Vrije Universiteit Brussel

Displaying 1-40 of 50 results

  • White Papers // Feb 2012

    On the Design of the ECMAScript Reflection API

    The authors describe in detail the new reflection API of the upcoming Javascript standard. The most prominent feature of this new API is its support for creating proxies: virtual objects that behave as regular objects, but whose entire "Meta-object protocol" is implemented in Javascript itself. Next to a detailed description...

    Provided By Vrije Universiteit Brussel

  • White Papers // Nov 2011

    CSOM/PL a Virtual Machine Product Line

    CSOM/PL is a Software Product Line (SPL) derived from applying Multi-Dimensional Separation Of Concerns (MDSOC) techniques to the domain of high-level language Virtual Machine (VM) implementations. For CSOM/PL, the authors modularised CSOM, a Smalltalk VM implemented in C, using VMADL (Virtual Machine Architecture Description Language). Several features of the original...

    Provided By Vrije Universiteit Brussel

  • White Papers // Sep 2011

    Computational Contracts

    Pre/post contracts for higher-order functions, as proposed by Findler and Felleisen and provided in Racket, allow run-time verification and blame assignment of higher-order functions. However these contracts treat contracted functions as black boxes, allowing verification of only input and output. It turns out that many interesting concerns about the behaviour...

    Provided By Vrije Universiteit Brussel

  • White Papers // Sep 2011

    Which Problems Does a Multi-Language Virtual Machine Need to Solve in the Multicore/Manycore Era?

    While parallel programming for very regular problems has been used in the scientific community by non-computer-scientists successfully for a few decades now, concurrent programming and solving irregular problems remains hard. Furthermore, the authors shift from few expert system programmers mastering concurrency for a constrained set of problems to mainstream application...

    Provided By Vrije Universiteit Brussel

  • White Papers // Aug 2011

    CRIMESPOT: Language Support for Programming Interactions Among Wireless Sensor Network Nodes

    An emerging breed of wireless sensor network applications tasks nodes not only with sensing, but also with reacting to sensor readings. Event-based middleware lends itself to implementing such applications. It offers developers fine-grained control over how an individual node interacts with the other nodes of the network. However, this control...

    Provided By Vrije Universiteit Brussel

  • White Papers // Aug 2011

    Reasoning Over the Evolution of Source Code Using Quantified Regular Path Expressions

    Version Control Systems (VCS) have become indispensable to develop software. Next to their immediate advantages, they also offer information about the evolution of software and its development process. Despite this wealth of information, it has only been leveraged by tools that are dedicated to a specific software engineering task such...

    Provided By Vrije Universiteit Brussel

  • White Papers // Aug 2011

    Mendel: Source Code Recommendation Based on a Genetic Metaphor

    When evolving software systems, developers spend a considerable amount of time understanding existing source code. To successfully implement new or alter existing behavior, developers need to answer questions such as: "Which types and methods can one use to solve this task?" or "Should the implementation follow particular naming or structural...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jul 2011

    Program Querying With a SOUL: The BARISTA Tool Suite

    Extracting information from the source code of a program is an important step in the way to program understanding, manipulation, development and maintenance. To this end, logic-based query languages provide a declarative manner in which to identify program elements of interest. In this paper, the authors present BARISTA, a tool-suite...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jul 2011

    Towards a General Composition Semantics for Rule-Based Model Transformation

    As model transformations have become an integral part of the automated software engineering lifecycle, reuse, modularization, and composition of model transformations becomes important. One way to compose model transformations is to compose modules of transformation rules, and execute the composition as one transformation (internal composition). This kind of composition can...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jul 2011

    A Logic Meta-Programming Foundation for Example-Driven Pattern Detection in Object-Oriented Programs

    This paper summarizes the doctoral dissertation in which the authors introduced an example-driven approach to pattern detection. This approach enables specifying pattern characteristics in a familiar language: through a code excerpt that corresponds to their prototypical implementation. Such excerpts are matched against the program under investigation according to various matching...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jun 2011

