Three Issues in the Use of Versioned Hypermedia for Software Development Systems Tien Nguye
CurrentIssues

• By1884 25% • By1919 75% • In 1928 99%
Why important
• The election is seen as an opportunity to influence future government policy
• Only to make a deposit of 500 pounds
What happens in an election
• Everyone on the “electoral register” receives a voting card in the mails with details of when and where to vote
Recent Political Trends
• In the 1970s, the first woman Prime Minister committed to the idea of small government and free-market economics and less concerned with being “fatherly” .
Class
• Social class is a complex topic, but British society class is more important than in other countries. Difference
•
Characteristic
• How to divide the classes: employment (the main guide), cultural differences, education. Class
NVIDIA Data Center GPU Driver version 450.80.02 (L

NVIDIA Data Center GPU Driver version 450.80.02 (Linux) / 452.39 (Windows)Release NotesTable of Contents Chapter 1. Version Highlights (1)1.1. Software Versions (1)1.2. Fixed Issues (1)1.3. Known Issues (2)Chapter 2. Virtualization (5)Chapter 3. Hardware and Software Support (7)Chapter 1.Version HighlightsThis section provides highlights of the NVIDIA Data Center GPU R450 Driver (version 450.80.02 Linux and 452.39 Windows).For changes related to the 450 release of the NVIDIA display driver, review the file "NVIDIA_Changelog" available in the .run installer packages.Driver release date: 09/30/20201.1. Software Versions07/28/2020: For this release, the software versions are listed below.‣CUDA Toolkit 11: 11.03Note that starting with CUDA 11, individual components of the toolkit are versionedindependently. For a full list of the individual versioned components (e.g. nvcc, CUDA libraries etc.), see the CUDA Toolkit Release Notes‣NVIDIA Data Center GPU Driver: 450.80.02 (Linux) / 452.39 (Windows)‣Fabric Manager: 450.80.02 (Use nv-fabricmanager -v)‣GPU VBIOS:‣92.00.19.00.01 (NVIDIA A100 SKU200 with heatsink for HGX A100 8-way and 4-way)‣92.00.19.00.02 (NVIDIA A100 SKU202 w/o heatsink for HGX A100 4-way)‣NVSwitch VBIOS: 92.10.14.00.01‣NVFlash: 5.641Due to a revision lock between the VBIOS and driver, VBIOS versions >= 92.00.18.00.00 must use corresponding drivers >= 450.36.01. Older VBIOS versions will work with newer drivers. For more information on getting started with the NVIDIA Fabric Manager on NVSwitch-based systems (for example, HGX A100), refer to the Fabric Manager User Guide.1.2. Fixed Issues‣Various security issues were addressed. For additional details on the med-high severity issues, review the NVIDIA Security Bulletin 5075 .‣Fixed an issue where using CUDA_VISIBLE_DEVICES environment variable to restrict devices seen by CUDA on a multi-GPU A100 system (such as DGX A100 or HGX A100) may cause an out-of-memory error for some workloads, for example when running with CUDA IPC.‣Fixed an issue with ECC DBE handling on A100 resulting in an incorrect part of GPU memory being retired. The faulty memory would continue to be available even afterresetting the GPU/rebooting the system and hitting the same DBE every time could make the GPU unusable.‣Fixed an issue with ECC DBE handling on A100 resulting in an incorrect part of GPU memory being retired. The faulty memory would continue to be available even afterresetting the GPU/rebooting the system and hitting the same DBE every time could make the GPU unusable.1.3. Known IssuesGeneral‣By default, Fabric Manager runs as a systemd service. If using DAEMONIZE=0 in the Fabric Manager configuration file, then the following steps may be required.1.Disable FM service from auto starting. (systemctl disable nvidia-fabricmanager)2.Once the system is booted, manually start FM process. (/usr/bin/nv-fabricmanager-c /usr/share/nvidia/nvswitch/fabricmanager.cfg). Note, since the processis not a daemon, the SSH/Shell prompt will not be returned (use another SSH shell for other activities or run FM as a background task).‣There is a known issue with cross-socket GPU to GPU memory consistency that is currently under investigation‣When starting the Fabric Manager service, the following error may be reported: detected NVSwitch non-fatal error 10003 on NVSwitch pci. This error is not fatal and no functionality is affected. This issue will be resolved in a future driver release.‣On NVSwitch systems with Windows Server 2019 in shared NVSwitch virtualization mode, the host may hang or crash when a GPU is disabled in the guest VM. This issue is under investigation.‣In some cases, after a system reboot, the first run of nvidia-smi shows an ERR! for the power status of a GPU in a multi-GPU A100 system. This issue is not observed when running with peristence mode enabled.GPU Performance CountersThe use of developer tools from NVIDIA that access various performance countersrequires administrator privileges. See this note for more details. For example, readingNVLink utilization metrics from nvidia-smi (nvidia-smi nvlink -g 0) would require administrator privileges.NoScanout ModeNoScanout mode is no longer supported on NVIDIA Data Center GPU products. If NoScanout mode was previously used, then the following line in the “screen” section of /etc/X11/xorg.conf should be removed to ensure that X server starts on data center products:Option "UseDisplayDevice" "None"NVIDIA Data Center GPU products now support one display of up to 4K resolution.Unified Memory SupportSome Unified Memory APIs (for example, CPU page faults) are not supported on Windows in this version of the driver. Review the CUDA Programming Guide on the system requirements for Unified MemoryCUDA and unified memory is not supported when used with Linux power management states S3/S4.IMPU FRU for Volta GPUsThe driver does not support the IPMI FRU multi-record information structure for NVLink. See the Design Guide for Tesla P100 and Tesla V100-SXM2 for more information.Video Memory SupportFor Windows 7 64-bit, this driver recognizes up to the total available video memory on data center cards for Direct3D and OpenGL applications.For Windows 7 32-bit, this driver recognizes only up to 4 GB of video memory on data center cards for DirectX, OpenGL, and CUDA applications.Experimental OpenCL FeaturesSelect features in OpenCL 2.0 are available in the driver for evaluation purposes only.The following are the features as well as a description of known issues with these features in the driver:Device side enqueue‣The current implementation is limited to 64-bit platforms only.‣OpenCL 2.0 allows kernels to be enqueued with global_work_size larger than the compute capability of the NVIDIA GPU. The current implementation supports only combinations of global_work_size and local_work_size that are within the compute capability of the NVIDIA GPU. The maximum supported CUDA grid and block size of NVIDIA GPUs is available at /cuda/cuda-c-programming-guide/index.html#computecapabilities.For a given grid dimension, the global_work_size can be determined by CUDA grid size x CUDA block size.‣For executing kernels (whether from the host or the device), OpenCL 2.0 supports non-uniform ND-ranges where global_work_size does not need to be divisible by thelocal_work_size. This capability is not yet supported in the NVIDIA driver, and therefore not supported for device side kernel enqueues.Shared virtual memory‣The current implementation of shared virtual memory is limited to 64-bit platforms only.Chapter 2.VirtualizationTo make use of GPU passthrough with virtual machines running Windows and Linux, the hardware platform must support the following features:‣ A CPU with hardware-assisted instruction set virtualization: Intel VT-x or AMD-V.‣Platform support for I/O DMA remapping.‣On Intel platforms the DMA remapper technology is called Intel VT-d.‣On AMD platforms it is called AMD IOMMU.Support for these features varies by processor family, product, and system, and should be verified at the manufacturer's website.Supported HypervisorsThe following hypervisors are supported:Tesla products now support one display of up to 4K resolution.Supported Graphics CardsThe following GPUs are supported for device passthrough:VirtualizationChapter 3.Hardware and SoftwareSupportSupport for these feature varies by processor family, product, and system, and should be verified at the manufacturer's website.Supported Operating Systems for NVIDIA Data Center GPUsThe Release 450 driver is supported on the following operating systems:‣Windows x86_64 operating systems:‣Microsoft Windows® Server 2019‣Microsoft Windows® Server 2016‣Microsoft Windows® 10‣The table below summarizes the supported Linux 64-bit distributions. For a complete list of distributions, kernel versions supported, see the CUDA Linux System Requirements documentation.Hardware and Software Support Note that SUSE Linux Enterprise Server (SLES) 15.1 is provided as a preview for Arm64 server since there are known issues when running some CUDA applications related to dependencies on glibc 2.27.Supported Operating Systems and CPU Configurations for HGX A100The Release 450 driver is validated with HGX A100 on the following operating systems and CPU configurations:‣Linux 64-bit distributions:‣Red Hat Enterprise Linux 8.1 (in 4/8/16-GPU configurations)‣CentOS Linux 7.7 (in 4/8/16-GPU configurations)‣Ubuntu 18.04.4 LTS (in 4/8/16-GPU configurations)‣SUSE SLES 15.1 (in 4/8/16-GPU configurations)‣Windows 64-bit distributions:‣Windows Server 2019 (in 4/8/16-GPU configurations)‣CPU Configurations:‣AMD Rome in PCIe Gen4 mode‣Intel Skylake/Cascade Lake (4-socket) in PCIe Gen3 modeSupported Virtualization ConfigurationsThe Release 450 driver is validated with HGX A100 on the following configurations:‣Passthrough (full visibility of GPUs and NVSwitches to guest VMs):‣8-GPU configurations with Ubuntu 18.04.4 LTS‣Shared NVSwitch (guest VMs only have visibility of GPUs and full NVLink bandwidth between GPUs in the same guest VM):‣16-GPU configurations with Ubuntu 18.04.4 LTSAPI SupportThis release supports the following APIs:‣NVIDIA® CUDA® 11.0 for NVIDIA® Kepler TM, Maxwell TM, Pascal TM, Volta TM, Turing TM and NVIDIA Ampere architecture GPUs‣OpenGL® 4.5‣Vulkan® 1.1‣DirectX 11‣DirectX 12 (Windows 10)‣Open Computing Language (OpenCL TM software) 1.2Note that for using graphics APIs on Windows (i.e. OpenGL, Vulkan, DirectX 11 and DirectX 12) or any WDDM 2.0+ based functionality on Tesla GPUs, vGPU is required. See the vGPU documentation for more information.Supported NVIDIA Data Center GPUsThe NVIDIA Data Center GPU driver package is designed for systems that have one or more Tesla products installed. This release of the driver supports CUDA C/C++ applications and libraries that rely on the CUDA C Runtime and/or CUDA Driver API.NoticeTHE INFORMATION IN THIS GUIDE AND ALL OTHER INFORMATION CONTAINED IN NVIDIA DOCUMENTATION REFERENCED IN THIS GUIDE IS PROVIDED “AS IS.” NVIDIA MAKES NO WARRANTIES, EXPRESSED, IMPLIED, STATUTORY, OR OTHERWISE WITH RESPECT TO THE INFORMATION FOR THE PRODUCT, AND EXPRESSLY DISCLAIMS ALL IMPLIED WARRANTIES OF NONINFRINGEMENT, MERCHANTABILITY, AND FITNESS FOR A PARTICULAR PURPOSE. Notwithstanding any damages that customer might incur for any reason whatsoever, NVIDIA’s aggregate and cumulative liability towards customer for the product described in this guide shall be limited in accordance with the NVIDIA terms and conditions of sale for the product.THE NVIDIA PRODUCT DESCRIBED IN THIS GUIDE IS NOT FAULT TOLERANT AND IS NOT DESIGNED, MANUFACTURED OR INTENDED FOR USE IN CONNECTION WITH THE DESIGN, CONSTRUCTION, MAINTENANCE, AND/OR OPERATION OF ANY SYSTEM WHERE THE USE OR A FAILURE OF SUCH SYSTEM COULD RESULT IN A SITUATION THAT THREATENS THE SAFETY OF HUMAN LIFE OR SEVERE PHYSICAL HARM OR PROPERTY DAMAGE (INCLUDING, FOR EXAMPLE, USE IN CONNECTION WITH ANY NUCLEAR, AVIONICS, LIFE SUPPORT OR OTHER LIFE CRITICAL APPLICATION). NVIDIA EXPRESSLY DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY OF FITNESS FOR SUCH HIGH RISK USES. NVIDIA SHALL NOT BE LIABLE TO CUSTOMER OR ANY THIRD PARTY, IN WHOLE OR IN PART, FOR ANY CLAIMS OR DAMAGES ARISING FROM SUCH HIGH RISK USES.NVIDIA makes no representation or warranty that the product described in this guide will be suitable for any specified use without further testing or modification. Testing of all parameters of each product is not necessarily performed by NVIDIA. It is customer’s sole responsibility to ensure the product is suitable and fit for the application planned by customer and to do the necessary testing for the application in order to avoid a default of the application or the product. Weaknesses in customer’s product designs may affect the quality and reliability of the NVIDIA product and may result in additional or different conditions and/or requirements beyond those contained in this guide. NVIDIA does not accept any liability related to any default, damage, costs or problem which may be based on or attributable to: (i) the use of the NVIDIA product in any manner that is contrary to this guide, or (ii) customer product designs.Other than the right for customer to use the information in this guide with the product, no other license, either expressed or implied, is hereby granted by NVIDIA under this guide. Reproduction of information in this guide is permissible only if reproduction is approved by NVIDIA in writing, is reproduced without alteration, and is accompanied by all associated conditions, limitations, and notices.TrademarksNVIDIA and the NVIDIA logo are trademarks and/or registered trademarks of NVIDIA Corporation in the Unites States and other countries. Other company and product names may be trademarks of the respective companies with which they are associated.Copyright© 2020 NVIDIA Corporation. All rights reserved.。
数据库英文版第六版课后答案 (28)

The E-R model itself and E-R diagrams are used often in the text. It is important that students become comfortable with them. The E-R model is an excellent context for the introduction of students to the complexity of database design. For a given enterprise there are often a wide variety of E-R designs. Although some choices are arbitrary, it is often the case that one design is inherently superior to another. Several of the exercises illustrate this point. The evaluation of the goodness of an E-R design requires an understanding of the enterprise being modeled and the applications to be run. It is often possible to lead students into a debate of the relative merits of competing designs and thus illustrate by example that understanding the application is often the hardest part of database design.
RalphWaldoEmerson拉尔夫·沃尔多·爱默生

