address the application integration problem by facilitating communication among different systems in a loosely coupled, standard-based, and protocol independent manner. Data sources are maintained out of the ESB's control and there should be a mechanism to select the most suitable data source among all available data sources. Especially, when two or more data sources are about the same object. For instance, it is normal to use more than one sensor to measure pressure or temperature at a particular point. Data quality can play an important role in selecting data sources in ESB since quality of data is an essential factor in the success of organizat…
Architectures “on ruins” and ambiguous transparency: the glass in preservation and communication of archaeology
2008
Abstract The contemporary architecture is characterized by an even more marked transparency, as a result of a continuous experimentation all directed towards the search of the built “lightness”, that is towards the “dematerialization” of the architecture and the consequent loss of weight connected to the excess of form. It is in 1851 that a New Architectural Age springs because of the realization of the Crystal Palace, in London – that has addressed towards the experimentation of the glass as an architectural, structural element and of design. Today, part of this experimentation has been applied for some interventions of coverage, protection and communication in situ of the archaeological r…