    Automatic Parallelization of Side-Effecting Higher-Order Scheme Programs

    The multi-core revolution heralds a challenging era for software maintainers. Manually parallelizing large sequential code bases is often infeasible. In this paper, the authors present a program transformation that automatically parallelizes real-life Scheme programs. The transformation has to be instantiated with an inter-procedural dependence analysis that exposes parallelization opportunities in...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jun 2011

    Volatile Sets: Event-Driven Collections for Mobile Ad-Hoc Applications

    In mobile peer-to-peer applications, a common pattern is to maintain a collection of remotely-hosted objects. Traditional approaches require programmers to manually track the connectivity state of these remote objects and add them or remove them from local collections on a per-object basis. Because this happens concurrently with the rest of...

    Provided By Vrije Universiteit Brussel

  • White Papers // Mar 2011

    Does The Investment Opportunities Bias Affect The Investment-Cash Flow Sensitivities Of Unlisted SMEs?

    Using a panel of 5,999 Small and Medium-sized Belgian Enterprises (SMEs) over the period 2002-2008, the authors identify three measures of investment opportunities suitable for unlisted firms. They then estimate firm-varying Investment-Cash Flow Sensitivities (ICFS) from reduced-form investment equations that include these measures, and compare them with those derived from...

    Provided By Vrije Universiteit Brussel

  • White Papers // Nov 2010

    Language Engineering for Mobile Software

    Mobile systems offer the possibility of delivering software services that tightly match user needs, thanks to their availability right at the moment and place where they are needed, and their ability to take advantage of local resources and self-adapt to their environment of use. Alas, writing software for mobile systems...

    Provided By Vrije Universiteit Brussel

  • White Papers // Oct 2010

    Resolving Model Inconsistencies With Automated Planning

    Various approaches have been explored to detect and resolve software model inconsistencies in a generic and scalable way. In this position paper, the authors outline their research that aims to use the technique of automated planning for the purpose of resolving model inconsistencies. They discuss the scalability results of the...

    Provided By Vrije Universiteit Brussel

  • White Papers // Sep 2010

    Improving the Data Locality of Work Stealing

    Fork/Join parallelism based on work stealing is becoming a widely used approach for parallelizing programs, yielding good and proven performance characteristics, while being relatively convenient to use. A known problem, however, is that randomized work stealing may suffer from suboptimal data locality over time. Current solutions for this issue rely...

    Provided By Vrije Universiteit Brussel

  • White Papers // Aug 2010

    Event-Driven Mobile Computing With Objects

    The authors motivate why event-driven approaches are suitable to address the challenges of mobile and ubiquitous computing. In particular, they describe the beneficial properties of event-based communication in so-called mobile ad hoc networks. However, because contemporary programming languages feature no built-in support for event-driven programming, programmers are often forced to...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jul 2010

    Verifying the Design of an Outsourced COBOL System With IntensiVE

    Companies nowadays rely on outsourcing for the implementation of their software. While outsourcing can reduce the actual development costs for a piece of software, it can also reduce a company's control over the quality of the delivered software. In light of obtaining maintainable software, it is however important that the...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jul 2010

    Lifetime Optimization for Wireless Sensor Networks With Correlated Data Gathering

    The nodes in wireless sensor networks often collect correlated measurements. Not taking into account this information redundancy is detrimental to the network lifetime, since communication is often the most energy consuming task for a sensor node. This paper tackles this issue by proposing an approach based on Distributed Source Coding...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jul 2010

    Insertion Tree Phasers: Efficient and Scalable Barrier Synchronization for Fine-Grained Parallelism

    This paper presents an algorithm and a data structure for scalable dynamic synchronization in fine-grained parallelism. The algorithm supports the full generality of phasers with dynamic, two-phase, and point-to-point synchronization. It retains the scalability of classical tree barriers, but provides unbounded dynamicity by employing a tailor-made insertion tree data structure....