He continued his speeches against slavery, but never with the fire of Theodore Parker. In 1857 he wrote an essay on “Memory” but ironically, in his later years, his own memory would falter, especially after his beloved house burned in 1872. He died quietly of pneumonia ( 肺 炎 ) in 1882.
Henry David Thoreau (July 12, 1817 – May 6, 1862) was an American author, poet, abolitionist(废奴主义者), naturalist, tax resister, development critic, surveyor, historian, philosopher, and leading transcendentalist. He is best known for his book Walden, a reflection upon simple living in natural surroundings, and his essay, Civil Disobedience, an argument for individual resistance to civil government in moral opposition to an unjust state.
In 1835, Emerson married Lydia Jackson; they lived in Concord and had four children while he settled into his life of conversations, reading and writing, and lecturing, which furnished a comfortable income.
译林版高中英语必修一Unit4 Extended reading 教案(雅礼)

C. Where: Where do the standards of beauty come from?
Standards of beauty in the media can have a big influence on what you think of
your physical appearance. Para.2
教学目标:
By the end of the section, students will be able to : 1. Identity the structure and the main idea of the argument; 2. Locate specific information related to the content; 3. Have a positive attitude towards physical appearance.
Narration
Question: What issues will you address if you are to write this argumenta?
How? Who? What?
When: When do people tend to judge a book by its cover? Where: Where do the standards of beauty come from? Who: 1. Who are easy to judge a book by its cover?
Judging from the title, what type of writing may it belong to?
Provide three options:
Argumentation
研究生学术英语答案Unit 3

Introduction to Drama Films (1)
Unit 3 The Shawshank Redemption
Section A Focused Activities Part 1 Lead-in
Part 2 Watching & Listening
Part 3 Fun Time
Section A
Section A
Part 2 Watching & Listening
Directions: In this part, you’re going to watch six clips from the movie The Shawshank Redemption. After watching each clip, please complete the tasks following it.
(俚)同性恋者 挖掘隧道 加价 专业
mica n.
shale n. limestone n.
(俚) 美元
n.
自命不凡的
散步,漫步 保护
Section A
Part 2 Watching & Listening
Task 1 Watch the clip and then some questions will be asked about it. Choose the best answer to each question from the four choices given below.
Section A
Task
Part 1 Lead-in
Can you match the following pictures with their descriptions? Try to imagine their roles in the movie.
做雅思阅读的问题英语作文

做雅思阅读的问题英语作文The world we live in today is a complex and rapidly changing one. With the rapid advancements in technology, the way we communicate, work, and live our daily lives has undergone a significant transformation. One of the most notable changes has been the rise of the digital age and the increasing reliance on technology in our everyday lives.The digital age has brought about a wealth of opportunities and challenges. On the one hand, it has revolutionized the way we access and share information, connect with others, and conduct business. The internet has become an indispensable tool, allowing us to communicate with people around the globe, access a vast array of knowledge, and engage in a wide range of activities from the comfort of our own homes. The advent of social media has further amplified our ability to connect and share with one another, fostering a sense of global community.Moreover, the digital age has ushered in a new era of innovation and entrepreneurship. Technological advancements have enabled the creation of groundbreaking products and services that have transformed entire industries. Entrepreneurs and innovators haveleveraged the power of technology to disrupt traditional business models, create new opportunities, and drive economic growth.However, the digital age has also brought about a host of challenges that we must navigate. The proliferation of technology has led to concerns about privacy, security, and the ethical use of data. As more of our personal information and activities are stored and shared online, the risk of data breaches and cybercrime has increased, requiring us to be vigilant in protecting our digital identities and safeguarding sensitive information.Additionally, the constant exposure to digital media and the reliance on technology in our daily lives have raised concerns about the impact on our mental health and well-being. The pressure to be constantly connected and the fear of missing out can lead to increased stress, anxiety, and social isolation. The sedentary nature of many digital activities has also contributed to concerns about physical health and the rise of issues such as obesity and musculoskeletal problems.Furthermore, the digital age has exacerbated existing social and economic inequalities. The digital divide, the gap between those who have access to technology and those who do not, has become a significant barrier to social and economic mobility. Individuals and communities without access to reliable internet, digital devices, andthe necessary skills to navigate the digital landscape are at a significant disadvantage in terms of education, employment, and overall quality of life.Despite these challenges, the digital age also presents opportunities for addressing some of the world's most pressing issues. The use of technology in fields such as healthcare, education, and environmental conservation has the potential to revolutionize the way we approach these challenges. For example, telemedicine and remote patient monitoring have expanded access to healthcare, particularly in underserved communities. Online learning platforms have democratized education, making it more accessible to individuals around the world. The use of data analytics and digital technologies in environmental conservation efforts has enabled more effective monitoring and management of natural resources.As we navigate the complexities of the digital age, it is essential that we approach it with a balanced and thoughtful perspective. We must strive to harness the power of technology to improve our lives while also addressing the ethical, social, and environmental implications of its use. This will require a collaborative effort among policymakers, technology companies, educators, and individuals to ensure that the benefits of the digital age are equitably distributed and that its risks are mitigated.In conclusion, the digital age has fundamentally transformed the world we live in. While it has brought about numerous opportunities, it has also presented significant challenges that we must address as we move forward. It is crucial that we approach the digital age with a sense of purpose, responsibility, and a commitment to creating a more equitable and sustainable future for all. By doing so, we can ensure that the transformative power of technology is harnessed in a way that enhances our lives, strengthens our communities, and creates a better world for generations to come.。
TEM-4 Exercise 10

TEM-4 Exercise 10Questions 22 to 26 are based on the following passage:California is a land of variety and contrast. Almost every type of physical land feature, sort of arctic ice fields and tropical jungles can be found within its borders. Sharply contrasting types of land often lie very close to one another.People living in Bakersfield, for instance, can visit the Pacific Ocean and the coastal plain, the fertile San Joaquin Valley, the arid Mojave Desert,and the high Sierra Nevada, all within a radius of about 100 miles. In other areas it is possible to go snow skiing in the morning and surfing in the evening of the same day, without having to travel long distance.Contrast abounds in California. The highest point in the United States (outside Alaska ) is in California, and so is the lowest point (including Alaska)。
英语问题类型作文模板

英语问题类型作文模板英文回答:What are the different types of English question types?There are many different types of English question types, but they can be broadly classified into three main categories:1. Factual questions ask for information that can be found in a text or passage. These questions are typically answered with a single word or phrase. For example:What is the capital of France?How many states are there in the United States?2. Inferential questions ask for information that is not explicitly stated in a text or passage. These questions require the reader to make inferences based on theinformation they have read. For example:Why did the author write this passage?What is the main idea of this paragraph?3. Evaluative questions ask for the reader's opinion or judgment about a text or passage. These questions cannot be answered with a single word or phrase, and they require the reader to provide a more developed response. For example:Do you agree with the author's argument?What do you think of the author's writing style?How to answer different types of English questions。
U-Net用于包含无答案问题的机器阅读理解的轻量级模型

第35卷第2期2021年2月中文信息学报JO U R N A L OF CHINESE INFO R M A TIO N PROCESSINGVol. 35,No. 2 Feb.,2021文章编号:1003-0077(2021)02-0099-08U -N e t :用于包含无答案问题的机器阅读理解的轻量级模型孙付1,李林阳1,邱锡鹏1,刘扬黄萱菁1(1.复旦大学计算机学院,上海201210; 2.流利说硅谷人工智能实验室,美国旧金山94104)摘要:处理机器阅读理解任务时.识别其中没有答案的问题是自然语言处理领域的一个新的挑战。
该文提出U -N e t 模型来处理这个问题,该模型包括3个主要成分:答案预测模块、无答案判别模块和答案验证模块。
该模型用一个U 节点将问题和文章拼接为一个连续的文本序列,该U 节点同时编码问题和文章的信息,在判断问题是否 有答案时起到重要作用,同时对于精简U -N e t 的结构也有重要作用。
与基于预训练的B E R T 不同,U -N e t 的U 节 点的信息获取方式更多样,并且不需要巨大的计算资源就能有效地完成机器阅读理解任务。
在SQuAD 2.0中,11-他1的单模型['1得分72.6、£1^得分69.3,11-仏1的集成模型/;'|得分74.9、£\1得分71.4.均为公开的非基于大规模预训练语言模型的模型结果的第一名。
关键词:机器阅读理解;SQ uAD ;注意力机制 中图分类号:TP391文献标识码:AU-Net : Lightweight Model for Machine Reading Comprehensionwith Unanswerable QuestionsSUN Fu1 . LI Linyang1 . QIU Xipeng1 , LIU Yang2 , HUANG Xuanjing1(1. School of Computer Science, Fudan University,Shanghai 201210,China;2. Liulishuo Silicon Valley AI Lab, San Francisco 94104» USA)Abstract : Machine reading comprehension with unanswerable questions is a challenging task. In this paper, we propose a unified models called U-Net» with three important components : answer pointer^ no-answer pointer, and answer verifier. We introduce a universal node which processes the question and its context passage as a single contigu- ous sequence of tokens. The universal node encodes the fused information from both the quev s tion and passage» and plays an important role to predict whether the question is answerable and also greatly improves the conciseness of the U-Net. Different from the modeLs based on pre-trained B E R T , universal node fuses information from passage and question in a variety of ways and avoids the huge computation. T he single U-Net model achieves the F\ score of 72.6 and the EM score of 69.3 on SQuAD 2.0, and the ensemble version, 74.9 and 71.4» respectively. Both version of U-Net models rank top among the models without a large scale pre-trained language model.Keywords : machine reading comprehension;SQuAD;attention mechanism了丰硕的成果。
c57.12.20-1997

