Software Evolution: a Requirements Engineering Approach

Total Page:16

File Type:pdf, Size:1020Kb

Software Evolution: a Requirements Engineering Approach Software Evolution: a Requirements Engineering Approach by Neil Alexander Ernst A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department of Computer Science University of Toronto Copyright c 2012 by Neil Alexander Ernst Abstract Software Evolution: a Requirements Engineering Approach Neil Alexander Ernst Doctor of Philosophy Graduate Department of Computer Science University of Toronto 2012 This thesis examines the issue of software evolution from a Requirements Engineering perspective. This perspective is founded on the premise that software evolution is best managed with reference to the requirements of a given software system. In particular, I follow the Requirements Problem approach to software development: the problem of developing software can be characterized as finding a specification that satisfies user requirements, subject to domain constraints. To enable this, I propose a shift from treating requirements as artifacts to treating requirements as design knowledge, embedded in knowledge bases. Most requirements today, when they exist in tangible form at all, are static objects. Such artifacts are quickly out of date and difficult to update. Instead, I propose that requirements be maintained in a knowledge base which supports knowledge-level operations for asserting new knowledge and updating existing knowledge. Consistency checks and entailment of new specifications is done automatically by answering simple queries. Maintaining a requirements knowledge base in parallel with running code means that changes precipitated by evolution are always addressed relative to the ultimate purpose of the system. This thesis begins with empirical studies which establish the nature of the requirements evolution problem. I use an extended case study of payment cards to motivate the following discussion. I begin at an abstract level, by introducing a requirements engineering knowledge base (REKB) using a functional specification. Since it is functional, the specifics of the implementation are left open. I then describe one implementation, using a reason-maintenance system, and show how this implementation can a) solve static requirements problems; b) help stakeholders bring requirements and implementation following a change in the requirements problem; c) propose paraconsistent reasoning to support inconsistency tolerance in the REKB. The end result of my work on the REKB is a tool and approach which can guide software developers and software maintainers in design and decision-making in the context of software evolution. ii Ignoramus et ignorabimus ... \we do not know and will not know" We must not believe those, who today, with philosophical bearing and deliberative tone, prophesy the fall of culture and accept the ignorabimus. For us there is no ignorabimus, and in my opinion none whatever in natural science. In opposition to the foolish ignorabimus our slogan shall be: Wir m¨ussenwissen { wir werden wissen! (`We must know { we will know!') { David Hilbert iii Acknowledgements Many people have helped shaped this, the final result of my student years. This thesis may have my name on it but the majority of the work was done in the best traditions of scientific collaboration. I would like to thank my committee members Steve Easterbrook and Kelly Lyons, as well as erstwhile member Greg Jamieson, for excellent advice on scope and direction. My external examiner, Vincenzo Gervasi, made substantial improvement possible through his insightful comments. In particular I wish to thank Jorge Aranda, Yiqiao Wang, Alexei Lapouchnian, Jennifer Horkoff and Rick Salay for always answering my questions and provoking yet more. The consistent high standards of our lab are an inspiration and a challenge. Thanks to Abram Hindle for being a truly collaborative research partner. I was fortunate enough to spend three months visiting the University of Trento, and made great friends there, including Fabiano Dalpiaz, Amit Chopra, Raian Ali, Vitor Souza, Michele Vescovi and Alberto Griggio. I am indebted to them for welcoming me to the group, and making me feel at home. To Ivan