فا   |   En
ورود به سایت
عنوان مقاله نویسنده (ها) مربوط به کنفرانس چکیده
Using Domain-Specific Languages to Describe the Development Viewpoint of Software Architectures Amir Reza Yazdanshenas
Ramtin Khosravi
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
The developers of a system are accepted as one of the most important stakeholders of an Architecture Description. The Development Viewpoint is suggested to satisfy the needs of the developers throughout the development process ... مشاهده کامل
The developers of a system are accepted as one of the most important stakeholders of an Architecture Description. The Development Viewpoint is suggested to satisfy the needs of the developers throughout the development process via codeline organization descriptions, programming models, etc. However, the available models for such purposes, if any, barely cross informal natural language descriptions and checklists. This paper introduces the idea of enhancing the description of the Development viewpoint using lightweight Domain- Specific Languages and presents the application of such languages in two industrial case studies. This language enables the architect to provide the necessary guidelines that constrains the implementers during the development process and it is also used as a means to discover the deviation of the code from the architecture as the development goes on. عدم مشاهده کامل
The developers of a system are accepted as one of the most important stakeholders of an Architecture Description. The Development Viewpoint is suggested to satisfy the needs of the developers throughout the development process ... مشاهده کامل
خرید مقاله
Visibility of a Moving Segment Observer Mojtaba Nouri Bygi
Mohammad Ghodsi
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
In this paper we study combinatorial segment visibility, and show how to compute and maintain it as the observer moves in the plane. There are n non-overlapping convex objects in the plane, and ... مشاهده کامل
In this paper we study combinatorial segment visibility, and show how to compute and maintain it as the observer moves in the plane. There are n non-overlapping convex objects in the plane, and we have a segment observer among them. We first consider static case of the problem, in which the observer and objects are static, and then we study dynamic case of the problem, in which the observer can move among obstacles. عدم مشاهده کامل
In this paper we study combinatorial segment visibility, and show how to compute and maintain it as the observer moves in the plane. There are n non-overlapping convex objects in the plane, and ... مشاهده کامل
خرید مقاله
Compound of Reversible One-Dimensional CA Rules for Two-Dimensional CA with Cryptographic Applications Hoda Maleki
Babak Sadeghiyan
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Reversible Cellular Automata is applicable in cryptographic functions. A reversible CA can be obtained by employing reversible rules. In this paper, we propose 65280 two-dimensional reversible CA rules by compounding one-dimensional reversible rules. We produce ... مشاهده کامل
Reversible Cellular Automata is applicable in cryptographic functions. A reversible CA can be obtained by employing reversible rules. In this paper, we propose 65280 two-dimensional reversible CA rules by compounding one-dimensional reversible rules. We produce these rules by alternately applying onedimensional CA rule f1 to the rows and applying another rule f2 to the columns of the configuration matrix of twodimensional CA. In addition to describing these rules, we consider the required cryptographic properties such as completeness, strict avalanche criteria, non-linearity, and differential-profile flatness for our proposed approach. According to the obtained results, 9463 rules are specified as appropriate rules for the purpose of applying in cryptographic functions. Only 510 rules do not satisfy any of the mentioned cryptographic properties and the other remain rules satisfy some of the properties. عدم مشاهده کامل
Reversible Cellular Automata is applicable in cryptographic functions. A reversible CA can be obtained by employing reversible rules. In this paper, we propose 65280 two-dimensional reversible CA rules by compounding one-dimensional reversible rules. We produce ... مشاهده کامل
خرید مقاله
