Proceedings of the 7Th Spring/Summer Young Researchers’ Colloquium on Software Engineering

Total Page:16

File Type:pdf, Size:1020Kb

Proceedings of the 7Th Spring/Summer Young Researchers’ Colloquium on Software Engineering SYRCoSE 2013 Editors: Alexander Kamkin, Alexander Petrenko, Andrey Terekhov Proceedings of the 7th Spring/Summer Young Researchers’ Colloquium on Software Engineering Kazan, May 30-31, 2013 2013 Proceedings of the 7th Spring/Summer Young Researchers’ Colloquium on Software Engineering (SYRCoSE 2013), May 30-31, 2013 – Kazan, Russia: The issue contains the papers presented at the 7th Spring/Summer Young Researchers’ Colloquium on Software Engineering (SYRCoSE 2013) held in Kazan, Russia on 30th and 31st of May, 2013. Paper selection was based on a competitive peer review process being done by the program committee. Both regular and research-in-progress papers were considered acceptable for the colloquium. The topics of the colloquium include modeling of computer systems, software testing and verification, parallel and distributed systems, information search and data mining, image and speech processing and others. Труды 7-ого весеннего/летнего коллоквиума молодых исследователей в области программной инженерии (SYRCoSE 2013), 30-31 мая 2013 г. – Казань, Россия: Сборник содержит статьи, представленные на 7-ом весеннем/летнем коллоквиуме молодых исследователей в области программной инженерии (SYRCoSE 2013), проводимом в Казани 30 и 31 мая 2013 г. Отбор статей производился на основе рецензирования материалов программным комитетом. На коллоквиум допускались как полные статьи, так и краткие сообщения, описывающие текущие исследования. Программа коллоквиума охватывает следующие темы: моделирование компьютерных систем, тестирование и верификация программ, параллельные и распределенные системы, информационный поиск и анализ данных, обработка изображений и речи и др. ISBN 978-5-91474-020-4 © Авторы, 2013 Contents Foreword························································································································································6 Committees / Referees··································································································································7 Formal Models of Computer Systems NPNtool: Modelling and Analysis Toolset for Nested Petri Nets L. Dworzanski, D. Frumin················································································································9 The Tool for Modeling of Wireless Sensor Networks with Nested Petri Nets N. Buchina, L. Dworzanski·············································································································15 Process Mining and Trace Analysis DPMine: Modeling and Process Mining Tool S. Shershakov··································································································································19 Recognition and Explanation of Incorrect Behavior in Simulation-Based Hardware Verification M. Chupilko, A. Protsenko··············································································································25 Model Transformations Horizontal Transformations of Visual Models in MetaLanguage System A. Sukhov, L. Lyadova····················································································································31 An Approach to Graph Matching in the Component of Model Transformations A. Seriy, L. Lyadova························································································································41 Testing Software and Hardware Systems Technology Aspects of State Explosion Problem Resolving for Industrial Software Design P. Drobintsev, V. Kotlyarov, I. Nikiforov························································································46 MicroTESK: An Extendable Framework for Test Program Generation A. Kamkin, T. Sergeeva, A. Tatarnikov, A. Utekhin········································································51 Probabilistic Networks as a Means of Testing Web-Based Applications A. Bykau··········································································································································58 Software Mutation Testing: Towards Combining Program and Model Based Techniques M. Forostyanova, N. Kushik···········································································································62 Experimental Comparison of the Quality of TFSM-Based Test Suites for the UML Diagrams R. Galimullin···································································································································68 Linux Development and Verification Experience of Building and Deployment Debian on Elbrus Architecture A. Kuyan, S. Gusev, A. Kozlov, Z. Kaimuldenov, E. Kravtsunov····················································73 Generating Environment Model for Linux Device Drivers I. Zakharov, V. Mutilin, E. Novikov, A. Khoroshilov······································································77 3 of 173 On the Implementation of Data-Breakpoints Based Race Detection for Linux Kernel Modules N. Komarov·····································································································································84 Software Engineering Education Mobile Learning Systems in Software Engineering Education L. Andreicheva, R. Latypov············································································································89 Computer Networks Hide and Seek: Worms Digging at the Internet Backbones and Edges S. Gaivoronski, D. Gamayunov······································································································94 