State of the World - Statically Verifying API Usage Rule
|
|
|
- Jeffery Ball
- 5 years ago
- Views:
Transcription
1 Statically Verifying API Usage Rule using Tracematches Xavier Noumbissi, Patrick Lam University of Waterloo November 4, 2010 (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
2 Outline 1 Problem 2 Constraint language 3 Example 4 Analysis Overview 5 Related Work 6 Future Work 7 Conclusion (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
3 Problem Software relies on Libraries LIBRARY 1 APPLICATION LIBRARY 2 (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
4 Problem Plug-in / Wrapper-Library Abstraction Layer PLUGIN 1 LIBRARY 1 APPLICATION PLUGIN 2 LIBRARY 2 (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
5 Verification Properties Problem Expressing Properties Two types of properties: State Properties: Pre- and Post-Conditions Temporal Properties: Typestates, LTL, etc. (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
6 Constraint language Tracematches Tracematches: Unauthorized events sequence Example: Do not write to a file after closing it. Regular Expression: open write* close+ write write close open close write start q 0 q 1 q 2 q 3 (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
7 Example Example Configuration BookEditor BookHandler Java API (FileWriter) (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
8 Application & Plug-in Example The Code p u b l i c class BookHandler { F i l e W r i t e r l1 ; p u b l i c void openbook ( S t r i n g b){ l 1 = new F i l e W r i t e r ( b ) ; } p u b l i c void printchapter ( S t r i n g s ){ l 1. w r i t e ( s ) ; } p u b l i c void p r i n t S e c t i o n ( S t r i n g s ){ i f ( n u l l == s ) l 1. f l u s h ( ) ; else l 1. w r i t e ( s ) ; } public void addindex ( String [ ] t ){ f o r ( i n t k =0; k<t. l e n g t h ; ++k ) { l 1. w r i t e ( t [ k ] ) ; } F i l e W r i t e r l 3 = l 1 ; / / I l l u s t r a t e s l 3. close ( ) ; / / a l i a s i n g } p u b l i c class BookEditor { p u b l i c s t a t i c void main ( S t r i n g [ ] args ){ BookHandler b = new BookHandler ( ) ; S t r i n g [ ] index = {"book", "chapter"}; StringBuilder s t r = new StringBuilder ( ) ; b. openbook ( "book.txt" ) ; b. p r i n t C h a p t e r ( "A chapter" ) ; s t r. append ( "Not in abstract CFG" ) ; b. p r i n t S e c t i o n ( "A section" ) ; b. addindex ( index ) ; b. close ( ) ; } } ACFG } public void close (){ l 1. f l u s h ( ) ; l 1. close ( ) ; } (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
9 Example Usage Rule A Usage Rule for java.io.filewriter No write or flush on a FileWriter after a close. write, flush close close write, flush start q 0 q 1 q 2 (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
10 A Violation of the Rule Example A Rule Violation The developer expects: close: closes the book s stream addindex: does not close the book s stream But: addindex: closes the stream close: flushes the stream before closing it (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
11 Method summaries Example Plug-in summary Summary of BookHandler.addIndex k = 0 if (k < t.length) T l1.write(t[k]); ++k; F FileWriter l3=l1; l3.close(); l 1.close() q 0 q 2 l 1.write() q 1 Must-alias information at intraprocedural level: l1 and l3 must alias (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
12 Plug-in summary Example Plug-in summary Reusable as long as Plug-in code unchanged Represents all events sequences on FileWriter objects Storage of summaries improves scalability (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
13 Example Application code Abstracted CFG for BookEditor.main The code q 0 q 1 b.openbook(...) Here s a CFG which only includes the BookHandler calls. Statements on edges q 2 q 3 b.printchapter(...) b.printsection(...) b.addindex(...) q 6 (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26 q 4 b.closebook(...)