ANSI C57.12.20-1997American National Standard for Transformers—Standard for Overhead Type Distribution Transformers, 500 kVA and Smaller:High Voltage, 34500 Volts and Below:Low Voltage, 7970/13800Y Volts and BelowApproved 5/3/97American National Standards Institute, Inc.American National StandardApproval of an American National Standard requires verification by ANSI that the requirements for due process, consensus, and other criteria for approval have been met by the standards developer.Consensus is established when, in the judgment of the ANSI Board of Standards Review, substantial agreement has been reached by directly and materially affected interests. Substantial agreement means much more than a simple majority, but not necessarily unanimity. Consensus requires that all views and objections be considered, and that a concerted effort be made toward their resolution.The use of American National Standards is completely voluntary; their existence does not in any respect preclude anyone, whether he has approved the standards or not, from manufacturing, marketing, purchasing, or using products, processes, or procedures not conforming to the standards.The American National Standards Institute does not develop standards and will in no circumstances give an interpretation of any American National Standard. Moreover, no person shall have the right or authority to issue an interpretation of an American National Standard in the name of the American National Standards Institute. Requests for interpretations shall be addressed to the secretariat or sponsor whose name appears on the title page of this standard.CAUTION NOTICE: This American National Standard may be revised or withdrawn at any time. The procedures of the American National Standards Institute require that action be taken to reaffirm, revise, or withdraw this standard no later than five years from the date of approval. Purchasers of American National Standards may receive current information on all standards by calling or writing the American National Standards Institute.Foreword (This Foreword is not part of American National Standard C57.12.20-1997)In 1938 the EEI-NEMA (Edison Electric Institute-National Electrical Manufacturers Association) Joint Committee on Standards for Distribution Transformers was organized to develop standards for the various types of distribution transformers. For 23 years the continuous work of this Joint Committee was evidenced by a series of reports published jointly by the Edison Electric Institute (EEI) and the National Electrical Manufacturers Association (NEMA). The last report on overhead-type distribution transformers was the Seventh Report published in April 1961. The Joint Committee’s last two reports on overhead-type distribution transformers were approved as American National Standards, the Seventh Report being reissued as American National Standard C57.12.201938-1962.To avoid further duplication of effort and to simplify future revisions, the EEI-NEMA Joint Committee on Standards for Distribution Transformers was dissolved and replaced by new subcommittees of Accredited Standards Committee on Transformers, Regulators, and Reactors, C57. The work on standards for overhead-type distribution transformers was taken over by the Subcommittee on Distribution Transformers, Overhead and Pad-Mounted, C57.12.2.This standard was prepared by IEEE Subcommittee C57.12.2 on behalf of C57 and is a revision of ANSI C57.12.20-1988, Requirements for Overhead-Type Distribution Transformers, 500 kVA and Smaller: High-V oltage, 67000 Volts and Below; Low-V oltage, 15000 Volts and Below. The previous edition was dated 1981. The 1981 revision included detailed requirements on relief of excessive pressure. The 1988 revision recognized the step-down and series-multiple designs in distribution transformers, and omitted the platform- or station-type transformer. In recognition of the dramatic reduction in catastrophic failures of overhead transformers since the formulation of NEMA Standards Proposal Number TR-P7-1975, the 1988 revision included in Section 8. this updated NEMA proposal that is now designated 2.02 of NEMA Standards Publication for Transformers, Regulators, and Reactors, NEMA TR 1-1980. The general industry consensus is that transformers that are built in conformance with this standard and that have adequate overcurrent protection, and recognizing the limitations included therein, will provide for enclosures with reasonable withstand capability.Suggestions for improvement of this standard will be welcome. They should be sent to the National Electrical Manufacturers Association, 1300 North 17th Street, Suite 1847, Rosslyn, Virginia, 22209This standard was processed and approved for submittal to ANSI by Accredited Standards Committee on Transformers, Regulators, and Reactors, C57. Committee approval of the standard does not necessarily imply that all committee members voted for its approval.At the time it approved this standard, the C57 Committee had the following members:Paul Orehek, (Chairman)J. D. Borst, (Vice Chairman)John A. Gauthier, (Secretary)Organization of RepresentativeU.S. Dept. of Energy,Western Area Power Administration..............................................................Kenneth C. WolohonDept of Navy Civil Engineer Corps.Civil Engineer Corps.....................................................................................C.M. MandevilleDept of Interior, Bureau of Reclamation............................................................D. J. MulliganDept of Agriculture, REA..................................................................................J. BohlkTennessee Valley Authority................................................................................F. LewisElectric Light & Power DelegationPublic Service Electric & Gas Co..................................................................P.E. Orehek (Chairman of Delegation) Consolidated Edison Co. of NY, Inc. ...........................................................E. A. BertoliniNiagara Mohawk Power Corp. .....................................................................T. DiamantisT.U. Electric ..................................................................................................K. S. HanusEdison Electric Institute ...............................................................................Gary Miller (Alternate)Southern California Edison Co. ......................................................................G. A. PaivaTampa Electric Co. ..........................................................................................J. SullivanInstitute of Electrical & Electronic EngineersDelegationABB Power T& D Company ...........................................................................J. D. Borst (Chairman of Delegation) Penn Power ......................................................................................................W. B. BinderBeckwith Electric Company .............................................................................J. H. HarlowBaltimore Gas & Electric Company ................................................................J. W. MatthewsSouthern Company Services Inc. ....................................................................B. PatelPEMCO Corporation........................................................................................H. Smith (Alternate) Commonwealth Edison ...................................................................................T. P. TraubNational Electrical ManufacturersAssociation DelegationGeneral Electric Company ..............................................................................G. Coulter (Chairman of Delegation) Cooper Power Systems .....................................................................................M. AustinR. E. Uptegraff Manufacturing Co....................................................................S. EndersbeCooper Power Systems......................................................................................A. Ghafourian (Alternate)Square D Company............................................................................................P.J. HopkinsonABB Power T&D Company..............................................................................K. R. LinsleyABB Power T&D Company ............................................................................R. Plaster (Alternate)North American Transformer, Inc. ..................................................................H. RobinHevi-Duty Electric ............................................................................................J. Sims (Alternate)Underwriters Laboratories, Inc. ...........................................................................M. SchackerMembers of Working Group C57.12.20Glenn Andersen Rick Anderson Jerry Bishop Charles V. Brown Ned Brush Charles Bryant William E. Carter Tom Diamantis Kevin Edwards Ali Ghafourian Ken Hanus David Helriegel Richad HollingsworthJohn HuntRon JordanBrian KlaponskiJohn LazarJames LongMark LovelessDave LyonAl McGuireMatthew MingoiaSam MichaelNorvin MoheskyGerry PalvaJesse PattonTom PekarekClyde PearsonJerry RoweDavie RollingRobert ScheuJeff SchneiderEd SmithJerry SmithRon StaharaAl TrautMiguel ValbuenaDorman WhitleyAlan WilksCLAUSE PAGE 1. Scope (1)1.1 (1)1.2 (1)2. Referenced and related publications (1)2.1Referenced American National Standards (1)2.2Related publications (2)3. Ratings (2)3.1Kilovolt-ampere ratings (2)3.2Voltage ratings and tap ratings (2)4. Basic lightning impulse insulation levels and dielectric test levels (5)4.1 (5)4.2 (5)5. Tests (5)5.1General (5)5.2Dielectric tests (5)6. Construction (6)6.1Bushings and terminals (8)6.2Accessory equipment (20)6.3Polarity, terminal markings, and angular displacement (24)6.4Oil preservation (36)6.5Tanks (36)7. Storage and installation (37)7.1Storage (37)7.2Installation (37)8. Design tests for fault current capability of overhead distribution transformer enclosures (37)8.1Objective (37)8.2Definitions (38)8.3General requirements (38)8.4Tests (38)8.5Test number 1 — an arcing fault in an enclosure (38)8.6Test number 2 — for enclosures with internal fusible elements (39)8.7Test results (39)Annex A (informative) Informational (40)AMERICAN NATIONAL STANDARDfor Transformers—Standard For Overhead Type Distribution Transformers,500 kVA and Smaller: High Voltage, 34500 Volts and Below; Low Voltage, 7970/13800Y Volts and Below1. Scope1.1This standard is intended for use as a basis for determining the performance, interchangeability, and safety of the equipment covered, and to assist in the proper selection of such equipment.1.2This standard covers certain electrical, dimensional, and mechanical characteristics and takes into consideration certain safety features of single- and three-phase, 60-Hz, mineral-oil-immersed, self-cooled, overhead-type distribution transformers 500 kVA and smaller, with high voltages 34500 volts and below and low voltages 7970/ 13800Y volts and below. Such transformers may include one or more of the following features:1)High-voltage, overcurrent protection2)High-voltage, overvoltage protection3)Low-voltage, overcurrent protection4)Low-voltage, overvoltage protectionNOTE — For polychlorinated-biphenyl (PCB) contamination in transformers, refer to the latest federal regulations.2. Referenced and related publications2.1 Referenced American National StandardsThis standard is intended for use in conjunction with the following American National Standards. All characteristics, definitions, terminology, voltage designations, and tests, except as specified herein, shall be in accordance with these referenced American National Standards. When the following referenced standards are superseded by a revision approved by the American National Standards Institute, Inc., the latest revision shall apply.ANSI C57.12.70, Terminal Markings and Connections for Distribution and Power TransformersANSI C135.1, Galvanized Steel Bolts and Nuts for Overhead Line ConstructionANSI/IEEE C37.40 and C37.40a, Service Conditions and Definitions for High-Voltage Fuses, Distribution Enclosed Single-Pole Air Switches, Fuse Disconnecting Switches, and AccessoriesANSI/IEEE C37.41, Design Tests for High-Voltage Fuses, Distribution Enclosed Single-Pole Air Switches, Fuse Disconnecting Switches, and AccessoriesANSI/IEEE C57.12.00, General Requirements for Liquid-Immersed Distribution, Power, and Regulating TransformersANSI/IEEE C57.12.80, Terminology for Power and Distribution TransformersANSI/IEEE C57.12.90, Test Code for Liquid-Immersed Distribution, Power, and Regulating Transformers and Guide for Short-Circuit Testing of Distribution and Power TransformersANSI/IEEE C57.91, Guide for Loading Mineral-Oil-Immersed Overhead and Pad-Mounted Distribution Transformers Rated 500 kVA and Less with 65°C or 55° Αverage Winding Rise2.2 Related publicationsThe following publications are listed for information only and are not essential for the completion of the requirements of this standard: (Latest Revision shall apply)NEMA MG2, Safety Standard for Construction and Guide for Selection, Installation, and Use of Electric Motors (available from National Electrical Manufacturers Association, 1300 North 17th Street, Suite 1847, Rosslyn, Virginia 22209).NEMA TR 1, Transformers, Regulators, and Reactors (available from National Electrical Manufacturers Association, 1300 North 17th Street, Suite 1847, Rosslyn, Virginia 22209).MIL-STD-209C, Swinging Eyes and Attachments for Lifting and Tying Down Military Equipment. (available from Commanding Officer, Naval Publications and Forms, 5801 Tabor Avenue, Philadelphia, PA 19120).3. Ratings3.1 Kilovolt-ampere ratingsKilovolt-ampere ratings are continuous and are based on not exceeding either a 65°C average winding temperature rise or an 80°C hot-spot temperature rise. The temperature rise of the insulating oil shall not exceed 65°C when measured near the top of the tank. Kilovolt-ampere ratings for single-phase and three-phase transformers shall be as shown in Table 1. These ratings are based on the usual temperature and altitude service conditions specified in ANSI/IEEE C57.12.00 .3.2 Voltage ratings and tap ratings3.2.1V oltage ratings for single-phase and three-phase transformers shall be in accordance with Tables 2, 3, and 4. No taps are to be provided unless otherwise specified in accordance with 3.2.23.2.2When specified, tap ratings for single- and three-phase transformers shall be in accordance with Table 5. All tap ratings shall be at rated kilovolt-amperes, except as otherwise indicated. V oltages in Tables 2, 3, and 4 are without tapsTable 1— Kilovolt-ampere ratingsTable 2— Ratings for single-phase transformers (single ratio)Single PhaseThree Phase10301545257537-1/2112-1/25015075225100300167500250333500Transformer High VoltageMinimum kVA Rating for Low Voltage Rating of:RatingBIL (kV)120/240 (1)(1)Low-voltage rating of 120/240 volts or 240/480 volts is suitable for series, multiple, or three-wire service 277or 240/480 (1)2400 or 48007200 or 7620 