Station Disassociaciation Problem in Hosted Network A. Shal···········································································································································108 On Bringing Software Engineering to Computer Networks with Software Defined Networking A. Shalimov, R. Smeliansky···········································································································111 Parallel and Distributed Systems The Formal Statement of the Load-Balancing Problem for a Multi-Tenant Database Cluster With a Constant Flow of Queries E. Boytsov, V. Sokolov···················································································································117 Scheduling Signal Processing Tasks for Antenna Arrays with Simulated Annealing D. Zorin·········································································································································122 Automated Deployment of Virtualization-Based Research Models of Distributed Computer Systems A. Zenzinov····································································································································128 Information Search and Data Mining Intelligent Search Based on Ontological Resources and Graph Models A. Chugunov, V. Lanin··················································································································133 Intelligent Service for Aggregation of Real Estate Market Offers V. Lanin, R. Nesterov, T. Osotova·································································································136 An Approach to the Selection of DSL Based on Corpus of Domain-Specific Documents E. Elokhov, E. Uzunova, M. Valeev, A. Yugov, V. Lanin······························································139 Computer Graphics and Image/Speech Processing Beholder Framework: A Unified Real-Time Graphics API D. Rodin········································································································································144 Image Key Points Detection and Matching M. Medvedev, M. Shleymovich······································································································149 Voice Control of Robots and Mobile Machinery R. Shokhirev··································································································································155 4 of 173 Application-Specific Methods and Tools Service-Oriented Control System for a Differential Wheeled Robot A. Mangin, L. Amiraslanova, L. Lagunov, Yu. Okulovsky····························································159 Scheduling the Delivery of Orders by a Freight Train A. Lazarev, E. Musatova, N. Khusnullin·······················································································165 Optimization of Electronics Component Placement Design on PCB Using Genetic Algorithm L. Zinnatova, I. Suzdalcev·············································································································169 5 of 173 Foreword Dear participants, we are glad to meet you at the 7th Spring/Summer Young Researchers’ Colloquium on Software Engineering (SYRCoSE). The event is held in Kazan, the capital and largest city of the Republic of Tatarstan, Russia. The colloquium is hosted by Kazan National Research Technical University named after A.N. Tupolev (KNRTU), former Kazan Aviation Institute (KAI), one of the leading Russian institutions in aircraft engineering, engine- and instrument- design and manufacturing, computer science and radio- and telecommunications engineering. SYRCoSE 2013 is organized by Institute for System Programming of the Russian Academy of Sciences (ISPRAS) and Saint-Petersburg State University (SPbSU) jointly with KNRTU. In this year, Program Committee (consisting of more than 40 members from more than 20 organizations) has selected 30 papers. Each submitted paper has been reviewed independently by three referees. Participants
Recommended publications
  • “Current Trends in the Russian Financial System”
    “CURRENT TRENDS IN THE RUSSIAN FINANCIAL SYSTEM” Edited by Morten Balling Chapters by: Stephan Barisitz Zeljko Bogetic Zuzana Fungačova and Laura Solanko Peter Havlik Valery Invushin, Vladimir V. Osakovsky and Debora Revoltella Alexander Lehmann Ewald Nowotny Cyril Pineau-Valencienne Pekka Sutela A joint publication with the Austrian Society for Bank Research SUERF – The European Money and Finance Forum Vienna 2009 CIP CURRENT TRENDS IN THE RUSSIAN FINANCIAL SYSTEM Editor: Morten Balling; Authors: Stephan Barisitz; Zeljko Bogetic; Zuzana Fungačova and Laura Solanko; Peter Havlik; Valery Invushin, Vladimir V. Osakovsky and Debora Revoltella; Alexander Lehmann; Ewald Nowotny; Cyril Pineau-Valencienne; Pekka Sutela Vienna: SUERF (SUERF Studies: 2009/2) ISBN-13: 978-3-902109-47-7 Keywords: Russia, rouble, oil price, banking, transition economics, global financial crisis, Central Bank of Russia JEL Classification Numbers: E5, O5, P2, Q43 © 2009 SUERF, Vienna Copyright reserved. Subject to the exception provided for by law, no part of this publication may be reproduced and/or published in print, by photocopying, on microfilm or in any other way without the written consent of the copyright holder(s); the same applies to whole or partial adaptations. The publisher retains the sole right to collect from third parties fees payable in respect of copying and/or take legal or other action for this purpose. TABLE OF CONTENTS Table of Contents 3 1. Introduction 7 2. Opening Remarks 13 3. Russian Finance: Drag or Booster for Future Growth? 23 1. References 39 4. Russian Banking in Recent Years: Gaining Depth in a Fragile Environment 43 1. Abstract 43 2. Introduction 44 3.