14 Edge Substitution - 1 Example Application code Substitute method-call edges with NFA summaries: Summarizes application behavior with respect to tracematch events May-alias information at interprocedural level Unless FileWriter objects may not alias (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
15 Edge Substitution - 2 Example Application code l 1.write() c 2 l 1.close() l 1.flush() l 1.close() c 5 c 6 c 7 l 1.write() c 0 c 1 c 4 l 1.flush() c 3 l 1.write() c 8 (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
16 Example Application code Tracematch: Runtime Monitor (RM) Combined execution of application and RM: Synchronous Product Automaton (SPA): defines a transition for an event only if it occurs in both automatons Shared actions: tracematch events (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
17 Example Application code Synchronous Product Automaton - 1 l 1.flush() c 5 q 1 c 6 q 2 l 1.flush() c 3 q 0 l 1.close() l 1.write() c 0 q 0 c 1 q 0 l 1.write() c 2 q 0 c 4 q 0 l 1.write() c 8 q 0 (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
18 Example Application code Synchronous Product Automaton - 2 l 1.flush() c 5 q 1 c 6 q 2 l 1.flush() c 3 q 0 l 1.close() l 1.write() c 0 q 0 c 1 q 0 l 1.write() c 2 q 0 c 4 q 0 l 1.write() c 8 q 0 An accepting path represents a violation of the rules. (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
19 Analysis Overview Our approach: Four Phases Overview 1 Compute plug-in summaries (Preliminary phase) 2 Generate application Abstract CFGs 3 Integrate plug-in summaries to abstract CFGs 4 Build SPA and check for accepting paths (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
20 Implementation Analysis Overview Overview Uses the Soot Framework Interaction of inter- and intra-procedural analysis Intraprocedural analysis as a region-based analysis (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
21 Analysis Overview Overview Computing Plug-in Summaries Advantages of storing summaries: Effects of whole program analysis with partial code No need to have plug-in code Manual creation of plug-in summary Plug-in summary as a contract (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
22 Analysis Overview Library Object Accesses Overview Library objects may be accessible as: Member variables Local instantiated variables Others: out of scope (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
23 Related Work Related Work Static optimization of runtime monitors: static verification of tracematches at the intraprocedural level (Bodden et al.) Analysis of multiple interactive objects: Uses tracematches to verify correct interaction of several objects (Naeem et al.) Component Level data-flow Analysis (CLA): computes summaries and properties of software with partial information (source code or summaries) of its components. (Rountev et al.) (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
24 Future Work Future Work Complete implementation Test analysis on production software Use of constraint-solvers to remove false positives from summaries Try to improve scalability of other analyses on tracematches using summaries (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
25 Contributions Conclusion Check that abstraction layers do not introduce bugs Use of summaries as contracts Use of summaries for other analyses on tracematches (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
26 THANK YOU! Conclusion Comments & Questions (University of Waterloo) Statically Verifying API Usage Rule November 4, / 26
A staged static program analysis to improve the performance of runtime monitoring
A staged static program analysis to improve the performance of runtime monitoring Eric Bodden 1, Laurie Hendren 1, Ondřej Lhoták 2 1 McGill University, Montréal, Québec, Canada 2 University of Waterloo,
Design by Contract beyond class modelling
Design by Contract beyond class modelling Introduction Design by Contract (DbC) or Programming by Contract is an approach to designing software. It says that designers should define precise and verifiable
Writing new FindBugs detectors
Writing new FindBugs detectors Why? You may find bug patterns in your own code How? Inspect bytecode There are many ways to implement a FindBugs detector Often, simple techniques (e.g., sequential scan)
Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection
Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection Martin Leucker Technische Universität München (joint work with Andreas Bauer, Christian Schallhart et. al) FLACOS
Software Engineering Techniques
Software Engineering Techniques Low level design issues for programming-in-the-large. Software Quality Design by contract Pre- and post conditions Class invariants Ten do Ten do nots Another type of summary
SAF: Static Analysis Improved Fuzzing
The Interdisciplinary Center, Herzlia Efi Arazi School of Computer Science SAF: Static Analysis Improved Fuzzing M.Sc. Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of
Overview of Web Services API
1 CHAPTER The Cisco IP Interoperability and Collaboration System (IPICS) 4.5(x) application programming interface (API) provides a web services-based API that enables the management and control of various
A framework for creating custom rules for static analysis tools
A framework for creating custom rules for static analysis tools Eric Dalci John Steven Cigital Inc. 21351 Ridgetop Circle, Suite 400 Dulles VA 20166 (703) 404-9293 edalci,[email protected] Abstract Code
CMV: Automatic Verification of Complete Mediation forjavavirtualmachines
CMV: Automatic Verification of Complete Mediation forjavavirtualmachines A. Prasad Sistla V.N.Venkatakrishnan Michelle Zhou Hilary Branske Department of Computer Science University of Illinois at Chicago
WRITING DATA TO A BINARY FILE
WRITING DATA TO A BINARY FILE TEXT FILES VS. BINARY FILES Up to now, we have looked at how to write and read characters to and from a text file. Text files are files that contain sequences of characters.