or 7970Table 7 Figure Reference2400/4160Y 601010------94800/8320Y 751010------97200/12470Y 95101050---1012 470GrdY/720095101050---6, 77620/13 200Y 95101050---1013 200GrdY/762095101050---6, 712 000951010505010, 1113 200/22 860Y (2)(2) Suitable for wye-connection on systems where ground connections permit the use of 18-kV arresters 1251010505010, 1113 200951010505010, 1113 800GrdY/797095101050---6, 713 800/23 900Y (2)1251010505010, 1113 800951010505010, 1114 400/24 940Y (2)1251010505010, 1124 940GrdY/14 400(2)125101050506, 7, 816 340951010505010, 1134 500GrdY/19 920 (3) (4)(3) Suitable for wye-connection on systems where ground connections permit the use of 27-kV arresters (4) 125 KV BIL may be used based on user vendor agreement150101050506, 7, 834 5002002525505010, 11Table 3— Ratings for single-phase transformers (series — multiple)Table 4— Ratings for three-phase transformersTransformer High VoltageMinimum kVA Rating for Low Voltage Rating of:RatingMinimum BIL (kV) (1)(1) Arrester coordination may require higher BIL on Multiple connection than indicated to achieve a minimum protective level of 20%.120/240 (2)(2)Low-voltage rating of 120/240 volts or 240/480 volts is suitable for series, multiple, or three-wire service277or 240/480 (2)2400 or 4800Figure Table 8 Reference2400/4160Y x 7200/12 470Y 60 x 95101050104160GrdY/2400 x 12 470GrdY/720060 x 951010---6, 72400/4160Y x 7620/13 200Y 60 x 95101050104160GrdY/2400 x 13 200GrdY/762060 x 951010---6, 74800/8320Y x 7200/12 470Y 75 x 95101050108320GrdY/4800 x 12 470GrdY/720075 x 951010---6, 74800/8320Y x 7620/13 200Y 75 x 95101050108320GrdY/4800 x 13 200GrdY/762075 x 951010---6, 77200/12 470Y x 14 400/24 940Y 95 x 1251010501012 470GrdY/7200 x 24 940GrdY/14 40095 x 1251010---6, 77620/13 200Y x 14 400/24 940Y 95 x 1251010501013 200GrdY/7620 x 24 940GrdY/14 40095 x 1251010---6, 7Transformer High VoltageMinimum kVA Rating for Low Voltage Rating of:Rating (1)(1) All transformers are delta-connected unless otherwise specifiedMinimum BIL (kV)208Y/120240 or 480240 x 480480Y/2772400 or 4160Y/2400 or 4800 or 8320Y/4800Table 15 Figure Reference24004530303030---124160Y/24006030------30---124160Y 60303030------1241606030303030---1248006030303030---128320Y/48007530------30---128320Y 75---3030------12720075303030301501312 00095303030301501312 470Y/72009530------30---1312 470Y 95---3030------1313 200Y/76209530------30---1313 200Y 95---3030------1313 2009530---30301501313 80095303030301501313 800GrdY/79709530------30---1324 940GrdY/14 40012530------30---1334 500GrdY/19 92015030------30---13Table 5— Recommended taps for single-phase and three-phase transformersNOTE — No taps will be supplied if taps are not specified.4. Basic lightning impulse insulation levels and dielectric test levels4.1Basic lightning impulse insulation levels (BILs) shall be as shown in Tables 2, 3, and 4.4.2Dielectric test levels shall be in accordance with the distribution levels specified in ANSI/IEEE C57.12.00 .5. Tests5.1 GeneralExcept as specified in 5.2, tests shall be performed as specified in ANSI/IEEE C57.12.00 and in ANSI/IEEE C57.12.90 .5.2 Dielectric testsFor single-phase transformers with a BIL of 150 kV or less that have one high-voltage bushing and a high-voltage terminal permanently connected to ground, no applied-voltage test is required. Induced-voltage tests shall be performed by applying between the terminals of one winding a voltage that will be developed from the high-voltage line terminals to ground. This voltage shall be 1000 volts plus 3.46 times the rated transformer winding voltage, but in no case shall the line-to-ground voltage developed exceed 40 000 volts for 125 kV BIL or 50 000 volts for 150 kV BIL.For this test the neutral terminal shall be grounded. An applied potential test shall be applied on the low-voltage winding.Winding Voltage Above RatingBelow RatingThe Following Options are available for All Voltages:2400/4160Y 4800/8320Y 7200/12470Y 12 470GrdY/72007620/13 200Y Option 1(2) 2 - 1/2%(2) 2 - 1/2%13 200GrdY/762012 00013 200/22 860Y Option 2None (4) 2 - 1/2%13 20013 800GrdY/797034 500GrdY/19 92013 800/23 900Y 14 400/14 10013 500/13 20013 80014 400/14 10013 500/13 20014 400/24 940Y None 13 800/13 200/12 870/12 54016 340 (1)(1)Single Phase Only.17 200/16 77015 910/15 48024 940GrdY/14 400None 13 800/13 200/12 870/12 5406. ConstructionFor the purpose of this standard, two principal reference locations have been established, as shown in Figures 1 and 2. The first of these is a horizontal plane that passes through the top of the bolt slot in the upper support lug. For the second, the transformer cover has been divided into four segments. The segments are numbered in a clockwise direction with the centerline of segment 1 on the centerline of the low-voltage bushings, as shown in Figures 1 and 2.Figure 1— Segment designations and interchangeability dimensions forsingle phase transformersFigure 2— Segment designations and interchangeability dimensions for three phase transformersTable 6— Electrical characteristics of bushings6.1 Bushings and terminals6.1.1 Bushings 6.1.1.1Electrical characteristics of transformer bushings shall be as listed in Table 6.6.1.1.2The number, location, and arrangement of bushings for single-phase and three-phase transformers shall be as shown in Tables 7, 8, 9, and 15, and Figure 3. The centerline of the high-voltage bushings shall be located within the shaded areas. The positions of high-voltage bushings for three-phase transformers need not be symmetrical. Low-voltage bushings shall be of the sidewall or cover type and shall be individually mounted.6.1.1.3Unless otherwise specified, the color of bushings shall match Light Gray Number 70, Munsell Notation 5BG7.0/0.4.6.1.2 Terminals 6.1.2.1Terminal details shall be as shown in Figure 4.6.1.2.2High-voltage bushings of transformers 200 kV BIL and below shall be equipped with tinned, copper-alloy solderless connectors. High-voltage terminal sizes shall be as shown in Tables 10 and 11.6.1.2.3Low-voltage terminal sizes shall be as shown in Tables 12 and 13.6.1.2.4Terminals of low-voltage windings 600 volts and below shall be arranged for vertical take-off.6.1.2.5External spacing between low-voltage bushing terminals shall be such as to provide the maximum clearance between live metal parts in the working area. For low-voltage ratings above 600 volts, the electrical characteristics of the bushings determine the spacing. For low-voltage ratings 600 volts and below, spacings shall be within the limits of Table 14.BIL Withstand (kV)Creepage Distance (1)(1)Creepage distances are minimum values where no tolerance is specified.60-Hz Dry 1-Minute Withstand (kV)60-Hz Wet 1-Minute Withstand(kV)Inches Millimeters 30------10645------151360------212075------27249510-1/2 +/- 1/2267 +/- 133530150174326050Single Phase Transformer Bushings Only 95 (2)(2) For 16.34 kV rating only.16-1/2 +/- 1-1/2419 +/- 38353012516-1/2 +/- 1-1/2419 +/- 384236200266608075ANSI C57.12.20-1997Table 9— Number of low voltage terminals and arrangement for single-phase transformers Table 10— High-voltage terminal sizes for single-phase transformerskVA Range for High Voltage Rating of 34.5 kV and Below,14.4/24.94Y kV and Below, 34.5GrdY/19.92 kV and BelowLow-VoltageRatings(Volts)120/240------10 - 50(1)(1) Transformers with single high-voltage bushing. See 6.5.4.3.10 - 100 (1)167 (1)250 - 500240/480---------10 – 100167---277(2)(2) For 167 kVA and Below, low-voltage grounding provision on centerline below low-voltage terminals.10 - 500---------------2400 - 480050 - 500---------------7200 - 7970---50 - 500------------Size of TerminalOpening TerminalDetailFigureAWG Size of ConductorTerminal will AccommodatekVA Range for High-VoltageRating of:Inches Millimeters5 kVand Below7.2 kV - 34.5 kV5/167.94a No. 8 Solid to No 2 Stranded10 - 16710 - 500 5/815.94a No 6 Solid to No 4/0-19 Stranded250 - 500---Table 16— Angular displacementFigure 3— Number of terminals, descriptions, and arrangement for three phase transformersNOTES:1 — Threaded parts of connector shall be removeable without removing bushings.2 — Connector Clamping Bolts shall be 3/8, 1/2, 5/8, or 3/4 NC threads, class 2 fit.3 — One or two connector clamping bolts may be used, but U-bolts or J-bolts shall not be used.4 — Terminal of low-voltage windings 600 volts and below shall be arranged for vertical takeoff.5 — Terminals are to be tin plated and aluminum conductors are to be properly prepared.Figure 4a— Terminal detailsFigure 4b— Spade H — Terminal detailsFigure 4c— Spade J — Terminal details6.1.3 Neutral termination6.1.3.1On single-phase transformers having one high-voltage bushing, the H2 end of the winding shall be securely connected internally to the grounded clamping structure or the tank. This connection shall be independent of all other electrical connections.6.1.3.2On all three-phase transformers, a fully insulated low-voltage neutral bushing, X0, shall be provided when the low-voltage windings are wye-connected.6.1.3.3On three-phase transformers, a fully insulated high-voltage neutral bushing, H0, and a fully insulated low-voltage neutral bushing X0, shall be provided where wye-connected, high-voltage windings are rated 8.32Y kV and below. The low-voltage windings are rated 208Y/120 volts or 480Y/277 volts. The high-voltage and low-voltage neutrals shall be connected internally by a link that is accessible and capable of reconnection.6.1.3.4On three-phase transformers, a common fully insulated low-voltage type neutral bushing H0X0, shall be provided where wye-connected high-voltage windings are rated above 8.32Y kV and low-voltage windings are rated 208Y/120 or 480Y/277 volts. The high-voltage and low-voltage neutrals shall be connected internally by a link that is accessible and capable of reconnection.6.1.4 Terminal boardsOn single-phase transformers with low-voltage ratings of 120/240 volts or 240/480 volts, the internal connections to the low-voltage bushings on sizes 25 kVA and smaller shall, and on sizes 37-1/2 kVA to 100 kVA inclusive may, be arranged to serve in lieu of a low-voltage terminal board. These connections shall be in conformance with and arranged as shown in Figure 5.6.2 Accessory equipmentAccessory equipment listed in Tables 7, 8, and 15 shall be provided and located as shown in Figures 6–13.6.2.1 Tap changer(See item 9 in Tables 7 and 15.) Tap changers for deenergized operation shall be provided on tapped transformers. Each tap-changer position and the tap voltage or percentage associated with it shall be clearly identifiable by reference to nameplate information. All positions of the tap changer shall be operative positions. Transformers may have either an internal tap changer or an externally operated tap changer unless one or the other is specified.The internal tap changer shall have the operating handle inside the tank above the oil level. The tap changer shall rotate in a clockwise direction from a high tap voltage to a lower tap voltage in the high-voltage winding. The tap changer shall be provided with mechanical stops to identify the highest and lowest tap positions.NOTE — The H1 terminal for either additive or subtractive polarity is located on the left-hand side when facing the low-voltage terminals.Figure 5— Connections and polaritybushingsThe handle of the externally operated tap changer shall be brought out through the side of the tank in or near segment3, as shown in Tables 7 and 15. It shall be designed to prevent accidental operation by requiring a preliminary step before the tap setting can be changed. Position number or letters corresponding to the nameplate shall be clearly identifiable near the handle. There shall be located on or adjacent to the operating mechanism a written caution statement to deenergize the transformer before operating.6.2.2 Series-multiple connections(See item 33 in Table 8.) The series-multiple voltage-changing device may be an internally mounted terminal board or externally operated switch, unless one or the other is specified. Either device is for deenergized operation.Internal terminal boards with movable links shall have all studs identified on the board, and the nameplate shall show the connections to be made for each voltage.The handle of the externally operated switch shall be brought out through the side of the tank in or near segment 3, as shown in Table 8. It shall be designed to indicate voltage position and to prevent accidental operation by requiring a preliminary step before the voltage setting can be changed. Actual voltages or position numbers corresponding to the nameplate shall be clearly identifiable near the handle. There shall be located on or adjacent to the operating mechanism a written caution statement to deenergize the transformer before operating.6.2.3 Liquid-level marking(See item 5 in Tables 7, 8, and 15.) A suitable marking inside the tank shall indicate the correct oil level at 25°C. 6.2.4 Lifting lugs(See item 16 in Tables 7, 8, and 15.) The lifting lugs shall be permanently attached to and arranged on the tank to provide a balanced lift in a vertical direction for the completely assembled transformer and shall be designed to provide a safety factor of five. 1 The safety factor of five is the ratio of the ultimate stress to the working stress of the material used. The working stress is the maximum combined stress developed in the lifting lugs by the static load of the completely assembled transformer.26.2.5 Relief of excessive pressureA means as specified in 6.2.5.1 or 6.2.5.2 shall be provided to relieve pressure in excess of pressure that results from normal operation. This excess pressure may build up slowly due to overloads, high ambient temperatures, or external secondary faults, or internal incipient faults in the low-voltage winding. This excess pressure should result in an emission of only a negligible amount of oil.6.2.5.1(See item 32, Tables 7, 8, and 15.) A replaceable valve shall be located on the tank above the 140°C top oil level, by the manufacturer’s calculation, and so located as not to interfere with use of support lugs, lifting lugs, operating handles of switches and circuit breakers, or sidewall bushings.The inlet port shall be 1/4-inch (6.4-mm) or larger NPT (or NC thread with gasket), sized for specified minimum flow rate. Exposed parts shall be of weather- and corrosion-resistant materials. Gaskets and O-rings shall withstand oil vapor at 105°C continuously and under operating conditions as described in ANSI/IEEE C57.91, without seizing or deteriorating, for the life of the transformer.1This value is taken from 1.3, Lifting Means, in NEMA MG2-1983, Safety Standard for Construction and Guide of Selection, Installation, and Use of Electric Motors (available from National Electrical Manufacturers Association, 2101 L Street, NW, Washington, DC 20037).2This value is taken from MIL-STD-209C, Swinging Eyes and Attachments for Lifting and Tying Down Military Equipment; (available from Commanding Officer, Naval Publications and Forms, 5801 Tabor Avenue, Philadelphia, PA 19120).。
three question 英语读后感