Jureta, your commitment to the issue of the requirements problem has made my own work much stronger. For Alex Borgida, my co-supervisor, many thanks for your patience and interest. In explaining things to you I inevitably clarified my own thinking dramatically. Thank you for being understanding of a geographer turned part-time language designer. And naturally, many thanks to my co-supervisor and mentor, John Mylopoulos. Oftentimes I would pay too little heed to what you advised; it inevitably turned out to be the right approach. Any use of the personal pronoun herein should be seen as convention, because both Alex and John have greatly contributed to, helped with, and influenced all my work. My family have always been there for me, unquestioningly supportive. Sometimes it is nice not to have to explain things. To Kambria, \Love is not a big enough word. It's not a big enough word for how I feel about my wife." For Elliott, who wasn't yet there in person but was great motivation to wrap things up, and for Kieran, for showing me that thesis writing can be fun if you occasionally pause to enjoy the simple things, like throwing a ball. This thesis is dedicated to you guys. iv Contents 1 Introduction 1 1.1 Software Must Accommodate Unanticipated Change . .1 1.2 Software Development Solves Requirements Problems . .5 1.3 Research Questions and Contributions . .6 1.4 Publications . 10 2 Preliminaries 12 2.1 Goal Modeling in Requirements Engineering . 12 2.1.1 Turning Stakeholder Desires Into Goals . 13 2.1.2 The Requirements Problem in Techne ......................... 14 2.2 Formal Background . 19 2.2.1 Syntax of Propositional Logic . 19 2.2.2 Rules of Inference . 20 2.2.3 Semantics of Propositional Logic . 20 2.2.4 Abduction . 21 2.2.5 Propositional Satisfiability . 22 2.2.6 Belief Revision . 22 2.3 Knowledge Level Models . 23 3 Related Work 25 3.1 Historical Developments . 25 3.2 Evolution and Industrial Tools . 29 3.3 Implementation-level Approaches . 31 3.4 Studies of Evolving Requirements in Industrial Settings . 31 3.5 Current Approaches . 33 v 4 Empirical Studies of Changing Requirements 35 4.1 Mining Quality Requirements From Artifacts . 36 4.1.1 Controlled Vocabulary Mining of GNOME Projects . 37 4.1.2 Applying Latent Dirichlet Allocation to Extract Requirements Topics . 52 4.1.3 Related Work in Mining Requirements . 63 4.2 Tracing Software Evolution History with Design Goals . 65 4.2.1 Motivating the Study of Software History . 66 4.2.2 Related Work in Software Histories . 67 4.2.3 A history of distributed computing protocols . 67 4.2.4 Interpretation . 75 4.2.5 Conclusions From Software Histories . 77 4.3 Lessons . 78 5 Case Study: Payment Cards 82 5.1 Overview . 82 5.2 Standards for Securing Payment Card Systems . 83 5.3 The Payment Card Model . 85 5.4 Change Scenarios . 87 5.4.1 Alternative Compliance Choices . 88 5.5 PCI-DSS and Evolution . 89 5.5.1 Expansion . 89 5.5.2 Contraction . 89 5.5.3 Revision . 90 5.5.4 Conflicts in the Standard . 91 5.6 Conclusions . 91 6 A Functional View of Requirements Problems 93 6.1 Definitions . 95 6.2 TELL Operations . 97 6.3 ASK Operations . 98 6.3.1 Goal Achievement . 99 6.3.2 Finding Candidate Solutions . 100 6.3.3 Deciding Among Candidates . 101 6.4 Operations for Requirements Evolution Problems . 102 vi 6.4.1 Finding Minimal Change Tasks . 102 6.5 Complexity . 103 6.6 Related Work in Requirements Engineering KBs . 104 6.6.1 KAOS . 104 6.6.2 Other RE Approaches . 105 7 Solving Static Requirements Problems 107 7.1 Finding Solutions . 108 7.1.1 The Assumption-Based Truth Maintenance System ATMS)............. 108 7.1.2 ARE-GOALS-ACHIEVED-FROM . 110 7.1.3 MINIMAL-GOAL-ACHIEVEMENT . 111 7.1.4 GET-CANDIDATE-SOLUTIONS . 113 7.1.5 The Problem Solver . 114 7.2 Deciding on a Solution . 115 7.2.1 First Approach: pQGM . 117 7.2.2 Selecting Solutions . 124 7.3 Tool support . 125 7.3.1 DSLs . 125 7.3.2 Graphical Editor . 126 7.4 Implementation Feasibility . 126 7.4.1 Optimizations for pQGM . 130 7.4.2 Evaluating the ATMS Approach . 134 7.5 Other approaches . 138 8 Solving Evolving Requirements Problems 141 8.1 Methodological Guidance for Solving Unanticipated Changes . 142 8.2 Revising requirements . 144 8.2.1 Requirements Revision . 145 8.3 Finding Minimal New Changes . ..