    [Show full text]
  • №15. November 2016.Pdf
    FINANCIAL NO. 15 November 2 0 1 6 SECURITY CONTENTS 5 Congratulation of President of Russian Federation V. Putin to Federal Financial Monitoring Service Staff Cover Story 6 Yu. Chikhanchin. Task We Face Now Is No Less Complicated Than 15 Years Ago 9 V. Zubkov. Financial Intelligence Unit Has All Necessary Means to Curtail High Risk Zones in Russia 18 O. Markov. Our Performance Was Best Reflected in International Organizations Assessments' Results Greeting Addresses 24 N. Patrushev 25 V. Kolokoltsev 26 S. Shoigu 27 M. Mishustin 28 A. Khloponin 29 A. Buksman 30 S. Sobyanin 31 Yu. Isaev 32 A. Karelin 33 O. Budargin 34 S. Chemezov National AML/CFT System 35 A. Kudrin. FIU Has More Powers in Russia Than in Other Countries 41 G. Tosunyan. Cooperation Between Private Sector and FIU Has Always Been Constructive 46 I. Sirotkin. Rosfinmonitoring Role in National Counter-Terrorism System Russia in International AML/CFT System 48 Rosfinmonitoring International Сooperation 50 T. Greenberg. All About Russian AML/CFT Regime Was Pretty Sad 53 J. Ringguth. Over 16 Years Russia Created Strong, Centralized, Well-Resourced, National FIU 56 D. Thelesklaf. Creation of FIU Played Very Important Role 58 V. Nechaev. Long Way Milestones Areas of Work 61 Yu. Korotky. Analytics: How It All Started... 64 P. Livadny. Anti-Money Laundering Legislation as Legal Reflection of National AML/CFT System 68 G. Bobrysheva. Key Period of My Professional Career Was at Federal Financial Monitoring Service 71 V. Glotov. People – Agency’s Main Strategic Asset 74 A. Klimenchenok. It Was Hard Way But We Passed It Fast 77 O.
    [Show full text]
  • Russia's Strategic Mobility
    Russia’s Strategic Mobility: Supporting ’Hard Pow Supporting ’Hard Mobility: Strategic Russia’s Russia’s Strategic Mobility Supporting ’Hard Power’ to 2020? The following report examines the military reform in Russia. The focus is on Russia’s military-strategic mobility and assess- ing how far progress has been made toward genuinely enhanc- ing the speed with which military units can be deployed in a N.McDermott Roger er’ to2020? theatre of operations and the capability to sustain them. In turn this necessitates examination of Russia’s threat environ- ment, the preliminary outcome of the early reform efforts, and consideration of why the Russian political-military leadership is attaching importance to the issue of strategic mobility. Russia’s Strategic Mobility Supporting ’Hard Power’ to 2020? Roger N. McDermott FOI-R--3587--SE ISSN1650-1942 www.foi.se April 2013 Roger N. McDermott Russia’s Strategic Mobility Supporting ‘Hard Power’ to 2020? Title Russia’s Strategic Mobility: Supporting ‘Hard Power’ to 2020? Titel Rysk strategisk mobilitet: Stöd för maktut- övning till 2020? Report no FOI-R--3587--SE Month April Year 2013 Antal sidor/Pages 101 p ISSN 1650-1942 Kund/Customer Försvarsdepartementet/ Ministry of Defence Projektnr/Project no A11301 Godkänd av/Approved by Maria Lignell Jakobsson Ansvarig avdelning/Departement Försvarsanalys/Defence Analysis This work is protected under the Act on Copyright in Literary and Artistic Works (SFS 1960:729). Any form of reproduction, translation or modification without permission is prohibited. Cover photo: Denis Sinyakov, by permission. www.denissinyakov.com FOI-R--3587--SE Summary Since 2008, Russia’s conventional Armed Forces have been subject to a contro- versial reform and modernization process designed to move these structures be- yond the Soviet-legacy forces towards a modernized military.