three question 英语读后感three question reading responsethe three question essay written by jorge luis borges is a thought provoking and insightful exploration of the nature of existence and the human condition the author presents three deceptively simple questions that delve into the deepest mysteries of the universe and the human experience through his masterful storytelling and philosophical musings borges invites the reader to contemplate the profound implications of these questions and to grapple with the uncertainty and complexity of our realitythe first question posed by borges is what is the world the author skillfully weaves together various philosophical and scientific perspectives to examine the fundamental nature of the universe and our place within it he challenges the reader to consider the possibility that the world we perceive may not be the objective reality that we assume it to be borges suggests that our senses and cognitive biases may limit our ability to fully comprehend the true nature of existence he contemplates the idea that the world could bean illusion or a dream created by a higher power or even our own minds this line of questioning leads the reader to ponder the nature of consciousness and the extent to which our perceptions shape our understanding of the worldthe second question asks what is the self borges delves into the complex and elusive concept of the self exploring the various philosophical and psychological perspectives on the nature of human identity he questions the notion of a stable and unified self arguing that our sense of self is constantly in flux shaped by our memories experiences and social interactions borges suggests that the self is not a fixed entity but rather a constantly evolving narrative that we construct to make sense of our lived experiences he challenges the reader to consider the possibility that the self is an illusion or a convenient fiction that we use to navigate the world this line of questioning prompts the reader to reflect on the nature of human identity and the extent to which our sense of self is shaped by external factorsthe third and final question posed by borges is what is god the author explores the various theological and philosophical conceptions of the divine drawing upon a wide range of cultural and religious traditions he contemplates the possibility that god may not be the all powerful and all knowing deity that is commonly depicted in religious teachings instead borges suggests that god may be alimited and flawed entity or perhaps even a creation of the human mind he invites the reader to consider the implications of a god that is not all powerful or all knowing and to grapple with the existential questions that arise from such a conception of the divine this line of questioning leads the reader to ponder the nature of religious belief and the role of the divine in shaping our understanding of the worldthroughout the essay borges weaves together a tapestry of philosophical ideas and literary references to create a rich and thought provoking exploration of the three questions he presents the author skillfully navigates the complex and often contradictory perspectives on these fundamental questions drawing upon a wide range of intellectual traditions and cultural perspectives borges challenges the reader to embrace the uncertainty and complexity of existence to let go of our preconceived notions and to engage in a deeper and more meaningful exploration of the human conditionthe three question essay is a masterful work of philosophical fiction that invites the reader to engage in a profound and transformative journey of self discovery and intellectual exploration through his masterful storytelling and his penetrating insights borges encourages the reader to question the very foundations of our reality to confront the uncertainty and complexity of existence and to embrace the unknown as a source of wonder and possibility the essay is a testament to the power of literature to illuminate thehuman experience and to inspire us to grapple with the most profound and enduring questions of our existence。
three question 英语读后感

three question 英语读后感As I finished the book, I realized that the journey I had taken through its pages was not just a quest for knowledge or entertainment, but a profound exploration ofthe human mind and its potential. The book, "Three Questions," left me with a sense of amazement and curiosity, sparking thoughts that refuse to settle, demanding answers and reflection.The first question posed by the book was a simple yet profound inquiry into the essence of our existence: "Whyare you here?" It challenged me to examine my reasons for being, my purpose in life, and the values that guide my decisions. This question forced me to delve into the deeper meanings of my life, to question the assumptions I had made about myself and the world, and to reevaluate my goals and aspirations.The second question, "What do you want?" was a direct call to self-awareness and honesty. It asked me to confront my desires, both the ones that I admitted to and the ones that I had buried deep within. It demanded that I acknowledge my ambitions, my dreams, and my fears, and toface them with courage and clarity. This question helped me to realize that my wants were not just selfish desires, but expressions of my true self, reflecting my values and beliefs.The third question, "What can you do?" was a reminder of my agency and responsibility. It challenged me to assess my abilities, my strengths, and my weaknesses. It asked me to consider not just what I could do for myself, but what I could contribute to the world, what I could do to make a difference. This question inspired me to action, to turn my dreams into reality, and to use my talents and skills to create positive change.Reading "Three Questions" was not just an intellectual exercise, but an emotional and spiritual journey. It forced me to look inward, to delve into the recesses of my mind and heart, and to come face-to-face with the true essence of my being. It reminded me that the answers to these questions were not static or predefined, but were constantly evolving and transforming as I grew and learned. The book left me with a renewed sense of purpose and direction, a clearer understanding of who I am and what Iwant to become. It taught me that the answers to these questions are not easily found, but must be sought with patience and perseverance, through reflection and self-discovery.In conclusion, "Three Questions" is not just a book, but a guide to self-discovery and growth. It is a powerful reminder of the potential within each of us, waiting to be unleashed through self-reflection and honest self-assessment. As I close the book, I find myself asking these questions not just about myself, but about the world at large, seeking to understand its complexities and find my place within it.**读后感:三个问题的力量**读完这本书后,我意识到自己在书中页页翻过的不仅仅是对知识或娱乐的追求,而是一次深刻的人性探索和潜能挖掘。
Evaluation of COM Support in Visual c++

