FROntIER ListReader OntoSoar GreenFIE COMET High-Level Architecture Model.

Slides:



Advertisements
Similar presentations
Programmability Issues
Advertisements

The Operating System. What is an Operating System? The software which makes it possible for you to use your computer The software which starts up when.
Object Oriented Programming in Java George Mason University Fall 2011
101.  When you communicate with people you use a language that you both understand.  The trick is that the computer does not speak English.  To communicate.
1 OBJECTIVES To generate a web-based system enables to assemble model configurations. to submit these configurations on different.
JAXB Java Architecture for XML Binding Andy Fanton Khalid AlBayat.
Generative Programming for a Component-based Framework of Distributed Embedded Software Systems Xu Ke, Krzysztof Sierszecki Mads Clausen Institute for.
AndroidCompiler. Layout Motivation Literature Review AndroidCompiler Future Works.
MIS 5241 SOFTWARE. MIS 5242 Agenda The Stored Program Concept Software as Control Software as Simulation.
Web server (serves web pages).NET Framework (executes code) ASP.NET processor Internet Information Services Server HTTP requestASP.NET code OutputHTML.
Slides prepared by Rose Williams, Binghamton University Chapter 1 Getting Started 1.1 Introduction to Java.
Introduction to the Computer
CS211 Data Structures Sami Rollins Fall 2004.
Problem Statement Give a formal Problem statement showing the input / output; objective (e.g. minimizing computational cost or other relevant metrics)
CS 101 Problem Solving and Structured Programming in C Sami Rollins Spring 2003.
2  Problem Definition  Project Purpose – Building Obfuscator  Obfuscation Quality  Obfuscation Using Opaque Predicates  Future Planning.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 15 Slide 1 Real-time Systems 1.
V Avon High School Tech Club Agenda Old Business –Delete Files New Business –Week 16 Topics: Intro to HTML/CSS –Questions? Tech Club Forums.
Introduction to Graphical User Interfaces. Objectives * Students should understand what a procedural program is. * Students should understand what an.
C++ Code Analysis: an Open Architecture for the Verification of Coding Rules Paolo Tonella ITC-irst, Centro per la Ricerca Scientifica e Tecnologica
Chapter 1 Introduction Dr. Frank Lee. 1.1 Why Study Compiler? To write more efficient code in a high-level language To provide solid foundation in parsing.
LLVM Compiler (2 of 3) Jason Dangel. Lectures High-level overview of LLVM (Katie) Walkthrough of LLVM in context of our project (Jason) –Input requirements.
OCCAM capstone Spring 2015 OCCAM: repository for open-access, collaborative computer architecture research. Too many simulators to test too many parameters.
First Programming Assignment For MIPS R3000 Processor Department of Computer Science Southern Illinois University Edwardsville Fall, 2015 Dr. Hiroshi Fujinoki.
Flexibility and user-friendliness of grid portals: the PROGRESS approach Michal Kosiedowski
Introduction to Application Programming IST 256 Application Programming for Information Systems Xiaozhong Liu
Launch SpecE8 and React from GSS. You can use the chemical analyses in a GSS data sheet to set up and run SpecE8 and React calculations. Analysis → Launch…
Niv Gafni, Yair Offir and Eliav Ben-zaken Information System Engineering Ben Gurion University 1.
Programming with Visual C++: Concepts and Projects Chapter 2B: Reading, Processing and Displaying Data (Tutorial)
1/8/ L7 Project Step 3Copyright Joanne DeGroat, ECE, OSU1 Project Step 3 Structural Modeling and the Generate Statement.
CHAPTER 1 INTRODUCTION 1 st Semester H King Saud University College Of Applied Studies and Community Services CSC 1101 Computer Programming-1.
© Geodise Project, University of Southampton, Knowledge Management in Geodise Geodise Knowledge Management Team Barry Tao, Colin Puleston, Liming.
Introduction to Compilers. Related Area Programming languages Machine architecture Language theory Algorithms Data structures Operating systems Software.
Chapter 9 Constraints. Chapter Objectives  Explain the purpose of constraints in a table  Distinguish among PRIMARY KEY, FOREIGN KEY, UNIQUE, CHECK,
Oracle 11g: SQL Chapter 4 Constraints.
CHAPTER 1 INTRODUCTION 2 nd Semester H King Saud University College Of Applied Studies and Community Services CSC 1101 Computer Programming-1.
COERCE Software Existing Software KEY: Document Generated Software Simulationist Domain Expert User Source Code Simulation Adaptation without COERCE.
Khalid Rasheed Shaikh Computer Programming Theory 1.
(Semi)automatic Extraction of Genealogical Information from Scanned & OCRed Historical Documents Elder David W. Embley.
Chapter 1 Computers, Compilers, & Unix. Overview u Computer hardware u Unix u Computer Languages u Compilers.
A.Abhari CPS1251 Topic 1: Introduction to Computers Computer Hardware Computer components Connecting Computers Computer Software Operating System (OS)
1 More on Readln:numerical values Note: ENTER key counts sends a carriage return and a line feed to the computer definition: “white space”: space, tab,
The Development Process Compilation. Compilation - Dr. Craig A. Struble 2 Programming Process Problem Solving Phase We will spend significant time on.
Dr. Mohamed Ramadan Saady 314ALL CH1.1 Chapter 1: Introduction to Compiling.
IP Address Checker SNMP Checker Duplication Checker IP address range Available IP addresses SNMP Agents and Routers Network ICMP Agent MIB Managed Device.
HOOPScheduler Mid-Semester Status Report. Presentation Outline Context & Requirements Interface Components User Interface Demo Questions.
ICS312 Introduction to Compilers Set 23. What is a Compiler? A compiler is software (a program) that translates a high-level programming language to machine.
Ganga/Dirac Data Management meeting October 2003 Gennady Kuznetsov Production Manager Tools and Ganga (New Architecture)
Software Engineering Algorithms, Compilers, & Lifecycle.
Import existing part with drawing
Introduction To Software Development Environment.
Mock-ups for Discussing the CMS Administrator Interface
Mock-ups for Discussing the CMS Administrator Interface
Stephen W. Liddle, Deryle W. Lonsdale, and Scott N. Woodfield
Vision for an Automatically Constructed FH-WoK
Knowledge Based Workflow Building Architecture
Pragmatic Quality Assessment for Automatically Extracted Data
Project Step 2 – A single bit slice of the ALU
Mock-ups for Discussing the CMS Administrator Interface
Writing functions in MATLAB
MXNet Internals Cyrus M. Vahid, Principal Solutions Architect,
C6: Introducing Native Invocation with the OpenEdge® Adapter for Sonic™ ESB Chris James Senior Consultant.
Fundamental Operation
(Semi)automatic Extraction of Genealogical Information from Scanned & OCRed Historical Documents Elder David W. Embley.
LMC Little Man Computer What do you know about LMC?
MEGN 537 – Probabilistic Biomechanics Running NESSUS with “Big Models”… that have many support files Anthony J Petrella, PhD.
See requirements for practice program on next slide.
Project Step 2 – A single bit slice of the ALU
Internal components of a computer.
Project Step 2 – A single bit slice of the ALU
Presentation transcript:

