Domain specific languages
531 resources related to Domain specific languages
- Topics related to Domain specific languages
- IEEE Organizations related to Domain specific languages
- Conferences related to Domain specific languages
- Periodicals related to Domain specific languages
- Most published Xplore authors for Domain specific languages
The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted papers will be peer reviewed. Accepted high quality papers will be presented in oral and postersessions, will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE
The Conference focuses on all aspects of instrumentation and measurement science andtechnology research development and applications. The list of program topics includes but isnot limited to: Measurement Science & Education, Measurement Systems, Measurement DataAcquisition, Measurements of Physical Quantities, and Measurement Applications.
All areas of ionizing radiation detection - detectors, signal processing, analysis of results, PET development, PET results, medical imaging using ionizing radiation
ICSE is the premier forum for researchers to present and discuss the most recent innovations,trends, outcomes, experiences, and challenges in the field of software engineering. The scopeis broad and includes all original and unpublished results of empirical, conceptual, experimental,and theoretical software engineering research.
The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.
Speech analysis, synthesis, coding speech recognition, speaker recognition, language modeling, speech production and perception, speech enhancement. In audio, transducers, room acoustics, active sound control, human audition, analysis/synthesis/coding of music, and consumer audio. (8) (IEEE Guide for Authors) The scope for the proposed transactions includes SPEECH PROCESSING - Transmission and storage of Speech signals; speech coding; speech enhancement and noise reduction; ...
The IEEE Transactions on Automation Sciences and Engineering (T-ASE) publishes fundamental papers on Automation, emphasizing scientific results that advance efficiency, quality, productivity, and reliability. T-ASE encourages interdisciplinary approaches from computer science, control systems, electrical engineering, mathematics, mechanical engineering, operations research, and other fields. We welcome results relevant to industries such as agriculture, biotechnology, healthcare, home automation, maintenance, manufacturing, pharmaceuticals, retail, ...
Specific topics of interest include, but are not limited to, sequence analysis, comparison and alignment methods; motif, gene and signal recognition; molecular evolution; phylogenetics and phylogenomics; determination or prediction of the structure of RNA and Protein in two and three dimensions; DNA twisting and folding; gene expression and gene regulatory networks; deduction of metabolic pathways; micro-array design and analysis; proteomics; ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...
2008 International Conference on Information Security and Assurance (isa 2008), 2008
In the context of computer systems, an intrusion is generally considered to be a harmful endeavor to prevent others from legitimate use of that system, to obtain data which is not normally available to the intruder, or to plant data or disrupt data already existent on the machines. Traditionally intrusion detection has relied on two data sources: various log files ...
Seventh IEEE International Conference on Advanced Learning Technologies (ICALT 2007), 2007
The aim of this paper is to present a model driven approach for reusing pedagogical scenarios. In the framework of different pedagogical situations, we show how the design context should be expressed in scenarios and how these scenarios could be reused. This approach enhance the teaching expertise capitalization by defining contextualized pedagogical models and by allowing the reuse and the ...
2011 15th International Software Product Line Conference, 2011
Domain-Specific Languages are languages narrowly focused on a particular problem domain. Compared to feature models they are more expressive, but possibly not as easy to use. Compared to source code, they are usually simpler, more targeted and hence easier to use - although not quite as flexible. DSLs can play an important role in PLE, filling the gap between configuration ...
2010 IEEE/IFIP Network Operations and Management Symposium Workshops, 2010
One of the main steps of service assurance is service monitoring using Key Performance Indicators (KPIs) and Service Level Agreements (SLAs). We show an approach for service modeling, first starting with an abstract service model that depends on the network. And then, we show how a corresponding model can be realized using a domain specific language. This solution is able ...
2010 Seventh International Conference on Information Technology: New Generations, 2010
This paper shows how to use state machines and systematic approaches to software modeling to help modeler to improve, verify and validate a Domain Analysis and also refine and improve enterprise business processes. The main objective of this approach is how to systematic got a DSL from a Domain Analysis which can be used code system respecting, all business rules ...
IEEE Internet Initiative
IMS 2011 Microapps - Time Domain Measurements in Waveguide
A perspective shift from Fuzzy logic to Neutrosophic Logic - Swati Aggarwal
When Do We Resort to EC in the Communications Industry, and What is Needed in the Future? - IEEE Congress on Evolutionary Computation 2017
An Interview with Niklaus Emil Wirth, Part 2
Niklaus Wirth on Teaching Computer Science
Spin Dynamics in Inhomogeneously Magnetized Systems - Teruo Ono: IEEE Magnetics Society Distinguished Lecture 2016
EDOC 2010 - Dr. Benjamin Grosof Keynote
Rebooting Computing Week 2018 - IRDS, ICRC, and Industry Summit on the Future of Computing
An Interview with Niklaus Emil Wirth, Part 3
An Interview with Delores Etter, Part Two: IEEE VIC Summit 2018
Learning with Kernels for Streams of Structured Data
An Interview with Niklaus Emil Wirth, Part 1
Computing Conversations: Bertrand Meyer: Eiffel Programming Language
Computing Conversations: Rasmus Lerdorf Interview on Creating PHP
IEEE 5G World Forum 30 September - 02 October 2019 in Dresden Germany
Conformity Assessment: A Process - Rudi Schubert, IEEE Standards Association
Patentable Subject Matter and Software Patents - IEEE USA
Performance Analytics, Valuation Trends & the M&A Market
In the context of computer systems, an intrusion is generally considered to be a harmful endeavor to prevent others from legitimate use of that system, to obtain data which is not normally available to the intruder, or to plant data or disrupt data already existent on the machines. Traditionally intrusion detection has relied on two data sources: various log files which record user's activity, and network traffic which contains potential threats. This research presents a system which we call IDEA; the Intrusion DEtection Automata system. We utilize a third source of data for intrusion detection in the form of an instrumented process. Open source software is recompiled using a modified compiler we have created, and the resulting executable program generates the data as it runs. An external monitoring facility then checks the behavior of the program against known good execution paths. These paths are specified either using a domain specific language and hand-written rules, or by running the software in a learning mode and capturing the normal behavior for later comparison.