    Provided By Vrije Universiteit Brussel

  • White Papers // May 2010

    Tackling Pointcut Fragility With Dynamic Annotations

    Within the aspect-oriented software development community, the use of annotation-based point-cuts has been pro-posed as a means to alleviate the fragile point-cut problem. Expressing point-cuts in terms of source-code annotations instead of the structure of the source code decouples them from the source code of the base system and makes...

    Provided By Vrije Universiteit Brussel

  • White Papers // Feb 2010

    Predicated Generic Functions Enabling Context-Dependent Method Dispatch

    This paper presents predicated generic functions, a novel programming language abstraction that allows the expression of context dependent behaviour in a declarative and modular manner, providing fine-grained control of method applicability and method specificity. Methods are guarded by predicates with user-defined orderings, thereby increasing the expressiveness of existing method dispatching...

    Provided By Vrije Universiteit Brussel

  • White Papers // Dec 2009

    Co-Evolving Annotations and Source Code Through Smart Annotations

    Annotations are a means to attach additional meta data to the source code of a system. Nowadays, more and more technologies rely on the presence of such annotations in the source code: beyond their use for documentation purposes, annotations impact the behaviour of the system. Since there exists little or...

    Provided By Vrije Universiteit Brussel

  • White Papers // Nov 2009

    Enforcing Structural Regularities in Software Using IntensiVE

    The design and implementation of a software system is often governed by a variety of coding conventions, design patterns, architectural guidelines, design rules, and other so-called structural regularities. To prevent a deterioration of the system's source code, it is important that these regularities are verified and enforced upon evolution of...

    Provided By Vrije Universiteit Brussel

  • White Papers // Sep 2009

    Language-Shifting Objects From Java to Smalltalk

    Foreign-function interfaces enable programs in a host language to interoperate with programs written in another language and vice-versa. Two languages that feature such an interface to a common language can even interoperate by means of this common intermediate language. Smalltalk and Java, for example, both offer an interface to C...

    Provided By Vrije Universiteit Brussel

  • White Papers // Sep 2009

    Experiments With Pro-Active Declarative Meta-Programming

    Program querying has become a valuable asset in the programmer's toolbox. Using dedicated querying languages, developers can reason about their source code in order to find errors, refactoring opportunities and so on. Within Smalltalk, the SOUL language has been proposed as one such language that offers a declarative and expressive...

    Provided By Vrije Universiteit Brussel

  • White Papers // Sep 2009

    Module Superimposition: A Composition Technique for Rule-Based Model Transformation Languages

    As the application of model transformation becomes increasingly commonplace, the focus is shifting from model transformation languages to the model transformations themselves. The properties of model transformations, such as scalability, maintainability and reusability, have become important. Composition of model transformations allows for the creation of smaller, maintainable and reusable transformation...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jun 2009

    Cell-ID Positioning in WiMAX Networks Analysis of the Clearwire Network in Belgium

    Base station identification, or Cell IDentification (Cell-ID) is the first method used by operators to provide Location-Based Services (LBS). The advantage of using this method is the simplicity and the low cost implementation and processing. However, this method suffers from the low accuracy as the user will use the best...

    Provided By Vrije Universiteit Brussel

  • White Papers // May 2009

    TOTAM: Scoped Tuples for the Ambient

    Coordination of mobile applications posses a number of issues. Devices should be able to communicate with each other without being connected with each other at the same time while maintaining privacy and limited network traffic. Current tuple based approaches solve these issues partially but none of them solves all of...

    Provided By Vrije Universiteit Brussel

  • White Papers // May 2009

    A Leasing Model to Deal With Partial Failures in Mobile Ad Hoc Networks

    In Mobile Ad hoc NETworks (MANETs) many partial failures are the result of temporary network partitions due to the intermittent connectivity of mobile devices. Some of these failures will be permanent and require application-level failure handling. However, it is impossible to distinguish a permanent from a transient failure. Leasing provides...