Evaluation of COM Support in VisualC++ using ATLCOT/3-7-V1.0Centre for Object TechnologyThe Centre for Object Technology (COT) is a three year project concerned with research, application and implementation of object technology in Danish companies. The project is Participants are:Maersk Line, Maersk Training Centre, Bang & Olufsen, WM-data, Rambøll, Danfoss, Systematic Software Engineering, Odense Steel Shipyard, A.P.Revision history:V1.019-08-98First version. Author(s):Kristian Lippert, DTIStatus:Final.Publication:PublicSummary:© Copyright 1998 Danish Technological InstituteIntroductionT his document presents the answer to a number of specific questions regarding the support for COM based development using Microsoft Visual C++ using the ATL class library.T his report is part of an evaluation of four development environments with respect to their support for COM based development. The main document of this evaluation is COT-3-4: Evaluation of COM Support in Development Environments.1. Component Server1.1 Which types of components does the tool support creation for?(1.1)• 1.2.3.2 Changing the code by hand ?(1.2.3.2) Maybee• 1.3.1.2.1 Which code-generation-wizards exist (list names and usages)?(1.3.1.2.1) You can choose between three different kinds of in-proc components. These are Objects, Controls, andMiscellaneous•Objects:•Simple Objetcs adds a minimal COM object.•Add-in Objects creates a COM object that can beused to extend Developers Studio.•Internet Explorer Object creates an object thatcontains all the interfaces necessary for it to workwith Internet Explorer, but has no user interface.•ActiveX Server Component creates an object thatcan be used as a part of an ActiveX Server Page(ASP) with Internet Information Server.•MS Transaction Server Component includes the header files needed by MTS, and makes the objectnon-aggregatable.•Component Registrar Object adds an object that implements the IComponentRegistrar interface,which is used to register the objects in a serverindividually.•Controls:•Full Control adds an object that implements all the interfaces needed by full ActiveX control(OCX), such that it should work with any ActiveXControl Container.•Internet Explorer Control adds a control that has all the interfaces (and UI functionality) needed byInternet Explorer and other compatible browsers.•Property Page adds a property page object.•Miscellaneous:•Dialog adds a class that implements a dialog• 1.3.1.2.5 Do the wizards allow for reverse-engineering ? To answer this question you should answer the following(1.3.1.2.5) Generating the code is a one way thing. If you regretanything a new project has to be started. Adding objects andmethods is also a forward only thing.• 1.4.1.2 Dispatch ?(1.4.1.2) Yes, Pure Dispatch interfaces are supported, but you will haveto manually delete the vtable interface because you as default whengenerating a new interface you can only choose between custom (vtable) and dual interfaces.• 1.4.3.1 If Yes, how ?(1.4.3.1) Using the wizard see 1.4.2. Manually you first define theinterface in the IDL. The definition tells whether it is a custom (Inherited from IUnknown), a dual (inherited from IDispatch, with the dualkeyword in the header), and a pure dispinterface by using the keyword "dispinterface" instead of the normal keyword "interface". Then you add the interface to the coclass. If it is a custom, or a dual interface you use the keyword "interface" in the coclass definition and if it is a puredispinterface you use the keyword "dispinterface" in the coclass. Thefollowing defines an coclass with three diferent interface (a custominterface, a dual, and pure dispinterface):[ uuid(02B6FBB1-F794-11d0-BFFF-00A0C922E84A),helpstring("Dispatch interface for Clock")]dispinterface IClock{properties:[id(1)] short AlarmHour;[id(2)] short AlarmMinute;methods:[id(3)] void TestAlarm();};[ object,uuid(37FBCAE0-08B6-11d1-8001-00A0C922E84A),dual,helpstring("IArc Interface"),pointer_default(unique)] interface IArc : IDispatch{[id(1), helpstring("method ArcSin")] HRESULT ArcSin([in] double arg, [out, retval] double * result);[id(2), helpstring("method ArcCos")] HRESULT ArcCos([in] double arg, [out, retval] double * result);[id(3), helpstring("method ArcTan")] HRESULT ArcTan([in] double arg, [out, retval] double * result);};[ uuid(64711D31-08C1-11D1-98AB-00A0D100E3C8),helpstring("IAmACustomInterface Interface"),pointer_default(unique)]interface helpstring("IAmACustomInterface : IUnknown {...};[ uuid(02B6FBB2-F794-11d0-BFFF-00A0C922E84A),helpstring("CoClass for clock")]coclass Clock{[default] dispinterface IClock;interface IArc;interface IAmACustomInterface;};You then add the interfaces to the inheritance list for the com object (in the true .h file), either directly, or using then macro IDispacthImpl, both After doing that interface should be added to the interface map (the stuff beween the BEGIN_COM_MAP and the END_COM_MAP macros using the macro COM_INTERFACE_ENTRY. The rest is just to define the methods in the .h-file and implement them in the .cpp file.• 1.4.4.2.3 Source code ?(1.4.4.2.3) No, using the C++ source code only is not enoughbecause the interface have to be defined too.• 1.4.6.2 Tear-of interfaces (a tear-of interface is part of an aggregated component. The component will not be instantiated until the interface is actually queried), How: ?(1.4.6.2) Tear-off interfaces can be made using the superclassCComTearOffObjectBase and the macroCOM_INTERFACE_ENTRY_TEAR_OFF in the COM map forthe object. Remember that tear-offs is an optimization of aggregated opbjects. There is an optimizations for the tear-offs. This is COM_INTERFACE_ENTRY_CACHED_TEAR_OFF where the inner objects IUnknown is cached, so when first instantiated it is cached for further usage.• 1.5.2.3.1 Is it possible to customize what happens when the reference count drops to 0 ?(1.5.2.3.1) The default implementation is add to the object byinheriting from CComObjectRootEx. If you mannually delete this superclass from the inheritance list and you manually implement the AddRef and Release methods you can custumize thebehaviour.1.7 Throwing errors (1.7) Svartekst• 1.8.1 How are data-types of the development tools mapped to COM data types ?(1.8.1)• 1.9.1.3 Own Proxy/Stub DLL ?(1.9.1.3) A projects for creating a proxy/stub dll is automaticallygenerated as a side effect of creating a normal project.2.3 Which types of target code does the tool produce (i.e. native/optimized native + runtime, p-code, nothing/interpreted) ?(2.3) There are many different types of targets, but they are all compiled native Win32 code. The different types are: Debug Unicode Debug Release Minimum size Release Minimum Dependency The ATL registrar (registrar = registry resource interpretter) Unicode Release Minimum size Unicode Minimum Dependency• 2.4.4.1 Can the developer freely choose a components ProgID ?(2.4.4.1) Yes, you can freely choose a components ProgID.• 3.1.1.4 This question is intentionally left blank(3.1.1.4) Yes• 3.1.3.3.2 Is Release called automatically by a generated client when exiting scope for an interface reference ?(3.1.3.3.2) When using normal C++ interface pointers the Releaseshould be called manually. When using a smartpointer this is doneautomatically.3.2 Aggregation3.2.1 Can the tool control COM-aggregation for produced components ?(3.2.1) When creating in-proc components it is a choise in the wizard to choose between different kinds of aggregation. The choises are:(1) Aggregatable.(2) Never aggregatable. The component can not be instantiated using a outer unknowninterface(3) Only aggregatable. Methods like CoCreateInstance can for this kind of objects only be called with a unknown outer interface. When trying to make explicit instances of these components the CoCreateInstance will fail.(4) Poly aggregatable. The object is created from the same obejct wether or not it is aggregated.• 4.1.1 What kind of object browser facilities are provided ?(4.1.1) For browsing typelibraries the VC++ v5.0 comes with at tool called"OLE-COM object viewer". This tool can browse typelibraries from files, and it can read the registry to find different component categories.F igure X: VC++ 5.0 OLE-COM Object ViewerF rom the invironment (the IDE) the projects different components can be viewedthrough the class view:F igure X: VC++ 5.0 Class View with COM interfaces• 4.1.4.1 How can you make this manually ?(4.1.4.1) This can be done as if the interface was your own to implement.• 4.2.1.1.1 Is it easy to find out how to do COM-based development in the tool ?(4.2.1.1.1) The VC++ compiler comes with some good tutorialsfor creating servers and ActiveX controls. The concept of COM must be known.。
北京理工大学智慧树知到“公共课”《大学英语(3)》网课测试题答案4

北京理工大学智慧树知到“公共课”《大学英语(3)》网课测试题答案(图片大小可自由调整)第1卷一.综合考核(共15题)1.Few of the students understand why language is _______ to human beings.A.awareB.uniqueC.absoluteD.continual2.What a ________ smell! Open the window and air the room.A.disgustingB.pleasingC.powerfulD.disturbing3.After three days of ____ travel, they arrived in Tibet.A.repeatedB.continualC.continuousD.unbroken4.On my way home this evening, I happen to notice that an old man was nearly ran ____ by a speeding car.A.afterB.aboutC.acrossD.over5.We are not immune ____ the influences around us. What matters is that we have and use our own will.A.forB.toC.towardD.with6.Your recent work hasn’t ____ your earlier standards.e toe upe up toe up with7.I ran ____ an old friend of mine the other day when I did some shopping downtown.A.afterB.aboutC.acrossD.over8.The frightened man reached ____ the telephone and quickly dialed a number.A.forB.toC.atD.on9.We were in Paris for two days, so we took the ____ of visiting the Louver.A.chanceB.opportunityC.activityD.luck10.Mother dropped the glass ________ she was standing up from her seat.A.andB.butC.soD.as11.I’ve just come ____ a beautiful poem in this book found in a secondhand bookshop.A.aboutB.acrossC.downD.out12.He is always running ____ money before receiving his monthly pay.A.outB.out ofC.inD.away with13.Measures had to be taken in face of the housing problem that ________ in the city.A.roseB.raisedC.aroseD.produced14.We tried all sorts of medicine but they were all ____.eefuledeless15.The school has ____ some top students.A.turned awayB.turned upC.turned inD.turned out第2卷一.综合考核(共15题)1.The line was engaged and the operator asked if I’d like to ____.A.hang aboutB.hang backC.hang onD.hang out2.After a long period of regular exercise, I now _____ much less than I used to.A.weighB.likeC.growD.increase3.The historical and cultural background to the play has been very carefully and thoroughly ___.A.searchedB.researchedC.sourcedD.reserved4.The doctor gave her some medicine. After she took it, she didn’t ___ for two days.e oute offe aboute to5.Some pupils fill their spare time ____ computer games. It is really a waste of time.A.withB.byC.toD.into6.It rains one minute and shines the next. What ________ weather!A.fineB.awfulC.radicalD.tuneless7.The large wings of that bird _________ it to fly very high and fast.A.makeB.enableC.forceD.realize8.She had to __________ several times a night when her baby was ill.A.call outB.get aheadC.wake upe to9.The police searched the city in an effort to catch the man who ______ murder last week.A.limitedB.madeC.didmitted10.The Chinese government took ____ the administration of Hong Kong from Britain on July 1, 1997.A.upB.downC.afterD.over11.The book offers some advice about how to make a good ________ on job interviews.A.attitudeB.appearanceC.effectD.impression12.Walking on the ____, the young couple talked about those unforgettable days when they were studying at college.A.sideway'sB.sidewalkC.sidwayD.sidewalk's13.How could she keep you ____ believing that she was changing her mind?A.atB.onC.fromD.off14.After Billy proved that he could ride a bicycle safely, his father ___ to him and bought him one.A.give offB.give inC.give outD.give back15.His work has ___ his health. The doctor suggests that he travel to the beach to have a holiday.A.affectedB.effectedC.causedD.brought第1卷参考答案一.综合考核1.参考答案:B2.参考答案:A3.参考答案:C4.参考答案:D5.参考答案:B6.参考答案:C7.参考答案:C8.参考答案:A9.参考答案:B10.参考答案:D11.参考答案:B12.参考答案:B13.参考答案:C14.参考答案:D15.参考答案:D第2卷参考答案一.综合考核1.参考答案:C2.参考答案:A3.参考答案:B4.参考答案:D5.参考答案:A6.参考答案:C7.参考答案:B8.参考答案:C9.参考答案:D10.参考答案:D11.参考答案:D12.参考答案:B13.参考答案:C14.参考答案:B15.参考答案:A。
英语选修3第2单元作文

英语选修3第2单元作文Unfortunately, I don't have access to specifictextbooks or their contents, including the prompts for writing assignments in English elective courses. Therefore, I cannot provide a direct response to the prompt you've mentioned for the second unit of English elective 3.However, I can help you structure an essay that meetsthe general requirements for an English essay, including a recommended length of at least 1000 words. Let's assume a general topic for this essay, such as "The Impact of Technology on Modern Communication." You can adapt this structure and content to fit your specific prompt and topic.Title: The Evolution of Communication: The Role of Technology in Shaping Modern Interaction.Introduction (Approximately 100-150 words):Begin with a broad introduction to the topic,discussing the historical significance of communication and its evolution over time.Highlight the role of technology in shaping communication patterns and practices.Transition to the main focus of the essay, discussing how modern technology has transformed the way we interact.Main Body (Approximately 600-700 words):Paragraph 1: Early Forms of Communication and Their Limitations:+ Describe early forms of communication, such as written letters, telegraphs, and early telephones.+ Discuss the limitations of these forms of communication in terms of speed, efficiency, and accessibility.Paragraph 2: The Digital Revolution and Its Impact:+ Introduce the digital revolution and its impact on communication.+ Describe the advent of email, social media, and instant messaging platforms.+ Analyze how these digital tools have changed the way people interact and exchange information.Paragraph 3: Modern Technology and Its Effect on Communication Patterns:+ Discuss modern technologies such as smartphones, video conferencing, and messaging apps.+ Examine how these technologies have influenced communication patterns, including the rise of asynchronous communication and the decline of face-to-face interactions.+ Explore the pros and cons of this shift in communication patterns.Paragraph 4: The Future of Communication and Its Challenges:+ Predict future trends in communication technology, such as the potential role of artificial intelligence and virtual reality.+ Discuss the challenges these technologies may pose to privacy, security, and human interaction.+ Argue for a balanced approach to technology use that promotes effective communication while minimizing its negative impacts.Conclusion (Approximately 150-200 words):Summarize the main points discussed throughout the essay.Reiterate the importance of technology in shaping modern communication and its impact on society.Close with a thought-provoking statement or call to action, encouraging readers to consider the role of technology in their own communication practices and its potential to shape the future of human interaction.Remember to tailor this structure to fit your specific prompt and topic. You can also include examples, quotes, and personal anecdotes to enrich your essay and make it more engaging. Aim for a clear and coherent flow of ideas, supported by evidence and analysis.。
Computational and Applied Mathematics

We discuss several issues that arise in the implementation of Martin, Otto, and Felten's Chained Lin-Kernighan heuristic for large-scale traveling salesman problems. Computational results are presented for TSPLIB instances ranging in size from 11,849 cities up to 85,900 cities; for each of these instances, solutions within 1% of the optimal value can be found in under 1 CPU minute on a 300 Mhz Pentium II workstation, and solutions within 0.5% of optimal can be found in under 10 CPU minutes. We also demonstrate the scalability of the heuristic, presenting results for randomly generated Euclidean instances having up to 25,000,000 cities. For the largest of these random instances, a tour within 1% of an estimate of the optimal value can be obtained in under 1 CPU day on a 64-bit IBM RS6000 workstation.
Contributors

