搜索结果: 1-15 共查到“计算机软件 using”相关记录42条 . 查询时间(0.34 秒)
2017国际华人交互大会工作坊七:《利用服务设计工具协同相关人员进行体验创新》(Workshop 7: Involve different kinds of stakeholders to co-creative by using service design tools)
2017 国际华人 交互大会 工作坊 七 利用服务设计工具协同相关人员进行体验创新
2017/5/23
服务设计的过程是一个需要充分调动相关人员高度参与的过程。相关人员包括:我们的客户即服务的享受着,包括企业的高管即服务资源的协调者,包括服务人员即服务的最终提供者等等。每类角色的相关利益点不同,而好的服务设计需要充分考虑不同角色的相关利益,将商业、客户需求、员工效率等要求在服务设计过程中进行较好的平衡。因此,服务设计师在这个过程中需要扮演一个好的利益关系协调者,需要充分引入各类角色参与服务设计的过程...
Program Analysis Using Mixed Term and Set Constraints
Program Analysis Mixed Term Set Constraints
2016/5/24
There is a tension in program analysis between precision and eciency. In constraint-based program analysis, at one extreme methods based on unication of equality constraints over terms are very fast...
Static Error Detection Using Semantic Inconsistency Inference
Static analysis error detection satisfiability inconsistency
2016/5/24
Inconsistency checking is a method for detecting software errors that relies only on examining multiple uses of a value. We propose that inconsistency inference is best understood as a variant of the ...
Containers are general-purpose data structures that provide functionality for inserting, reading, removing, and iterating over elements. Since many applications written in modern programming languages...
First-class Runtime Generation of High-performance Types using Exotypes
First-class Runtime Generation High-performance Types Exotypes
2016/5/24
We introduce exotypes, user-defined types that combine the flexibility of meta-object protocols in dynamically-typed languages with the performance control of low-level languages. Like objects in dyna...
Specification Inference Using Context-Free Language Reachability
program analysis verification specification inference
2016/5/24
We present a framework for computing context-free language reachability properties when parts of the program are missing. Our framework infers candidate specifications for missing program pieces that ...
Evaluation of Different Methods for Using Colour Information in Global Stereo Matching Approaches
Stereoscopic Matching Stereoscopic Reconstruction Colour Analysis Experimental Analysis
2015/12/4
Global algorithms currently represent the state-of-the-art in dense stereo matching. These methods first set up an energy function.The energy function is then subject to optimization, which is t...
Temperature control of high-performance multi-core platforms using convex optimization
Thermal-aware design temperature control dynamic frequency scaling static and dynamic optimization
2015/8/10
With technology advances, the number of cores integrated on a chip and their speed of operation is increasing. This, in turn is leading to a significant increase in chip temperature. Temperature gradi...
Smoothed state estimates under abrupt changes using sum-of-norms regularization
State estimation Impulsive disturbance Load disturbance Smoothing Sparsity Regularization Change detection
2015/8/7
The presence of abrupt changes, such as impulsive and load disturbances, commonly occur in applications,but make the state estimation problem considerably more difficult than in the standard setting w...
Using Redundancies to Find Errors
Extensible compilation error detection program redundancy software quality
2015/8/7
Programmers generally attempt to perform useful work. If they performed an action, it was because they believed it served some purpose. Redundant operations violate this belief. However, in the past r...
ARCHER:Using Symbolic,Path-sensitive Analysis to Detect Memory Access Errors
ARCHER Using Symbolic Path-sensitive Analysis Detect Memory Access Errors
2015/8/7
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER usespath-sensitive, interprocedural s...
Z-Ranking:Using Statistical Analysis to Counter the Impact of Static Analysis Approximations
Z-Ranking Statistical Analysis Static Analysis Approximations
2015/8/7
This paper explores z-ranking, a technique to rank error reports emitted by static program checking analysis tools. Such tools often use approximate analysis schemes, leading to false error reports. T...
Using Model Checking to Find Serious File System Errors
Model Checking Serious File System Errors
2015/8/7
This paper shows how to use model checking to find serious errors in file systems. Model checking is a formal verification technique tuned for finding corner-case errors by comprehensively exploring t...
Automatically Generating Malicious Disks using Symbolic Execution
Automatically Generating Malicious Disks Symbolic Execution
2015/8/7
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant violations before usin...
Geological Mapping in The Cheleken Peninsula, Turkmenistan Area Using Advanced Spaceborne Thermal Emission and Reflection Radiometer (Aster) Data
Remote Sensing Geology Mapping
2015/7/7
High number of geological phenomena – outcropping Pliocene rocks (Red Series), former and recent mud volcanoes, hydrothermal
brines rich in Pb and Zn – which can provide significant information to un...