    Provided By Vrije Universiteit Brussel

  • White Papers // Apr 2009

    Adding State and Visibility Control to Traits Using Lexical Nesting

    Traits are reusable building blocks that can be composed to share methods across unrelated class hierarchies. Original traits are stateless and cannot express visibility control for methods. Two extensions, stateful traits and freezable traits, have been proposed to overcome these limitations. However, these extensions introduce complexity and have not yet...

    Provided By Vrije Universiteit Brussel

  • White Papers // Mar 2009

    Decentralized Learning in Wireless Sensor Networks

    In this paper the authors use a reinforcement learning algorithm with the aim to increase the autonomous lifetime of a Wireless Sensor Network (WSN) and decrease latency in a decentralized manner. WSNs are collections of sensor nodes that gather environmental data, where the main challenges are the limited power supply...

    Provided By Vrije Universiteit Brussel

  • White Papers // Mar 2009

    Inducing Evolution-Robust Pointcuts

    One of the problems in Aspect-Oriented Software Development is specifying point-cuts that are robust with respect to evolution of the base program. The authors propose to use Inductive Logic Programming, and more specifically the FOIL algorithm, to automatically discover intensional pattern-based point-cuts. In this paper, they demonstrate this approach using...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jan 2009

    Privacy, Trust and Policy-Making: Challenges and Responses

    The authors contend that the emerging ubiquitous Information Society (aka ambient intelligence, pervasive computing, ubiquitous networking and so on) will raise many privacy and trust issues that are context-dependent. These issues will pose many challenges for policy-makers and stakeholders because people's notions of privacy and trust are different and shifting....

    Provided By Vrije Universiteit Brussel

  • White Papers // Dec 2008

    Cognac: A Framework for Documenting and Verifying the Design of Cobol Systems

    For any non-trivial software project, architectural drift is a well-known problem. Over time, the design rules and guidelines governing the software project are no longer obeyed, resulting in that the software becomes more difficult to maintain. While there exist numerous tools - such as code checkers, architecture and design checkers,...

    Provided By Vrije Universiteit Brussel

  • White Papers // Nov 2008

    Verifying the Design of a Cobol System Using Cognac

    A property of large-scale, industrial systems is that they are intended to be used and maintained over a long period of time. In order to keep such large systems maintainable, it is important that developers respect the various rules that underlie the design of such systems during the subsequent evolutions...

    Provided By Vrije Universiteit Brussel

  • White Papers // Nov 2008

    On the Classification of First-Class Changes

    Feature-Oriented Programming (FOP) is the research domain that targets the encapsulation of software building blocks as features, which better match the specification of requirements. Recently, the authors proposed change-oriented programming, in which features are seen as sets of changes that can be applied to a base program, as an approach...

    Provided By Vrije Universiteit Brussel

  • White Papers // Oct 2008

    Feature-Oriented Programming Based on First-Class Changes

    A growing trend in software construction advocates the encapsulation of software building blocks as features which better match the specification of requirements. Feature Oriented Programming (FOP) is the research domain that targets this trend. The authors argue that the state-of-the-art approaches to FOP are not satisfactory because they only provide...

    Provided By Vrije Universiteit Brussel

  • White Papers // Sep 2008

    Reflection for the Masses

    A reflective programming language provides means to render explicit what is typically abstracted away in its language constructs in an on-demand style. In the early 1980's, Brian Smith introduced a general recipe for building reflective programming languages with the notion of procedural reflection. It is an excellent framework for understanding...

    Provided By Vrije Universiteit Brussel

  • White Papers // Aug 2008

    Localization in WiMAX Networks Based on Signal Strength Observations

    Wireless operators have realized the value and potential to provide Location-Based Services (LBS) to their customers in a convenient and seamless way without imposing extra hardware or extra fees. Recently, localization in wireless networks has gained a lot of interest and the researchers are continuously seeking new methods and techniques...