FROntIER ListReader OntoSoar GreenFIE COMET High-Level Architecture Model

Child(c) is child of Person(p), Person(c) has BirthDate(cb), Person(p) has BirthDate(pb), person’s Age(cb-pb) at child’s birth has probability(pr))  Person(p)’s Age(a) at Child(c)’s birth has Probability(pr)

COMET

FROntIER ListReader OntoSoar GreenFIE Constraint Enforcer

 Constraint Checker ◦ Model builder  Input the model and data  Outputs DOM ◦ Constraint compiler produces list of constraints  A constraint is a command ◦ Each constraint contains  A checker – compute probabilities  One or more handlers – each determines if there are constraint violations and reacts accordingly

 Because of constraint compiler ◦ Constraints are declarative  Not hard wired into the constraint checker  Pluggable nature of components ◦ Using a configuration file we can add  General constraints – compiled by constraint compiler  Checkers – assigned to constraints  Handler – assigned to constraints  By feeding the constraint checker a different model, it can be used with a different application

for(Constraint constraint : constraints) Constraint.execute()

 Mary Ely is child of Mary Eliza Warner  Mary Ely has Birthdate(1836)  Mary Eliza Warner has Birthdate(1826)  Mary Eliza Warner’s Age(10) at Mary Ely’s birth has Probability(0.05%)

 Automatic generation of executable constraints  Use of probability-distribution constraints  Flexible  We can suggest reasons for constraint violation  To work with other applications, we just change the model