• Title/Summary/Keyword: 프롤로그

Search Result 16, Processing Time 0.027 seconds

Prolog Tailoring Technique on Epilog Tailored Procedures (에필로그 테일러된 프로시저를 위한 프롤로그 테일러링 기법)

  • Jhi, Yoon-Chan;Kim, Ki-Chang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.5
    • /
    • pp.1345-1356
    • /
    • 1998
  • Prolog tailoring technique, an optimization method to improve the execution speed of a procedure, is proposed in this paper. When a procedure is frequently and repeatedly called and the machine has a lot of callee-saved registers, optimizing prolog and epilog can become an important step of optimization. Epilg tailoring supported by IBM XL C Compiler has been known to improve procedure's execution speed by reducing register restore instructions on execution paths, but no algorithms for prolog tailoring has been proposed yet. The prolog generated by the prolog tailoring algorithm proposed in this paper executes considerably smaller number of register save instructions at run-time. This means the total number of instructions to be executed is decreased resulting in an improvement on the procedure's execution speed. To maintain the correctness of code, prolog code should not be inserted inside diamond structures of loop structures. This paper proposes a prolog tailoring technique which generates register save instructions at the best position in a control flow graph while not allowing the insertion of any prolog code inside diamond structures of loop structures.

  • PDF

An Efficient Method for Controlling the Number of Proofs in Prolog (프롤로그에서 증명의 수를 효과적으로 제어하기 위한 방법)

  • Nam, Young-Kwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.6
    • /
    • pp.1557-1564
    • /
    • 1997
  • We propose an extension to Prolog called the count term for controlling Prolog execution. The purpose is to allow the programmers as well as the users to have greater flexibility in controlling the execution behavior of Prolog programs and for limiting the number of answers or proofs retrieved when Prolog is used as a database query language. Both syntax and operational semantics of the count term are defined. An implementation strategy based on WAM (Warren Abstract Machine) by modifying instructions related to backtracking behavior has been suggested.

  • PDF

The Specification and Verification Using SPSL about NTFS's Multiuser Privileges (SPSL을 이용한 NTFS 다중 사용 권한에 대한 명세 및 검증)

  • ;;;;;;Dmitry Zegzhda
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.631-633
    • /
    • 2003
  • 시스템의 안전성을 평가하기 위해 프롤로그 기반의 명세 언어인 SPSL을 사용하여 보안 모델을 정형적으로 설계하였다. 보안 모델은 시스템의 3가지 컴포넌트, 시스템 보안 상태(system security states), 접근 통제 규칙(access control rules), 그리고 보안 기준(security criteria)으로 구성된다. 본 논문에서는 NTFS의 다중 사용 권한에 대한 보안 모델을 만들어서 3가지 컴포넌트를 명세하고 안전성 문제 해결 도구인 SPR[1]을 이용하여 검증하였다.

  • PDF

A Study on Mash-Up Service System Using PROLOG (프롤로그를 이용한 메쉬업 서비스 시스템에 관한 연구)

  • Park, Sung-Chul;Kwon, Ki-Hang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.601-604
    • /
    • 2007
  • 공개된 웹 서비스를 가공하여 새로운 서비스를 만들어내는 매쉬업 서비스가 활발하게 개발되어 사용자에게 제공되고 있다. 그러나 이러한 매쉬업 서비스도 프로그래밍 수준에서 이루어지고 있어 매우 제한된 사람만 개발 할 수 있다는 단점이 있다. 본 논문에서는 이러한 메쉬업 서비스를 기술하고, 기술된 서비스를 효과적으로 실행할 수 있는 시스템을 제안한다.

  • PDF

The Safety Evaluation for a Security Model using SPR (SPR를 이용한 보안 모델의 안전성 평가)

  • ;;;;;;Dmitry P. Zegzhda
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.655-659
    • /
    • 2003
  • 시스템의 안전성을 평가하기 위해 안전성 문제 해결 도구인 SPR[1]을 이용하여 보안 모델을 프롤로그 기반의 명세 언어인 SPSL로 기술하여 안전성을 검증한다. 보안 모델은 시스템의 3가지 컴포넌트, 시스템 보안 상태(system security states), 접근 통제 규칙(access control rules), 그리고 보안 기준(security criteria)으로 구성된다. 본 논문에서는 보안 모델의 보안 기준에 NTFS의 다중 사용 권한을 적용하여 명세하고 안전성 문제 해결방법을 제시하고자 한다.