The aim of this paper is to present a model driven approach for reusing pedagogical scenarios. In the framework of different pedagogical situations, we show how the design context should be expressed in scenarios and how these scenarios could be reused. This approach enhance the teaching expertise capitalization by defining contextualized pedagogical models and by allowing the reuse and the customization of these models and the relevant scenarios.
Domain-Specific Languages are languages narrowly focused on a particular problem domain. Compared to feature models they are more expressive, but possibly not as easy to use. Compared to source code, they are usually simpler, more targeted and hence easier to use - although not quite as flexible. DSLs can play an important role in PLE, filling the gap between configuration via feature models and low-level programming. This tutorial covers approaches, tools and experiences of using DSLs in PLE. I will start with briefly introducing DSLs and their role in PLE. We will then look at a real-world DSL that has been used to describe a product line of electrical devices. We will then spend some time extending a DSL built with Eclipse Xtext to get some hands-on tool experience. Then we will look at another DSL, one for robot control, that integrates nicely with feature models. We will then finally spend some time extending a DSL build with JetBrains MPS, before we wrap up the tutorial.
One of the main steps of service assurance is service monitoring using Key Performance Indicators (KPIs) and Service Level Agreements (SLAs). We show an approach for service modeling, first starting with an abstract service model that depends on the network. And then, we show how a corresponding model can be realized using a domain specific language. This solution is able to condense various sources of service model requirements into a condense formal and executable model including service decomposition and KPI aggregation. We have described this solution in the context of Magneto project and uses IPTV as a service in our description.
This paper shows how to use state machines and systematic approaches to software modeling to help modeler to improve, verify and validate a Domain Analysis and also refine and improve enterprise business processes. The main objective of this approach is how to systematic got a DSL from a Domain Analysis which can be used code system respecting, all business rules without complex definitions or documents. Many problems of Computer Software Systems (CSS) are derived from a lack of its behavior specification in order to solve that problem, but even with a well defined system behavior, many business rules are not properly treated since formalization becomes on the design phase. This paper shows an approach on how to systematically refine domain analysis to consider all business rules. It considers a state machine which represent all aspects of the domain choice. The state machines use is based on user friendliness and formality.
Programming is a process of formalizing and codifying knowledge, and, as a result, programming languages are designed for generalists trained in this process of formalization. Artists, whose training focuses on skill and tacit knowledge, are marginalized by existing tools. By designing visual languages that take advantage of an artist's skills in visual perception and expression, we can allow that artist to take advantage of the expressive potential that modern computing offers. In particular, this paper will look at lighting design for interactive, virtual environments, and augmenting an existing programming language to allow artists to leverage their skills in the pragmatics of that medium.
Using domain-specific languages, scientific codes can let users work directly with equations and benefit from optimizations not available with general compilers.
This paper introduces a new approach to the automation of realtime embedded systems modeling. Our approach is based on a new domain-specific language called AutoModel to specify the requirements of a system in terms of its components, goals and constraints. Our automated approach accepts the specified requirements and infers both structural and behavioral models to implement the requirements in the UML-RT modelling language. Existing modeling tools can then be used to generate an implementation from the inferred models without extra work.
It is pointed out that many translation schemes from domain-specific languages to supposedly functionally equivalent VDHL (VHSIC hardware description language) have been developed as an approach to simulation. However, due to a subtle theoretical limitation to this approach, functionally equivalent VHDL cannot be created for the general case, making such translations an unsound technique. The authors propose an alternative approach which strives instead for functionally equivalent simulation, while still taking advantage of VHDL simulators. This method uses a novel time-shift transformation in conjunction with any translation scheme, making correct simulations easily obtainable. This bridges the gap to a sound and advantageous use of VHDL as a tool for simulating domain-specific languages.<<ETX>>
Along with the evolution of computer technology, language oriented programming came out as a revolutionary progress which beyond the object-oriented programming. In current object-oriented programming, the general modeling language UML lacks of rich syntax and semantics in the specific domain. Developing and using domain specific language model in the progress of language oriented programming can solve this problem well. By constructing a executable model based on the MOF, defining an abstract syntax model and an concrete syntax model and extending semantics, this paper designs a telecommunication topology modelling language TML which based on the MOF metamodel .TML contains rich syntax, semantics and constraints which are telecommunication domain specific, and has the executable feature, thus it greatly simplifies the complexity of system modelling in domain and enhances the efficiency of software production.
No standards are currently tagged "Domain specific languages"