The Model Checker SPIN
The Model Checker SPIN Author: Gerard J. Holzmann Presented By: Maulik Patel Outline Introduction Structure Foundation Algorithms Memory management Example/Demo SPIN-Introduction Introduction SPIN (Simple(
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
BACKING UP A DATABASE
BACKING UP A DATABASE April 2011 Level: By : Feri Djuandi Beginner Intermediate Expert Platform : MS SQL Server 2008, Visual C# 2010 Pre requisites: Suggested to read the first part of this document series
A Scalable Technique for Characterizing the Usage of Temporaries in Framework-intensive Java Applications
A Scalable Technique for Characterizing the Usage of Temporaries in Framework-intensive Java Applications Bruno Dufour Dept of Computer Science Rutgers University [email protected] Barbara G. Ryder
Detecting Critical Defects on the Developer s Desktop
Detecting Critical Defects on the Developer s Desktop Seth Hallem CEO Coverity, Inc. Copyright Coverity, Inc. 2006. All Rights Reserved. This publication, in whole or in part, may not be reproduced, stored
Using Eclipse CDT/PTP for Static Analysis
PTP User-Developer Workshop Sept 18-20, 2012 Using Eclipse CDT/PTP for Static Analysis Beth R. Tibbitts IBM STG [email protected] "This material is based upon work supported by the Defense Advanced Research
Algorithmic Software Verification
Algorithmic Software Verification (LTL Model Checking) Azadeh Farzan What is Verification Anyway? Proving (in a formal way) that program satisfies a specification written in a logical language. Formal
Data Flow Static Code Analysis Best Practices
Data Flow Static Code Analysis Best Practices Introduction This paper examines why and how to add flow analysis to your existing testing strategies. After introducing the general concept and benefits of
Developing a Web Server Platform with SAPI Support for AJAX RPC using JSON
Revista Informatica Economică, nr. 4 (44)/2007 45 Developing a Web Server Platform with SAPI Support for AJAX RPC using JSON Iulian ILIE-NEMEDI, Bucharest, Romania, [email protected] Writing a custom web
Statically Checking API Protocol Conformance with Mined Multi-Object Specifications Companion Report
Statically Checking API Protocol Conformance with Mined Multi-Object Specifications Companion Report Michael Pradel 1, Ciera Jaspan 2, Jonathan Aldrich 2, and Thomas R. Gross 1 1 Department of Computer
Unified Static and Runtime Verification of Object-Oriented Software
Unified Static and Runtime Verification of Object-Oriented Software Wolfgang Ahrendt 1, Mauricio Chimento 1, Gerardo Schneider 2, Gordon J. Pace 3 1 Chalmers University of Technology, Gothenburg, Sweden
White Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems
White Paper March 1, 2005 Integrating AR System with Single Sign-On (SSO) authentication systems Copyright 2005 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service
Efficient Monitoring of Parametric Context-Free Patterns
Efficient Monitoring of Parametric Context-Free Patterns Patrick O Neil Meredith and Dongyun Jin and Feng Chen and Grigore Roşu University of Illinois at Urbana-Champaign {pmeredit, djin3, fengchen, grosu}@cs.uiuc.edu
MS SQL Express installation and usage with PHMI projects
MS SQL Express installation and usage with PHMI projects Introduction This note describes the use of the Microsoft SQL Express 2008 database server in combination with Premium HMI projects running on Win31/64
SMock A Test Platform for the Evaluation of Monitoring Tools
SMock A Test Platform for the Evaluation of Monitoring Tools User Manual Ruth Mizzi Faculty of ICT University of Malta June 20, 2013 Contents 1 Introduction 3 1.1 The Architecture and Design of SMock................
