The document summarizes the key ideas from the book "The Programmer's Apprentice" which aimed to provide software engineers with intelligent computer assistance. It discusses the concepts of clichés, the Plan Calculus representation, and overlays which allow relationships between clichés to be represented. The system demonstrated capabilities like shared knowledge, automated documentation, and programming language independence through the use of these concepts.
Objeto de conferencia
III International Conference on New Horizons in Education (INTE) (Praga, República Checa)
This work presents an open source web environment to learn GPSS language in Modeling and Simulation courses. With this environment, students build their models by selecting entities and configuring them instead of programming GPSS codes from scratch. Teachers can also create models so that students can apply, analyze and interpret results. Thus, it includes a simulation engine that stores snapshots of models as they are executed, and allows students to navigate through these snapshots. The environment may be combined with existing learning management systems.
Ver registro completo en: http://sedici.unlp.edu.ar/handle/10915/25674
Implementing Web Applications as Social Machines Composition: a Case StudyKellyton Brito
With the evolution of the web and the concepts of web 3.0 as known as programmable web, several issues need to be studied in order to develop, deploy and use this new kind of application in a more effective way, such as communication between systems, unstructured data and non-scalable protocols, among others issues. In this regard, a new concept – named Social Machines – emerged to describe web based information systems that interact for a common purpose. In order to apply and validate in practice this new model, in this paper we describe a case study which implements a web application that is a composition of several public and well-known services from different application domains, such as Wikipedia, Flickr, Twitter, Google Places and Google Maps, following the Social Machines’ model. In the end, we present the results and some improvement suggestions for the model.
[2015/2016] Introduction to software architectureIvano Malavolta
This presentation is about a lecture I gave within the "Software systems and services" immigration course at the Gran Sasso Science Institute, L'Aquila (Italy): http://cs.gssi.infn.it/.
http://www.ivanomalavolta.com
Objeto de conferencia
III International Conference on New Horizons in Education (INTE) (Praga, República Checa)
This work presents an open source web environment to learn GPSS language in Modeling and Simulation courses. With this environment, students build their models by selecting entities and configuring them instead of programming GPSS codes from scratch. Teachers can also create models so that students can apply, analyze and interpret results. Thus, it includes a simulation engine that stores snapshots of models as they are executed, and allows students to navigate through these snapshots. The environment may be combined with existing learning management systems.
Ver registro completo en: http://sedici.unlp.edu.ar/handle/10915/25674
Implementing Web Applications as Social Machines Composition: a Case StudyKellyton Brito
With the evolution of the web and the concepts of web 3.0 as known as programmable web, several issues need to be studied in order to develop, deploy and use this new kind of application in a more effective way, such as communication between systems, unstructured data and non-scalable protocols, among others issues. In this regard, a new concept – named Social Machines – emerged to describe web based information systems that interact for a common purpose. In order to apply and validate in practice this new model, in this paper we describe a case study which implements a web application that is a composition of several public and well-known services from different application domains, such as Wikipedia, Flickr, Twitter, Google Places and Google Maps, following the Social Machines’ model. In the end, we present the results and some improvement suggestions for the model.
[2015/2016] Introduction to software architectureIvano Malavolta
This presentation is about a lecture I gave within the "Software systems and services" immigration course at the Gran Sasso Science Institute, L'Aquila (Italy): http://cs.gssi.infn.it/.
http://www.ivanomalavolta.com
User Centered Design Patterns and Related Issues – A ReviewWaqas Tariq
A design pattern describes possible good solutions to common problems within certain context. This is done by describing the invariant qualities of all those solutions where good patterns improve with time and widespread use. In this research paper some existing user centered design patterns and their issues are discussed. We have studied many user centered design patterns; however most of them do not provide diagrammatic solutions which can be implementable. It is observed that there is a need of a design pattern which can address issues specifically related to Open Source Software (OSS) users.
Lecture Slides from the 2nd Lecture in "Social Learning and Knowledge Sharing Technologies" about Social Patterns & Graph Theories
Lecture at TU Darmstadt - Multimedia Communications Lab
Lecturers: Johannes Konert & Christoph Rensing
Industry-Academia Communication In Empirical Software EngineeringPer Runeson
Researchers in software engineering must communicate with industry practitioners, both engineers and managers. Communication may be about collaboration buy-in, problem identification, empirical data collection, solution design, evaluation, and reporting. In order to gain mutual benefit of the collaboration, ensuring relevant research and improved industry practice, researchers and practitioners must be good at communicating. The basis for a researcher to be good at industry-academia communication is firstly to be “bi-lingual”. Understanding and being able to translate between these “languages” is essential. Secondly, it is also about being “bi-cultural”.Understanding the incentives in industry and academia respectively, is a basis for being able to find balances between e.g. rigor and relevance in the research. Time frames is another aspect that is different in the two cultures. Thirdly, the choice of communication channels is key to reach the intended audience.A wide range of channels exist, from face to face meetings, via tweets and blogs, to academic journal papers and theses; each having its own audience and purposes. The keynote speech will explore the challenges of industry-academia communication, based on two decades of collaboration experiences, both successes and failures. It aims to support primarily the academic side of the communication to help achieving industry impact through rigorous and relevant empirical software engineering research.