Recommended publications
  • Kirjoituspohja VTT Science
    IENCE C • •S T S E C Small world for dynamic wireless cyber-physical N O H I N systems S O I V Dissertation L • O S 142 G T Y H • R Industries and consumer markets are today increasingly using G I E L VTT SCIEN CE S H E G services exposed from wireless sensor and actuator networks, A I R H C cyber-physical machine-to-machine systems. The motivation for H the research arises from problems detected in the remote 1 4 2 interaction with embedded devices over dynamic wireless networks in such systems. The selected approach is based on the application of the small- world paradigm to cyber-physical systems. It is here assumed that the concept of small world, "six degrees of separation", can be expanded to also cover communication with wireless embedded devices in cyber-physical systems context. The main contributions are the technical enablers referred to as dynamic communication spaces, dynamic M2M service spaces, configuration and remote use of services, communication overlay, access systems selection, integrated mobility, secure ad hoc networking, situated opportunistic communication, hierarchical networking for small-world networks, and short-cuts for network optimization. The enablers have been evaluated as separate technical methods and means by means of experiments and/or simulations. According to the evaluations, the enablers seem to work well as separate building blocks and that they can be combined to expand the concept of small world to also cover communication with embedded devices. Wireless short-cuts can improve the scalability and efficiency of dynamic wireless networking and weak links are essential in the neighbour discovery process.
    [Show full text]
  • Ubuntu Kung Fu
    Prepared exclusively for Alison Tyler Download at Boykma.Com What readers are saying about Ubuntu Kung Fu Ubuntu Kung Fu is excellent. The tips are fun and the hope of discov- ering hidden gems makes it a worthwhile task. John Southern Former editor of Linux Magazine I enjoyed Ubuntu Kung Fu and learned some new things. I would rec- ommend this book—nice tips and a lot of fun to be had. Carthik Sharma Creator of the Ubuntu Blog (http://ubuntu.wordpress.com) Wow! There are some great tips here! I have used Ubuntu since April 2005, starting with version 5.04. I found much in this book to inspire me and to teach me, and it answered lingering questions I didn’t know I had. The book is a good resource that I will gladly recommend to both newcomers and veteran users. Matthew Helmke Administrator, Ubuntu Forums Ubuntu Kung Fu is a fantastic compendium of useful, uncommon Ubuntu knowledge. Eric Hewitt Consultant, LiveLogic, LLC Prepared exclusively for Alison Tyler Download at Boykma.Com Ubuntu Kung Fu Tips, Tricks, Hints, and Hacks Keir Thomas The Pragmatic Bookshelf Raleigh, North Carolina Dallas, Texas Prepared exclusively for Alison Tyler Download at Boykma.Com Many of the designations used by manufacturers and sellers to distinguish their prod- ucts are claimed as trademarks. Where those designations appear in this book, and The Pragmatic Programmers, LLC was aware of a trademark claim, the designations have been printed in initial capital letters or in all capitals. The Pragmatic Starter Kit, The Pragmatic Programmer, Pragmatic Programming, Pragmatic Bookshelf and the linking g device are trademarks of The Pragmatic Programmers, LLC.
    [Show full text]
  • Epistemic Truth and Excluded Middle* Cesare Cozzo Abstract
    Penultimate draft of a paper published in in Theoria, a Swedish journal of philosophy, LXIV 2-3, Thales, Stockholm 1998, pp. 243-282. Epistemic truth and excluded middle* Cesare Cozzo Università di Roma ”La Sapienza” Dipartimento di studi filosofici ed epistemologici email: [email protected] Abstract: Can an epistemic conception of truth and an endorsement of the excluded middle (together with other principles of classical logic abandoned by the intuitionists) cohabit in a plausible philosophical view? In PART I I describe the general problem concerning the relation between the epistemic conception of truth and the principle of excluded middle. In PART II I give a historical overview of different attitudes regarding the problem. In PART III I sketch a possible holistic solution. Part I The Problem §1. The epistemic conception of truth. The epistemic conception of truth can be formulated in many ways. But the basic idea is that truth is explained in terms of epistemic notions, like experience, argument, proof, knowledge, etc. One way of formulating this idea is by saying that truth and knowability coincide, i.e. for every statement S i) it is true that S if, and only if, it is (in principle) possible to know that S. Knowledge that S can be equated with possession of a correct (or ideal) finite argument for S in an optimal (or ideal) epistemic situation. For example, mathematical knowledge can be equated with possession of a proof of a mathematical statement. But the notion of ideal argument should be wider than the notion of proof: for empirical statements like “strawberries contain sugar” an ideal argument should contain also some sensory evidence.