    [Show full text]
  • Computer Architectures an Overview
    Computer Architectures An Overview PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 25 Feb 2012 22:35:32 UTC Contents Articles Microarchitecture 1 x86 7 PowerPC 23 IBM POWER 33 MIPS architecture 39 SPARC 57 ARM architecture 65 DEC Alpha 80 AlphaStation 92 AlphaServer 95 Very long instruction word 103 Instruction-level parallelism 107 Explicitly parallel instruction computing 108 References Article Sources and Contributors 111 Image Sources, Licenses and Contributors 113 Article Licenses License 114 Microarchitecture 1 Microarchitecture In computer engineering, microarchitecture (sometimes abbreviated to µarch or uarch), also called computer organization, is the way a given instruction set architecture (ISA) is implemented on a processor. A given ISA may be implemented with different microarchitectures.[1] Implementations might vary due to different goals of a given design or due to shifts in technology.[2] Computer architecture is the combination of microarchitecture and instruction set design. Relation to instruction set architecture The ISA is roughly the same as the programming model of a processor as seen by an assembly language programmer or compiler writer. The ISA includes the execution model, processor registers, address and data formats among other things. The Intel Core microarchitecture microarchitecture includes the constituent parts of the processor and how these interconnect and interoperate to implement the ISA. The microarchitecture of a machine is usually represented as (more or less detailed) diagrams that describe the interconnections of the various microarchitectural elements of the machine, which may be everything from single gates and registers, to complete arithmetic logic units (ALU)s and even larger elements.
    [Show full text]
  • Programme Saint-Petersburg | | Forum`S Sessions Schedule | June, 20, Thursday
    WHITE NIGHTS St. Petersburg International Oncology Forum JUNE, 20-23, 2019 WWW.FORUM-ONCO.RU PROGRAMME JUNE, 20, THURSDAY JUNE, 20, | зал места 08.00 08.30 09.00 09.30 10.00 10.30 11.00 11.30 12.00 12.30 13.00 13.30 14.00 14.30 15.00 15.30 16.00 16.30 17.00 17.30 18.00 18.30 19.00 19.30 20.00 Lung cancer: multidisciplinary approach Sponsored Lung cancer: multidisciplinary approach Sponsored symposium Blue 1 180 symposium The Fifth M.L.Gershanovich Conference «Treatment The Fifth M.L.Gershanovich Conference Blue 2 SESSIONS SCHEDULE | FORUM`S 250 «Treatment individualization: from science Sponsored symposium individualization: from science to practice» with interactive to practice» with interactive voting: Key issues voting: Key issues Blue 3 180 New strategies in gynecology: live surgery 3D, presentations, Discussion Blue 4 330 Current capabilities of breast cancer reconstructive surgery Break Current capabilities of breast cancer reconstructive surgery Blue 5 250 Workshop session «Live surgery»: pancreas cancer Green 5 50 Biology of informal financial relations in oncology Break SPOT: lifehacks for young oncologists WWW.FORUM-ONCO.RU | Green Multidisciplinary approach in oncogynecological diseases Multidisciplinary approach in oncogynecological diseases 100 Break 6+7 radiology radiology Cancer service development perspectives Sponsored symposium Analysis of the KSG Cutaneous melanoma: new approaches to treatment within the framework of Green 8 120 system. Subtotals the «Healthcare» national project Green 9 170 Workshop session “Live surgery»:
    [Show full text]
  • Open Access Proceedings Journal of Physics: Conference Series
    IOP Conference Series: Earth and Environmental Science PAPER • OPEN ACCESS Issues of compatibility of processor command architectures To cite this article: T R Zmyzgova et al 2020 IOP Conf. Ser.: Earth Environ. Sci. 421 042006 View the article online for updates and enhancements. This content was downloaded from IP address 85.143.35.46 on 13/02/2020 at 06:53 AGRITECH-II-2019 IOP Publishing IOP Conf. Series: Earth and Environmental Science 421 (2020) 042006 doi:10.1088/1755-1315/421/4/042006 Issues of compatibility of processor command architectures T R Zmyzgova, A V Solovyev, A G Rabushko, A A Medvedev and Yu V Adamenko Kurgan State University, 62 Proletarskaya street, Kurgan, 640002, Russia E-mail: [email protected] Abstract. Modern computers and computing devices are based on the principle of open architecture, according to which the computer consists of several sufficiently independent devices that perform a certain function. These devices must meet certain standards of interaction with each other. Existing standards relate to both the technical characteristics of the devices and the content of the signals exchanged between them. The article considers the issue of creating a universal architecture of processor commands. The brief analysis of the components of devices and interrelations between them (different hardware features of processors, architecture of memory models and registers of peripheral devices, mechanisms of operand processing, the number of registers and processed data types, interruptions, exceptions, etc.) is carried out. The problem of architecture standardization, which generalizes the capabilities of the most common architectures and is suitable for high-performance emulation on most computer architectures, is put.