Synergy of Human and Artificial Intelligence in Software EngineeringTao Xie
Keynote Talk by Tao Xie at International NSF sponsored Workshop on Realizing Artificial Intelligence Synergies in Software Engineering (RAISE 2013) http://promisedata.org/raise/2013/
Slides presented at MODEVAR 2024 co-located with VaMoS 2024: https://modevar.github.io/program/ Thanks to Jessie Galasso and Chico Sundermann for the invitation Abstract: "Variability models (e.g., feature models) are widely considered in software engineering research and practice, in order to develop software product lines, configurable systems, generators, or adaptive systems. Numerous success stories of variability models have been reported in different domains (e.g., automotive, aerospace, avionics) and the applicability broadens. However, the use of variability models is not yet universally adopted… Why? Some examples: variability models are not continuously extracted from projects and artefacts; each time a variability model is used, its expressiveness and language should be specialized; learning-based models are decoupled from variability models; modeling software variability should cover different layers and their interactions, etc. The list is arguably opinionated, incomplete, and based on my own practical experience, but also on observations of existing works. I will give 24 reasons to occupy your day as a researcher or practitioner in the field of variability modeling."
Slides: https://github.com/acherm/24RWVMANYU-VaMoS-MODEVAR/blob/main/vamos2024.md (Markdown content) PDF: https://github.com/acherm/24RWVMANYU-VaMoS-MODEVAR/blob/main/VaMoS2024-MODEVAR.pdf (slides in PDF format)
This seminar lecture, provided at the Gran Sasso Science Institute, provides an overview on software architecture styles, product lines, and my research
Nowadays software systems are essential to the environment of most organizations, and their maintenance is a key point to support business dynamics. Thus, reverse engineering legacy systems for knowledge reuse has become a major concern in software industry. This article, based on a survey about reverse engineering tools, discusses a set of functional and nonfunctional requirements for an effective tool for reverse engineering, and observes that current tools only partly support these requirements. In addition, we define new requirements, based on our group’s experience and industry feedback, and present the architecture and implementation of LIFT: a Legacy InFormation retrieval Tool, developed based on these demands. Furthermore, we discuss the compliance of LIFT with the defined requirements. Finally, we applied the LIFT in a reverse engineering project of a 210KLOC NATURAL/ADABAS system of a financial institution and analyzed its effectiveness and scalability, comparing data with previous similar projects performed by the same institution.
Some Pitfalls with Python and Their Possible Solutions v1.0Yann-Gaël Guéhéneuc
Python is a very popular programming language that comes with many pitfalls. This presentation describes some of these pitfalls, especially when they could trick unsuspecting object-oriented developers. It proposes solutions to these pitfalls, in particular regarding inheritance, which is easily broken because of the implementation choice of Python for explicit delegation, its method resolution order, and its use of the C3 algorithm. It discusses some advantages of using Python, especially regarding meta-classes.
Advice for writing a NSERC Discovery grant application v0.5Yann-Gaël Guéhéneuc
NSERC Discovery grant applications are judged according to four criteria: (1) Excellence of the researcher, (2) Merit of the proposal, (3) Contribution to the training of HQP, and (4) Cost of research. Each criterion has six possible merit indicators: Exceptional, Outstanding, Very strong, Strong, Moderate, and Insufficient. This presentation describes the process from a candidate's point of view and a reviewer's point of view. It discusses funding decisions, including bins and ER vs. ECR. It gives some advice, including graduating PhD students, having a story, and limiting the number of main objectives.
User Centered Design Patterns and Related Issues – A ReviewWaqas Tariq
A design pattern describes possible good solutions to common problems within certain context. This is done by describing the invariant qualities of all those solutions where good patterns improve with time and widespread use. In this research paper some existing user centered design patterns and their issues are discussed. We have studied many user centered design patterns; however most of them do not provide diagrammatic solutions which can be implementable. It is observed that there is a need of a design pattern which can address issues specifically related to Open Source Software (OSS) users.
Lecture Slides from the 2nd Lecture in "Social Learning and Knowledge Sharing Technologies" about Social Patterns & Graph Theories
Lecture at TU Darmstadt - Multimedia Communications Lab
Lecturers: Johannes Konert & Christoph Rensing
Industry-Academia Communication In Empirical Software EngineeringPer Runeson
Researchers in software engineering must communicate with industry practitioners, both engineers and managers. Communication may be about collaboration buy-in, problem identification, empirical data collection, solution design, evaluation, and reporting. In order to gain mutual benefit of the collaboration, ensuring relevant research and improved industry practice, researchers and practitioners must be good at communicating. The basis for a researcher to be good at industry-academia communication is firstly to be “bi-lingual”. Understanding and being able to translate between these “languages” is essential. Secondly, it is also about being “bi-cultural”.Understanding the incentives in industry and academia respectively, is a basis for being able to find balances between e.g. rigor and relevance in the research. Time frames is another aspect that is different in the two cultures. Thirdly, the choice of communication channels is key to reach the intended audience.A wide range of channels exist, from face to face meetings, via tweets and blogs, to academic journal papers and theses; each having its own audience and purposes. The keynote speech will explore the challenges of industry-academia communication, based on two decades of collaboration experiences, both successes and failures. It aims to support primarily the academic side of the communication to help achieving industry impact through rigorous and relevant empirical software engineering research.
