Description of the CUDF Format
نویسندگان
چکیده
This document contains several related specifications, together they describe the document formats related to the solver competition which will be organized by Mancoosi. In particular, this document describes: DUDF (Distribution Upgradeability Description Format), the document format to be used to submit upgrade problem instances from user machines to a (distribution-specific) database of upgrade problems; CUDF (Common Upgradeability Description Format), the document format used to encode upgrade problems, abstracting over distribution-specific details. Solvers taking part in the competition will be fed with input in CUDF format.
منابع مشابه
Teaching Competencies from the Perspective of a Group of Educational Activists: Commonalities and Differences
Since teachers are a key agent in the success of any educational system, those involved in teacher training need to have a clear description of teaching competencies, reflection upon which could be useful in organizational leadership and administration, teacher training curriculum, and creation of a compatible organizational culture. To have as broad of a spectrum of competencies as possible, a...
متن کاملInvestigating the Impact of Response Format on the Performance of Grammar Tests: Selected and Constructed
When constructing a test, an initial decision is choosing an appropriate item response format which can be classified as selected or constructed. In large-scale tests where time and finance are of concern, the use of response chosen known as multiple-choice items is quite widespread. This study aimed at investigating the impact of response format on the performance of structure tests. Concurren...
متن کاملProper e-content format for internet based continuous medical education in Iran
Introduction: As there are different e-CME content formats, we need documented evidence for comparing them. In this study, we determined the proper e-content format for CME activities in Iran. Methods: We devised a questionnaire to gather the opinion of the faculty members who had the experience of e-CME content development about the proper e-CME content format for Iranian medical society. Ba...
متن کاملCombining and Steganography of 3-D Face Textures
One of the serious issues in communication between people is hiding information from the others, and the best way for this, is to deceive them. Since nowadays face images are mostly used in three dimensional format, in this paper we are going to steganography 3-D face images and detecting which by curious people will be impossible. As in detecting face only, its texture is important, we separat...
متن کاملReverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/0811.3621 شماره
صفحات -
تاریخ انتشار 2008