The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a scientific research network, to determine the influence of an academic research, a key is to build and evaluate properties of its cited references or co-author networks. To analyze 18,000 lines of original data from Problem C given in 2014 MCM/ICM (Mathematical Contest In Modeling /Interdisciplinary Contest In Modeling), the Pajek software was used with obtaining a result that correlations among...
In order to establish a comprehensive automatic visual surveil-lance system, many researches aimed at tracking objects for high-precision and recognized objects for high accuracy. The process of these technologies involves a lot of computation load and even highly complex algorithms to meet the requirement. However, while implementing these technologies for the application in embedded systems or low-end...
Taint-based Concolic testing is a software testing technique, which combines dynamic taint analysis, symbolic testing and concrete execution. Concolic testing is faster than symbolic testing while maintaining the same precision. Taint-based concolic testing uses dynamic taint analysis to help identify instructions related to inputs, and at the same time reduce the total number of constraints. Although...
In this paper we design and implement a home embedded surveillance system with ultra-low alert power. Traditional surveillance systems suffer from an unnecessary waste of power and the shortcomings of memory conditions in the absence of invasion. In this design we use Pyroelectric Infrared sensors (PIR) and pressure sensors as the alert group in windows and doors where an intruder must pass through...
As Graphical User Interfaces (GUIs) have almost become ubiquitous for users to interacting with software system, GUI testing becomes an essential task. GUI testing, whose basic steps are test case generation and execution result validation, is a knowledge intensive process that requires both knowledge of GUI systems and testers' experience. In this paper, an ontology-based approach is proposed to...
Recovering software architecture from a software system is a good manner to understand and maintain it, and has great significance for legacy systems whose problem is a lack of information for maintenance and evolution. Recently, many clustering algorithm have been employed for software architecture recovery. To increase the recovering accuracy and enhance the effectivity, an improved hierarchical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.