A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Model Transformation by Example
[chapter]
2006
Lecture Notes in Computer Science
In advanced XML transformer tools, XSLT rules are generated automatically after relating simple source and target XML documents. ...
The derived transformation rules can be refined later by adding further source-target model pairs. ...
When calculating the 1-context of a source node, all types of edges allowed by the metamodel (for the type of this source node) are enumerated. Example. ...
doi:10.1007/11880240_29
fatcat:6j7ikhj3szgj5ef4oyui2zhja4
Detecting Design Patterns by Learning Embedded Code Features
2021
figshare.com
and the nature of specific design patterns. ...
Some of those approaches use class-related metrics and code features, while others apply the learning techniques to overcome the low performance in detection caused by the variance in design patterns implementations ...
In the reference [57] , using XML document retrieval approach, and the pattern is seen as an XML query and the design as an XML document and using document similarity techniques, they could detect patterns ...
doi:10.6084/m9.figshare.14686989.v1
fatcat:wykzqmsewnd5vo2phtms74etsy
SESCon: Secure Ethereum Smart Contracts by Vulnerable Patterns' Detection
2021
Security and Communication Networks
Our tool outperforms other analyzers and detected up to 90% of the known vulnerability patterns. ...
., FinTech, has been targeted by so many successful attacks due to its financial worth of billions of dollars. ...
By parsing source code as an XML tree, we have achieved 100% code coverage and all elements are matched through XPath queries. ...
doi:10.1155/2021/2897565
fatcat:7gt5efmez5dsph6yezpx5p2xju
Example-Driven Reconstruction of Software Models
2007
11th European Conference on Software Maintenance and Reengineering (CSMR'07)
Unfortunately a great deal of effort may be required to build a specialized parser for a legacy programming language or dialect. ...
On the other hand, (i) we typically do not need a complete parser that recognizes all language constructs, and (ii) we have a rich supply of (legacy) examples. ...
-Network of Reengineering Expertise" (SNF Project IB7320-110997). ...
doi:10.1109/csmr.2007.23
dblp:conf/csmr/NierstraszKGLB07
fatcat:qn2r6xz65jhvzbpk7tdbq7kmnu
Improving Design Patterns By Description Logics: A Use Case With Abstract Factory And Strategy
2008
Zenodo
to the Abstract Factory Pattern in a Model Driven Approach. ...
We exploit the TwoUse approach, which integrates OWL-DL, a W3C standard for description logics on the web, and UML-based modeling, to overcome drawbacks of the Strategy Pattern, that are also extensible ...
The composition of OWL with object-oriented software has been addressed by some work like [Knu04] and [PT05] . ...
doi:10.5281/zenodo.12239
fatcat:5yn3lavupve4vpb4cabzmvvqnu
A Study of Mashup as a Software Application Development Technique with Examples from an End-User Programming Perspective
2010
Journal of Computer Science
Results: The philosophy of mashup is aimed at providing simple rapid program development by endusers with minimum programming skills. ...
However, we observe that mashup tools typically follow four data processing styles: Webpage customization, wire paradigm, spreadsheet and programming by demonstration. ...
However, the development of users' applications in the complex world of computing by following the pattern of writing "knit and stitch" programming is a daunting task. ...
doi:10.3844/jcssp.2010.1406.1415
fatcat:q4jaiihlefe45b55tqzmg7q7qe
Supporting co-evolution of users and systems by the recognition of interaction patterns
2002
Proceedings of the Working Conference on Advanced Visual Interfaces - AVI '02
by the user. ...
This paper presents an approach to support the designer of Visual Interactive Systems (VISs) in adapting a VIS to the evolution of its users. This process is called co-evolution of users and systems. ...
The support of grants by MURST 60%, and MURST Cofin 2000 is acknowledged. ...
doi:10.1145/1556262.1556291
dblp:conf/avi/ArondiBFM02
fatcat:alt3emlymvbdddgstwg24hlbcq
Standard Elevator Information Schema: Its Origins, Features and Example Applications
[chapter]
2020
Building Transportation, Traffic and Engineering Systems [Working Title]
This chapter discusses the origins and features of SEIS and provides a varied set of example applications. Consideration is also given to the issues of cyber security and data protection. ...
The diverse and heterogeneous nature of such collaborations requires a common shared semantic understanding of the complex and dense information that may be generated by transportation systems in buildings ...
It has then been picked up and displayed to the user (Figure 2 , bottom left circled), by the XML editor program in which the XML is being viewed. ...
doi:10.5772/intechopen.92552
fatcat:3mjxo3idpjd67cd5jegoo6yaee
Building an example application with the Unstructured Information Management Architecture
2004
IBM Systems Journal
For example, a database of chemical names can help in focusing the analysis of medical abstracts. ...
