72,209 Hits in 3.9 sec

Rules and Strategies in Java

Pierre-Etienne Moreau, Antoine Reilles
2008 Electronical Notes in Theoretical Computer Science  
In this paper we present the essential feature we have considered when designing a new language based on rules and strategies.  ...  Relying on the implementation of Tom, we explain how these ingredients can be implemented and integrated in a Java environment.  ...  Conclusion The design of a language that integrates the notions of rules and strategies in a mainstream programming language such as Java is not an easy task.  ... 
doi:10.1016/j.entcs.2008.03.054 fatcat:iie5czldi5fejkgmlnw7iusmbq

Strategy for Strengthening of Music Industry in Indonesia: How is Rule Organization Commitment as a Variable Intervening

Sriyono, Wisnu Panggah Setiyono, Sigit Hermawan, Dewi Komala, Maulidha Kurnia
2021 Proceedings of the 1st Paris Van Java International Seminar on Health, Economics, Social Science and Humanities (PVJ-ISHESSH 2020)   unpublished
As we know that the success of an organization is determined by the fulfillment of personal needs to always improve the performance of its employees, both through training and the availability of a supportive  ...  Research on strengthening Industry Music in Indonesia has not been done much, even though the music industry has contributed a lot to the strengthening of creative industry organizations.  ...  So in such a way employees will feel the participation and appreciated in the organization.  ... 
doi:10.2991/assehr.k.210304.083 fatcat:kt35pf6fmra6fdzi2yak7g64iq

Rewriting Strategies in Java

Emilie Balland, Pierre-Etienne Moreau, Antoine Reilles
2008 Electronical Notes in Theoretical Computer Science  
The notion of strategy is complementary: this describes how rules are applied. In this paper, we show how a high-level strategy language can be implemented in a Java setting.  ...  In Section 4, we show how it can be applied to implement a compiler for the strategy language of Tom using a rule based library designed to perform Java bytecode transformations.  ...  Acknowledgement We sincerely thank Jeremie Delaitre for the initial development of bytecode rewriting in Tom and its work on strategy compilation.  ... 
doi:10.1016/j.entcs.2008.10.037 fatcat:akcmjpumkvgwrd5gaqsladzlgm

Effective strategic programming for Java developers

Emilie Balland, Pierre-Etienne Moreau, Antoine Reilles
2012 Software, Practice & Experience  
In this paper, we present the strategy language SL that provides programming support for strategies in Java. EFFECTIVE STRATEGIC PROGRAMMING FOR JAVA DEVELOPERS 3 to software [7] .  ...  It introduces an elegant and simple strategy language. As in ELAN, an elementary strategy can be a rule, the identity function (Identity), or a failure (Fail).  ...  We sincerely thank the anonymous referees for their valuable and detailed remarks that led to a substantial improvement of the paper.  ... 
doi:10.1002/spe.2159 fatcat:h5lb3cf4vndqjgwxwoovxvvvde

Automatic Translation from Combined B and CSP Specification to Java Programs [chapter]

Letu Yang, Michael R. Poppleton
2006 Lecture Notes in Computer Science  
At the implementation end of the development, concurrent programming in Java remains a demanding and error-prone activity, because of the need to verify critical properties of safety and liveness as well  ...  We propose rules for the automated translation of the integrated specification to multi-threaded Java using the extended JCSP channel classes.  ...  In Section 3, we demonstrate the translation strategy from the combined B and CSP specification to Java programs, and discuss the translation tool which implements these rules in Prolog.  ... 
doi:10.1007/11955757_8 fatcat:pd3eu3snunbnzb4lkjayq7o4p4

A Teaching Strategies Engine Using Translation from SWRL to Jess [chapter]

Eric Wang, Yong Se Kim
2006 Lecture Notes in Computer Science  
A teaching strategy is a kind of procedural knowledge, generically an if-then rule that queries the learner's state and performs teaching actions.  ...  Within an intelligent tutoring system framework, the teaching strategy engine stores and executes teaching strategies.  ...  Summary We have developed a teaching strategy engine in Jess, based on an automatic conversion mechanism from OWL individuals and SWRL rules in Protégé to Jess facts and rules.  ... 
doi:10.1007/11774303_6 fatcat:adtfaflu55elfeeijw56ng7l6m

Bytecode Rewriting in Tom

Emilie Balland, Pierre-Etienne Moreau, Antoine Reilles
2007 Electronical Notes in Theoretical Computer Science  
An originality of Tom is that it provides a powerful strategy language to express traversals over trees and to control how transformation rules are applied.  ...  In this paper, we present a term rewriting based library for manipulating Java bytecode.  ...  Acknowledgement We sincerely thank Jeremie Delaitre for the initial development of bytecode rewriting in Tom and Pauline Kouzmenko for her work on the secure loading.  ... 
doi:10.1016/j.entcs.2007.02.058 fatcat:mgja2ruvxzhtpcl7cegcqrnxha

MetaBorg in Action: Examples of Domain-Specific Language Embedding and Assimilation Using Stratego/XT [chapter]

Martin Bravenboer, René de Groot, Eelco Visser
2006 Lecture Notes in Computer Science  
JavaRegex is a new embedding of regular expression matching and string rewriting. JavaJava is an embedding of Java in Java for generating Java code.  ...  For these cases we show how Java programs in these domains become dramatically more readable, and we give an impression of the implementation of the language embeddings.  ...  A typical assimilation implemented in Stratego consists of a set of rewrite rules and a traversal strategy that controls the application of these rewrite rules.  ... 
doi:10.1007/11877028_10 fatcat:dq2fjepys5ds3nx5o7yljbrtze

Encapsulating Software Platform Logic by Aspect-Oriented Programming: A Case Study in Using Aspects for Language Portability

Lennart C.L. Kats, Eelco Visser
2010 2010 10th IEEE Working Conference on Source Code Analysis and Manipulation  
Software platforms such as the Java Virtual Machine or the CLR .NET virtual machine have their own ecosystem of a core programming language or instruction set, libraries, and developer community.  ...  This paper proposes to use aspect weaving to invasively adapt programs and libraries to address such portability concerns, and identifies four classes of aspects for this purpose.  ...  The Stratego frontend merges all rules and strategies with the same signature, as described in Section III-A.  ... 
doi:10.1109/scam.2010.11 dblp:conf/scam/KatsV10 fatcat:jchw5kbr3bhhtam2qzlz76gvoq

Algebraic Compilation of Safety-Critical Java Bytecode [chapter]

James Baxter, Ana Cavalcanti
2017 Lecture Notes in Computer Science  
In this paper, we contribute a formal specification of a bytecode interpreter for SCJ and an algebraic compilation strategy from Java bytecode to C.  ...  Safety-Critical Java (SCJ) is a version of Java that facilitates the development of certifiable programs, and requires a specialised virtual machine (SCJVM).  ...  We also thank Andy Wellings for his advice on SCJ and Leo Freitas for his help with the use of Z/EVES and understanding of icecap.  ... 
doi:10.1007/978-3-319-66845-1_11 fatcat:7hpkoolo7fdrzjeziluczqorwm

Problem and Solution Models for Halal Tourism Development in West Java

Nurul Huda, Nova Rini, Muslikh ., Slamet Hidayat
2020 KnE Social Sciences  
The purpose of this study is to explore the development of halal tourism in West Java by using problem and solution models.  ...  The main problem from the aspect of government is the rules of implementation, from the aspect of society is knowledge, and from the aspect of hotels, travel, and halal food is halal food.  ...  Development Strategy for Halal Tourism West Java The strategy priority in developing halal tourism in West Java is from the aspect of synergy.  ... 
doi:10.18502/kss.v4i14.7929 fatcat:fhkzlex3ofajbd6lv2wswiqn4a

Analysis and Implementation of FP-Growth Algorithm to Support Promotion Strategy UNAKI Semarang

Yornita Arshimelda, Kristoko Dwi Hartomo, Hindriyanto Dwi Purnomo
2020 Zenodo  
Implementing the Association Rule method and the FP-Growth algorithm in the promotion strategy is the way to find out what right rules or patterns in determining a more accurate promotional strategy.  ...  Abstract—The right promotion strategy in promoting higher education is very necessary in addition to introducing about the university, promotions are also carried out to attract the interest and talents  ...  From the 10 rules above, it was expected that they could be used as a rule or pattern in determining an effective and efficient promotion strategy at UNAKI Semarang V.  ... 
doi:10.5281/zenodo.4425586 fatcat:arx2bvrykjdsphggf35sslef24

TomML: A Rule Language for Structured Data [chapter]

Horatiu Cirstea, Pierre-Etienne Moreau, Antoine Reilles
2009 Lecture Notes in Computer Science  
This approach was motivated by the promotion of rule based techniques and their integration in large scale applications.  ...  Powerful matching capabilities along with a rich strategy language are among Tom's strong features that make it easy to use and competitive with respect to other rule based languages.  ...  Each phase transforms a Java+Tom abstract syntax tree using rewrite rules and strategies. At the end a pure Java program is obtained.  ... 
doi:10.1007/978-3-642-04985-9_24 fatcat:sivjt2bilnfaxjlqcpazibl36i

IPR paralysis in standardization: is regulatory symmetry desirable?

T.M. Egyedi
2001 IEEE Communications Magazine  
The process of Java' standardization, which is a red thread in this article, well illustrates what may happen.  ...  I analyze to what degree the public interest in compatibility is institutionalized in European, United States, and international regulation and end with questions that are meant to fuel policy debate.  ...  It is part of the market and is thus also subject to the "rules" of the market. In the standards arena market strategies are evident that are tolerated by the standards regime in question.  ... 
doi:10.1109/35.917512 fatcat:5a63kawmnvbvpdphv7svmnblru

The Vulnerability Analysis Of Java Bytecode Based On Points-To Dataflow

Tang Hong, Zhang Lufeng, Chen Hua, Zhang Jianbo
2009 Zenodo  
Today many developers use the Java components collected from the Internet as external LIBs to design and develop their own software.  ...  So a novel method to check the bugs in Java bytecode based on points-to dataflow analysis is in need, which is different to the common analysis techniques base on the vulnerability pattern check.  ...  Analysis strategy The following part defines the strategies of the vulnerability analysis, which includes the entrance point of input data from outside, the risk operation method, and the rules of points-to  ... 
doi:10.5281/zenodo.1082355 fatcat:flwiigcfqvhqzg5smpvnwlho5q
« Previous Showing results 1 — 15 out of 72,209 results