Synergy of Human and Artificial Intelligence in Software EngineeringTao Xie
Keynote Talk by Tao Xie at International NSF sponsored Workshop on Realizing Artificial Intelligence Synergies in Software Engineering (RAISE 2013) http://promisedata.org/raise/2013/
Slides presented at MODEVAR 2024 co-located with VaMoS 2024: https://modevar.github.io/program/ Thanks to Jessie Galasso and Chico Sundermann for the invitation Abstract: "Variability models (e.g., feature models) are widely considered in software engineering research and practice, in order to develop software product lines, configurable systems, generators, or adaptive systems. Numerous success stories of variability models have been reported in different domains (e.g., automotive, aerospace, avionics) and the applicability broadens. However, the use of variability models is not yet universally adopted… Why? Some examples: variability models are not continuously extracted from projects and artefacts; each time a variability model is used, its expressiveness and language should be specialized; learning-based models are decoupled from variability models; modeling software variability should cover different layers and their interactions, etc. The list is arguably opinionated, incomplete, and based on my own practical experience, but also on observations of existing works. I will give 24 reasons to occupy your day as a researcher or practitioner in the field of variability modeling."
Slides: https://github.com/acherm/24RWVMANYU-VaMoS-MODEVAR/blob/main/vamos2024.md (Markdown content) PDF: https://github.com/acherm/24RWVMANYU-VaMoS-MODEVAR/blob/main/VaMoS2024-MODEVAR.pdf (slides in PDF format)
This seminar lecture, provided at the Gran Sasso Science Institute, provides an overview on software architecture styles, product lines, and my research
Nowadays software systems are essential to the environment of most organizations, and their maintenance is a key point to support business dynamics. Thus, reverse engineering legacy systems for knowledge reuse has become a major concern in software industry. This article, based on a survey about reverse engineering tools, discusses a set of functional and nonfunctional requirements for an effective tool for reverse engineering, and observes that current tools only partly support these requirements. In addition, we define new requirements, based on our group’s experience and industry feedback, and present the architecture and implementation of LIFT: a Legacy InFormation retrieval Tool, developed based on these demands. Furthermore, we discuss the compliance of LIFT with the defined requirements. Finally, we applied the LIFT in a reverse engineering project of a 210KLOC NATURAL/ADABAS system of a financial institution and analyzed its effectiveness and scalability, comparing data with previous similar projects performed by the same institution.
Similar to 020523+the+programmers+apprentice.ppt (20)
Some Pitfalls with Python and Their Possible Solutions v1.0Yann-Gaël Guéhéneuc
Python is a very popular programming language that comes with many pitfalls. This presentation describes some of these pitfalls, especially when they could trick unsuspecting object-oriented developers. It proposes solutions to these pitfalls, in particular regarding inheritance, which is easily broken because of the implementation choice of Python for explicit delegation, its method resolution order, and its use of the C3 algorithm. It discusses some advantages of using Python, especially regarding meta-classes.
Advice for writing a NSERC Discovery grant application v0.5Yann-Gaël Guéhéneuc
NSERC Discovery grant applications are judged according to four criteria: (1) Excellence of the researcher, (2) Merit of the proposal, (3) Contribution to the training of HQP, and (4) Cost of research. Each criterion has six possible merit indicators: Exceptional, Outstanding, Very strong, Strong, Moderate, and Insufficient. This presentation describes the process from a candidate's point of view and a reviewer's point of view. It discusses funding decisions, including bins and ER vs. ECR. It gives some advice, including graduating PhD students, having a story, and limiting the number of main objectives.
Ptidej Architecture, Design, and Implementation in Action v2.1Yann-Gaël Guéhéneuc
A set of process, architecture, design, and implementation patterns from a real, large program, the Ptidej Tool Suite. This set shows concrete problems and their solutions in Java. It includes: Be A Profiler, Tests as Documentation, Multi-layered Architecture, Proxy Console, Proxy Disk, Hidden Language, Internal Observer, Run-time Deprecation, String Parsimony, Object Identity, Object Address, Final Construction, StringBuffer as Positioning Element.
Examples of (bad) consequences of a lack of software quality and some solutions. This presentation presents some examples of (bad) consequences of a lack of software quality, in particular how poor software quality led to the direct deaths of 89 people. It then provides some background on software quality, especially the concept of Quality Without a Name. It then discusses many principles, their usefulness, and their positive consequences on software quality. Some of these principles are well-known in object-oriented programming while many others are taken from the book 97 Programmers. They include: abstraction, encapsulation, inheritance, types, polymorphism, SOLID, GRASP, YAGNI, KISS, DRY, Do Not Reinvent the Wheel, Law of Demeter, Beware of Assumptions, Deletable Code, coding with reason, and functional programming. They pertain to dependencies, domains, and tools.
