An Onion of Documents and Metadata

Author(s):  
D. Matthew Kelleher ◽  
Albert J. Klein ◽  
James David Mason

When a product cannot be tested as a finished unit, its warranty, as it were, depends on extensive testing of its component parts and assemblies. The record for products of the Y-12 National Security Complex has for many years been in the form of lengthy paper documents. Recently we have begun a process to capture some of this information in XML documents. However, this is not simply another XML publishing project. Because our products have a potentially very long shelf life and we cannot foresee the computing environment in their distant future existence, we must take extraordinary measures to document not only the products themselves but also the environment in which the documentation has been prepared. Adding complexity to this documentation challenge is a parallel effort to capture the output data of test equipment and wrap it in XML. While this project is very much a work in progress, we can see that one major component of its possible success will be the coordination of complex metadata.

2003 ◽  
Vol 10 (19) ◽  
Author(s):  
Christian Kirkegaard ◽  
Anders Møller ◽  
Michael I. Schwartzbach

XML documents generated dynamically by programs are typically represented as text strings or DOM trees. This is a low-level approach for several reasons: 1) Traversing and modifying such structures can be tedious and error prone; 2) Although schema languages, e.g. DTD, allow classes of XML documents to be defined, there are generally no automatic mechanisms for statically checking that a program transforms from one class to another as intended. We introduce X<small>ACT</small>, a high-level approach for Java using XML templates as a first-class data type with operations for manipulating XML values based on XPath. In addition to an efficient runtime representation, the data type permits static type checking using DTD schemas as types. By specifying schemas for the input and output of a program, our algorithm will statically verify that valid input data is always transformed into valid output data and that no errors occur during processing.


Author(s):  
Ari Nordström

Profiling is an often-used XML publishing technique where nodes are marked as conditional according to a set of profiles, identified using attribute values as filtering conditions. When publishing, the nodes are only included if the publishing conditions match the publishing context. The profiles are sometimes also used as variables in text content, including the attribute value in the publication. While useful, these techniques have a number of problems. For example, if the attribute values need to be changed, the new values usually require converting any “live” legacy documentation to the new values, changing the schema, stylesheets, etc, and supporting both the old and new profiles will not be possible. This paper takes a look at profiling, some of the common problems and suggest ways to solve those problems. An abstraction layer solves this. The profile values are not used directly; instead they represent a specific “semantic profile”. The abstraction layer can be expressed using URNs that are matched to human-readable values when required. A different problem arises when handling XML documents with structures not in our control. The document might be from a third party and not be editable directly, or use incompatible profiling semantics. These documents can be profiled using out-of-line profiling, describing the conditions outside the document, for example, in an extended XLink linkbase listing the nodes and their profiles. XLink, as it turns out, is well suited for this.


Author(s):  
Nathan Wong ◽  
Kevin Gucwa ◽  
Harry H. Cheng

An interactive, web-based C/C++ computing environment has been developed to facilitate programming education. An editor with syntax highlighting is provided for students to solve the educational lessons designed to introduce computer programming concepts. The system uses SafeCh, a secure C/C++ interpreter that sandboxes the user to protect against server access, to execute code written by the user. Node.js, a JavaScript framework, is used to interface with SafeCh to redirect user input and output data from client to server and vice versa, creating an interactive programming environment. Users are able to access the learning environment conveniently using any internet-enabled device, including mobile phones and tablets. Most other web-based interactive programming tutorials teach scripting languages such as Python or JavaScript. The few existing web tutorials for C/C++ use server-side compilation and thus lack the same interactivity as is available with this system. Given the increasing popularity of programming education events such as Hour of Code, this web-based computing system can be a simple, interactive method to introduce and teach C/C++.


1976 ◽  
Vol 32 ◽  
pp. 109-116 ◽  
Author(s):  
S. Vauclair

This paper gives the first results of a work in progress, in collaboration with G. Michaud and G. Vauclair. It is a first attempt to compute the effects of meridional circulation and turbulence on diffusion processes in stellar envelopes. Computations have been made for a 2 Mʘstar, which lies in the Am - δ Scuti region of the HR diagram.Let us recall that in Am stars diffusion cannot occur between the two outer convection zones, contrary to what was assumed by Watson (1970, 1971) and Smith (1971), since they are linked by overshooting (Latour, 1972; Toomre et al., 1975). But diffusion may occur at the bottom of the second convection zone. According to Vauclair et al. (1974), the second convection zone, due to He II ionization, disappears after a time equal to the helium diffusion time, and then diffusion may happen at the bottom of the first convection zone, so that the arguments by Watson and Smith are preserved.


Author(s):  
Klaus-Ruediger Peters

Differential hysteresis processing is a new image processing technology that provides a tool for the display of image data information at any level of differential contrast resolution. This includes the maximum contrast resolution of the acquisition system which may be 1,000-times higher than that of the visual system (16 bit versus 6 bit). All microscopes acquire high precision contrasts at a level of <0.01-25% of the acquisition range in 16-bit - 8-bit data, but these contrasts are mostly invisible or only partially visible even in conventionally enhanced images. The processing principle of the differential hysteresis tool is based on hysteresis properties of intensity variations within an image.Differential hysteresis image processing moves a cursor of selected intensity range (hysteresis range) along lines through the image data reading each successive pixel intensity. The midpoint of the cursor provides the output data. If the intensity value of the following pixel falls outside of the actual cursor endpoint values, then the cursor follows the data either with its top or with its bottom, but if the pixels' intensity value falls within the cursor range, then the cursor maintains its intensity value.


2007 ◽  
Vol 38 (3) ◽  
pp. 1-92
Author(s):  
CHRISTINE KILGORE
Keyword(s):  

2007 ◽  
Vol 40 (7) ◽  
pp. 16-17
Author(s):  
CHRISTINE KILGORE
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document