The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Currently, open source projects receive various kinds of issues daily, because of the extreme openness of Issue Tracking System (ITS) in GitHub. ITS is a labor-intensive and time-consuming task of issue categorization for project managers. However, a contributor is only required a short textual abstract to report an issue in GitHub. Thus, most traditional classification approaches based on detailed...
Deduplication is widely adopted in virtual machine(VM) backup to save storage space. However, the deduplication storage could cause serious fragmentation, which severely affects the performance of restoring VMs. Current studies mainly focus on backups from a single data source, whereas the backup of VM images is usually a group of behaviors. Exploiting the block reference helps to defragment deduplication...
Middleboxes are widely deployed to perform various network functions to ensure security and improve performance. The recent trend of Network Function Virtualization (NFV) makes it easy for operators to deploy software implementations of these network functions on commodity servers. However, virtual network functions consume different amounts of resources when processing packets. Thus a multi-resource...
The global open source software resources have become an Internet-scale repository, which provide abundant resources for software reuse. However, how to locate the desired resource efficiently and accurately from such large amounts is quite a challenge problem. Most of recent works barely focus on the semantic similarity by analyzing the software itself, which often result in inappropriate ranking...
Middleboxes are prevalent in today's enterprise and data center networks. Network function virtualization (NFV) is a promising technology to replace dedicated hardware middleboxes with virtualized network functions (VNFs) running on commodity servers. However, no prior study has examined the energy efficiency of different NFV implementations. In this paper, we conduct a measurement study on the power...
“Rebooting Computing” (RC) is an effort in the IEEE to rethink future computers. RC started in 2012 by the co-chairs, Elie Track (IEEE Council on Superconductivity) and Tom Conte (Computer Society). RC takes a holistic approach, considering revolutionary as well as evolutionary solutions needed to advance computer technologies. Three summits have been held in 2013 and 2014, discussing different technologies,...
Because of the rapid growth of open source software, how to choose software from many alternatives becomes a great challenge. Traditional ranking approaches mainly focus on the characteristics of the software themselves. In this paper we investigate the market demands for software engineers, and propose a novel approach for ranking software by analyzing the market requirements for special software...
This study mainly about the structure design and movement simulation of 3 degree of freedom parallel robot, which has cylinder as actuator. Through comparing with the existing delta parallel robot we solve the problem that the mobile platform horizontal direction tilt in the design process. This problem can be solved from two aspects that hardware constraints and software control, hardware aspect...
A high-performance interconnection between a host processor and FPGA accelerators is in much demand. Among various interconnection methods, a PCIe bus is an attractive choice for loosely coupled accelerators. Because there is no standard host-FPGA communication library, FPGA developers have to write significant amounts of PCIe related code at both the FPGA side and the host processor side. A high-performance...
Algebraic side-channel attack (ASCA) is a typical technique that relies on a general solver to solve the equations of a cipher and its side-channel leaks. It falls under analytical side-channel attack and can recover the entire key at once. Many ASCAs are proposed against the AES, and they utilize the Gröbner basis-based, SAT-based, or optimizer-based solver. The advantage of the general solver approach...
The teaching of equipment training is one of the necessary means of equipment safeguard. Facing increasingly complicated structure of equipments, there are many limitations about the real machine teaching while virtual reality technology can simulate actual structure of equipment vividly which can highlight the training characteristics. This article is combined with professional teaching and designs...
Developing secure wireless sensor networks (WSNs) is a complex process that involves careful design of attack test cases and security countermeasures, as well as meaningful evaluation of the impact of the attack and performance of the countermeasure. In this paper, we present the design and implementation of Sen Sec, a scalable framework that facilitates the development and evaluation of secure WSNs,...
For the current open, dynamic and ever-changing Internet environment, select the security, integrity, trusted, software coordination entity with reliable quality of service has great difficulty, Internetware service entity is difficult to ensure the other's trusted in mutual coordination. Trusted relationship between software entities for the trust of Internetware has important significance. This...
In this paper, we first discuss the current conditions of education on software engineering talents. Then we recommend an example adopted by school of computer in Hubei University of Economics, in which we address the education model of talents training, and raise the opinion that education model of software engineering must orient vocation and utilize the iterative approach. To the end, we summarize...
As applications grow more and more complex, the current software faces a great challenge in dynamism. This paper proposes to modernize legacy software towards runtime plug-and-play architecture using service-oriented component model. Our object is to provide runtime plug-and-play feature for software to simplify development and adapt to changing execution environment. We propose a two-stage modernization...
Simulating the behavior of sensor applications in a heterogeneous network or under diverse environmental conditions is particularly challenging. In this paper, we present the design and implementation of TiQdagger, a scalable framework that allows unmodified TinyOS applications to be evaluated in a diverse set of operating conditions, including heterogeneous networks. We validate TiQ against MoteLab,...
Firstly, based on the principle of binocular vergence eye movements ,a new type of method about field fixed point landing of the Subminiature robot helicopter is put forward. Secondly, according to oculomotor neural pathways, the oculomotor control system model is established. Then the control model of SHR landing system is discussed in detail. Some key problems about the control system are stressed...
The typical software engineering course consists of a series of lectures in which theories and concepts are communicated, and, in an attempt to put this knowledge into practice, a small software engineering project that the students must develop. But there are simply not enough time and resources for the students to work on a project of a large enough size to exhibit many of the phenomena present...
A novel three-dimensional human body modeling method on laser technology, using the CCD camera to receive the scanning information, based on the theory of aerial photography surveying and 36 characteristic measuring points, is reported here. We introduce the mode integration of human body and the principle of human body feature identifying. The laser scanning human body three-dimensional modeling...
Computational grid is a cooperative computing environment which collects all kinds of high performance software and hardware computing resources distributed in WAN and provides networked computing services. The computational grid systems that have been the focus of much research activities in the past years for controlled sharing of resources across institutional boundaries. Credit is one major concern...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.