    [Show full text]
  • Free As in Freedom
    Daily Diet Free as in freedom ... • The freedom to run the program, for any purpose (freedom 0). Application Seen elsewhere Free Software Choices • The freedom to study how the program works, and adapt it to Text editor Wordpad Kate / Gedit/Vi/ Emacs your needs (freedom 1). Access to the source code is a precondition for this. Office Suite Microsoft Office KOffice / Open Office • The freedom to redistribute copies so you can help your Word Processor Microsoft Word Kword / Writer Presentation PowerPoint KPresenter / Impress neighbor (freedom 2). Spreadsheet Excel Kexl / Calc • The freedom to improve the program, and release your Mail & Info Manager Outlook Thunderbird / Evolution improvements to the public, so that the whole community benefits (freedom 3). Access to the source code is a Browser Safari, IE Konqueror / Firefox precondition for this. Chat client MSN, Yahoo, Gtalk, Kopete / Gaim IRC mIRC Xchat Non-Kernel parts = GNU (GNU is Not Unix) [gnu.org] Netmeeting Ekiga Kernel = Linux [kernel.org] PDF reader Acrobat Reader Kpdf / Xpdf/ Evince GNU Operating Syetem = GNU/Linux or GNU+Linux CD - burning Nero K3b / Gnome Toaster Distro – A flavor [distribution] of GNU/Linux os Music, video Winamp, Media XMMS, mplayer, xine, player rythmbox, totem Binaries ± Executable Terminal>shell>command line – interface to type in command Partition tool Partition Magic Gparted root – the superuser, administrator Graphics and Design Photoshop, GIMP, Image Magick & Corel Draw Karbon14,Skencil,MultiGIF The File system Animation Flash Splash Flash, f4l, Blender Complete list- linuxrsp.ru/win-lin-soft/table-eng.html, linuxeq.com/ Set up Broadband Ubuntu – set up- in terminal sudo pppoeconf.
    [Show full text]
  • Heinrich Rommen, the Natural Law: a Study in Legal and Social History and Philosophy (1936)
    Rommen_0017 09/15/2005 09:46 AM THE ONLINE LIBRARY OF LIBERTY © Liberty Fund, Inc. 2005 http://oll.libertyfund.org/Home3/index.php HEINRICH ROMMEN, THE NATURAL LAW: A STUDY IN LEGAL AND SOCIAL HISTORY AND PHILOSOPHY (1936) URL of this E-Book: http://oll.libertyfund.org/EBooks/Rommen_0017.pdf URL of original HTML file: http://oll.libertyfund.org/Home3/HTML.php?recordID=0017 ABOUT THE AUTHOR Heinrich Rommen was a Catholic German lawyer who practised in Germany during the Weimar Republic before fleeing to the United States in 1938. He taught in Germany and England before concluding his distinguished scholarly career at Georgetown University. ABOUT THE BOOK Originally published in German in 1936, The Natural Law is the first work to clarify the differences between traditional natural law as represented in the writings of Cicero, Aquinas, and Hooker and the revolutionary doctrines of natural rights espoused by Hobbes, Locke, and Rousseau. Beginning with the legacies of Greek and Roman life and thought, Rommen traces the natural law tradition to its displacement by legal positivism and concludes with what the author calls "the reappearance" of natural law thought in more recent times. In seven chapters each Rommen explores "The History of the Idea of Natural Law" and "The Philosophy and Content of the Natural Law." In his introduction, Russell Hittinger places Rommen’s work in the context of contemporary debate on the relevance of natural law to philosophical inquiry and constitutional interpretation. THE EDITION USED The Natural Law: A Study in Legal and Social History and Philosophy, trans. Thomas R.