(In details: Beautify is Simplicity, The Boy Scout Rule, You Gotta Care About the Code, The Longevity of Interim Solutions, Beware the Share, Encapsulate Behaviour not Just State, Single Responsibility Principle, WET Dilutes Performance Bottlenecks, Convenience Is Not an -ility, Code in the Language of the Domain, Comment Only What the Code Cannot Say, Distinguish Business Exception from Technical, Prefer Domain-specific Types to Primitive Types, Automate Your Coding Standards, Code Layout Matters, Before You Refactor, Improve Code by Removing It, Put the Mouse Down and Step Away from the Keyboard)
Some Pitfalls with Python and Their Possible Solutions v0.9Yann-Gaël Guéhéneuc
Python is a very popular programming language that comes with many pitfalls. This presentation describes some of these pitfalls, especially when they could trick unsuspecting object-oriented developers. It proposes solutions to these pitfalls, in particular regarding inheritance, which is easily broken because of the implementation choice of Python for explicit delegation, its method resolution order, and its use of the C3 algorithm. It discusses some advantages of using Python, especially regarding meta-classes.
An Explanation of the Unicode, the Text Encoding Standard, Its Usages and Imp...Yann-Gaël Guéhéneuc
Unicode is currently the world standard for encoding text. It supports all of the world's major writing systems. With its version 15.1 of 2023/09/12, it defines 149,813 characters and 161 scripts. This presentation starts with the, seemingly, simple example of the polar bear emoji. It then defines the key terms of any such standard. It then asks how a software system can render orthographic characters into glyphs, i.e., to render characters into (combined) glyphs. It introduces the concept of abstract characters and describes a brief history of encoding standards, from ASCII to Unicode. It shows how, by adding one level of indirection, the Unicode standard answers this question. It then presents code examples to display text written in Unicode: HarfBuzz (for shaping) and FreeType (for rendering).
An Explanation of the Halting Problem and Its ConsequencesYann-Gaël Guéhéneuc
The halting problem is an important, famous, and consequential problem in computer science. It is about writing a program that decides if another problem will stop. There is no general solution to this problem, which shows that such a problem is undecidable, with important consequences: for example, it is not possible to write tests that would exhaustively test entirely an arbitrary program. This presentation was written in collaboration with <a href="https://www.iro.umontreal.ca/~hahn/">Gena Hahn</a>.
A presentation summarising FPGAs, their history, their benefits, and showing how to program them. It provides some historical background on the development of computers, from the Difference Engine to the Intel 4004 to the AMD Ryzen Threadripper PRO 3995WX. It shows how the number of transistors increased dramatically but also how this increase led to more complexity and more bugs. It then introduces Field-programmable gate arrays (FPGA) as an alternative. It then presents how to program such FPGA using data-flow graphs. It discusses some tools (Yosys, NextPnR, and IceStorm) and illustrates them with a typical "Hello World" (i.e., blinking an LED) using Cygwin on Windows 10.
A set of brief presentations of some of the women and men who made the history of computer science and software engineering.
- 1936: Alan Turing
- 1948: Claude Elwood Shannon
- 1950: Grace Murray Hopper
- 1960: John McCarthy
- 1966: Frances E. Allen
- 1967: Ole-Johan Dahl
- 1967: Kristen Nygaard
- 1969: Charles A. R. Hoare
- 1970: Edgar F. Codd
- 1972: Dave Parnas
- 1974: Manny Lehman
- 1975: Frederick Brooks
- 1986: Edward Yourdon
- 1987: Barbara Liskov
- 1994: Erich Gamma
- 1997: Grady Booch
- 2001: Butler Lampson
A tutorial on the history, use, and caveats of Java generics. Using the simple example of an interface for sort algorithms, the tutorial presents the history of generics and describes the problems being solved by generics. It also provides definitions, and examples in Java and C++, and discusses Duck Typing. It then describes two scenarios: (1) Scenario 1: you want to enforce type safety for containers and remove the need for typecasts when using these containers and (2) Scenario 2: you want to build generic algorithms that work on several types of (possibly unrelated) things. It also summarises caveats with generics, in particular type erasure.
A tutorial on reflection, with a particular emphasis on Java, with a comparison with C++, Python, and Smalltalk. It describes different scenarios in which reflection is useful, a brief history of reflection and MOPs, a comparison with C++, Python, and Smalltalk, and some particulars about Java. The source code of the examples in Java (Eclipse project), Smalltalk (Squeak image v3.10.6), Python (Eclipse project), and C++ (Eclipse projects and Visual Studio solution) are available. (C++ Eclipse projects require Mirror.) Big thanks to Matúš Chochlík and Marcus Denker for their kind and precious help with C++ and Smalltalk.
The tutorial focuses on four common problems:
- Avoid using instanceof when code must bypass the compiler and virtual machine’s choice of the method to call.
- Create external, user-defined pieces of code loaded, used, and unloaded at run-time.
- Translate data structures or object states into a format that can be stored (file, network...).
- Monitor the execution of a program to understand its behaviour, and measure its space and time complexity.
It shows working examples of Java, Smalltalk, Python, and C++ code solving the four common problems through four scenarios:
- Scenario 1: invoke an arbitrary method on an object (see the problems with instanceof and plugins).
- Scenario 2: access the complete (including private) state of an object (see the problem with serialisation).
- Scenario 3: count the number of instances of a class created at runtime (see the problem with debugging/profiling).
- Scenario 4: patch the method of a class to change its behaviour (see the problem with patching).
It also discusses the different kinds of interconnections among objects that are available in common programming languages (linking, forking, subclassing, inter-process communication, and dynamic loading/invoking), a bit of theory about reflection, and specifically the class-loading mechanism of Java.
