A Rule-based Approach for Animating Java']Java Algorithms

被引:4
|
作者
Sharaf, Nada [1 ]
Abdennadher, Slim [1 ]
Fruehwirth, Thom [2 ]
机构
[1] German Univ Cairo, Dept Comp Sci & Engn, Cairo, Egypt
[2] Univ Ulm, Inst Software Engn & Compiler Construct, Ulm, Germany
关键词
!text type='Java']Java[!/text] Programs; Visual Language; Constraint Handling Rules; Algorithm Animation;
D O I
10.1109/IV.2016.55
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Over the past years, visualization of programs has been widely applied. Algorithm animation was proven to aid in teaching and learning. It provides a convenient medium for beginners to a programming language by giving them the ability to visually discover how their programs are running. It also provides experts of a language with a means to have a visual trace utility. Lately, a new approach for adding visualization features into Constraint Handling Rules (CHR) programs was proposed. The new methodology was a dynamic one able to animate different types of algorithms. The work in this paper aims at introducing a revised extension that is able to embed visualization features into Java programs. With the new extension, Java algorithms could be animated without the need of doing any modifications to the code. In addition, the provided technique is still a general one able to animate different kinds of algorithms.
引用
收藏
页码:141 / 145
页数:5
相关论文
共 50 条
  • [41] A Java']Java Card Based Approach for Smart Meter Gateway Security
    Piska, Srinivas
    Shetty, Manasa
    [J]. 2013 IEEE INNOVATIVE SMART GRID TECHNOLOGIES - ASIA (ISGT ASIA), 2013,
  • [42] OSS through Java']Java - a standards-based approach to integration
    Hardwicke, J
    Naughton, B
    Holmes, PE
    [J]. BT TECHNOLOGY JOURNAL, 2005, 23 (03) : 111 - 120
  • [43] The MICROBE benchmarking toolkit for Java']Java: a component-based approach
    Kurzyniec, D
    Sunderam, V
    [J]. COMPUTATIONAL SCIENCE-ICCS 2002, PT II, PROCEEDINGS, 2002, 2330 : 709 - 719
  • [44] A Specification-Based Approach to the Testing of Java']Java Memory Bloat
    Qian, Ju
    Zhou, Xiaoyu
    Dang, Wanchun
    Wang, Ziyuan
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2016), 2016, : 347 - 352
  • [45] A state exploration-based approach to testing Java']Java monitors
    Lei, Yu
    Carver, Richard
    Kung, David
    Gupta, Vidur
    Hernandez, Monica
    [J]. ISSRE 2006:17TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2006, : 256 - +
  • [46] Parametric polymorphism in Java']Java: An approach to translation based on reflective features
    Viroli, M
    Natali, A
    [J]. ACM SIGPLAN NOTICES, 2000, 35 (10) : 146 - 165
  • [47] The pangreh praja in Java']Java under Japanese military rule
    Shigeru, S
    [J]. BIJDRAGEN TOT DE TAAL- LAND- EN VOLKENKUNDE, 1996, 152 (04): : 586 - 608
  • [48] Leadership on Java']Java: Gentle hints, authoritarian rule.
    Singh, LP
    [J]. JOURNAL OF SOUTHEAST ASIAN STUDIES, 2000, 31 (01) : 204 - 205
  • [49] Vulnerabilities Constraint Based Analysis Approach for Java']Java Bytecode Programs
    Achour, Safaa
    Benattou, Mohammed
    [J]. PROCEEDINGS OF 2018 6TH INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2018, : 93 - 98
  • [50] A Patterns based reverse engineering approach for Java']Java source code
    Couto, Rui
    Ribeiro, Antonio Nestor
    Campos, Jose Creissac
    [J]. PROCEEDINGS OF THE 2012 IEEE 35TH SOFTWARE ENGINEERING WORKSHOP (SEW 2012), 2012, : 140 - 147