    Provided By Vrije Universiteit Brussel

  • White Papers // Sep 2010

    Improving the Data Locality of Work Stealing

    Fork/Join parallelism based on work stealing is becoming a widely used approach for parallelizing programs, yielding good and proven performance characteristics, while being relatively convenient to use. A known problem, however, is that randomized work stealing may suffer from suboptimal data locality over time. Current solutions for this issue rely...

    Provided By Vrije Universiteit Brussel

  • White Papers // Dec 2008

    Cognac: A Framework for Documenting and Verifying the Design of Cobol Systems

    For any non-trivial software project, architectural drift is a well-known problem. Over time, the design rules and guidelines governing the software project are no longer obeyed, resulting in that the software becomes more difficult to maintain. While there exist numerous tools - such as code checkers, architecture and design checkers,...

    Provided By Vrije Universiteit Brussel

  • White Papers // Apr 2009

    Adding State and Visibility Control to Traits Using Lexical Nesting

    Traits are reusable building blocks that can be composed to share methods across unrelated class hierarchies. Original traits are stateless and cannot express visibility control for methods. Two extensions, stateful traits and freezable traits, have been proposed to overcome these limitations. However, these extensions introduce complexity and have not yet...

    Provided By Vrije Universiteit Brussel

  • White Papers // May 2009

    A Leasing Model to Deal With Partial Failures in Mobile Ad Hoc Networks

    In Mobile Ad hoc NETworks (MANETs) many partial failures are the result of temporary network partitions due to the intermittent connectivity of mobile devices. Some of these failures will be permanent and require application-level failure handling. However, it is impossible to distinguish a permanent from a transient failure. Leasing provides...

    Provided By Vrije Universiteit Brussel

  • White Papers // May 2009

    TOTAM: Scoped Tuples for the Ambient

    Coordination of mobile applications posses a number of issues. Devices should be able to communicate with each other without being connected with each other at the same time while maintaining privacy and limited network traffic. Current tuple based approaches solve these issues partially but none of them solves all of...

    Provided By Vrije Universiteit Brussel

  • White Papers // Sep 2009

    Module Superimposition: A Composition Technique for Rule-Based Model Transformation Languages

    As the application of model transformation becomes increasingly commonplace, the focus is shifting from model transformation languages to the model transformations themselves. The properties of model transformations, such as scalability, maintainability and reusability, have become important. Composition of model transformations allows for the creation of smaller, maintainable and reusable transformation...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jun 2008

    Forward Chaining in HALO: An Implementation Strategy for History-Based Logic Pointcuts

    In aspect-oriented programming, point-cuts are formulated as conditions over the context of dynamic events in the execution of a program. Hybrid point-cut languages also allow this context to come from interactions between the point-cut language and the base program. While some point-cut languages only allow conditions on the current execution...

    Provided By Vrije Universiteit Brussel

  • White Papers // May 2008

    Example-Based Program Querying

    Program query languages are an essential component of program analysis and manipulation systems. In each such system, a query identifies the source-code parts of interest by reasoning over a program representation that is dedicated to the intent of the system (e.g. call-graphs to detect behavioral flaws, abstract syntax trees for...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jun 2008

    Experiences in Modularizing Business Rules Into Aspects

    This paper provides an experience report on the use of aspect-oriented technology as a means to modularize the implementation of business rules in an object-oriented, large scale case study. The goal of this refactoring of the system was to provide a proof-of-concept implementation of how such an aspect-oriented solution can...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jul 2008

    Group Communication Abstractions for Distributed Reactive Systems

    Pervasive computing in mobile ad hoc networks requires that applications react to a plethora of events red by other devices in the mobile ad hoc network. Current context-aware and event-driven architectures require the programmer to react to these events via a carefully crafted network of observers and event handlers, while...