REST APIs are nowadays the de-facto standard for Web applications. However, as more systems and services adopt the REST architectural style, many problems arise regularly. To avoid these repetitive problems, developers should follow good practices and avoid bad practices. Thus, research on good and bad practices and how to design a simple but effective REST API are essential. Yet, to the best of our knowledge, there are only a few concrete solutions to recurring REST API practices, like “API Versioning”. There are works on defining or detecting some practices, but not on solutions to the practices. We present the most up-to-date list of REST API practices and formalize them in the form of REST API (anti)patterns. We validate our design (anti)patterns with a survey and interviews of 55 developers.
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
Listen to the keynote address and hear about the latest developments from Rachana Ananthakrishnan and Ian Foster who review the updates to the Globus Platform and Service, and the relevance of Globus to the scientific community as an automation platform to accelerate scientific discovery.
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
Navigating the Metaverse: A Journey into Virtual Evolution"Donna Lenk
Join us for an exploration of the Metaverse's evolution, where innovation meets imagination. Discover new dimensions of virtual events, engage with thought-provoking discussions, and witness the transformative power of digital realms."
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
GraphSummit Paris - The art of the possible with Graph TechnologyNeo4j
Sudhir Hasbe, Chief Product Officer, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
We describe the deployment and use of Globus Compute for remote computation. This content is aimed at researchers who wish to compute on remote resources using a unified programming interface, as well as system administrators who will deploy and operate Globus Compute services on their research computing infrastructure.
2. 2
2/40
Charles Rich, Richard C. Waters ;
The Programmer’s Apprentice ;
ACM Press – Frontier Series,
Addison-Wesley,
ISBN 0-201-52425-2,
1990.
3. 3
3/40
Why this book?
It covers software engineering and
artificial intelligence
Theoretical and practical
Notion of “patterns” in 1975!
– 12 years before 1987…
– 20 years before the GoF…
Much inspiration for our projects
In particular, they tackled problems similar to ours, except that their solutions are
for Lisp and Ada, while our projects relate to object-oriented programming
languages.
5. 5
5/40
Context and philosophy
1975 – 1990
Artificial Intelligence
Software engineering
LISP and Ada
IBM’s Harlan Mills idea of
chief programmer teams
Study how software engineers analyze, synthesize, modify, specify, verify, and
document.
Artificial intelligence techniques to support software engineers.
Software engineering as a domain for investigating fundamental issues in
knowledge representation and reasoning.
Expert software engineers are surrounded by support staffs of human assistants
(junior programmers, testers, documentation writers, program librarians).
6. 6
6/40
Goal (1/2)
“[…] to provide software engineers with
intelligent assistance.” (p. 2)
“The intended interaction between a
software engineer […] is modeled after
interaction with a human assistant.”
(p. 2)
Here and in the following, all bold emphasises mine.
“Our goal is to provide every software engineer with a support team in the form
of an intelligent computer program […].” (p. 2)
“The engineer will make the important design decision and communicate them to
the Apprentice. The Apprentice will check for consistency and reasonableness
[…].” (p. 3)
Differences with a compiler. (p. 3)
No effort on the human interface, the communication with the Apprentice takes
place in the development environment through a specific command area. (p. 3-4)
Incremental automation through access to both the Apprentice and the underlying
development environment. (p. 4)
7. 7
7/40
Goal (2/2)
“Between the engineer and the
Apprentice […], the key to effective
cooperation is shared knowledge.” (p. 4)
Shared knowledge
– About the system being worked on
– About concepts of software engineering
⇒ Clichés
“This knowledge is of two kinds.” (p. 4)
“[…] this information […] must be stored on-line and in a form that can be
reasoned about.” (p. 4)
“It would be impossibly tedious if the Apprentice required engineers to describe
everything from first principles.” (p. 4)
8. 8
8/40
Key notion: Clichés (1/7)
In all engineering domains exist
standard, well-understood, primitive
building blocks
That’s a statement…
9. 9
9/40
Clichés (2/7)
Engineering methods
– Uniform general methods
• Finite element method (ME)
• Floyd-Hoare verification method (CS)
– Inspection methods
• Analysis and synthesis by inspection
Primitive building blocks
+ Inspection methods ⇒ Clichés
Uniform general methods: From first principles (from the ground up, each time).
Inspection methods: Pattern recognition.
Primitive building blocks + Inspection methods ⇒ Notion of clichés.
10. 10
10/40
Clichés (3/7)
Space of software clichés
Graphics
programming Statistical
programming
System
programming
Hardware
Geometry
Statistics
Basictechniques
I/O
methods
Numerical
methods
“The shaded intersection of the three areas represents basic software-engineering
techniques […].” (p. 19)
“The overlap between each pair of elliptical areas […] represents clichés of
intermediate generality.” (p. 20)
“The remaining part of each area […] represents the most specialized clichés.
Note that as software knowledge becomes more specialized, it begins to overlap
with domain knowledge (the dashed circles).” (p. 20)
11. 11
11/40
Clichés (4/7)
Examples
– Information system
– Linear search
“[…] a cliché contains both fixed parts
and parts that vary from one
occurrence of the cliché to the next […],
[it] may also include constraints […].”
(p. 12)
Clichés form the shared technical vocabulary of a discipline.
