نتایج جستجو برای: api model
تعداد نتایج: 2115703 فیلتر نتایج به سال:
This paper presents an application program interface (API) that enables applications running on top of a POSIX operating system to use applicationdefined scheduling algorithms in a way compatible with the scheduling model of the Ada 95 Real-Time Systems Annex. Several application-defined schedulers, implemented as special user tasks, can coexist in the system in a predictable way. This API is c...
J2EE offers “Write Once, Run Anywhere” platform, and takes advantage of JDBC API for database access, CORBA technology for interaction with existing enterprise resources, a security model that protects data in Internet applications. Building on this foundation, J2EE offers Enterprise JavaBeans(EJB), JavaBeans, Java Servlets API, and JavaServer Pages (JSP) technology. Enterprise JavaBeans and Ja...
Java, the Java Virtual Machine, and the Java API have captured the imagination of many programmers in the short time since they have been released. In this paper we examine an aspect of the Java API from a security context. We show that the security model is adequate from the perspective of the implementors of Java but fails to provide the function-ality required by users and programmers in the...
Component-based software, particularly distributed componentbased software, makes heavy use of interfaces to de ne the interactions among components. Each of these interfaces is usally presented in the form of an API, as a speci cation of the capabilities of the relevant component. However, while the predominant API model captures the behavior of individual interface members, it neglects the in...
We describe a simple and efficient Java object model and application programming interface (API) for (possibly multi-modal) annotated natural language corpora. Corpora are represented as elements like Sentences, Turns, Utterances, Words, Gestures and Markables. The API allows linguists to access corpora in terms of these discourse-level elements, i.e. at a conceptual level they are familiar wit...
We introduce and demonstrate the viability of a novel technique for verifying that implementations of application program interfaces (APIs) are bug free. Our technique applies a new abstract interpretation to extract an underlying model of API usage, and then uses this to synthesise a set of verifiable program fragments. These fragments are evaluated using CBMC and any potentially spurious prop...
Testing networked systems is challenging. The client or server side cannot be tested by itself. We present a solution using tool “Modbat” that generates test cases for Java’s network library java.nio, where we test both blocking and non-blocking network functions. Our test model can dynamically simulate actions in multiple worker and client threads, thanks to a carefully orchestrated design tha...
This paper presents a public domain implementation of the Active Appearance Model framework and gives examples using it for segmentation and analysis of medical images. The software is open source, designed with efficiency in mind, and has been thoroughly tested and evaluated in several medical and non-medical applications.
This paper explains why existing anonymity models such as k-anonymity cannot be applied to the most common form of private data release on the internet, social network APIs. An alternative anonymity model, PP-anonymity, is presented, which measures the posterior probability of an attacker logically deducing previously unknown private information using a social network API. Finally, the feasibil...
Microscopic simulation tools have been gaining popularity among the traffic engineers. Enhanced inputoutput capabilities of these simulation tools allow engineers model and simulate complex transportation networks, and gather results relatively fast. However, extensive validation/calibration efforts are required to verify the credibility of the results of these simulation models. This paper dea...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید