|
Showing 1 - 8 of
8 matches in All Departments
An emerging topic in software engineering and data mining,
specification mining tackles software maintenance and reliability
issues that cost economies billions of dollars each year. The first
unified reference on the subject, Mining Software Specifications:
Methodologies and Applications describes recent approaches for
mining specifications of software systems. Experts in the field
illustrate how to apply state-of-the-art data mining and machine
learning techniques to address software engineering concerns. In
the first set of chapters, the book introduces a number of studies
on mining finite state machines that employ techniques, such as
grammar inference, partial order mining, source code model
checking, abstract interpretation, and more. The remaining chapters
present research on mining temporal rules/patterns, covering
techniques that include path-aware static program analyses,
lightweight rule/pattern mining, statistical analysis, and other
interesting approaches. Throughout the book, the authors discuss
how to employ dynamic analysis, static analysis, and combinations
of both to mine software specifications. According to the US
National Institute of Standards and Technology in 2002, software
bugs have cost the US economy 59.5 billion dollars a year. This
volume shows how specification mining can help find bugs and
improve program understanding, thereby reducing unnecessary
financial losses. The book encourages the industry adoption of
specification mining techniques and the assimilation of these
techniques in standard integrated development environments (IDEs).
Complexity, Analysis and Control of Singular Biological Systems
follows the control of real-world biological systems at both
ecological and phyisological levels concentrating on the
application of now-extensively-investigated singular system theory.
Much effort has recently been dedicated to the modelling and
analysis of developing bioeconomic systems and the text establishes
singular examples of these, showing how proper control can help to
maintain sustainable economic development of biological resources.
The book begins from the essentials of singular systems theory and
bifurcations before tackling the use of various forms of control in
singular biological systems using examples including predator-prey
relationships and viral vaccination and quarantine control.
Researchers and graduate students studying the control of complex
biological systems are shown how a variety of methods can be
brought to bear and practitioners working with the economics of
biological systems and their control will also find the monograph
illuminating.
For decades, people have been trying to develop
wireless/contactless power transfer technologies to drive movable
loads without direct electrical contacts, with ICPT (Inductively
Coupled Power Transfer) being the most popular. As a new
alternative, CCPT (Capacitively Coupled Power Transfer), which
employs electric field (rather than magnetic field) coupling, has
drawn a great attention recently due to its inherent advantages of
confined electric field between the coupling plates, power transfer
capability through metal barriers, very low eddy current power
losses associated with metal surroundings, and reduced circuit
sizes/costs, etc. This book is about a fundamental study on CCPT
technologies covering full mathematical analysis, detailed computer
simulation, and practical experiments of different types of CCPT
systems. The results obtained demonstrate the feasibility and
potential of CCPT as an emerging wireless/contactless power
transfer solution; and the theory and practical design methods
established lay a solid foundation for future CCPT research and
development.
Recent years have seen great advances in software engineering and
programming languages, but unfortunately, software is still far
from bug-free. Static analysis is an effective approach to
eliminating numerous bugs, but its conservative nature of analysis
unavoidably constrains its capacity. Dynamic analysis, on the other
hand, utilizes program runtime execution data, and automatically
infers about program bugs. The two approaches essentially
complement each other, and this book focuses on dynamic techniques,
and demonstrates how to leverage program runtime data to improve
software quality. The first part of this book introduces
statistical debugging algorithms, which aim at automated
localization of program bugs in the source code based on
statistical analysis of the runtime data. The second part then
dives into the discusion of automated program failure triage,
exploring effective ways to prioritize software development. For
both parts, comprehensive reviews of related studies are provided
so that readers can easily grasp the state of the art. This book is
designed for both software engineering researchers and
practitioners, and can also supplement course instruction.
This is the first work in English to explore Manchukuo literature
in its entirety. It provides comprehensive, in-depth, and
thought-provoking research by placing the literary history of
Manchukuo from 1937 to 1941 in specific cultural lineages and
socio-political contexts and focusing on four major literary groups
of that period-the Manshu romanha, the Sakubun writers, the
Yiwenzhi intellectuals, and the Wenxuan School-to illuminate its
underlying intellectual dynamics. As it turns out, Manchukuo
literature notably featured multiplicity, ambiguity, and
self-reflexivity, which enabled it to transcend the dichotomy of
romanticism and realism and that of the colonizers and the
colonized. Not unlike a coordinate system, it took modernity and
national identity as its horizontal and vertical axes. The Manshu
romanha and the Sakubun writers respectively adopted an anti-modern
or a modernist perspective and unanimously headed towards the
intellectual stance of denying their own national identity and
merging into the indigenous society of the colony; in comparison,
Manchurian intellectuals, as epitomized by the Yiwenzhi School and
the Wenxuan School, started from the same purpose of promoting
national consciousness, but at last embarked on a bifurcated path
to either modernization or cultural regression. Moreover, although
the literary writings of these four groups differed much from each
other in topics, stylistic features, and narrative modes, they all
showed a deep concern for the sufferings of the Manchurian people
brought by colonialism, coincidentally directed their criticism or
sarcasm against the colonial rule, and thereupon endowed Manchukuo
literature with a keynote of darkness.
An emerging topic in software engineering and data mining,
specification mining tackles software maintenance and reliability
issues that cost economies billions of dollars each year. The first
unified reference on the subject, Mining Software Specifications:
Methodologies and Applications describes recent approaches for
mining specifications of software systems. Experts in the field
illustrate how to apply state-of-the-art data mining and machine
learning techniques to address software engineering concerns. In
the first set of chapters, the book introduces a number of studies
on mining finite state machines that employ techniques, such as
grammar inference, partial order mining, source code model
checking, abstract interpretation, and more. The remaining chapters
present research on mining temporal rules/patterns, covering
techniques that include path-aware static program analyses,
lightweight rule/pattern mining, statistical analysis, and other
interesting approaches. Throughout the book, the authors discuss
how to employ dynamic analysis, static analysis, and combinations
of both to mine software specifications. According to the US
National Institute of Standards and Technology in 2002, software
bugs have cost the US economy 59.5 billion dollars a year. This
volume shows how specification mining can help find bugs and
improve program understanding, thereby reducing unnecessary
financial losses. The book encourages the industry adoption of
specification mining techniques and the assimilation of these
techniques in standard integrated development environments (IDEs).
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|