The canonical example of structured information is a relational database table. ...
Acknowledgments We acknowledge the efforts by Alfred Spector and Arthur Ciccolo to make a unifying architecture the focus of the NLP and UIM activities at the IBM Research Division. ...
doi:10.1147/sj.433.0455
fatcat:gxpibgxm6fbs3bdr46p6gioqk4
Example-Driven Web API Specification Discovery
[chapter]
2017
Lecture Notes in Computer Science
Our approach is an example-driven approach, meaning that the OpenAPI specification is derived from a set of examples showing its usage. ...
The use of examples is a well-known technique in several areas such as Software Engineering [8, 10] and Automatic Programming [5]. ...
Acknowledgment This work has been supported by the Spanish government (TIN2016-75944-R project). 31 http://docs.seleniumhq.org/projects/webdriver/ 32 https://github.com/SOM-Research/hapi 33 https://apis.guru ...
doi:10.1007/978-3-319-61482-3_16
fatcat:bqyoz6jl2faf3luy4ctnbym52u
Programming by Examples: PL Meets ML
[chapter]
2017
Lecture Notes in Computer Science
Programming by Examples (PBE) involves synthesizing intended programs in an underlying domain-specific language from examplebased specifications. ...
(ii) Program ranking techniques to pick an intended program from among the many that satisfy the examples provided by the user. ...
Data is locked up into documents of various types such as text/log files, semi-structured spreadsheets, webpages, JSON/XML, and pdf documents. ...
doi:10.1007/978-3-319-71237-6_1
fatcat:nou2fnkpt5elfj3ohaunnfmy7y
Insights into layout patterns of mobile user interfaces by an automatic analysis of android apps
2013
Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive computing systems - EICS '13
The ten most frequent patterns together cover 21.13% of all interface elements. They are all more frequent than common widget including radio buttons and spinner. ...
The most common combination that consists of three nested elements covers 5.43% of all interface elements. It is more frequent than progress bars and checkboxes. ...
We configured the query to the Google Play server to receive free applications ordered by descending popularity. ...
doi:10.1145/2494603.2480308
fatcat:ztoa2odsibbirgwfruh5opr52a
A logic meta-programming foundation for example-driven pattern detection in object-oriented programs
2011
2011 27th IEEE International Conference on Software Maintenance (ICSM)
The resulting example-driven approach to pattern detection recalls the implicit implementation variants (i.e. those that are implied by the semantics of the programming language) of a machine-verifiable ...
This exposes developers to the intricate details of the program analyses that compute this information. We have reconciled both approaches by embedding source code excerpts in logic formulas. ...
Chapter 4: An Example-Driven Approach to Pattern Detection This chapter defines our example-driven approach to pattern detection in terms of four cornerstones and their inter-dependencies: logic meta programming ...
doi:10.1109/icsm.2011.6080830
dblp:conf/icsm/Roover11
fatcat:mtzy44ethrchdmtnkoqjcwiray
Dynamic web page authoring by example using ontology-based domain knowledge
2003
Proceedings of the 8th international conference on Intelligent user interfaces - IUI '03
Our approach consists of combining Programming By Example (PBE) techniques with an ontology-based representation of knowledge displayed in web pages. ...
Authorized users can modify the internal presentation model by editing the generated HTML pages with DESK in a WYSIWYG environment. ...
ACKNOWLEDGEMENTS The work reported in this paper is being supported by the Spanish Ministry of Science and Technology (MCyT), project number TIC2002-1948. ...
doi:10.1145/604050.604068
fatcat:v3atyvcwijb6pcpfkypvb4t6nu
Intelligent Approaches to Mining the Primary Research Literature: Techniques, Systems, and Examples
[chapter]
2008
Studies in Computational Intelligence
For example, the bioinformatics systems most widely used by biomedical researchers, those hosted by the National Center for Biotechnology Information (NCBI) [1], include two types of database: (a) molecular ...
The differences between these two types of system provide the central theme of this chapter: while it is relatively straightforward with current computational techniques to master the former, well-organized ...
Although some research reported to derive more complex patterns by mixing Part of Speech (POS) tags and surface words [63, 93] , patterns cannot be integrated with other types of useful required knowledge ...
doi:10.1007/978-3-540-75767-2_2
fatcat:k64qvz27p5hn3fqohql4ps2qwu
« Previous
Showing results 1 — 15 out of 7,856 results