    [Show full text]
  • Background Optimization in Full System Binary Translation
    Background Optimization in Full System Binary Translation Roman A. Sokolov Alexander V. Ermolovich MCST CJSC Intel CJSC Moscow, Russia Moscow, Russia Email: [email protected] Email: [email protected] Abstract—Binary translation and dynamic optimization are architecture codes fully utilizing all architectural features widely used to provide compatibility between legacy and promis- introduced to support binary translation. Besides, dynamic ing upcoming architectures on the level of executable binary optimization can benefit from utilization of actual information codes. Dynamic optimization is one of the key contributors to dynamic binary translation system performance. At the same about executables behavior which static compilers usually time it can be a major source of overhead, both in terms of don’t possess. CPU cycles and whole system latency, as long as optimization At the same time dynamic optimization can imply sig- time is included in the execution time of the application under nificant overhead as long as optimization time is included translation. One of the solutions that allow to eliminate dynamic in the execution time of application under translation. Total optimization overhead is to perform optimization simultaneously with the execution, in a separate thread. In the paper we present optimization time can be significant but will not necessarily implementation of this technique in full system dynamic binary be compensated by the translated codes speed-up if application translator. For this purpose, an infrastructure for multithreaded run time is too short. execution was implemented in binary translation system. This Also, the operation of optimizing translator can worsen the allowed running dynamic optimization in a separate thread latency (i.e., increase pause time) of interactive application or independently of and concurrently with the main thread of execution of binary codes under translation.
    [Show full text]
  • The North Caucasus: the Challenges of Integration (Ii), Islam, the Insurgency and Counter-Insurgency
    THE NORTH CAUCASUS: THE CHALLENGES OF INTEGRATION (II), ISLAM, THE INSURGENCY AND COUNTER-INSURGENCY Europe Report N°221 – 19 October 2012 TABLE OF CONTENTS EXECUTIVE SUMMARY ...................................................................................................... i I. INTRODUCTION ............................................................................................................. 1 II. THE ISLAMIC FACTOR AND ISLAMIST PROJECT .............................................. 3 A. THE SECTARIAN CONFLICT .......................................................................................................... 3 B. SALAFISM’S SPREAD AND RADICALISATION: INGUSHETIA AND KABARDINO-BALKARIA .............. 5 C. SALAFISM IN RELIGIOUSLY MIXED REPUBLICS ............................................................................ 6 D. DAGESTAN: SALAFIS, SUFIS AND DIALOGUE ................................................................................ 9 E. CHECHNYA: IDEOLOGICAL COMBAT AND ERADICATION ............................................................ 12 III. THE INSURGENCY ....................................................................................................... 13 A. THE CAUCASUS EMIRATE (IMARAT KAVKAZ) ............................................................................ 13 B. LEADERSHIP AND RECRUITMENT ............................................................................................... 14 C. TACTICS AND OPERATIONS .......................................................................................................
    [Show full text]
  • The North Caucasus: the Challenges of Integration (Ii), Islam, the Insurgency and Counter-Insurgency
    THE NORTH CAUCASUS: THE CHALLENGES OF INTEGRATION (II), ISLAM, THE INSURGENCY AND COUNTER-INSURGENCY Europe Report N°221 – 19 October 2012 TABLE OF CONTENTS EXECUTIVE SUMMARY ...................................................................................................... i I. INTRODUCTION ............................................................................................................. 1 II. THE ISLAMIC FACTOR AND ISLAMIST PROJECT .............................................. 3 A. THE SECTARIAN CONFLICT .......................................................................................................... 3 B. SALAFISM’S SPREAD AND RADICALISATION: INGUSHETIA AND KABARDINO-BALKARIA .............. 5 C. SALAFISM IN RELIGIOUSLY MIXED REPUBLICS ............................................................................ 6 D. DAGESTAN: SALAFIS, SUFIS AND DIALOGUE ................................................................................ 9 E. CHECHNYA: IDEOLOGICAL COMBAT AND ERADICATION ............................................................ 12 III. THE INSURGENCY ....................................................................................................... 13 A. THE CAUCASUS EMIRATE (IMARAT KAVKAZ) ............................................................................ 13 B. LEADERSHIP AND RECRUITMENT ............................................................................................... 14 C. TACTICS AND OPERATIONS .......................................................................................................