A New Approach for Tracing Quality Attributes in Service Oriented Architecture Using Graph Transformation Systems Farnoush Golshan
Ahmad Abdollahzade Barforoush
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
The dynamic nature of service-oriented architecture (SOA), leads to a need for special attention about the turbulence of the quality attributes (or non-functional requirements) of software during the dynamic changes. If there exists a ... مشاهده کامل
The dynamic nature of service-oriented architecture (SOA), leads to a need for special attention about the turbulence of the quality attributes (or non-functional requirements) of software during the dynamic changes. If there exists a method for monitoring the whole quality of a service-oriented software, the service selector component of the architecture, which has the responsibility of choosing the best candidate service at runtime, can be aware of the quality state of the whole software at any moment of decision. In this paper, we have focused on the overall quality of an architecture which consists of multiple independent services and present a new method for tracing quality attributes in service oriented architecture based on Graph Transformation System (GTS) as a formal approach. عدم مشاهده کامل
The dynamic nature of service-oriented architecture (SOA), leads to a need for special attention about the turbulence of the quality attributes (or non-functional requirements) of software during the dynamic changes. If there exists a ... مشاهده کامل
خرید مقاله
SWML: A Workflow Modeling Language Based on Stochastic Activity Networks Fatemeh Javadi Mottaghi
Mohammad Abdollahi Azgomi
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
The existing workflow modeling languages have some limitations and drawbacks. The aim is to introduce a new workflow modeling language based on stochastic activity networks (SANs). SANs are a powerful extension of Petri nets, ... مشاهده کامل
The existing workflow modeling languages have some limitations and drawbacks. The aim is to introduce a new workflow modeling language based on stochastic activity networks (SANs). SANs are a powerful extension of Petri nets, which have been used in a wide range of applications. SAN-based workflow modeling language (SWML) has some high-level modeling primitives for easily modeling workflow patterns. For analysis of the modeled workflow systems with SWML, we have introduced the transformation techniques from SWML models into ordinary SANs. The transformed models can be analyzed using the existing tools for SANs, such as the Möbius modeling tool. In this paper, we present definitions of SWML modeling language and its primitives and an example of SWML models. عدم مشاهده کامل
The existing workflow modeling languages have some limitations and drawbacks. The aim is to introduce a new workflow modeling language based on stochastic activity networks (SANs). SANs are a powerful extension of Petri nets, ... مشاهده کامل
خرید مقاله
Optimizing Information Systems By Realizing the Autonomy around Business Danial Moazen
Kazem Akbari
Alireza Hashemi
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
With ever increasing complexity of software systems, it is now more evident than ever that a fundamental change in software engineering practices is required. In this paper we discuss the nature of change ... مشاهده کامل
With ever increasing complexity of software systems, it is now more evident than ever that a fundamental change in software engineering practices is required. In this paper we discuss the nature of change and its implications. The notion of passive autonomy is introduced as a reference to the relative autonomy of business entities, and we claim that realizing the passive autonomy in information systems would results in systems far more adaptable and aligned with business’ needs. In order to realize this autonomy, theuse of autonomous agents as representing real world autonomous entities is suggested. After pointing out the shortcomings of current agent based architectures, a new architecture is proposed, based on indirect, multilateral negotiation. The suitability of this architecture is demonstrated in a simple case of beer game and it is shown that the bullwhip effect is remedied to some extent using this new architectural approach. عدم مشاهده کامل
With ever increasing complexity of software systems, it is now more evident than ever that a fundamental change in software engineering practices is required. In this paper we discuss the nature of change ... مشاهده کامل