    Provided By Vrije Universiteit Brussel

  • White Papers // Aug 2008

    Pitfalls in Aspect Mining

    The research domain of aspect mining studies the problem of (semi-)automatically identifying potential aspects and crosscutting concerns in a software system, to improve the system's comprehensibility or enable its migration to an aspect-oriented solution. Unfortunately, most proposed aspect mining techniques have not lived up to their expectations yet. In this...

    Provided By Vrije Universiteit Brussel

  • White Papers // Sep 2008

    Reflection for the Masses

    A reflective programming language provides means to render explicit what is typically abstracted away in its language constructs in an on-demand style. In the early 1980's, Brian Smith introduced a general recipe for building reflective programming languages with the notion of procedural reflection. It is an excellent framework for understanding...

    Provided By Vrije Universiteit Brussel

  • White Papers // Oct 2008

    Feature-Oriented Programming Based on First-Class Changes

    A growing trend in software construction advocates the encapsulation of software building blocks as features which better match the specification of requirements. Feature Oriented Programming (FOP) is the research domain that targets this trend. The authors argue that the state-of-the-art approaches to FOP are not satisfactory because they only provide...

    Provided By Vrije Universiteit Brussel

  • White Papers // Aug 2008

    Software Variation by Means of First-Class Change Objects

    A growing trend in software construction advocates the encapsulation of software building blocks as features which better match the language of requirements. As a result, programmers find it easier to design and compose different variations of their systems. Feature Oriented Programming (FOP) is the study domain that targets this trend....

    Provided By Vrije Universiteit Brussel

  • White Papers // Aug 2008

    First-Class Change Objects for Feature Oriented Programming

    A growing trend in software construction advocates the encapsulation of software building blocks as features which better match the specification of requirements. As a result, programmers find it easier to design and compose different variations of their systems. Feature-Oriented Programming (FOP) is the research domain that targets this trend. The...

    Provided By Vrije Universiteit Brussel

  • White Papers // May 2008

    Summary of the ThirdWorkshop on Domain-Specific Aspect Languages

    The tendency to raise the abstraction level in programming languages towards a particular domain is also a major driving force in the research domain of aspect-oriented programming languages. As a matter of fact, pioneering work in this field was conducted by devising small Domain-Specific Aspect Languages (DSALs) such as COOL...

    Provided By Vrije Universiteit Brussel

  • White Papers // Nov 2008

    On the Classification of First-Class Changes

    Feature-Oriented Programming (FOP) is the research domain that targets the encapsulation of software building blocks as features, which better match the specification of requirements. Recently, the authors proposed change-oriented programming, in which features are seen as sets of changes that can be applied to a base program, as an approach...

    Provided By Vrije Universiteit Brussel

  • White Papers // Nov 2008

    Verifying the Design of a Cobol System Using Cognac

    A property of large-scale, industrial systems is that they are intended to be used and maintained over a long period of time. In order to keep such large systems maintainable, it is important that developers respect the various rules that underlie the design of such systems during the subsequent evolutions...

    Provided By Vrije Universiteit Brussel

  • White Papers // Nov 2010

    Language Engineering for Mobile Software

    Mobile systems offer the possibility of delivering software services that tightly match user needs, thanks to their availability right at the moment and place where they are needed, and their ability to take advantage of local resources and self-adapt to their environment of use. Alas, writing software for mobile systems...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jun 2011

    Volatile Sets: Event-Driven Collections for Mobile Ad-Hoc Applications

    In mobile peer-to-peer applications, a common pattern is to maintain a collection of remotely-hosted objects. Traditional approaches require programmers to manually track the connectivity state of these remote objects and add them or remove them from local collections on a per-object basis. Because this happens concurrently with the rest of...