Review; questions Discussion of Semester Project Arbitrary interprocedural control flow Assign (see Schedule for links)
Class 9 Review; questions Discussion of Semester Project Arbitrary interprocedural control flow Assign (see Schedule for links) Readings on pointer analysis Problem Set 5: due 9/22/09 Project proposal
Hibernate Validator. Olivier Devoisin Kevin Gallardo. Université Pierre et Marie Curie. 9 Decembre 2014
Hibernate Validator Conception et Developpement d application d Entreprise à Large echelle Olivier Devoisin Kevin Gallardo Université Pierre et Marie Curie 9 Decembre 2014 Devoisin - Gallardo (UPMC) Hibernate
EMBEDDED SOFTWARE DEVELOPMENT: COMPONENTS AND CONTRACTS
EMBEDDED SOFTWARE DEVELOPMENT: COMPONENTS AND CONTRACTS David URTING, Stefan VAN BAELEN, Tom HOLVOET and Yolande BERBERS {David.Urting, Stefan.VanBaelen, Tom.Holvoet, Yolande.Berbers}@cs.kuleuven.ac.be
Tools for Integration Testing
Tools for Integration Testing What is integration ing? Unit ing is ing modules individually A software module is a self-contained element of a system Then modules need to be put together to construct the
Continuous Code-Quality Assurance with SAFE
Continuous Code-Quality Assurance with SAFE Emmanuel Geay Eran Yahav Stephen Fink IBM T.J. Watson Research Center {egeay,eyahav,sjfink}@us.ibm.com http://www.research.ibm.com/safe ABSTRACT This paper presents
How to Write a Checker in 24 Hours
How to Write a Checker in 24 Hours Clang Static Analyzer Anna Zaks and Jordan Rose Apple Inc. What is this talk about? The Clang Static Analyzer is a bug finding tool It can be extended with custom checkers
Design Grammars for High-performance Speech Recognition
Design Grammars for High-performance Speech Recognition Copyright 2011 Chant Inc. All rights reserved. Chant, SpeechKit, Getting the World Talking with Technology, talking man, and headset are trademarks
Unit Testing. and. JUnit
Unit Testing and JUnit Problem area Code components must be tested! Confirms that your code works Components must be tested t in isolation A functional test can tell you that a bug exists in the implementation
jmonitor: Java Runtime Event Specification and Monitoring Library
RV 04 Preliminary Version jmonitor: Java Runtime Event Specification and Monitoring Library Murat Karaorman 1 Texas Instruments, Inc. 315 Bollay Drive, Santa Barbara, California USA 93117 Jay Freeman 2
RV-Droid: Runtime Verification and Enforcement for Android Applications
RV-Droid: Runtime Verification and Enforcement for Android Applications Yliès Falcone, Sebastian Currea, Mohamad Jaber Laboratoire d Informatique de Grenoble - VASCO Team - University of Grenoble, Université
UML TUTORIALS THE USE CASE MODEL
UML TUTORIALS THE USE CASE MODEL www.sparxsystems.com.au Sparx Systems 2004 Page 1/5 describes the proposed functionality of the new system. A Use Case represents a discrete unit of interaction between
Iron Chef: John Henry Challenge
Iron Chef: John Henry Challenge Brian Chess Pravir Chandra Black Hat 3/27/2008 Amsterdam Sean Fay Jacob West Concept We love Iron Chef. We can t cook. Concept Compare tools and manual code review in head-tohead
Pulse: Plural To EVMDD-SMC
Pulse: Plural To EVMDD-SMC Automated Verification of Specifications with Typestates and Access Permissions Ijaz Ahmed 1 Néstor Cataño 1 Radu I. Siminiceanu 2 1 Carnegie Mellon University - Portugal, The
Documentum Developer Program
Program Enabling Logging in DFC Applications Using the com.documentum.fc.common.dflogger class April 2003 Program 1/5 The Documentum DFC class, DfLogger is available with DFC 5.1 or higher and can only
CS 141: Introduction to (Java) Programming: Exam 1 Jenny Orr Willamette University Fall 2013
Oct 4, 2013, p 1 Name: CS 141: Introduction to (Java) Programming: Exam 1 Jenny Orr Willamette University Fall 2013 1. (max 18) 4. (max 16) 2. (max 12) 5. (max 12) 3. (max 24) 6. (max 18) Total: (max 100)
Application-only Call Graph Construction
Application-only Call Graph Construction Karim Ali and Ondřej Lhoták David R. Cheriton School of Computer Science, University of Waterloo Abstract. Since call graphs are an essential starting point for
Experimental Comparison of Concolic and Random Testing for Java Card Applets