خرید مقاله
Unified Framework for Evaluating Deductive Databases with Uncertainty Jinzan Lai
Nematollaah Shiri
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Uncertainty reasoning has been identified as an important and challenging issue in the database research. Many logic frameworks have been proposed to represent and reason about uncertainty in deductive databases. On the basis of ... مشاهده کامل
Uncertainty reasoning has been identified as an important and challenging issue in the database research. Many logic frameworks have been proposed to represent and reason about uncertainty in deductive databases. On the basis of the way in which uncertainties are associated with the facts and rules in programs, the approaches of these frameworks have been classified into “annotation based (AB)” and “implication based (IB).” When extending both frameworks with certainty constraints, they become equivalent in terms of expressive power. In this paper, we propose a uniform environment to evaluate and experiment with logic programs in AB and IB frameworks at the same time. We also extend the existing query processing to handle certainty constraints and we carry out experiments to evaluate its performance. Our experiments and results indicate that the proposed techniques yield tools that are capable to reason with uncertainty. عدم مشاهده کامل
Uncertainty reasoning has been identified as an important and challenging issue in the database research. Many logic frameworks have been proposed to represent and reason about uncertainty in deductive databases. On the basis of ... مشاهده کامل
خرید مقاله
طراحي و پياده سازي يک الگوريتم زمانبندي در گريد بر مبناي دو الگوريتم Min-Min و Max-Min به کمک برنامه سازي ژنتيک کبري اطميناني
سيد مجتبي روحاني
نورعلي رائيجي يانه سري
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
با افز ايش قيمت ابرکامپ يوترها ا ز طرف ي و ني از به مناب ع محاسباتي با حجم وسيع از طرف ديگر، محقق ين کام پيوتر را بر ... مشاهده کامل
با افز ايش قيمت ابرکامپ يوترها ا ز طرف ي و ني از به مناب ع محاسباتي با حجم وسيع از طرف ديگر، محقق ين کام پيوتر را بر آن داشته است تا به سراغ استفاده از شبکهاي از منابع محاسبا تي به نا م گريد Grid) روي آورند. گونهاي از گريد به نام گريد محاسباتي Computing Grid مجموعهاي از منابع توزيع شده را براي حل مس ايل با ميزان محاسبات بالا در علوم، مهندس ي و تجارت فراهم آورده اس ت . براي استفاده بهينه از قابليتهاي اين سيستم توزيع شده، الگوريتمه اي زمانبندي کارامدي موردنياز است . در اي ن مقاله الگو ر يتم زمانبن دي جديدي به کمک برنامهسازي ژنتيک و بر مبن اي دو الگور يتم پاي هاي Min-Min و Max-Min طراحي شده است که س ع ي در استفاده از مزاياي اين دو، رفع معايب آنه ا و کوتاه کردن مدت زمانبن د ي نموده است. با مقايسه کارا يي الگو ريتم جدي د با دو الگو ر يتم Min-Min و Max-Min نتايج قابل قبولي بدست آمد. عدم مشاهده کامل
با افز ايش قيمت ابرکامپ يوترها ا ز طرف ي و ني از به مناب ع محاسباتي با حجم وسيع از طرف ديگر، محقق ين کام پيوتر را بر ... مشاهده کامل
خرید مقاله
جداسازي كور سيگنالهاي FHSS به صورت زمان -حقيقي با استفاده از الگوريتم JADE با حل مشكل جايگشت حميد اسدي
محمد حسين كهايي
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
اين مقاله مسئله جداسازي كور سيستمهاي طيف گسترده پرش فركانسي (FHSS) را با استفاده از يك المان آرايهاي بدون دانستن الگوي پرش و يا جهت سيگنال ورودي (DOA) براي كاربردهاي ... مشاهده کامل
اين مقاله مسئله جداسازي كور سيستمهاي طيف گسترده پرش فركانسي (FHSS) را با استفاده از يك المان آرايهاي بدون دانستن الگوي پرش و يا جهت سيگنال ورودي (DOA) براي كاربردهاي زمانحقيقي مورد بررسي قرار ميدهد. در اين مقاله الگوريتم مورد استفاده، الگوريتم تخمين و قطري سازي توام ماتريس كاميولنت (JADE) ميباشد. مزيت اين الگوريتم، سرعت بالاي آن ميباشد كه باعث شده است براي كاربردهاي زمان-حقيقي مناسب باشد. اما مشكل الگوريتم JADE رعايت نكردن ترتيب منابع يا جايگشت آنها به هنگام جداسازي است. براي حل مشكل جايگشت در اين مقاله، از ماتريس همبستگي استفاده ميكنيم. عدم مشاهده کامل
اين مقاله مسئله جداسازي كور سيستمهاي طيف گسترده پرش فركانسي (FHSS) را با استفاده از يك المان آرايهاي بدون دانستن الگوي پرش و يا جهت سيگنال ورودي (DOA) براي كاربردهاي ... مشاهده کامل
خرید مقاله
ارایه یک روش ترکیبی رده‌بندی ترافیک IP با کمک نگاشت ویژگی‌ها و الگوریتم‌های ژنتیک مهدی محمدی
بیژن راحمی
احمد اکبری
ماندانا بنکدار
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
...
خرید مقاله
کنفرانس‌ها و رخدادها





عضویت در انجمن کامپیوتر ایران
جستجوی مقالات