    Provided By Vrije Universiteit Brussel

  • White Papers // Aug 2008

    Localization in WiMAX Networks Based on Signal Strength Observations

    Wireless operators have realized the value and potential to provide Location-Based Services (LBS) to their customers in a convenient and seamless way without imposing extra hardware or extra fees. Recently, localization in wireless networks has gained a lot of interest and the researchers are continuously seeking new methods and techniques...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jun 2009

    Cell-ID Positioning in WiMAX Networks Analysis of the Clearwire Network in Belgium

    Base station identification, or Cell IDentification (Cell-ID) is the first method used by operators to provide Location-Based Services (LBS). The advantage of using this method is the simplicity and the low cost implementation and processing. However, this method suffers from the low accuracy as the user will use the best...

    Provided By Vrije Universiteit Brussel

  • White Papers // Sep 2009

    Language-Shifting Objects From Java to Smalltalk

    Foreign-function interfaces enable programs in a host language to interoperate with programs written in another language and vice-versa. Two languages that feature such an interface to a common language can even interoperate by means of this common intermediate language. Smalltalk and Java, for example, both offer an interface to C...

    Provided By Vrije Universiteit Brussel

  • White Papers // Mar 2009

    Decentralized Learning in Wireless Sensor Networks

    In this paper the authors use a reinforcement learning algorithm with the aim to increase the autonomous lifetime of a Wireless Sensor Network (WSN) and decrease latency in a decentralized manner. WSNs are collections of sensor nodes that gather environmental data, where the main challenges are the limited power supply...

    Provided By Vrije Universiteit Brussel

  • White Papers // May 2008

    The Strategic Planning Of EU Military Operations - The Case Of EUFOR TCHAD / RCA

    This paper cannot hope to cover all issues relevant to crisis management in Chad in detail. It can only briefly introduce the conflict in Chad itself. The role of the United Nations (UN) in managing the regional conflict will be mentioned in so far as necessary to understand the role...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jan 2009

    Privacy, Trust and Policy-Making: Challenges and Responses

    The authors contend that the emerging ubiquitous Information Society (aka ambient intelligence, pervasive computing, ubiquitous networking and so on) will raise many privacy and trust issues that are context-dependent. These issues will pose many challenges for policy-makers and stakeholders because people's notions of privacy and trust are different and shifting....

    Provided By Vrije Universiteit Brussel

  • White Papers // Mar 2011

    Does The Investment Opportunities Bias Affect The Investment-Cash Flow Sensitivities Of Unlisted SMEs?

    Using a panel of 5,999 Small and Medium-sized Belgian Enterprises (SMEs) over the period 2002-2008, the authors identify three measures of investment opportunities suitable for unlisted firms. They then estimate firm-varying Investment-Cash Flow Sensitivities (ICFS) from reduced-form investment equations that include these measures, and compare them with those derived from...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jul 2010

    Lifetime Optimization for Wireless Sensor Networks With Correlated Data Gathering

    The nodes in wireless sensor networks often collect correlated measurements. Not taking into account this information redundancy is detrimental to the network lifetime, since communication is often the most energy consuming task for a sensor node. This paper tackles this issue by proposing an approach based on Distributed Source Coding...

    Provided By Vrije Universiteit Brussel

  • White Papers // Sep 2011

    Computational Contracts

    Pre/post contracts for higher-order functions, as proposed by Findler and Felleisen and provided in Racket, allow run-time verification and blame assignment of higher-order functions. However these contracts treat contracted functions as black boxes, allowing verification of only input and output. It turns out that many interesting concerns about the behaviour...

    Provided By Vrije Universiteit Brussel

  • White Papers // Oct 2010

    Resolving Model Inconsistencies With Automated Planning

    Various approaches have been explored to detect and resolve software model inconsistencies in a generic and scalable way. In this position paper, the authors outline their research that aims to use the technique of automated planning for the purpose of resolving model inconsistencies. They discuss the scalability results of the...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jun 2011

    Automatic Parallelization of Side-Effecting Higher-Order Scheme Programs

    The multi-core revolution heralds a challenging era for software maintainers. Manually parallelizing large sequential code bases is often infeasible. In this paper, the authors present a program transformation that automatically parallelizes real-life Scheme programs. The transformation has to be instantiated with an inter-procedural dependence analysis that exposes parallelization opportunities in...