    [Show full text]
  • Fedora 17 System Administrator's Guide
    Fedora 17 System Administrator's Guide Deployment, Configuration, and Administration of Fedora 17 Jaromír Hradílek Douglas Silas Martin Prpič Stephen Wadeley Eliška Slobodová Tomáš Čapek Petr Kovář John Ha System Administrator's Guide David O'Brien Michael Hideo Don Domingo Fedora 17 System Administrator's Guide Deployment, Configuration, and Administration of Fedora 17 Edition 1 Author Jaromír Hradílek [email protected] Author Douglas Silas [email protected] Author Martin Prpič [email protected] Author Stephen Wadeley [email protected] Author Eliška Slobodová [email protected] Author Tomáš Čapek [email protected] Author Petr Kovář [email protected] Author John Ha Author David O'Brien Author Michael Hideo Author Don Domingo Copyright © 2012 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
    [Show full text]
  • Copyrighted Material
    37_125052 bindex.qxp 3/23/07 6:36 PM Page 343 Index Applications (Ubuntu Help Centre Symbols and Numerics window), 288 (@) at character, 70 Applications menu (GNOME desktop) (\) backslash character, 66 Accessories menu, 151 (:) colon character, 70 Add & Remove menu, 152 802.11a networks, 96 Games menu, 151 802.11b networks, 95–96 Graphics menu, 152 802.11g networks, 95–96 Internet menu, 152 802.11i networks, 95–96 Office menu, 152 802.11n networks, 96 Sound & Video menu, 152 (/) slash character, 65 applications, starting, 164–165 (~) tilde character, 70 APs (Access Points) overview, 98 unencrypted APs, 93, 97, 98–102 • A • WEP-encrypted APs, 93, 98, 102–103 WPA-encrypted APs, 98, 103–110 About GNOME option (GNOME desktop), apt-get utility 153 package installation with, 298 About OpenOffice.org, 289 package updating with, 296 About Ubuntu (Ubuntu Help Centre Archive Manager, 167 window), 288 asymmetric keys, 324 About Ubuntu option (GNOME desktop), at (@) character, 70 153 Audacity sound editor access points (APs) converting files, 267–268 overview, 98 installing, 266 unencrypted APs, 93, 97, 98–102 multimedia, 266–268 WEP-encrypted APs, 93, 98, 102–103 setting up, 266–267 WPA-encrypted APs, 98, 103–110 audio CDs, burning, 265–270 accessories, 167–168 audio files, playing, 257–258 Accessories menu (GNOME desktop), 151 automatic suspension, programming your activating the new settings for static IP computer for, 76 addresses, 89–90 COPYRIGHTEDautomatic MATERIAL update system for Firefox, 188 Add/Remove application, 170 Add & Remove menu
    [Show full text]
  • Linphone a Good Working Skype Voice Over IP Alternative
    Walking in Light with Christ - Faith, Computing, Diary Articles & tips and tricks on GNU/Linux, FreeBSD, Windows, mobile phone articles, religious related texts http://www.pc-freak.net/blog Linphone a good working Skype voice over IP alternative Author : admin If you never tried linphone I warmly recommend it. 2 days ago, with a friend of mine we tested a bunch of Linux softwares to find out what is the situation with possible alternatives to Skype to transmit Voice and Video. I've been interested into Skype Alternative programs since about 2 years, but so far I never found good and easy to set up working Linux alternative. We first tried Ekiga. Though it is said to be a good Linux SKype alternative, my ekiga client running on Debian Linux stable Squeeze ver. 3.2.7.2 failed to connect to SIP account I've created on ekiga.net. I've tried hard to make ekiga connect to account SIP created from ekiga.net but all time I was getting an error on connect: Ekiga did not manage to configure your network settings automatically. You can still use it, but you need to configure your network settings manually. Please see http://wiki.ekiga.org/index.php/Enable_port_forwarding_manually for instructions After continously trying to follow instructions from above pointed URL and making proper settings on my DL-524 Wireless Router and all time ending up with the annoying error, we decided to finally completely abondoned it and try some other voice over IP clients. We tried Jitsi and few others which prooved to be unworking.
    [Show full text]
  • U | UML | Xen | Wine REVIEWED Vmware 5.5