In literary criticism, cliché is negative; In software engineering, “the repeated use
of the same forms of expression is desirable.” (p. 12)
“Concepts similar to the idea of clichés appear in software engineering in the
work of …” (p. 12)
12. 12
12/40
Clichés (5/7)
Algorithmic clichés ≈ Program templates
“Non-algorithmic clichés are
represented […] using standard frame-
based knowledge representation
techniques […].” (p. 21)
Program templates with special features.
Frame-based knowledge representation techniques?
13. 13
13/40
Clichés (6/7)
Algorithmic clichés are more than
– Program templates
– Abstract syntax trees
Clichés result from an evolution of languages:
“The evolution of programming language is driven by at least two major forces.
One is the desire to move an entire class of decision making from the
programmer to the compiler. […] Language evolution is also driven by the
recognition of common patterns of usage (clichés) in the current language, which
are then incorporated into the syntax of the next language. […] From this point of
view, clichés can be viewed as recommendations for language design. […]
Moreover, this evolutionary process never stops—new clichés always arise at the
next higher level.” (p. 32)
14. 14
14/40
Clichés (7/7)
Key properties of Algorithmic clichés
– Canonical form
– Language independence
– Convenient manipulation
– Expressiveness
A representation of clichés
⇒ The Plan Calculus
“The scenarios […] may create the impression that an algorithmic cliché can be
represented most directly as a program template, i.e., a program text fragment
with holes to be filled in. […] program templates lack four key properties
essential to a knowledge representation for algorithmic clichés: canonical form,
language independence, convenience of manipulation, and expressiveness.”
(p. 23)
Canonical form: Abstract the semantics of program templates.
Language independence: Translation is a language independent form.
(Amortization of clichés libraries over the broadest user community)
(Automation of translation from subsets of Fortran, Cobol, Lisp, and Ada to the
Plan Calculus)
Convenient manipulation:Combination of clichés.
Expressiveness: Constraints on how the holes can be filled in.
15. 15
15/40
Key notion: Plan Calculus (1/6)
“The Plan Calculus is intended to be a
blueprint language for software.” (p. 29)
Formal representation for
– Programs
– Algorithmic clichés
No just another very high-level
programming language
“[…] it depends on exactly what is meant by the term programming language.”
(p. 30)
Programming language:
“To describe computations precisely enough to be executed by a machine”
+
“To serve as a communication medium between program writers and human
readers”
vs. Plan Calculus:
“To describe algorithmic clichés in a canonical, easy-to-combine, and language-
independent form.”
+
“To serve as a medium for the automated manipulation of programs.”
So, both compatible and not compatible.
Detail is often irrelevant to the algorithmic content of the code.
Information must be two-dimensional.
“How best to use graphics in software engineering is still an open research
question.” (p. 31)
The Plan Calculus is like a wide-spectrum language (very high-level languages).
16. 16
16/40
Plan Calculus (2/6)
Representation based on a graph
– Data flow
– Control flow
Genealogy
Subroutines Program generators
MacrosFlowcharts Program schemas
Flowchart schemas Logic
Program transformation Data abstractionFormal grammars
Plan calculus
“[…] it represents data and control flow explicitly.” (p. 24)
“[…] the kind of changes one typically wants to apply to an algorithm
correspond to changes that can be easily applied to a graph […].” (p. 27)
“In the semantics of a conventional programming language, every assignment
statement is a side effect. However, most assignment statements are merely part
of a pattern of assignments and variable references that implement the movement
of data from where it is produced to where it is used.” (p. 27)
“The plan for the enumeration cliché […] captures these constraints by restricting
the types of the corresponding boxes.” (p. 27-28)
Also, various levels of abstraction…
17. 17
17/40
Plan Calculus (3/6)
Parallel with electrical engineering plans
– “[…] a part is […] an operation, a test, or a
datum.” (p. 29)
– “Connections […] are […] data flow and
control flow.” (p. 29)
– “Constraints […] include the preconditions
and postconditions […] and the invariants
of data representations.” (p. 30)
Parts and connections may be more or less abstract.
“These constraints are expressed in the Programmer’s Apprentice using a
standard logical language.” (p. 30)
18. 18
18/40
Plan Calculus (4/6)
Parallel with artificial intelligence plans
– “[…] partial ordering of operations by data
flow and control flow.” (p. 30)
– “[…] symbolic evaluation of plans […]
very similar to symbolic evaluation […] in
planning in artificial intelligence.” (p. 30)
“[…] rather than forcing an arbitrary total ordering.” (p. 30)
19. 19
19/40
Plan Calculus (5/6)
Limits
– Canonical form: “Syntactically distinct
plans should also be semantically
distinct.” (p. 32)
– Non-local flow: Database updates/queries,
exceptional control flow
– Other kind of knowledge: Performance
properties of algorithms, domain
knowledge
Non-local flow: “Harel’s statecharts […] provide a nice solution to this problem
within a graphical formalism.” (p. 34)
Performance properties of algorithms: “Recent work in this area by Kant […]
starts with a program representation similar to the Plan Calculus.” (p. 34)
Domain knowledge: “[…] the problem of representing domain knowledge in
software is in principle equivalent to the general problem of knowledge
representation in artificial intelligence.” (p. 34-35)
20. 20
20/40
Plan Calculus (6/6)
The Plan Calculus defines parts and
connections
⇒ Plan diagrams
Plan diagrams represent clichés within the Plan Calculus .
21. 21
21/40
Key notion: Plan Diagrams (1/2)
The
Negate-if-negative
Cliché
if:negative
T F
then:negate
end:join
T F
“[…] control flow is depicted using arcs with double crosshatch marks between
exit points and entry points.” (p. 43)
22. 22
22/40
Plan Diagrams (2/2)
Parallel execution model
Hierarchical plans
Data plans
Side effects
Recursively defined plans
Relationships between clichés
⇒ Overlays
Parallel execution model: “The meaning of a plan diagram is defined formally as
the set of computation sequences the plan allows […]. However, a useful
intuitive model for plan diagrams is to imagine their direct execution as parallel
data-flow programs.” (p. 46)
Hierarchical: “Plan may contain other plans as parts.” (p. 48)
Data plans: “A data plan […] defines a […] collection of input/output
specifications for standard data structure accessors:
• A constructor […].
• A selector for each part […].
• A alterant for each part […].”
“The naming conventions for these accessors, their inputs, and their outputs, are
illustrated in Figure 4.10.” (p. 51)
“[…] a hierarchical plan may have a mixture of data and computational parts.”
(p. 51)
Side effects: “The formal statement of this condition involves use of a situational
calculus for modeling mutable objects […].” (p. 56)
Recursively defined plans: “Hierarchical plans can be recursively defined, i.e.,
the type of a subplan can be the same as the type of the plan.” (p. 57)
Relationships between clichés: “[…] a sequence can also be viewed as a list in
which the head is the first term o the sequence and the tail is the subsequence
starting as the second term. Similarly, Lisp list are an implementation of lists in
which the head is the car and tail is the cdr of a given cons cell. The facility in
the Plan Calculus for constructing views is called overlays […].” (p. 29)
23. 23
23/40
Key notion: Overlays (1/4)
“Programming knowledge includes
understanding […] relationships
between […] clichés […]” (p. 63)
“[…] such as how an instance of one cliché can be viewed as an instance of
another.” (p. 63)
“An overlay is a pair of plans with a set of correspondences between their parts.”
(p. 63)
“Basically, an overlay asserts than an instance of a plan on the left, viewed
through the correspondences, satisfies the constraints of the plan on the right.”
(p. 63)
24. 24
24/40
Overlays (2/4)
Implementing a specification
if:negative
T F
then:negate
end:join
T F
absolute-value
“The knowledge encoded in an overlay can be used in both the analysis and
synthesis of programs.” (p. 65)
“The repeated application of this recognition process can be thought of as parsing
[…].” (p. 65)
“[…] synthesis by inspection corresponds to using grammar to generate
sentences.” (p. 66)
25. 25
25/40
Overlays (3/4)
Optimization
– “[…] matching the right side and
replacing it by the left side […]” (p.71)
Implementing an abstract data structure
– “This means that the old indexed sequence
of bump-and-update viewed as a list
corresponds to the old input of push […]”
(p. 69)
Overlays also are useful for optimizations and the implementation of abstract
data structures.
26. 26
26/40
Overlays (4/4)
Temporal abstraction
next:apply-function
next:
input:
input:
continue:
generation
generation
generate
output:
*
“• Generate – given a
function (op) and an
initial value (init),
generate produces the
sequence [init, op(init),
op(op(init)), …].” (p. 76)
“A temporal correspondence links a data part in an iterative plan on the left side
of an overlay with a part of type sequence on the right side. The first term of this
temporal sequence is equal to the indicated part if the iterative plan; the second
term is equal to the same part of the recursively defined subplan; and so on
recursively.” (p. 77)
“The benefit of temporal overlays is that they make it possible to view a program
composed of iteration clichés as a composition of sequence functions, which is
much easier to understand and to reason about.” (p. 77)
27. 27
27/40
Overview of the results (1/6)
“The principal benefit of KBEmacs is
illustrated by the ration between the
size of the program […] and the size of
the command […].” (p. 79)
“This ration is seldom less than 2 to 1 and, as shown by the implementation of
the 57-line Ada program UNIT_REPAIR_REPORT using 6 commands […] can
reach 10 to 1 when constructing large programs.” (p. 79)
28. 28
28/40
Overview of the results (2/6)
“KBEmacs demonstrates […] key
capabilities […].” (p. 79)
– Shared knowledge
– Propagation of decisions
– Support for evolution
– Explanation
– Automation of details
– Escape to the surrounding environment
– Programming-language independence
Shared knowledge: Clichés.
Propagation of decisions: Using constraints, KBEmacs determines some of the
consequences of the design decisions.
Support for evolution: Traceability! Higher-level program representation and
manipulation.
Explanation: Automated documentation + Clichés traceability!
Automation of details: KBEmacs ensures clichés are combined correctly.
Escape to the surrounding environment: Text- and syntax-based editing
intermixed with knowledge-based editing.
Programming-language independence: Because of Plan Calculus but no program
translation!