IST-2002-507932ECRYPTEuropean Network of Excellence in CryptologyNetwork of ExcellenceInformation Society TechnologiesD.WVL.5First Summary Report on Hybrid SystemsDue date of deliverable:31.January2005Actual submission date:31.January2005Start date of project:1February2004Duration:4years Lead contractor:Otto-von-Guericke Universit¨a t Magdeburg(GAUSS)Revision1.0Project co-funded by the European Commission within the6th Framework Programme PU X Restricted to other programme participants(including the Commission services) REConfidential,only for members of the consortium(including the Commission services)First Summary Report on Hybrid SystemsEditorStefan Katzenbeisser(GAUSS)ContributorsJordi Herrera-Joancomart´ı(UOC)Stefan Katzenbeisser(GAUSS)David Meg´ıas(UOC)Juli`a Minguill´o n(UOC)Andreas Pommer(GAUSS)Martin Steinebach(FHG)Andreas Uhl(GAUSS)31.January2005Revision1.0The work described in this report has in part been supported by the Commission of the European Com-munities through the IST program under contract IST-2002-507932.The information in this document is provided as is,and no warranty is given or implied that the information isfit for any particular purpose.The user thereof uses the information at its sole risk and liability.AbstractIn this report we give an overview of three specific problems in the intersection between cryp-tography and watermarking.In thefirst chapter we discuss the security of dispute resolving protocols,which were one of thefirst applications of watermarking technology;we will con-clude that the security of this application depends heavily on the properties of the underlying watermark detector.In the second chapter we discuss the feasibility of watermarking en-crypted digital images in such a way that the decrypted document carries a watermark.The existence of such a watermarking scheme that commutes with an encryption function allows to construct secure Digital Rights Management(DRM)systems and asymmetricfingerprint-ing schemes.Finally,we give an overview of selective(partial)encryption in the last chapter. Partial encryption schemes allow to encrypt media data in a format-compliant way.Contents1Dispute Resolving Protocols11.1Application scenario and requirements (1)1.2Early attempts to copyright protection (2)1.3Customer’s rights problem (4)1.4Copyright protection schemes (5)1.4.1Conclusiveness problem (7)1.5Dispute resolving using watermarks (7)2Watermarking Encrypted Data112.1Homomorphic Encryption (11)2.2Watermarking in the encrypted domain (13)2.2.1An asymmetricfingerprinting scheme (14)2.3Further Research Directions (16)3Selective Encryption173.1On the Role of Selective Encryption in DRM (17)3.2Selective Encryption of Visual Data (18)3.2.1DCT-based Techniques (18)3.2.2Wavelet-based Techniques (26)3.3Standards and Commercial Applications (29)3.3.1JPSEC—Secure JPEG2000 (30)3.3.2IPMP—Intellectual Property Management and Protection (30)3.3.3MPEG,DVB and CSA (31)3.3.4DVD and CSS (31)Bibliography32iii ECRYPT—European NoE in CryptologyChapter 1Dispute Resolving ProtocolsDigital watermarks were proposed as main building block of dispute resolving schemes.Dis-pute resolving tries to sort out ownership disputes over digital objects by embedding ownership information as a watermark.1.1Application scenario and requirementsIn general,the process of delivering multimedia services to customers can be broken down to the scenario depicted in Figure 1.1.A content provider P (who owns the copyright on multimedia objects)forwards these objects to a seller S who in turn sells them to n different customers C 1,...,C n .Examples for this kind of application include electronic-commerce sys-tems (using the Internet as transfer medium),pay-per-view digital television or information systems based on multimedia databases.C 1C 2C nP SFigure 1.1:Application scenario for multimedia distribution containing a content provider P ,a seller S and n customers C 1,...,C n .The main goal of copyright protection is to construct a framework that is able to resolve12ECRYPT—European NoE in Cryptology the copyright situation after an infringement occurred.In particular,a copyright protection protocol allows to identify the copyright holder(P)of a multimedia object distributed illegally on the Internet;optionally,also the buyer(B i)of the illegally copied object can be traced. For unambiguous resolving,at least the following two requirements must be satisfied:•Assume that an object O is property of P.In case a dispute arises over an object O D that is derived from O,the dispute resolving process should be able to identify the copyright holder P.We will argue later that the copyright holder must be a protocol participant in the resolving process in order to fulfill this requirement.•In the same scenario,the copyright protection scheme should uniquely identify the customer C i who bought the object O that was used to create O D.These requirements naturally translate into the following security properties:•Resolvability.The dispute resolving mechanism should uniquely identify the copyright holder of the multimedia object.It should not be possible by an attacker to fake an ownership proof(that either identifies the attacker or any third party as copyright holder).•Robustness.The mechanism should“work”also with highly modified objects.In other words,it should not be possible to deliberately modify a multimedia object such that the resolving process fails.•Fairness.The mechanism should not falsely identify innocent customers as copyright infringers.•Nonrepudiation.Copyright infringers should not be able to plausibly deny that they illegally copied material.1.2Early attempts to copyright protectionEarly papers on watermarking such as[121,65]claimed the above problems as solved,once a sufficiently robust watermarking scheme is found.In early copyright protection protocols, the watermark was seen as a transfer medium that stores information about the copyright holder and the customer who bought a specific object.More specifically,the generic construction principle of[121,65]is as follows.The content provider P adds his watermark W C to all objects he forwards to the seller S,who in turn sells them to a customer C i.Before delivering the object to C i,S adds another watermark W S whose payload identifies C i.Due to the robust nature of the watermarks,both embedded marks will be detectable.Call the watermarked objectO is found,the content provider extracts both watermarks W C and W S.The former will be used to prove to a third party that the content provider actually owns the copyright on the object in question,whereas the latter watermark identifies the traitor.D.WVL.5—First Summary Report on Hybrid Systems3O A O Qz?O and challenge the true owner P.By the construction of an invertibility attack(see Figure1.2),no third person can decide whether the claims of P or Q are correct,as P’s claimed“original”contains Q’s watermark and vice versa.In order to prevent this attack,several authors proposed the use of non-invertible wa-termarks in the generic construction.However,the construction of provably-secure watermarks seems to be difficult and is—up to now—an open problem[3].Alternative methods use central time-stamping services or a trusted registration authority[5,4].•Other protocol attacks.An attacker could use other protocol attacks;for example using a copy attack,he is able to claim that an object is courtesy of a different person by transferring a watermark between two objects[57].Again,this contradicts the resolvability property discussed above.•Robustness of watermarks.If it is possible to remove watermarks from a multimedia object without visual degradation,an attacker can hinder the resolving process by removing W C and W S.Thus,the system may violate the robustness requirement.•Public versus private information.When the content provider is asked to publicly prove the ownership of his works(e.g.,in front of a judge),he has to reveal the watermark and private key.Since in most watermarking schemes the key is coupled with the location of the watermark in the digital media,it is then possible to remove the mark once the key is public.There are several approaches to solve the problem,such as the use of zero-knowledge and asymmetric watermarking schemes[2,50]or special purpose tamper-resistant hardware[100,101].Another alternative is the use of different watermarks W C in each sold copy,such that the publication of one watermark/key pair allows an attacker only to remove a watermark in one single copy of the digital work without putting all other copies at risk.4ECRYPT—European NoE in Cryptology •Customer’s rights problem.The protocol implicitly assumes that the seller S is trustworthy.Specifically,it is assumed that the seller sticks to the protocol and correctly embeds W S.However,this cannot be guaranteed in general.A cheating seller might deviate from the protocol specification and embed the identity of a different,innocent customer instead of W S,who will subsequently be blamed for all copyright infringements (see Section1.3).This violates the fairness requirement.1.3Customer’s rights problemMost copyright protection protocols are designed entirely to protect the copyright holder of digital objects;the implicit assumption of those proposals is that the seller behaves trustwor-thy,whereas the customers do not.Qiao and Nahrstedt[79]first noted that this asymmetry does not hold in general.More specifically,a cheating seller can fakefingerprints or illegally distributefingerprinted objects himself.The following two scenarios illustrate these problems:•Scenario A.Suppose that a seller S sells(by mistake)the samefingerprinted workO with the identity of A.Now,one of the customers forwards the content illegally to a party C.Based on thefingerprint,S will identify A as the traitor.However,from the setup it is unclear whether A or B is the traitor.Even if S did not make any mistake by selling any object twice,customers can always claim this and therefore plausibly deny their delinquency.•Scenario B.Suppose a copyright holder P forwards his objects to a seller S,who is not trustworthy.Now,S sells the object to customer C1;the sold objectO and sells them to customers C2,...,C n without records.Clearly,C1gets blamed for making illegal copies, although the seller is the traitor in this case.The problem stems from the fact that the seller S has access to thefingerprinted worksO without conforming to any copyright protection protocol. Qiao and Nahrstedt[79]proposed a partial solution to this problem by“binding”thefinger-printed object to an identification token produced by a legal customer.Unfortunately,this proposal does not solve all of the above problems,as the seller still has access toD.WVL.5—First Summary Report on Hybrid Systems51.4Copyright protection schemesFor simplicity,we assume in the following sections that the party P acts both as a content provider and a seller.However,the definitions can easily be adapted to the case that the seller and content provider are different persons.A copyright protection scheme can be defined as tuple of three probabilistic polynomial time algorithms and one multiparty cryptographic protocol Initialize,Prepare,Trace,Resolve .The algorithm Initialize initializes the copyright protection scheme.Among other tasks, Initialize chooses cryptographic keys and watermarking keys that will be used in the other parts of the system.Initialize is run by the copyright holder P;he inputs the length of the desired keys(n S)and an identity string ID P.The output of Initialize is a tuple of keys K E,K D .Here,K E contains the part of the key that is used privately by the copyright holder P,whereas K D contains all keys that will be disclosed in the dispute resolving protocol (when using a symmetric watermarking scheme,K E and K D could be identical or K D could be a substring of K E).Before a content provider releases an object O to a customer(B),he runs the algorithm Prepare on it.On input K E,an identity string of the customer(ID B)and O,the algorithm outputs a prepared objectO allegedly derived from O.The proof token proof P acts as“proof of ownership”in future dispute resolving steps;in watermark-based dispute resolving schemes,the proof token may consist of a watermark and the original object O.Both tokens are generated for the content provider P,whereasO that is apparently derived from P’s object O.For this purpose,the algorithm Trace takes the key K E of the copyright owner,the objectO was originally bought by the user identified in the token t i)or the special symbol fail(in case no conclusion about the original buyer could be drawn).Note that Trace does not attempt to resolve any disputes;it just enables the copyright holder to determine the buyer who might be a possible traitor.Trace may,for example,contain the detection algorithm of afingerprinting scheme.Finally,the dispute resolving protocol Resolve is a multiparty protocol between n+1 participants,namely n(possibly cheating)parties P1,...,P n who claim to be the true owner of an objectO.The output of the protocol is either the identity of a party P i or the special symbol fail in case no conclusion about the owner could be drawn.We write the decision of the dispute resolver as Resolve(6ECRYPT—European NoE in Cryptology holder P;on input n S and ID P,Initialize computes a tuple of strings K E,K D with |K D|=n S.•The algorithm Prepare prepares a multimedia object O for delivery to a party B.On input K E,ID B and O,the protocol outputs a prepared objectO,the key K E and a list of transaction tokens t i i∈T and outputs either an index j∈T or the special symbol fail.•Finally,the protocol Resolve performs dispute resolving among n disputants;the protocol involves the parties P1,...,P n and R.During the protocol,R inputs an objectO be an arbitrary object and P its rightful owner.Furthermore,let proof P be theoutput of algorithm Prepare for P,n K be a security parameter and K EP ,K DPbe theoutput of a run of algorithm Initialize for P.Then we call a dispute resolving scheme for n disputants P,P1,...,P n−1weakly resolving,ifP[Resolve(D.WVL.5—First Summary Report on Hybrid Systems7Scenario IAB?CScenario IIFigure1.3:Conclusiveness problem.1.4.1Conclusiveness problemAs noted in[6],a difficult problem arises in dispute resolving schemes.As argued above, the security of a dispute resolving scheme is only guaranteed if the copyright holder is a protocol participant.If this is not the case there are no restrictions on the result of the dispute resolving protocol,i.e.,after a protocol run any answer(that is,the identity of any participating party or the symbol fail)may be obtained.Consider the two scenarios depicted in Figure1.3.In thefirst scenario,the true author A and a traitor B dispute.Clearly,A wins the dispute using a weakly resolving scheme.In the second scenario,two traitors B and C dispute.Here,the output of the dispute resolving scheme is unclear:it can be either B,C or fail.Assume for a moment that the output is B. Now,in both scenarios the dispute resolver received the identity of a participant as output. However,he cannot distinguish between these two scenarios.In fact,he cannot decide whether the output of the dispute resolving scheme identified the correct copyright owner or a traitor (just because the true owner did not participate).This problem was termed conclusiveness problem[6,51].Although it is possible to avoid the problem with special watermarking schemes(whose existence is open)[6],it is an open problem whether dispute resolving schemes—without certification by a trusted clearing center—can be used for the identification of a copyright owner.1.5Dispute resolving using watermarksAs noted in Section1.2,early watermarking papers proposed the following general frame-work for dispute resolving.During object preparation(Prepare),P adds a watermark W8ECRYPT —European NoE inCryptology?OOInitialize AInitialize BFigure 1.4:Doubly watermarked objectO in dispute,i.e.,which watermarks contained in the proof stringsare actually detectable.If only one protocol participant can present a detectable watermark to the dispute resolver R ,the dispute is resolved in his favor.In case more than one participant is able to present a detectable watermark,the dispute resolver R has to decide which party actually inserted the watermark (i.e.,gained its knowledge of a detectable watermark not through attacks).The easiest attack that a dispute resolving protocol has to cope with is the addition of a second watermark,as indicated in Figure 1.4.Here,A is the true author of an object O .A runs Initialize on O to obtain the watermarked objectO .Now,the attacker B runs Initialize on O and his proof token proof B .The robustness assumption implies thatboth A and B obtain a proof string that is valid forO by running Initialize ,then (assuming a sufficientlyrobust watermarking scheme)B ’s claimed original should contain A ’s watermark.Therefore,one might be tempted to declare the party as owner,who is able to present an “original”that does not contain the watermark from the other party.In fact,this criterion was sometimes used as formal definition of “ownership”(the ability to present an original that does not contain the other disputant’s watermarks).D.WVL.5—First Summary Report on Hybrid Systems9?OOInitialize AInvertFigure 1.5:Inversion attack.Unfortunately,the discovery of the inversion attacks showed that such systems are inse-cure;see Figure 1.5.In fact,the attacker is not required to use the initialization algorithm during his attack;he is free to choose any probabilistic polynomial attack algorithm that works in his favor.For example,the attacker B may use an inversion attack Invert instead of Initialize to engineer his proof string.According to the definition of an inversion attack,his computed watermark will also be detectable in the original O of A ,whereas A ’s water-mark will be present in B ’s original by the robustness assumption.Thus,no party is able to provide an original that does not contain the other person’s watermark and the resolving process necessarily fails.One crucial assumption for the security of a dispute resolving scheme is that the true copyright holder keeps his “original”unmarked object secret.In other words,the attacker can only access a prepared version of the copyrighted object,i.e.,the output of algorithm Prepare .In general,no conclusion can be drawn in case this condition is violated.For example,consider Figure 1.6.Here,two parties independently take an object O and run the algorithm Prepare on it to obtain prepared objects O A and O B .As both parties act independently,a watermarking-based dispute resolver cannot be expected to obtain any useful results.We therefore only consider attackers that take an already prepared objectOand is expected to output a proof string and detection key such that the dispute resolving process fails or identifies the attacker as copyright owner.We also allow the attacker to fail with a certain bounded probability.Again,as we are only attempting to protect honest copyright holders,we require that the true copyright holder computes his proof token and keys according to the protocol specification.Dispute resolving schemes should work also with objects that are slightly modified by an10ECRYPT—European NoE in CryptologyOO A O BFigure1.6:Attack scenario where two objects O A and O B are prepared independently. attacker.That is,the dispute resolving step should be robust enough to work on an objectO of the copyright holder.To capture this,we allow an attacker to change the disputed objectO ,on which the dispute resolving process is started.However,an attacker is only allowed to perform invisible changes so that the two objects O stay perceptually similar.Following this approach,we can see an attack on a dispute resolving scheme a,proof A probabilistic polynomial time algorithm that outputs,on input O ,K DAso that Resolve(O,Chapter2Watermarking Encrypted DataIn this chapter we discuss the feasibility of directly watermarking encrypted data,i.e.,insert-ing a watermark into an encrypted multimedia object such that the corresponding decrypted object is watermarked.Such a watermarking operation that commutes with encryption can be a central building block of Digital Rights Management(DRM)and asymmetricfingerprinting systems.2.1Homomorphic EncryptionAfirst approach towards computing in the encrypted domain is to investigate constructions of cryptosystems that allow some basic algebraic operations in the encrypted domain which are“translated”onto the corresponding secret messages.Privacy homomorphisms werefirst proposed by Rivest et.al.[82],who defined them as encryption functions which permit en-crypted data to be operated on without decryption of the operands.In his seminal paper,he presentedfive simple examples of privacy homomorphisms;the most relevant one was RSA, which is multiplicative:E(a·b)=(a·b)e mod n=(a e mod n)·(b e mod n)=E(a)·E(b)In[39]an additive and multiplicative privacy homomorphism was presented.The proposal allows addition,subtraction and multiplication to be carried out directly on encrypted data, but it does not allow computation of multiplicative inverses;in other words,it is a ring privacy homomorphism,but not afield privacy homomorphism.Another well known privacy homomorphism is the one proposed by Paillier[67],which is now used as a building block of different applications.Security of privacy homomorphisms has been extensively studied.It is known that if a privacy homomorphism preserves order when encrypting,it is insecure against a ciphertext-only attack;if it is additive,it is insecure against a chosen-cleartext attack[8].With the exception of RSA,all the examples given in[82]were subsequently broken in[17]using ciphertext-only or known-cleartext attacks.On the other hand,the privacy homomorphism presented in[39]is secure against a known-cleartext attack.1112ECRYPT—European NoE in Cryptology Computing with encrypted values can be a convenient tool in the construction of secure protocols.In particular,homomorphic encryption has been used successfully in different appli-cations as a central building block,such as verifiable signature sharing[18],secure multiparty computation[30],electronic voting systems[69]and auctions[117,19,12].Homomorphic encryption is even used in the context of databases[27,47,40]in order to allow database computation while maintaining a certain level of privacy of the records.In mobile agent technology,homomorphic encryption is applied to solve the problem of protecting agents against malicious hosts[84];the solution is based on computing with encrypted functions,an extension of computing with encrypted data.Homomorphic encryption was also proposed in watermarking scenarios:[43]use the ho-momorphic properties of RSA to define a publicly verifiable watermarking scheme in which the verification process does not reveal the embedded mark.In addition to the basic algebraic operations described in the previous section,more com-plex computations—for example,encryption or the computation of signatures—can be per-formed on encrypted data.An encryption function E k(·)is called commutative,ifE k1(E k2(m))=E k2(E k1(m))for all keys k1,k2.Obviously,most symmetric encryption functions are not commutative while RSA is a commutative encryption scheme,sinceE k1(E k2(m))=E k1(m k2mod n)=m k k12mod n=m k k21mod n=E k2(E k1(m))Commutative encryption schemes are useful in different areas.For instance,a fair coinflipping protocol and a bit commitment scheme can be defined using commutative encryption[87].The possibility of digitally signing encrypted data has been discussed in the literature.In [1,11]the authors argue that it makes no sense to sign encrypted data since non-repudiation cannot be ensured because the signer does not know what he/she signs.However,as it is pointed out in[97],there are some applications where privacy is more important than non-repudiation.The concept of blind signatures was introduced by Chaum in[21].For example, using RSA signatures the blinding function can be implemented asE(m)=m·r e mod n=c,where k=r e is the private key with r∈R Z n and e the public key of the signature function S defined byS(c)=c d mod n=m d·r ed mod n=m d·r mod n=c ,since d·e≡1modφ(n).The unblinding function is defined byD(c )=c ·r−1=m d=sD.WVL.5—First Summary Report on Hybrid Systems13 and the signature verification function isV(s)=s e mod n=(m d)e mod n=m.Using this approach it is possible to sign in the blinded domain and verify in the clear domain, that isV(D(S(E(m))))=m.Thefirst application of blind signatures was an anonymous payment system[22],also proposed by D.Chaum.2.2Watermarking in the encrypted domainIn this section we want to pay attention to the possibility of watermarking in the encrypted domain,that is to say,we want to study when or how encryption and decryption functions commute with the watermarking operations(typically,mark and verify).As mentioned above,computing in the encrypted domain can be seen as central building block for the construction of cryptographic protocols.In the same way,watermarking en-crypted data can be a convenient tool for secure watermarking protocols and enables publicly verifiable watermarking schemes or asymmetricfingerprinting schemes.A watermarking scheme can be defined through two functions,the embedding or marking function M and the extraction or verification function V.Roughly speaking,the marking function takes an image1I as an input together with the mark m to be embedded and produces the marked image I∗=M(I,m).On the other hand,the verification function takes the marked(and possibly distorted)image I and reconstructs the mark embedded in the image V( I)=m.Again,we denote an encryption function by E;using an encryption key k,E produces an encrypted image I k=E k(I).The decryption function D reconstructs the image I=D k−1(I k), given the decryption key k−1and the encrypted image I k.Depending on the application,four properties of watermarking schemes and encryption functions can be convenient in the context of watermarking encrypted data:Property1.The marking function M can be performed on an encrypted image I k to embeda mark m.Property2.The verification function V is able to reconstruct a mark in the encrypted domain when it has been embedded in the encrypted domain.Property3.The verification function V is able to reconstruct a mark in the encrypted domain when it has been embedded in the clear domain.14ECRYPT—European NoE in Cryptology Property4.The decryption function does not affect the integrity of the watermark.Property1ensures that when the marking function is performed on an encrypted image, the result I∗k=M(I k,m)will be an encrypted image.The second property ensures that the marking and verification processes can be performed entirely in the encrypted domainV(M(E k(I),m))=m.The third property ensures that the encryption function does not affect the mark integrity in terms of mark reconstruction process;this property holds ifD k−1(V(E k(M(I,m)))=m.Note that properties2and3are equivalent in case the marking function and the encryption function commuteM(E k(I),m)=E k(M(I,m))=I∗k.The last property implies thatV(D(M(E k(I),m)))=m.Atfirst glance,it could be difficult to construct encryption/decryption functions and watermarking algorithms that satisfy all the proposed properties.For instance,Property1 fails for the vast majority of marking schemes in the literature,as to achieve imperceptibility they are based on image characteristics that disappear when the image is encrypted.However,in some scenarios,a secure watermarking protocol can be defined only if one of the above properties is satisfied.An example is the verification protocol proposed in[43] that allows to demonstrate the presence of a watermarking in an image without revealing the mark,thus producing thefirst approach to a zero-knowledge watermarking verification pro-tocol.In this case,the watermarking verification protocol is based on any linear and additive watermarking algorithm in which the watermarking verification can be performed by mark correlation(for instance the spread spectrum technique proposed by Cox et.al.[29]).The encryption algorithm used is the RSA.When using such watermarking techniques together with this encryption algorithm Property3holds due to the homomorphic properties of the RSA algorithm together with the multiplicative operations performed in the verification pro-cess.This example shows the possibilities of watermarking in the encrypted domain,even if only one of the properties holds.If there exist functions M,V,E,and D that satisfy the above properties,we can define new watermarking protocols,as shown in the next subsection.2.2.1An asymmetricfingerprinting schemeIn contrast to watermarking(which allows ownership protection),fingerprinting is a technique which allows to track redistributors of electronic information.In afingerprinting scheme,each image copy is marked with a different mark that allows buyer identifiually,it is。
PUBLISHING IN AMJ-PART 3 SETTING THE HOOK