    Provided By Vrije Universiteit Brussel

  • White Papers // Aug 2011

    Reasoning Over the Evolution of Source Code Using Quantified Regular Path Expressions

    Version Control Systems (VCS) have become indispensable to develop software. Next to their immediate advantages, they also offer information about the evolution of software and its development process. Despite this wealth of information, it has only been leveraged by tools that are dedicated to a specific software engineering task such...

    Provided By Vrije Universiteit Brussel

  • White Papers // Aug 2011

    CRIMESPOT: Language Support for Programming Interactions Among Wireless Sensor Network Nodes

    An emerging breed of wireless sensor network applications tasks nodes not only with sensing, but also with reacting to sensor readings. Event-based middleware lends itself to implementing such applications. It offers developers fine-grained control over how an individual node interacts with the other nodes of the network. However, this control...

    Provided By Vrije Universiteit Brussel

  • White Papers // Dec 2009

    Co-Evolving Annotations and Source Code Through Smart Annotations

    Annotations are a means to attach additional meta data to the source code of a system. Nowadays, more and more technologies rely on the presence of such annotations in the source code: beyond their use for documentation purposes, annotations impact the behaviour of the system. Since there exists little or...

    Provided By Vrije Universiteit Brussel

  • White Papers // Nov 2009

    Enforcing Structural Regularities in Software Using IntensiVE

    The design and implementation of a software system is often governed by a variety of coding conventions, design patterns, architectural guidelines, design rules, and other so-called structural regularities. To prevent a deterioration of the system's source code, it is important that these regularities are verified and enforced upon evolution of...

    Provided By Vrije Universiteit Brussel

  • White Papers // Feb 2010

    Predicated Generic Functions Enabling Context-Dependent Method Dispatch

    This paper presents predicated generic functions, a novel programming language abstraction that allows the expression of context dependent behaviour in a declarative and modular manner, providing fine-grained control of method applicability and method specificity. Methods are guarded by predicates with user-defined orderings, thereby increasing the expressiveness of existing method dispatching...

    Provided By Vrije Universiteit Brussel

  • White Papers // May 2010

    Tackling Pointcut Fragility With Dynamic Annotations

    Within the aspect-oriented software development community, the use of annotation-based point-cuts has been pro-posed as a means to alleviate the fragile point-cut problem. Expressing point-cuts in terms of source-code annotations instead of the structure of the source code decouples them from the source code of the base system and makes...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jul 2010

    Insertion Tree Phasers: Efficient and Scalable Barrier Synchronization for Fine-Grained Parallelism

    This paper presents an algorithm and a data structure for scalable dynamic synchronization in fine-grained parallelism. The algorithm supports the full generality of phasers with dynamic, two-phase, and point-to-point synchronization. It retains the scalability of classical tree barriers, but provides unbounded dynamicity by employing a tailor-made insertion tree data structure....

    Provided By Vrije Universiteit Brussel

  • White Papers // Aug 2010

    Event-Driven Mobile Computing With Objects

    The authors motivate why event-driven approaches are suitable to address the challenges of mobile and ubiquitous computing. In particular, they describe the beneficial properties of event-based communication in so-called mobile ad hoc networks. However, because contemporary programming languages feature no built-in support for event-driven programming, programmers are often forced to...

    Provided By Vrije Universiteit Brussel

  • White Papers // Jul 2010

    Verifying the Design of an Outsourced COBOL System With IntensiVE

    Companies nowadays rely on outsourcing for the implementation of their software. While outsourcing can reduce the actual development costs for a piece of software, it can also reduce a company's control over the quality of the delivered software. In light of obtaining maintainable software, it is however important that the...

    Provided By Vrije Universiteit Brussel