7,856 Hits in 6.1 sec

Model Transformation by Example [chapter]

Dániel Varró
2006 Lecture Notes in Computer Science  
In advanced XML transformer tools, XSLT rules are generated automatically after relating simple source and target XML documents.  ...  The derived transformation rules can be refined later by adding further source-target model pairs.  ...  When calculating the 1-context of a source node, all types of edges allowed by the metamodel (for the type of this source node) are enumerated. Example.  ... 
doi:10.1007/11880240_29 fatcat:6j7ikhj3szgj5ef4oyui2zhja4

Detecting Design Patterns by Learning Embedded Code Features

Mohamed Hamama
and the nature of specific design patterns.  ...  Some of those approaches use class-related metrics and code features, while others apply the learning techniques to overcome the low performance in detection caused by the variance in design patterns implementations  ...  In the reference [57] , using XML document retrieval approach, and the pattern is seen as an XML query and the design as an XML document and using document similarity techniques, they could detect patterns  ... 
doi:10.6084/m9.figshare.14686989.v1 fatcat:wykzqmsewnd5vo2phtms74etsy

SESCon: Secure Ethereum Smart Contracts by Vulnerable Patterns' Detection

Amir Ali, Zain Ul Abideen, Kalim Ullah, Farhan Ullah
2021 Security and Communication Networks  
Our tool outperforms other analyzers and detected up to 90% of the known vulnerability patterns.  ...  ., FinTech, has been targeted by so many successful attacks due to its financial worth of billions of dollars.  ...  By parsing source code as an XML tree, we have achieved 100% code coverage and all elements are matched through XPath queries.  ... 
doi:10.1155/2021/2897565 fatcat:7gt5efmez5dsph6yezpx5p2xju

Example-Driven Reconstruction of Software Models

Oscar Nierstrasz, Markus Kobel, Tudor Girba, Michele Lanza
2007 11th European Conference on Software Maintenance and Reengineering (CSMR'07)  
Unfortunately a great deal of effort may be required to build a specialized parser for a legacy programming language or dialect.  ...  On the other hand, (i) we typically do not need a complete parser that recognizes all language constructs, and (ii) we have a rich supply of (legacy) examples.  ...  -Network of Reengineering Expertise" (SNF Project IB7320-110997).  ... 
doi:10.1109/csmr.2007.23 dblp:conf/csmr/NierstraszKGLB07 fatcat:qn2r6xz65jhvzbpk7tdbq7kmnu

Improving Design Patterns By Description Logics: A Use Case With Abstract Factory And Strategy

Fernando Silva Parreiras, Steffen Staab, Andreas Winter
2008 Zenodo  
to the Abstract Factory Pattern in a Model Driven Approach.  ...  We exploit the TwoUse approach, which integrates OWL-DL, a W3C standard for description logics on the web, and UML-based modeling, to overcome drawbacks of the Strategy Pattern, that are also extensible  ...  The composition of OWL with object-oriented software has been addressed by some work like [Knu04] and [PT05] .  ... 
doi:10.5281/zenodo.12239 fatcat:5yn3lavupve4vpb4cabzmvvqnu

A Study of Mashup as a Software Application Development Technique with Examples from an End-User Programming Perspective

2010 Journal of Computer Science  
Results: The philosophy of mashup is aimed at providing simple rapid program development by endusers with minimum programming skills.  ...  However, we observe that mashup tools typically follow four data processing styles: Webpage customization, wire paradigm, spreadsheet and programming by demonstration.  ...  However, the development of users' applications in the complex world of computing by following the pattern of writing "knit and stitch" programming is a daunting task.  ... 
doi:10.3844/jcssp.2010.1406.1415 fatcat:q4jaiihlefe45b55tqzmg7q7qe

Supporting co-evolution of users and systems by the recognition of interaction patterns

Stefano Arondi, Pietro Baroni, Daniela Fogli, Piero Mussio
2002 Proceedings of the Working Conference on Advanced Visual Interfaces - AVI '02  
by the user.  ...  This paper presents an approach to support the designer of Visual Interactive Systems (VISs) in adapting a VIS to the evolution of its users. This process is called co-evolution of users and systems.  ...  The support of grants by MURST 60%, and MURST Cofin 2000 is acknowledged.  ... 
doi:10.1145/1556262.1556291 dblp:conf/avi/ArondiBFM02 fatcat:alt3emlymvbdddgstwg24hlbcq

Standard Elevator Information Schema: Its Origins, Features and Example Applications [chapter]

Jonathan Beebe, Ahmad Hammoudeh
2020 Building Transportation, Traffic and Engineering Systems [Working Title]  
This chapter discusses the origins and features of SEIS and provides a varied set of example applications. Consideration is also given to the issues of cyber security and data protection.  ...  The diverse and heterogeneous nature of such collaborations requires a common shared semantic understanding of the complex and dense information that may be generated by transportation systems in buildings  ...  It has then been picked up and displayed to the user (Figure 2 , bottom left circled), by the XML editor program in which the XML is being viewed.  ... 
doi:10.5772/intechopen.92552 fatcat:3mjxo3idpjd67cd5jegoo6yaee

