Search results for "computer.software_genre"
showing 10 items of 3858 documents
A High Level Language for Pyramidal Architectures
1986
In the paper are described the syntax and some implementation features of a high level language for pyramidal architectures called Pyramid B Language (PCL). The language is an extension of the B and include data type, set of instructions and builtin functions oriented to the pyramidal architectures. Some notes on the implementation for the PAPIA machine are also given.
A Logical Explication of the Concepts of Incomplete and Uncertain Information
1994
Discovery of elementary knowledge and its constituents, i.e. information contained in objects of reality is realized through asking questions including certain aspects called attributes in this paper. We describe a fragment of a discovered reality as an information system (cf. Pawlak [1,3,4]), which consists of the universum U of all the objects of this reality we are concerned with, and of a set A of attributes understood as functions each of which assigns to every object of U 1) a value of given attribute belonging to A or 2) an interval of approximate values of this attribute, i.e. an established set of possible values of this attribute. From the point of view of the cognitive agent and …
Construction and Implementation of LR(1) Parsers
1990
This chapter is devoted to the practical issues involved in the construction and use of deterministic LR(1) parsers. We shall show how the practical versions of LR (1) parsers, most notably the LALR (1) parsers, can be constructed efficiently, and we shall present methods for encoding LR(1) parsers as efficient RAM programs. Two versions of RAM program implementation are considered: in the first implementation the parsing program is table-driven, that is, the rules of the parser are encoded in a two-dimensional array which is simulated by a program body; in the other implementation the tabular information is further transformed into a set of program statements.
Semantic traffic applications based on DatexII
2009
In this work we demonstrate a particular use of ontologies based on the European specifications DATEXII. These specifications are designed and developed as a traffic and travel data exchange mechanism by a European task force to set up and standardise the interface between traffic control and information centres. It is the reference for applications that are developed and implemented in Europe.This language describes concepts and structures of data related to traffic, but the description is just syntactic, not semantic. Therefore the objective to be reached in this part of the research has been to develop a semantic description in order to carry out some applications like syndication and a …
Deriving and comparing deduplication techniques using a model-based classification
2015
Data deduplication has been a hot research topic and a large number of systems have been developed. These systems are usually seen as an inherently linked set of characteristics. However, a detailed analysis shows independent concepts that can be used in other systems. In this work, we perform this analysis on the main representatives of deduplication systems. We embed the results in a model, which shows two yet unexplored combinations of characteristics. In addition, the model enables a comprehensive evaluation of the representatives and the two new systems. We perform this evaluation based on real world data sets.
Mobile agents, globus and resource discovery
2004
Publisher Summary This chapter discusses grid technology and some related problem. The overview of grids, in terms of application fields and needed protocols is given. The common feature of all grid architectures is a coordinated and controlled resource sharing between the members of a dynamic multi-institutional virtual community. The members of such a community agree on which resources will be shared and which members of the community will be enabled to access these resources, thus defining a set of sharing rules and permissions. The Globus project is discussed, which is nowadays the de facto standard for grid environments, with emphasis on its resource discovery components. Finally, the …
Detection of Anomalous HTTP Requests Based on Advanced N-gram Model and Clustering Techniques
2013
Nowadays HTTP servers and applications are some of the most popular targets for network attacks. In this research, we consider an algorithm for HTTP intrusions detection based on simple clustering algorithms and advanced processing of HTTP requests which allows the analysis of all queries at once and does not separate them by resource. The method proposed allows detection of HTTP intrusions in case of continuously updated web-applications and does not require a set of HTTP requests free of attacks to build the normal user behaviour model. The algorithm is tested using logs acquired from a large real-life web service and, as a result, all attacks from these logs are detected, while the numbe…
Geospatial modelling and map analysis allowed measuring regression of the upper limit of Posidonia oceanica seagrass meadows under human pressure
2018
Abstract Marine coastal ecosystems are facing structural and functional changes due to the increasing human footprint worldwide, and the assessment of their long-term changes becomes particularly challenging. Measures of change can be done by comparing the observed ecosystem status to a purposely defined reference condition. In this paper, a geospatial modelling approach based on 2D mapping and morphodynamic data was used to predict the natural position of the upper limit (i.e., the landward continuous front) of Posidonia oceanica seagrass meadows settled on soft bottom. This predictive model, formerly developed at the regional spatial scale, was here applied for the first time at the Medit…
Electronic Health Record in Italy and Personal Data Protection.
2016
The present article deals with the Italian Electronic Health Record (hereinafter ehr), recently introduced by Act 221/2012, with a specific focus on personal data protection. Privacy issues — e.g., informed consent, data processing, patients’ rights and minors’ will — are discussed within the framework of recent e-Health legislation, national Data Protection Code, the related Data Protection Authority pronouncements and eu law. The paper is aimed at discussing the problems arising from a complex, fragmentary and sometimes uncertain legal framework on e-Health.
Iteratively reweighted least squares in crystal structure refinements
2011
The use of robust techniques in crystal structure multipole refinements of small molecules as an alternative to the commonly adopted weighted least squares is presented and discussed. As is well known, the main disadvantage of least-squares fitting is its sensitivity to outliers. The elimination from the data set of the most aberrant reflections (due to both experimental errors and incompleteness of the model) is an effective practice that could yield satisfactory results, but it is often complicated in the presence of a great number of bad data points, whose one-by-one elimination could become unattainable. This problem can be circumvented by means of a robust least-squares regression that…