    [Show full text]
  • Oral History of Boris Babayan
    Oral History of Boris Babayan Interviewed by: Alex Bochannek Recorded: May 16, 2012 Moscow, Russia CHM Reference number: X6507.2012 © 2013 Computer History Museum Oral History of Boris Babayan Boris Babayan, May 16, 2012 Alex Bochannek: I’m Alex Bochannek; Curator and Senior Manager at the Computer History Museum in Mountain View, California. Today is Wednesday, May 16th and we are at Intel in Moscow, Russia to conduct the oral history with Boris Babayan. Also present in the room are Lubov Gladkikh his assistant and Yuri Merling [ph?] the videographer. Thank you both for agreeing to do this oral history for the archive at the Computer History Museum today. Let’s start about talking about your childhood and would you give us your full name, where you were born, and tell us a little bit about your parents, if there are any siblings and what your childhood was like. Boris Babayan: I was born in 1933 in Baku, Azerbaijan, now it’s an independent state. My father was a technician, he was an electrical engineer, and my mother worked in the kindergarten. I finished 10 year secondary school in Baku and then moved in Moscow, where I entered the Moscow Institute of Physics and Technology. It seems to me that in Russia I definitely was the first student in computer science. Bochannek: Now, what made you want to go to Moscow to that institute? Were you interested in technical things? Babayan: Because I was interested in the technical education and some people told me that the Moscow Institute of Physics and Technology is a very good institute, like MIT in the United States; it was established just after World War II, specially for education in the high tech.
    [Show full text]
  • Experience of Building and Deployment Debian on Elbrus Architecture
    Experience of Building and Deployment Debian on Elbrus Architecture Andrey Kuyan, Sergey Gusev, Andrey Kozlov, Zhanibek Kaimuldenov, Evgeny Kravtsunov Moscow Center of SPARC Technologies (ZAO MCST) Vavilova street, 24, Moscow, Russia fkuyan a, gusev s, kozlov a, kajmul a, kravtsunov [email protected] Abstract—This article describe experience of porting Debian II. Debian package managment system Linux distribution on Elbrus architecture. Authors suggested Debian is built from a large number of open-source projects effective method of building Debian distribution for architecture which is not supported by community. which maintained by different groups of developers around the world. Debian uses the package term. There are 2 types of packages: source and binary. Common source package I. Introduction consists of *.orig.tar.gz file, *.diff.gz file and *.dsc file. *.orig.tar.gz file contains upstream code of a project, MCST (ZAO ”MCST”) is a Russian company specializing maintained by original developers. *.diff.gz file contains in the development of general purpose CPU with Elbrus- a Debian patch with some information about project, such 2000 (e2k) ISA [1] and computing platforms based on it as build-dependencies, build rules, etc. *.dsc file holds an [2].Also in the company are being developed optimizing information about *.orig.tar.gz and *.diff.gz. Some and binary compilers, operating systems. General purpose of source packages, maintained by Debian developers (for ex- microprocessors and platforms assume that users have the ample dpkg) may not comprise *.diff.gz file because they ability to solve any problems of system integration with its already have a Debian information inside.
    [Show full text]
  • Chronologie De L'informatique Scientifique
    Chronologie de l’Informatique Scientifique Gérard Sookahet (août 2021) Voici une chronologie simplifiée des différents faits qui balisent le parcours de l'activité de l'Informatique Scientifique . S'entrecroisent à la fois les progrès réalisés dans les domaines tels que l'Analyse Numérique, l'Informatique, l'Algorithmique, l'Infographie, etc .... ndlr: Certains événements ont parfois un rapport assez lointain avec l'Informatique Scientifique, mais ils permettent de mieux situer le contexte scientifique de l'époque. Certains autres événements ont une importance toute relative selon votre grille de lecture. Nomenclature Mathématiques, analyse numérique, calcul numérique, algorithmique Eléments Finis, calcul de structure, mécanique, CFD CAO, infographie, cartographie Informatique, calcul intensif Programmation, calcul formel et symbolique, intelligence artificielle, cryptographie - 2000 Tables numériques babyloniennes de carrés et cubes - 1800 Algorithme de Babylone (approximation des racines carrées) - 220 Calcul de la circonférence de la Terre par Eratosthène de Cyrène - 225 Approximation de π par Archimèdes de Syracuse - 150 Hipparque de Rhodes utilise des interpolations linéaires pour calculer la position des corps célestes - 87 Machine d'Anticythère pour calculer les positions astronomiques (Grèce) 200 Abaques chinois 263 Première méthode d'élimination de Gauss par Liu Hui (Chine) 450 Calcul de π avec 6 décimales par Tsu Chung-Chih et Tsu Keng-Chih 550 Apparition du zéro et de la numération de position (Inde) 600 Liu
    [Show full text]