1. Homepage
  2. Programming
  3. CERTIFIED SECURITY BY DESIGN Project 2 Requirements: Functional Programming

CERTIFIED SECURITY BY DESIGN Project 2 Requirements: Functional Programming

Engage in a Conversation
Syracuse UniversityCERTIFIED SECURITY BY DESIGNFunctional ProgrammingHOL

Project 2 Requirements CourseNana.COM

Shiu-Kai Chin Week 2 CourseNana.COM

1 Purpose CourseNana.COM

This project continues developing your capabilities to develop professional-level results capable of convincing a knowledgeable reviewer of your competence. The purpose of this project is for you to demonstrate the following: CourseNana.COM

Demonstrate your capabilities: CourseNana.COM

Basic functional programming skills as evidenced by CourseNana.COM

  • Code solutions to Exercises 2.5.1, 3.4.1, and 3.4.2 CourseNana.COM

  • Session transcripts showing execution results of required test cases CourseNana.COM

  • Explanations as required by each problem CourseNana.COM

  • All source code for each exercise in the appendix
    By means of using relevant tools and techniques: LaTeX, AUCTeX, emacs, and ML CourseNana.COM

    In order to deliver compelling evidence that you have satisfied functional and documentation requirements with: a pdf of your report with all source files allowing others to reproduce your report, functional programs, and test results. ML source code. All LaTeX and ML files are compiled with a single make command in the top-level folder. CourseNana.COM

2 Project Requirements 2.1 Directory Structure CourseNana.COM

The directory structure matches that of SampleProject. CourseNana.COM

  • Top Level Directory: Project2 CourseNana.COM

  • In Project2, you will have CourseNana.COM

    Makefile: top-level script for building your project Folder: ML containing CourseNana.COM

    All ML source code: ex2-5-1.sml, ex3-4-1.sml, ex-3-4-2.sml
    Execution transcripts: ex2-5-1.trans, ex3-4-1.trans, ex-3-4-2.trans CourseNana.COM

CERTIFIED SECURITY BY DESIGN CourseNana.COM

Makefile to execute ML source code and generate transcripts Folder: LaTeX containing CourseNana.COM

All project source code files for your project
Makefile: script for creating your pdf deliverable CourseNana.COM

2.2 Reproducible Results CourseNana.COM

make Your ML transcripts must be executed by HOL and produce an ASCII transcript file. Your report must be written CourseNana.COM

using LaTeX and produce a PDF output. Failure to do this correctly will result in a 50% penalty. CourseNana.COM

2.3 Appropriate File Names CourseNana.COM

The sources you deliver are a reflection of your competence, diligence, and professionalism. This includes using file names that reflect your competence and that you actually did your own work. For this project this might mean using <your initials>Report.tex as a name, instead of the file name I used in the in-class examples. CourseNana.COM

Failure to name files appropriately conveys you are too lazy to do anything more than copy someone else's work. If given files to use and it is appropriate for you to use them, then keep the names and acknowledge their source. CourseNana.COM

2.4 Required Content CourseNana.COM

Your report shall have the following content: CourseNana.COM

2.4.1 Front Matter CourseNana.COM

Title, Author, and Date
These must be formatted appropriately in LaTeX and spelled correctly.
CourseNana.COM

2.4.2 Abstract CourseNana.COM

In your own words limited to a paragraph, state what are the important things you learned to do and why they are important to you. This cannot be a general statement. It must be specific to the project and to you. CourseNana.COM

2.4.3 Acknowledgments CourseNana.COM

Cite people who helped you. Include the people you teamed with in class and anyone else who helped you, as the in-class projects contributed to your capability to do the project. We check if team members have consistently cited each other. CourseNana.COM

All your deliverables CourseNana.COM

including your CourseNana.COM

ML transcripts and LaTeX reports CourseNana.COM

must be reproducible in a CourseNana.COM

reviewer's virtual machine by typing CourseNana.COM

in the top-level folder of your source files. CourseNana.COM

CERTIFIED SECURITY BY DESIGN CourseNana.COM

2.4.4 Executive Summary CourseNana.COM

There are three parts to your Executive Summary 1. CourseNana.COM

  • All project requirements are satisfied, or CourseNana.COM

  • Some project requirements are NOT satisfied, and then provide a list and explanation of CourseNana.COM

    what is missing, incorrect, and why. CourseNana.COM

    The reason for the lead sentence is to inform the reader if your work is complete or not. It is unprofessional if the lead sentence is inconsistent with what you have actually done. Grade penalties are severe if the lead sentence is misleading. CourseNana.COM

    Similar to your weekly reflections, you must include as part of your executive summary: CourseNana.COM

  1. A mind-map of the key concepts/skills and obstacles you personally had to learn or overcome to do this project. What was hard? What was easy? CourseNana.COM

    . Note: I expect this to be unique to each student, because each of you comes to this course with different experiences. No CourseNana.COM

    two mind maps should be the same. CourseNana.COM

  2. A written summary of your mind-map and what you delivered with respect to the project requirements. Since each mind-map is unique, your written Executive Summary should be unique. CourseNana.COM