29. 29
29/40
Overview of the results (3/6)
“[…] KBEmacs automatically applies
temporal abstraction to all iterative
programs.” (p. 77)
“KBEmacs tries to forestall problems
[…] by not taking the exact order of
program statements too literally.” (p. 142)
“The code […] is malformed because the expression used to fill the role refers to
the variable UNIT_KEY before it has been given a value. […] However, while
the title role is first […], there is no reason why this has to be so. The two
computations are not ordered by control flow or data flow.” (p. 142)
30. 30
30/40
Overview of the results (4/6)
Architecture of KBEmacs
Interface
Coder
Analyzer
Text editor Plan editor
Program text Program plan
Cliché library
Analyzer: “First, whenever the programmer textually modifies the program being
worked on, the analyzer creates a new plan for the program so that knowledge-
based editing can continue. Second, the analyzer is used to process cliché
definitions to create plans that are stored in the cliché library.” (p. 152)
Coder: “The coder is used to create new program text whenever the plan for the
program being edited is changed.” (p. 156)
31. 31
31/40
Overview of the results (5/6)
“[…] the central weakness of
KBEmacs—it has no general-purpose
reasoning facilities.” (p. 84)
– Error detection
– Reasonableness
– Limited cliché library
– Incomplete analysis
– (Needs reimplementation)
Error detection, no general-purpose reasoning:
“All of KBEmacs’s reasoning is achieved via special-purpose procedures.”
(p. 84)
“[…] KBEmacs has no general way to evaluate the reasonableness of a
programmer’s commands.” (p. 84)
“KBEmacs implements Plan Calculus constraints as procedures, rather than using
a general-purpose logical language.” (p. 84)
Limited cliché library: no support for “taxonomic relationships between clichés
such as specialization and extension.” (p. 84)
Incomplete analysis: Traceability! “This means that after the program text has
been modified, KBEmacs’s ability to explain the program and to modify the
program using knowledge-based commands is subsequently reduced. (p. 85)
32. 32
32/40
Overview of the results (6/6)
Recognizer
– Automated cliché recognition
• Syntactic variation
• Unrecognizable code
• Implementation variation
• Noncontiguousness
• Overlapping implementations
– Flow-graph parser
“There are both practical and theoretical motivations for automating cliché
recognition.” (p. 171)
“[…] a flow-graph parser developed by Brotsky, which is a generalization of
Earley’s algorithm […] for string parsing.” (p. 173)
34. 34
34/40
What the future should have
been…
Full operational KBEmacs
Recognizer using comments and
mnemonic identifiers
“[…] a general-purpose reasoning
system (Cake)” (p. 84)
Teleological structure
Design and Requirements
Apprentices
Plan Calculus
Frames
Algebraic reasoning
Propositional logic
Comments and mnemonic identifiers: “The PUDSY system […] uses variables
names as hints to the clichés that might be present.” (p. 188)
Teleological structure:
“The teleological structure of a plan is the set of dependencies between the
preconditions and postconditions of the specifications for its parts.” (p. 195)
35. 35
35/40
Limits? (1/4)
Clichés
– Implementation-level, parameterized
(micro-, mini-) frameworks
– Many of them
• several hundreds just for the basic techniques
• only a few dozen implemented…
“We estimate that perhaps a thousand clichés are required to reach a reasonable
degree of completeness in basic techniques.” (p. 21)
“The second limitation of KBEmacs’s current cliché library is that it contains
only a few dozen clichés.” (p. 84)
36. 36
36/40
Limits? (2/4)
Clichés
– Cliché implementation (plan diagrams) is
language-dependent! Idioms…
“[…] a textual syntax is provided for
representing roles. […] special forms (in
Lisp and Ada) are provided for defining the
plan for a cliché.” (p. 148)
– Only program templates?
Cliché implementation is language-dependent!?
“This section presents several Ada clichés and contrasts them with their Lisp
counterparts.” (p. 118)
37. 37
37/40
Limits? (3/4)
Clichés and Plan Calculus
– Cliché’s complexity increases as cliché’s
size grows
– Clichés are not really ready for object-
orientation (future research…)
– Side effects express outside of the
language
Side effects: “The formal statement of this condition involves use of a situational
calculus for modeling mutable objects […].” (p. 56)
38. 38
38/40
Limits? (4/4)
Overlays
– How to count the number of elements in a
sequence?
KBEmacs
– Text-based operations/visualisation
– Fuzziness
– Demonstration system
Fuzziness: “KBEmacs tries to forestall problems […] by not taking the exact
order of program statements too literally.” (p. 142)
Demonstration system: “It is useful to distinguish three levels of systems:
demonstrations, prototypes, and fully operational systems.” (p. 168)
39. 39
39/40
And now? (1/2)
Among many others…
– The CatalogExplorer, Explainer, and
Modifier framework (Fisher, 1992)
– The System Architect’s Assistant
(Kramer, 1993)
– Task oriented software understanding
(Erdem, 1998)
– The PatternsBox/Ptidej projects (1999–?)
PatternsBox: http://www.emn.fr/albin/
Ptidej: http://www.yann-gael.gueheneuc.net/
40. 40
40/40
And now? (2/2)
Goal: Programmer’s Apprentice
– Clichés
– Plan Calculus
– Plan diagrams
– Overlays
Implementation: KBEmacs
Design patterns
+
Meta-modelling techniques
+
Constraints
PatternsBox
Ptidej
Design patterns and design defects