    Jon “maddog” Hall | GPL 3 | GCJ | VMware | QEMU | UML | Xen | Wine REVIEWED VMware 5.5 ™ Since 1994: The Original Magazine of the Linux Community MAY 2006 | www.linuxjournal.com Virtual Linux NEW COLUMN: Jon “maddog” Hall’s Beachhead Tales from the Beach Embedded Java with GCJ Using RTNETLINK AN PUBLICATION USA $5.00 PLUS CAN $6.50 U|xaHBEIGy03102ozXv!:; Is Linux VoIP Ready? MAY 2006 CONTENTS Issue 145 FEATURES ON THE COVER: IMAGE BY AYAAZ RATTANSI 60 RUNNING SOUND APPLICATIONS UNDER WINE 72 XEN You can make Linux sound better with a little Wine. Xen’s unusual approach to virtual systems can give it a speed edge. Dave Phillips Irfan Habib 64 USER-MODE LINUX ON THE COVER Run Linux on top of Linux? It makes sense. Really. • VMware 5.5, p. 56 Matthew E. Hoskins • Jon "maddog" Hall's Beachhead, p. 46 68 QEMU: A MULTIHOST, MULTITARGET EMULATOR • Embedded Java with GCJ, p. 76 Can a free virtual system offer what you need? • Using RTNETLINK, p. 86 Daniel Bartholomew • Is Linux VoIP Ready? p. 80 2 | may 2006 www.linuxjournal.com MAY 2006 CONTENTS Issue 145 COLUMNS REVIEW 22 REUVEN LERNER’S 56 VMWARE WORKSTATION 5.5 AT THE FORGE FOR LINUX HOSTS Google Web Services Mick Bauer 28 MARCEL GAGNÈ’S COOKING WITH LINUX The Virtual Streets of $HOME INDEPTH 80 IS LINUX VOICE OVER IP READY? 76 EMBEDDED JAVA WITH GCJ 34 DAVE TAYLOR’S GCJ may not be for end-user applications, WORK THE SHELL but it’s the bomb for embedded systems. Counting Cards Gene Sally Next Month 36 MICK BAUER’S 80 IS LINUX VOICE OVER IP READY? PARANOID PENGUIN What are the viable VoIP options for Linux Security Features in Debian 3.1 and how do they compare? Machtelt Garrels STORAGE 42 DEE-ANN LEBLANC’S Next month, we’re going fishing.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Deciding the Undecidable: Wrestling with Hilbert's Problems
    Deciding the Undecidable: Wrestling with Hilbert’s Problems Solomon Feferman∗ In the year 1900, the German mathematician David Hilbert gave a dramatic address in Paris, at the meeting of the 2nd International Congress of Mathematicians—an address which was to have lasting fame and importance. Hilbert was at that point a rapidly rising star, if not superstar, in mathematics, and before long he was to be ranked with Henri Poincar´eas one of the two greatest and most influential mathematicians of the era. Like Poincar´e, Hilbert worked in an exceptional variety of areas. He had already made fundamental contributions to algebra, number theory, geometry and analysis. After 1900 he would expand his researches further in analysis, then move on to mathematical physics and finally turn to mathematical logic. In his work, Hilbert demonstrated an unusual combination of direct intuition and concern for absolute rigor. With exceptional technical power at his command, he would tackle outstanding problems, usually with great originality of approach. The title of Hilbert’s lecture in Paris was simply, “Mathematical Problems”. In it he emphasized the importance of taking on challenging problems for maintaining the progress and vitality of mathematics. And with this, he expressed a remarkable conviction in the solvability of all mathematical problems, which he even called an axiom. To quote from his lecture: Is the axiom of the solvability of every problem a peculiar characteristic of math- ematical thought alone, or is it possibly a general law inherent in the nature of the mind, that all questions which it asks must be answerable?...This convic- tion of the solvability of every mathematical problem is a powerful incentive to the worker.
    [Show full text]
  • Download the Index
    41_067232945x_index.qxd 10/5/07 1:09 PM Page 667 Index NUMBERS 3D video, 100-101 10BaseT Ethernet NIC (Network Interface Cards), 512 64-bit processors, 14 100BaseT Ethernet NIC (Network Interface Cards), 512 A A (Address) resource record, 555 AbiWord, 171-172 ac command, 414 ac patches, 498 access control, Apache web server file systems, 536 access times, disabling, 648 Accessibility module (GNOME), 116 ACPI (Advanced Configuration and Power Interface), 61-62 active content modules, dynamic website creation, 544 Add a New Local User screen, 44 add command (CVS), 583 address books, KAddressBook, 278 Administrator Mode button (KDE Control Center), 113 Adobe Reader, 133 AFPL Ghostscript, 123 41_067232945x_index.qxd 10/5/07 1:09 PM Page 668 668 aggregators aggregators, 309 antispam tools, 325 aKregator (Kontact), 336-337 KMail, 330-331 Blam!, 337 Procmail, 326, 329-330 Bloglines, 338 action line special characters, 328 Firefox web browser, 335 recipe flags, 326 Liferea, 337 special conditions, 327 Opera web browser, 335 antivirus tools, 331-332 RSSOwl, 338 AP (Access Points), wireless networks, 260, 514 aKregator webfeeder (Kontact), 278, 336-337 Apache web server, 529 album art, downloading to multimedia dynamic websites, creating players, 192 active content modules, 544 aliases, 79 CGI programming, 542-543 bash shell, 80 SSI, 543 CNAME (Canonical Name) resource file systems record, 555 access control, 536 local aliases, email server configuration, 325 authentication, 536-538 allow directive (Apache2/httpd.conf), 536 installing Almquist shells
    [Show full text]