FROM THE EDITORSPUBLISHING INAMJ—PART 3: SETTING THE HOOK发布INAMJ ——第3 部分:设置钩Editor’s Note:This editorial continues a seven-part series, “Publishing in AMJ,” in which the editors give suggestions and advice for improving the quality of submissions to the Journal. The series offers “bumper to bumper” coverage, with installments ranging from topic choice to crafting a Discussion section. The series will continue in December with “Part 4:Grounding Hypotheses.” -J.A.C编者注:这篇社论中继续七部分系列,"发布在 AMJ,"在其中编辑为提高杂志质量给出建议和意见。
系列还提供的"撞"覆盖面,以分期的方式从选题到精心编制的讨论部分。
该系列将继续在 12 月进行"部分 4:Grounding"-J.A.C。
Ten times.If this were AMJ Jeopardy, the category would be“introductions,”and “ten” would be the answer.What’s the question? You might be thinking of one, but this is actually the correct answer to two questions: 十倍:如果这是 AMJ 岌岌可危,类别将"介绍,"和"十"就是答案。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Three Issues in the Use of Versioned Hypermedia for SoftwareDevelopment SystemsTien Nguyen,Satish Chandra Gupta,Ethan V.MunsonMultimedia Software LaboratoryDept.of EECSUniversity of Wisconsin-MilwaukeeMilwaukee,WI53211USAtien,scgupta,munson@Abstract.The Software Concordance project is extending the concept of literateprogramming with research on how modern document and hypermedia servicescan improve software development environments.The Software Concordanceeditor is both a syntax-recognizing Java program editor and an XML documenteditor.It has a uniform document model,based on XML,that lets Java sourcecode documents include both hyperlinks and inline multimedia documentation.The next step for the Software Concordance project is to enhance the editor withversioned hypermedia services in order to support sophisticated analysis and vi-sualization of relationships among software documents.This article discussesthree important issues for versioned hypermedia in this context:identificationof the versioning infrastructure that will be required;exploration of how ver-sioning information can be used to detect non-conforming documents;and theextension of versioned hypermedia to handle software configuration manage-ment.1.IntroductionWhen software engineers design and implement large-scale systems,they produce a large variety of software artifacts such as requirements documents,feasibility studies,design specifications,source code,module documentation,test plans,bug reports and sales plans. One challenging task for software engineers is to manage this collection so that the infor-mation can be quickly accessed and consistently organized.An important aspect of this task is to capture and manage the logical relationships among software documents.It is not uncommon for a large-scale software system to have hundreds of artifacts and thousands of implicit and explicit relationships,all evolving over time.The task of keeping these artifacts and relationships semantically consistent is not easy.The lack of powerful tools for document and relationship management forces developers to use ad hoc methods,including paper notes or memorization,which can lead to cognitive overhead and errors.This problem hinders developers from having a full understanding of the system and reduces their effectiveness.The Software Concordance is a software development environment that is attempt-ing to address the relationship management problem for software documents by provid-ing:a common document model that helps source code documents interoperate wellwith other software documents,afine-grained revision control model for software artifacts and their relationships, an extensible set of relationship types anda set of tools for analyzing,retrieving,visualizing and maintaining them.We have implemented a Software Concordance editor that uses a uniform document model to integrate program analysis and hypermedia services for both program source and documentation[15].This system is both a syntax-recognizing editor for Java pro-grams and an XML document editor.While there are a number of interactive program browsers in existence[8,25,32],we believe that the Software Concordance is thefirst system to make source code documents behave as hypermedia documents while still pro-viding interactive program analysis(lexing,parsing,and type checking)and supporting interactive editing.We have begun work to implementfine-grained version control of software doc-uments and their relationships(as represented by hyperlinks).This is an important step because software documents are not static,but rather evolve over time,and the relation-ships between software documents are also dynamic.Thus,the Software Concordance system will be a versioned hypermedia system.This paper describes three important issues that have arisen as we add support for versioned hypermedia to the Software Concordance.Two of the issues arise from our interest in conformance analysis.Conformance is our term for the state where a set of documents are in agreement with each other. Conformance analysis is the process of determining whether or not documents conform to each other.Conformance analysis is related to the well-known process of requirements traceability[28,p.261],but it has broader applications than just requirements tracing. For example,issues of conformance also arise between source code and bug reports and between design documents and user manuals.Thefirst issue that we address is the specific set of hypermedia services that are necessary to support conformance analysis.Secondly,we have investigated how to au-tomate aspects of conformance analysis using hypermedia versioning information.The final issue that we discuss is the relationship between hypermedia versioning and software configuration management.This article is organized into four sections,of which this section is thefirst.The next section briefly describes the Software Concordance project,including its motivation, the current editor prototype,and its future directions.Section3discusses the three issues for versioned hypermedia,while Section4is a conclusion.2.The Software Concordance ProjectThe Software Concordance project is motivated by the observation that software engineers have difficulty maintaining semantic consistency among their many documents.Our re-search is focusing on two particular sources of difficulty.First,source code documents interoperate poorly with the many other types of software documents.Source code documents are written and managed as simple text documents using specialized text editors,often in integrated development environments (IDEs)that include interactive program analysis.Other software documents are produced using a variety of tools such as word processors,graphics editors,and specialized en-vironments for project planning or graphical design languages such as UML[30].In general,these tools and the documents they produce interoperate well.However,source code documents and the IDEs used to edit them do not.Second,the relationships among software documents are usually implicit and thus cannot be browsed,navigated,queried,or analyzed systematically.This is particularly true for source code documents,whose lexical and syntactic rules hinder the use of hy-perlinks,the most natural means for representing relationships among documents.To address these problems,we seek to demonstrate that it is possible to create a new kind of software development environment in which:All software documents,including source code,are Web-compatible and able to include hyperlinks and embedded multimedia elements as documentation.Some software documents(such as source code)will be suitable for specialized analyses (such as compilation),but these analyses will not hinder interoperability.A variety of document views will be available in order to support the variety oftasks that a programmer performs.For example,programmers may want to hide distracting multimedia documentation or may benefit from novel“fish-eye”pre-sentations of source code.The environment will provide analyses and visualizations of the graph of hyper-links among the software documents so that developers can answer important questions related to such issues as requirements and bug tracing.Programmers will continue to have high-quality,interactive program analysis built in to their editors and will not be forced to use unnatural top-down(or syntax-directed)editing techniques.This vision for software development is similar in spirit to that articulated by Knuth for literate programming[20].Where Knuth envisioned a single document encompassing both the implementation and documentation of a system,the Software Concordance pic-tures a large collection of documents,linked with hypermedia technology into a literate whole.2.1.The Software Concordance editorThe project’sfirst application is an editor for Java source code and XML documents.The Software Concordance editor is implemented in Java with the Swing user interface library, and like most Java programs,runs in a variety of environments.Program analysis(lexing, parsing,and type checking)is provided by the Fluid program analysis system[11].A screen dump from an editing session is shown in Figure1.This session’s right-most window shows part of the implementation of an A VLTree class,specifically the simpleLeft method.The source code has been pretty-printed automatically using infor-mation from syntax analysis.The details of how the code is pretty-printed are controlled by a simple style sheet.Appearing above the method’s source code is some multimediaFigure1:Screen shot of the Software Concordance Systemdocumentation,including a diagram of the simple left rotation operation,a textual de-scription(but not a comment),and buttons that control an audio clip of the implementor explaining details of the implementation.On the left,the developer has another window open on the same source code document.This window shows the entire class,but using a style sheet that hides the method bodies and multimedia documentation so that only the class interface is visible. This is simply another view of the same information shown in the rightmost window.The two views are different only because they are presented using different style sheets.The developer can edit the document through either window and any changes will appear in both.The center window shows a design document for the A VLTree class.This window was brought up because the developer clicked on the word“simpleLeft”in one of the other windows.This word happens to be a hyperlink that points to the“Simple Left Rotation”heading in the design document.This heading is itself a hyperlink that can be followed back to the simpleLeft method in the class’s source code.The close integration between source code and design documents seen in this ex-ample is possible because the Software Concordance editor uses a uniform document model for all software documents.Both Java and XML documents are represented using the abstract syntax tree data structures of Fluid,but the editor accesses these structures through a facade that hides most of the complexities of program analysis.Gupta[15] describes the document model and its implementation in detail.The Software Concordance editor is thefirst program editor with integrated analy-sis services to support inline multimedia documentation and hyperlinks in source code.It can be contrasted with several other types of program editing and browsing environments. Programming environments like the Cornell Program Synthesizer[33],Pan[5,35], Ensemble[14],and Mj¨o lner[19]have powerful integrated analysis services butno support for multimedia or hyperlinks in source code.Software management environments such as SODOS[17,18],DIF[13]and Hyper-Pro[24,25]can maintain the relationships between documents from all phases ofthe software development process,but they do not support source code analysis. Program browsers and visualizers such as CHIME[8],the Variorum[6]and ShriMP[32, 39]exploit program analyses to provide novel and informative views that help de-velopers understand their systems.These systems provide interactive browsingbut do not support interactive editing and their analyses are performed in a batchmanner.Perhaps the system most similar to the Software Concordance is Desert[29],a software development environment that integrates a variety of tools through broadcast messages.It includes a common editor based on FrameMaker[1]that integrates program editing with editing tools for design diagrams and user interfaces.Desert views all of its artifacts as documents and achieves some of the integration and presentation features that we seek.However,Desert’s design deliberately avoids imposing a uniform document model and thus its level of integration falls short of our goals.3.Three issues3.1.Versioned hypermedia infrastructureWhitehead’s dissertation provided an organized list of requirements and goals for the hy-permedia versioning domain[37,chap.7].This list is also valid for hypermedia systems that are designed to support software development.However,to address conformance analysis and automatic relationship management adequately in hypermedia systems,sev-eral specific features are necessary.3.1.1.Versioning in Open Hypermedia SystemsA large-scale software development process produces a huge set of software artifacts, in many different computing environments,using multiple procedures and tools.This heterogeneity hinders document interchange and accessibility.An open hypermedia system(OHS)can handle this heterogeneity by providing mechanisms to integrate third party applications through both data and control integra-tion.This is an important advantage over embedded hypermedia systems(such as the HTML-based Web)for a software development environment(SDE)and it results primar-ily from the externally represented and managed relationships.This key characteristic addresses the automatic relationship management problem,which is crucial to software development[2].When relationships among documents are represented externally,they can be maintained and analyzed without modifying the documents.Different sets of hy-permedia anchors and link structures can be created according to the needs of users asthey perform different tasks.Another substantial disadvantage of embedded hypermedia systems is that the versioning of links is completely subsidiary to the versioning of the content.Open hypermedia systems can be broadly divided into two different approaches: link servers and open hyperbase.The goal of link servers[27,12,3]is to provide third-party links among a set of documents.The Link server approach is characterized by the use of third party viewers to present and store the contents of external objects[26].An open hyperbase[16,38]stores link information but provides storage for the content of ob-jects as well.The versioning frameworks of the existing open hyperbases are notflexible enough for SDEs,which have complicated data models and requirefine-grained version control.Implementing versioning on link servers is more complex because of the need to maintain synchronization between the versioning of external objects(performed by third party applications)and the versioning of hypermedia structures.However,this gives SDEs theflexibility to employ any revision control or data model that suits their goals. In brief,versioning of link server systems is necessary to provide automatic relationship management in SDEs.3.1.2.Requirements on anchorsThe notion of“anchors”varies from system to system[37],but anchors always denote regions of interest within objects in a hypertext system.In version space,as software documents evolve into new revisions,the regions of interest also change.These changes in documents may result in the non-conformance among software documents.In order to capture these changes and reflect the revisions of documents,anchors must also be versioned.SDEs also require support for both object-based and view-based anchors.View-based anchors are defined on the presentation(or view)of an external object.In an OHS,this presentation is the responsibility of a third-party application.An advantage of view-based anchors is that they can be defined for objects whose storage representation cannot be modified to include anchor information.They also allow link-based navigation among different views of the same document.This is a useful characteristic in a SDE that integrates third-party tools.In contrast,object-based anchors are defined on the underlying content of the objects and require either that the storage representation of the objects be able to describe anchors or that the OHS be aware of this storage representation.Object-based anchors will generally be visible in any view of an object.For an SDE,they have the advantage of correct semantics,because the logical connection between objects is not just an artifact of particular presentations.3.1.3.Requirements on linksSDEs also have requirements for links,because we assume that links are the representa-tion of logical connections between software documents.SDEs need typed links,flexibil-ity in the arity and directionality of links,and versions for links.Links must have types in order to represent the nature of the relationships among software documents.Relationship types can carry important information about the se-mantics of a relationship that can be exploited in later analysis.For example,“complains about”and“comments on”are two relationship types.The fact that A“comments on”B is essentially neutral.In contrast,when C“complains about”D,it is clear that a problem plaints require a response,while comments do not.While these example re-lationships are sensible,it does not appear useful to attempt to define a single taxonomy of link types for all situations,because the set of link types needed will depend on the software process used by each development organization.Rather,it must be possible for developers to define relationship types appropriate to their chosen process.Linking mechanisms that support a variety of link arities and directionalities are necessary because of the complexity of relationships among software documents.Non-directional links may be useful to connect examples of the same design pattern or uses of the same external library.Directional links can better represent causal relationships such as those between requirements,design,and implementation.While simple binary links will certainly be common,it is easy to envision the need for multi-links:a set of requirements may together motivate a set of design choices.Secondly,the developers must be able to define any kind of directionality of a link.A link must be a multi-link.An empty link should be allowed so that users can later on define its component anchors.Finally,links must be versioned.Some versioned hypermedia systems do not pro-vide versioning directly on links[24,31].Instead,changes in link structure are achieved by placing links inside containers that are versioned.This approach is not suitable for conformance analysis since the analysis requires to track individual links’evolution,and properties of links need to be updated over time.3.2.Conformance analysisSoftware systems evolve over time as the system is constructed from scratch and then as the system goes through a series of release versions.Thus,any system which purports to help with the management of software documents must support this evolution.We are particularly interested in helping developers detect when different software documents become non-conformant as the system evolves.Our current solution to this problem uses typed links along with versions and timestamps for anchors and links.3.2.1.RepresentationAs discussed in the previous section,the inter-document and intra-document relationships can convey important information about the semantics of the connections among software artifacts.In general,the relationships are among parts of documents,rather than entire documents.To achieve thisfine-grained representation,the SC document model provides a notion of linking between structural units.A structural unit is a fragment of a software document that is used to encode a concept such as a sentence,a paragraph,a section in software documentation or a statement,declaration,or class in program sources.It is represented by a node in the SC document tree.To capture the evolution of the relationships between documents,links in SC are typed and versioned.In general in SC,links are semantically directional but can be navi-gated in any direction and may connect more than two anchors.They are divided into four broad categories and the category affects both directionality and the number of anchors linked.Non-conformance links are intended to support navigational relationships that have little or no relevance to determining agreement between documents,such as table of contents and index links.Non-conformance links are n-ary,their direction is user-specifiable,and they are not used in conformance analysis.Non-causal links are n-ary and non-directional.They participate in conformance analysis.Causal links are used to represent semantic dependencies between entities where one document“causes”another.They have named types(such as“requires,”“specifies,”and“responds to”)and are always binary and directional.The dis-tinction between causal and non-causal links is important because causality can provide clues useful in conformance analysis.For example,item A in a design document may require the use of class B(A causes B)and function C may re-spond to bug report D(D causes C).Multi-causal links have two special associated sets:the source set and target set.This type of link is useful in the cases that a causal relationship has multiple sources and targets.Like causal links,they are directional and typed,but they are n-ary rather than binary.3.2.2.Anchor and link versioningAnchors in SC denote the regions of interest within a document and are versioned.But unlike some hypermedia systems,SC anchors are object-bound and view-independent.As an initial experiment,anchors are positioned at the structural unit level within a document. In version space,when the software documents evolve,the anchors might change as well, creating new versions.Anchors may also change when users redefine their positions in the documents,thus changing the semantic content of any links that use those anchors.Links in SC are also versioned,since a link is a set of anchors and the membership of the set may change over time.Thus,each anchor or link has a version tree.Every addition,deletion or replacement of an anchor for a link causes a new version of the link created.3.2.3.Conformance graphThe nodes and links form a general hypertext graph.An important related graph is the conformance graph,whose edges are the conformance links plus the structural relation-ships within the nodes,which are tree-structured documents.The conformance graph and its links have some important characteristics:The conformance graph must be acyclic with respect to causal links,because cy-cles would imply that a node causes itself.–The structural relationships within nodes are part of the conformance graphbecause a document element cannot have a causal relationship with any ofits ancestors.Such a relationship would imply that the element was caus-ing itself.Since causality is logically transitive,the structural relationshipsmust be part of the conformance graph when checking for cycles.Conformance links must connect anchors is a sensible way:–Non-causal conformance links must connect at least two anchors.–Causal links must have both a source and a target.–Multi-causal links must have non-empty source and target sets.The transitive and reflexive closure of edges corresponding to causal links definesa partial order set(poset)on a subset of nodes.The minimal elements of this posetare called source nodes and maximal elements are called sink nodes. Preventing cycles in the conformance graph will be a challenging task.It implies either that some information about the internal structure of a node must be visible to outside agents or that the conformance analysis will have to inspect the internals of a node.3.2.4.TimestampsIn SC,the representation of anchors and links uses standard concepts such as identifier, attributes and values as well as version information including version ID,version creator, and a timestamp.In addition,links must have a validation timestamp that records the time when the link was last validated by human inspection.When a link gets updated to a new version,the validation timestamp is copied from the previous version,even though validation predates the creation of the version.We expect this to simplify conformance analysis.3.2.5.Non-conformance ratingsWe have developed a scheme for detecting possible conformance problems in software document relationships based on the timestamps of anchors and links.This scheme pro-duces a numeric rating of the likely seriousness of the problem called the non-conformance heuristic value.They are on a scale from zero(likely conformance)to ten(likely non-conformance).However,these numbers are just heuristic values and have yet to be val-idated systematically.The detection scheme starts from non-causal links among source nodes and proceeds through causal links in a link-by-link manner.Causal links Causality implies a partial ordering in time.This partial order results from the fact that if causes,then must have occurred before.In the case of causal links,three timestamps are relevant:,the version timestamp of the source anchor;,the version timestamp of the destination anchor;and,the validation timestamp of the link.We have made a case analysis of the order of these timestamps,defining conformance ratings for each case,as shown in Table1.For example,if then the destination is newer than the source and the link relationship was validated by a human sometime after the last changes to both and the rating is zero.In contrast, if then the destination has changed since the last validation and the rating isfive(5).We have arrived at these ratings only by human judgement and makeTime Relationship CommentsNear full validity:src is newer thandest,but relationship has been validated5Likely problem:src has changed undetermined and relationship is not validated Table1:Non-conformance ratings for causal links based on various time rela-tionships between the anchors and the validation of the link.no claims of empirical validity.A correct and useful formula for these ratings remains an open question and will probably require empirical research.Non-causal links When causality is not available to provide clues,we turn to a more formulaic approach.Assume that a non-causal link connects anchors and let be the timestamp of the anchor.Then,if there exists any such that thenOtherwise,.is an adjustable parameter representing the minimum rating when the timestamps suggest that a problem exists.The idea is that this minimum rating may be affected by other factors such as the frequency of changes to the link’s anchors.3.3.Software configuration management and versioned hypermediaSoftware configuration management(SCM)is the discipline of managing the evolution of large-scale software systems.A SCM system records the composition of versioned software products as they evolve into many revisions and variants,maintains consistency between interdependent components,reconstructs previously recorded software configu-rations,builds derived objects from source,and constructs new configurations based on descriptions of their properties[4].The basic element of a SCM system is the software object.A software object can be afile(infile-based version control systems)or a smaller structural unit(infine-grained version control systems).The representation of software objects varies between different systems and they can be stored as textfiles or as syntax trees or graphs.Software objects have various types of logical relationships.The focus of a SCM system is on com-positional and dependency positional relationships organize software objects structurally,into larger composite objects.Dependency relationships establish di-rected dependencies between source objects and target objects.Examples of dependency relationships are import and include dependencies between modules and build dependen-cies between source code objects and compiled executable objects.A typical SCM maintains the evolution of a software product through the inter-play of two separate spaces:product space and version space.Product space describes。