Experimental Comparison of Concolic and Random Testing for Java Card Applets Kari Kähkönen, Roland Kindermann, Keijo Heljanko, and Ilkka Niemelä Aalto University, Department of Information and Computer
An Exception Monitoring System for Java
An Exception Monitoring System for Java Heejung Ohe and Byeong-Mo Chang Department of Computer Science, Sookmyung Women s University, Seoul 140-742, Korea {lutino, [email protected] Abstract. Exception
Model Checking: An Introduction
Announcements Model Checking: An Introduction Meeting 2 Office hours M 1:30pm-2:30pm W 5:30pm-6:30pm (after class) and by appointment ECOT 621 Moodle problems? Fundamentals of Programming Languages CSCI
HTTPS Configuration for SAP Connector
HTTPS Configuration for SAP Connector 1993-2015 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without
An Overview of Java. overview-1
An Overview of Java overview-1 Contents What is Java Major Java features Java virtual machine Java programming language Java class libraries (API) GUI Support in Java Networking and Threads in Java overview-2
How To Trace
CS510 Software Engineering Dynamic Program Analysis Asst. Prof. Mathias Payer Department of Computer Science Purdue University TA: Scott A. Carr Slides inspired by Xiangyu Zhang http://nebelwelt.net/teaching/15-cs510-se
Agent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents
Agent Languages Requirements Overview Java Tcl/Tk Telescript Evaluation Franz J. Kurfess, Cal Poly SLO 211 Requirements for agent Languages distributed programming large-scale (tens of thousands of computers)
Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327
Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327 Mod ule_i D Error _Cod e Error Description 1 1 PROCESSOR_NULLREF_ERROR 1 100 ERROR_PARSE_PAIR Failed
VDM vs. Programming Language Extensions or their Integration
VDM vs. Programming Language Extensions or their Integration Alexander A. Koptelov and Alexander K. Petrenko Institute for System Programming of Russian Academy of Sciences (ISPRAS), B. Communisticheskaya,
JUnit. Introduction to Unit Testing in Java
JUnit Introduction to Unit Testing in Java Testing, 1 2 3 4, Testing What Does a Unit Test Test? The term unit predates the O-O era. Unit natural abstraction unit of an O-O system: class or its instantiated
map/reduce connected components
1, map/reduce connected components find connected components with analogous algorithm: map edges randomly to partitions (k subgraphs of n nodes) for each partition remove edges, so that only tree remains
LEVERAGING DEDUCTIVE VERIFICATION IN INDUSTRIAL CONTEXTS
LEVERAGING DEDUCTIVE VERIFICATION IN INDUSTRIAL CONTEXTS CEA S SOFTWARE SAFETY LABORATORY 1995: LEAP FROM DYNAMIC TO STATIC CODE ANALYSIS! CAVEAT: ARCHITECTURE C source code VC Generator Formal specifications
No no-argument constructor. No default constructor found
Every software developer deals with bugs. The really tough bugs aren t detected by the compiler. Nasty bugs manifest themselves only when executed at runtime. Here is a list of the top ten difficult and
Intrusion Detection via Static Analysis
Intrusion Detection via Static Analysis IEEE Symposium on Security & Privacy 01 David Wagner Drew Dean Presented by Yongjian Hu Outline Introduction Motivation Models Trivial model Callgraph model Abstract
Networks and Services
Networks and Services Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Fall 2015 TOC 1 Infrastructure as a Service 2 Platform as a Service 3 Software as a Service Infrastructure as a Service Definition Infrastructure
Reducing Transfer Delay Using Java Class File Splitting and Prefetching
Reducing Transfer Delay Using Java Class File Splitting and Prefetching Chandra Krintz Brad Calder Urs Hölzle Department of Computer Science and Engineering University of California, San Diego ckrintz,calder
Building Web Services with Apache Axis2
2009 Marty Hall Building Web Services with Apache Axis2 Part I: Java-First (Bottom-Up) Services Customized Java EE Training: http://courses.coreservlets.com/ Servlets, JSP, Struts, JSF/MyFaces/Facelets,
See the Developer s Getting Started Guide for an introduction to My Docs Online Secure File Delivery and how to use it programmatically.