Building an example application with the Unstructured Information Management Architecture

D. Ferrucci, A. Lally
2004 IBM Systems Journal  
For example, a database of chemical names can help in focusing the analysis of medical abstracts.  ...  The canonical example of structured information is a relational database table.  ...  Acknowledgments We acknowledge the efforts by Alfred Spector and Arthur Ciccolo to make a unifying architecture the focus of the NLP and UIM activities at the IBM Research Division.  ... 
doi:10.1147/sj.433.0455 fatcat:gxpibgxm6fbs3bdr46p6gioqk4

Example-Driven Web API Specification Discovery [chapter]

Hamza Ed-douibi, Javier Luis Cánovas Izquierdo, Jordi Cabot
2017 Lecture Notes in Computer Science  
Our approach is an example-driven approach, meaning that the OpenAPI specification is derived from a set of examples showing its usage.  ...  The use of examples is a well-known technique in several areas such as Software Engineering [8, 10] and Automatic Programming [5].  ...  Acknowledgment This work has been supported by the Spanish government (TIN2016-75944-R project). 31 32 33  ... 
doi:10.1007/978-3-319-61482-3_16 fatcat:bqyoz6jl2faf3luy4ctnbym52u

Programming by Examples: PL Meets ML [chapter]

Sumit Gulwani, Prateek Jain
2017 Lecture Notes in Computer Science  
Programming by Examples (PBE) involves synthesizing intended programs in an underlying domain-specific language from examplebased specifications.  ...  (ii) Program ranking techniques to pick an intended program from among the many that satisfy the examples provided by the user.  ...  Data is locked up into documents of various types such as text/log files, semi-structured spreadsheets, webpages, JSON/XML, and pdf documents.  ... 
doi:10.1007/978-3-319-71237-6_1 fatcat:nou2fnkpt5elfj3ohaunnfmy7y

Insights into layout patterns of mobile user interfaces by an automatic analysis of android apps

Alireza Sahami Shirazi, Niels Henze, Albrecht Schmidt, Robin Goldberg, Benjamin Schmidt, Hansjörg Schmauder
2013 Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive computing systems - EICS '13  
The ten most frequent patterns together cover 21.13% of all interface elements. They are all more frequent than common widget including radio buttons and spinner.  ...  The most common combination that consists of three nested elements covers 5.43% of all interface elements. It is more frequent than progress bars and checkboxes.  ...  We configured the query to the Google Play server to receive free applications ordered by descending popularity.  ... 
doi:10.1145/2494603.2480308 fatcat:ztoa2odsibbirgwfruh5opr52a

A logic meta-programming foundation for example-driven pattern detection in object-oriented programs

Coen De Roover
2011 2011 27th IEEE International Conference on Software Maintenance (ICSM)  
The resulting example-driven approach to pattern detection recalls the implicit implementation variants (i.e. those that are implied by the semantics of the programming language) of a machine-verifiable  ...  This exposes developers to the intricate details of the program analyses that compute this information. We have reconciled both approaches by embedding source code excerpts in logic formulas.  ...  Chapter 4: An Example-Driven Approach to Pattern Detection This chapter defines our example-driven approach to pattern detection in terms of four cornerstones and their inter-dependencies: logic meta programming  ... 
doi:10.1109/icsm.2011.6080830 dblp:conf/icsm/Roover11 fatcat:mtzy44ethrchdmtnkoqjcwiray

Dynamic web page authoring by example using ontology-based domain knowledge

José A. Macías, Pablo Castells
2003 Proceedings of the 8th international conference on Intelligent user interfaces - IUI '03  
Our approach consists of combining Programming By Example (PBE) techniques with an ontology-based representation of knowledge displayed in web pages.  ...  Authorized users can modify the internal presentation model by editing the generated HTML pages with DESK in a WYSIWYG environment.  ...  ACKNOWLEDGEMENTS The work reported in this paper is being supported by the Spanish Ministry of Science and Technology (MCyT), project number TIC2002-1948.  ... 
doi:10.1145/604050.604068 fatcat:v3atyvcwijb6pcpfkypvb4t6nu

Intelligent Approaches to Mining the Primary Research Literature: Techniques, Systems, and Examples [chapter]

Gully A. P. C. Burns, Donghui Feng, Eduard Hovy
2008 Studies in Computational Intelligence  
For example, the bioinformatics systems most widely used by biomedical researchers, those hosted by the National Center for Biotechnology Information (NCBI) [1], include two types of database: (a) molecular  ...  The differences between these two types of system provide the central theme of this chapter: while it is relatively straightforward with current computational techniques to master the former, well-organized  ...  Although some research reported to derive more complex patterns by mixing Part of Speech (POS) tags and surface words [63, 93] , patterns cannot be integrated with other types of useful required knowledge  ... 
doi:10.1007/978-3-540-75767-2_2 fatcat:k64qvz27p5hn3fqohql4ps2qwu
« Previous Showing results 1 — 15 out of 7,856 results