  • PDF

Computational Processing of Korean Dialogue and the Construction of Its Representation Structure Based on Situational Information (상황정보에 기반한 한국어대화의 전산적 처리와 표상구조의 구축)

  • Lee, Dong-Young
    • The KIPS Transactions:PartB
    • /
    • v.9B no.6
    • /
    • pp.817-826
    • /
    • 2002
  • In Korean dialogue honorification phenomenon may occur, an honorific pronoun may be used, and a subject or an object may be completely omitted when it can be recovered based on context. This paper proposes that in order to process Korean dialogue in which such distinct linguistic phenomena occur and to construct its representation structure we mark and use the following information explicitly, not implicitly : information about dialogue participants, information about the speech act of an utterance, information about the relative order of social status for the people involved in dialogue, and information flow among utterances of dialogue. In addition, this paper presents a method of marking and using such situational information and an appropriate representation structure of Korean dialogue. In this paper we set up Korean dialogue representation structure by modifying and extending DRT (Discourse Representation Theory) and SDRT (Segmented Discourse Representation Theory). Futhermore, this paper shows how to process Korean dialogue computationally and construct its representation structure by using Prolog programming language, and then applies such representation structure to spontaneous Korean dialogue to know its validity.

Design of a Business Process Consultant System based on Enterprise Ontology (기업 온톨로지 기반의 비즈니스 프로세스 컨설턴트 시스템 설계)

  • Park, Ji-Hyun;Yang, Jae-Gun;Yoo, Young-Dae;Bae, Jae-Hak J.
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06c
    • /
    • pp.435-438
    • /
    • 2008
  • 본 논문은 기업 온톨로지를 기반으로 하는 비즈니스 프로세스 컨설턴트 시스템(BUPCO)의 설계를 기술한다. BUPCO 시스템은 사용자 인터페이스, 프로세스 표현 도구, 프로세스 평가 도구, 프로세스 분석 도구, 워크플로우 영향분석 도구, 프로세스 시각화 도구로 구성된다. 그 기반에 기업의 프로세스 지식을 표현하기 위해 기업 온톨로지를 구축하고 온톨로지 추론을 위한 프롤로그 추론기를 개발하였다. BUPCO 시스템은 기업 업무 환경의 변화에 빠르게 적응할 수 있는 최적의 프로세스 개선안을 제공하는 것을 목적으로 한다. 이 시스템을 통해 기업은 내부의 각종 비효율성을 제거하고 프로세스와 자원을 최적화함으로써 기업의 경쟁력을 제고시킬 수 있을 것이다.

  • PDF

A implementation and evaluation of Rule-Based Reverse-Engineering Tool (규칙기반 역공학 도구의 구현 및 평가)

  • Bae Jin Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.135-141
    • /
    • 2004
  • With the diversified and enlarged softwares, the issue of software maintenance became more complex and difficult and consequently, the cost of software maintenance took up the highest portion in the software life cycle. We design Reverse Engineering Tool for software restructuring environment to object-oriented system. We design Rule - Based Reverse - Engineering using Class Information. We allow the maintainer to use interactive query by using Prolog language. We use similarity formula, which is based on relationship between variables and functions, in class extraction and restructuring method in order to extract most appropriate class. The visibility of the extracted class can be identified automatically. Also, we allow the maintainer to use query by using logical language. So We can help the practical maintenance. Therefore, The purpose of this paper is to suggest reverse engineering tool and evaluation reverse engineering tool.

  • PDF

Integration and Verification of Privacy Policies Using DSML's Structural Semantics in a SOA-Based Workflow Environment (SOA기반 워크플로우 환경에서 DSML의 구조적 접근방법을 사용한 프라이버시 정책 모델의 통합과 검증)

  • Lee, Yong-Hwan;Jan, Werner;Janos, Sztipanovits
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.139-149
    • /
    • 2009
  • In order to verify that a lot of legal requirements and regulations are correctly translated into software, this paper provides a solution for formal and computable representations of rules and requirements in data protection legislations with a DSML (Domain Specific Modeling Language). All policies are formally specified through Prolog and then integrated with DSML, According to the time of policy verification, this solution has two kinds of policies: static policies, dynamic policies.

  • PDF