My Docs Online Secure File Delivery API: C# Introduction My Docs Online has provided HIPAA-compliant Secure File Sharing and Delivery since 1999. With the most recent release of its web client and Java
ID TECH UniMag Android SDK User Manual
ID TECH UniMag Android SDK User Manual 80110504-001-A 12/03/2010 Revision History Revision Description Date A Initial Release 12/03/2010 2 UniMag Android SDK User Manual Before using the ID TECH UniMag
Static Code Analysis Procedures in the Development Cycle
Static Code Analysis Procedures in the Development Cycle Tools, Technology, and Process in Engineering at Microsoft Mooly Beeri Microsoft Haifa R&D Center Agenda Static code analysis tools PREfix and PREfast
A Study of Android Application Security
A Study of Android Application Security William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri USENIX Security Symposium August 2011 Systems and Internet Infrastructure Security Laboratory
OSF INTEGRATOR for INGRAM MICRO Integration Guide
OSF INTEGRATOR for INGRAM MICRO Integration Guide Table of Contents 1 Installation... 3 1.1 Disabling Extension... 4 1.2 Uninstalling Extension... 4 2 Configuration... 5 3 Usage... 6 3.1 Automated product
Write Barrier Removal by Static Analysis
Write Barrier Removal by Static Analysis Karen Zee and Martin Rinard Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, MA 02139 {kkz, [email protected] ABSTRACT We present
Integration of an open source rule engine to enhance the IHTSDO Workbench testing
Integration of an open source rule engine to enhance the IHTSDO Workbench testing Dr. Guillermo Reynoso Dr. Alejandro Lopez Osornio termmed IT Buenos Aires, Argentina 2009 termmed SA Terminology maintenance
Hadoop 只 支 援 用 Java 開 發 嘛? Is Hadoop only support Java? 總 不 能 全 部 都 重 新 設 計 吧? 如 何 與 舊 系 統 相 容? Can Hadoop work with existing software?
Hadoop 只 支 援 用 Java 開 發 嘛? Is Hadoop only support Java? 總 不 能 全 部 都 重 新 設 計 吧? 如 何 與 舊 系 統 相 容? Can Hadoop work with existing software? 可 以 跟 資 料 庫 結 合 嘛? Can Hadoop work with Databases? 開 發 者 們 有 聽 到
Intel Retail Client Manager Audience Analytics
Intel Retail Client Manager Audience Analytics By using this document, in addition to any agreements you have with Intel, you accept the terms set forth below. You may not use or facilitate the use of
Getting Started with the Internet Communications Engine
Getting Started with the Internet Communications Engine David Vriezen April 7, 2014 Contents 1 Introduction 2 2 About Ice 2 2.1 Proxies................................. 2 3 Setting Up ICE 2 4 Slices 2
Using the TASKING Software Platform for AURIX
Using the TASKING Software Platform for AURIX MA160-869 (v1.0rb3) June 19, 2015 Copyright 2015 Altium BV. All rights reserved. You are permitted to print this document provided that (1) the use of such
The software model checker BLAST
Int J Softw Tools Technol Transfer (2007) 9:505 525 DOI 10.1007/s10009-007-0044-z SPECIAL SECTION FASE 04/05 The software model checker BLAST Applications to software engineering Dirk Beyer Thomas A. Henzinger
RTAP Database Lifecycle Management
SYSTEMS INC. RTAP Database Lifecycle Management Abstract: This paper will describe the typical RTAP database lifecycle and how the tessernet Systems Inc. tools can make this process easier to manage and
BUSINESS RULES CONCEPTS... 2 BUSINESS RULE ENGINE ARCHITECTURE... 4. By using the RETE Algorithm... 5. Benefits of RETE Algorithm...