What you produced for this project along with what is missing, if anything. CourseNana.COM

Remaining Content CourseNana.COM

Chapter 2: Exercise 2.5.1 with the following sections
2.1
Problem statement: describe the problem in your own words CourseNana.COM

Typeset the mathematical function implemented by timesplus in LaTeX 2.2 Relevant Code CourseNana.COM

To make your relevant code stand out: relevant code must be displayed within shadow framed box as in the sample report. CourseNana.COM

2.3 Test cases CourseNana.COM

To make your test cases stand out: test cases are surrounded by double lines at the top and bottom as shown in the sample report CourseNana.COM

You MUST put one of the following two sentences at the beginning of your Executive CourseNana.COM

Summary: CourseNana.COM

Please comment specifically CourseNana.COM

on how you found the use of (1) pattern matching to be challenging or not, (2) the use of CourseNana.COM

listings CourseNana.COM

package and commands (e.g., \lstset, etc.), and (3) the use of graphics functions for CourseNana.COM

boxing source code, tests, and execution trandscripts CourseNana.COM

2.4 Execution transcripts CourseNana.COM

To make your execution transcripts stand out: use the numbered HOL session boxes as shown in the sample report. The first box is numbered starting with 1. Successive session boxes are numbered incremented by 1. CourseNana.COM

Chapter 3: Exercise 3.4.1 A, B, and C, with the following sections
3.1
Problem statement: describe the problem in your own words 3.2 Relevant Code CourseNana.COM

To make your relevant code stand out: relevant code must be displayed within shadow framed box as in the sample report. CourseNana.COM

3.3 Execution transcripts CourseNana.COM

To make your execution transcripts stand out: use the numbered HOL session boxes as shown in the sample report. The first box is numbered starting with 1. Successive session boxes are numbered incremented by 1.Chapter 4: Exercise 3.4.2 with the following sections CourseNana.COM

4.1 Problem statement: describe the problem in your own words 4.2 Relevant Code CourseNana.COM

To make your relevant code stand out: relevant code must be displayed within shadow framed box as in the sample report. CourseNana.COM

4.3 Execution transcripts CourseNana.COM

To make your execution transcripts stand out: use the numbered HOL session boxes as shown in the sample report. The first box is numbered starting with 1. Successive session boxes are numbered incremented by 1. CourseNana.COM

Appendix A: Exercise 2.5.1 Source Code CourseNana.COM

Source code is input to the report using \lstinputlisting CourseNana.COM


Appendix B: Exercise 3.4.1 Source Code CourseNana.COM

Source code is input to the report using \lstinputlisting CourseNana.COM


Appendix C: Exercise 3.4.2 Source Code CourseNana.COM

Source code is input to the report using \lstinputlisting CourseNana.COM


3 Submission Guidelines CourseNana.COM

Deadline: check the course website. Generally, projects are due 1 week after assigned at 2359 hours the day in between our first and last class of the week. Late work is penalized at the rate of 10% for each day, even if you are only 1 minute into the new day, e.g., 0000 hours the day after your work is due, you will get a 10% penalty. This means you should not wait until the last minute to submit your work in case something goes wrong. When submitting proposals to the government, if you miss the deadline your proposal is automatically rejected. CourseNana.COM

  • How submitted: through Blackboard. This means Blackboard timestamps your work. It is your responsibility to make sure it is submitted correctly. CourseNana.COM

  • Unlimited number of submissions: your last submission is what is graded prior to the deadline. Once I start grading your last submitted report after the deadline, you cannot count on me grading anything else you have submitted after the deadline. CourseNana.COM

Get in Touch with Our Experts

WeChat WeChat
Whatsapp WhatsApp
Syracuse University代写,CERTIFIED SECURITY BY DESIGN代写,Functional Programming代写,HOL代写,Syracuse University代编,CERTIFIED SECURITY BY DESIGN代编,Functional Programming代编,HOL代编,Syracuse University代考,CERTIFIED SECURITY BY DESIGN代考,Functional Programming代考,HOL代考,Syracuse Universityhelp,CERTIFIED SECURITY BY DESIGNhelp,Functional Programminghelp,HOLhelp,Syracuse University作业代写,CERTIFIED SECURITY BY DESIGN作业代写,Functional Programming作业代写,HOL作业代写,Syracuse University编程代写,CERTIFIED SECURITY BY DESIGN编程代写,Functional Programming编程代写,HOL编程代写,Syracuse Universityprogramming help,CERTIFIED SECURITY BY DESIGNprogramming help,Functional Programmingprogramming help,HOLprogramming help,Syracuse Universityassignment help,CERTIFIED SECURITY BY DESIGNassignment help,Functional Programmingassignment help,HOLassignment help,Syracuse Universitysolution,CERTIFIED SECURITY BY DESIGNsolution,Functional Programmingsolution,HOLsolution,