1 Table of Contents BUSINESS RULES CONCEPTS... 2 BUSINESS RULES... 2 RULE INFERENCE CONCEPT... 2 BASIC BUSINESS RULES CONCEPT... 3 BUSINESS RULE ENGINE ARCHITECTURE... 4 BUSINESS RULE ENGINE ARCHITECTURE...
Android builders summit The Android media framework
Android builders summit The Android media framework Author: Bert Van Dam & Poornachandra Kallare Date: 22 April 2014 Usage models Use the framework: MediaPlayer android.media.mediaplayer Framework manages
SnapLogic Salesforce Snap Reference
SnapLogic Salesforce Snap Reference Document Release: October 2012 SnapLogic, Inc. 71 East Third Avenue San Mateo, California 94401 U.S.A. www.snaplogic.com Copyright Information 2012 SnapLogic, Inc. All
Java Applet and Terminal Application for Financial transactions
Java Applet and Terminal Application for Financial transactions Security for Java and E-commerce Environment Behrooz Aghakhanian [email protected] Jalil Shokouh [email protected] May 2011 Introduction In this assignment
How To Run A Test File Extension On A Rexx 4.1.1 (Unix) 4.2.1 On A Microsoft Linux 4.3.2 (Amd64) (Orchestra) (For Windows) (
Institut für Betriebswirtschaftslehre und Wirtschaftsinformatik Configuring Rexx Interpreter Instances from NetRexx/Java The 2012 International Rexx Symposium Rony G. Flatscher Wirtschaftsuniversität Wien
Monitoring Method Call Sequences using Annotations
Monitoring Method Call Sequences using Annotations B. Nobakht 1, M.M. Bonsangue 1,2, F.S. de Boer 1,2, and S. de Gouw 1,2 1 Leiden Institute of Advanced Computing, Universiteit Leiden, Niels Bohrweg 1,
www.virtualians.pk CS506 Web Design and Development Solved Online Quiz No. 01 www.virtualians.pk
CS506 Web Design and Development Solved Online Quiz No. 01 Which of the following is a general purpose container? JFrame Dialog JPanel JApplet Which of the following package needs to be import while handling
An introduction to creating Web 2.0 applications in Rational Application Developer Version 8.0
An introduction to creating Web 2.0 applications in Rational Application Developer Version 8.0 September 2010 Copyright IBM Corporation 2010. 1 Overview Rational Application Developer, Version 8.0, contains
COSC 1020 3.0 Introduction to Computer Science I Section A, Summer 2005. Question Out of Mark A Total 16. B-1 7 B-2 4 B-3 4 B-4 4 B Total 19
Term Test #2 COSC 1020 3.0 Introduction to Computer Science I Section A, Summer 2005 Family Name: Given Name(s): Student Number: Question Out of Mark A Total 16 B-1 7 B-2 4 B-3 4 B-4 4 B Total 19 C-1 4
Transparent Monitoring of a Process Self in a Virtual Environment
Transparent Monitoring of a Process Self in a Virtual Environment PhD Lunchtime Seminar Università di Pisa 24 Giugno 2008 Outline Background Process Self Attacks Against the Self Dynamic and Static Analysis
MPI-Checker Static Analysis for MPI
MPI-Checker Static Analysis for MPI Alexander Droste, Michael Kuhn, Thomas Ludwig November 15, 2015 Motivation 2 / 39 Why is runtime analysis in HPC challenging? Large amount of resources are used State
