The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Although every educational institution has a code of academic honesty, they still encounter incidents of plagiarism. These are difficult and time-consuming to detect and deal with. This paper explores the use of personalized assessments with the goal of reducing incidents of plagiarism, proposing a personalized assessment software framework through which each student receives a unique problem set...
Understanding existing pieces of software is a challenge faced by many software developers regardless of their experience. This project researches into existing reverse engineering tools used for code comprehension and identifies the limitations of the current approaches. Furthermore, a prototype implementation was developed to extract design models from available source code in order to achieve better...
The incorporation of peer code reviews as being part of a developer's work flow, and hence the software development lifecycle, has steadily grown in popularity over the past three decades. During the process of statically inspecting code, developers of a codebase are able to collaboratively detect possible code defects, as well as use code reviews as a means of transferring knowledge to improve the...
Network steganography or covert channel allows one to initiate secret communication with the hope that such communication cannot be detected by adversaries. It appears to be a favourable tool that could bring the next level of communication secrecy for everyone. While there are number of research work into how such covert channels are formed and used, there are also a number of work investigating...
High performance scientific computers require high bandwidth memory systems. The size of data sets for large scientific codes implies the need for a memory system which contains independent, interleaved banks. We compare the performance of two different control structures for an interleaved memory: bank buffering and address stream lookahead. We show that a centralized lookahead memory controller...
Given an irregular dependency graph consisting of interdependent tasks, the problem of finding an optimal assignment on a number of parallel execution units is NP-complete. Assignment schemes thus settle for some heuristics that produce sub-optimal solutions. Most popular of these are the work-greedy assignment schemes. This paper presents new bounds on the performance of work-greedy schemes, taking...
Network steganography is an ever-growing research topic as the idea of hiding information attracts many researchers. It is a rapidly evolving topic with suggestions and proposals how one can exploit a network protocol to enable a secret communication, and how it can be detected and prevented. This paper reviews some of the notable network steganography and steganalysis techniques and comments on their...
Health monitoring involves sensing, reporting, and sometimes adjusting the states of objects or nodes remotely. This paper describes the design and implementation of a real-time distributed hardware health monitoring framework, assuming a homogeneous set of hardware nodes. The framework consists of sensor components operating at the nodes, and visualization components operating at monitoring stations...
While Cryptography is the science of secure communication, Steganography is the art of covert communication. Steganography has a long history, but modern steganography uses digital carriers such as electronic text, disk space, network packets, digital audio and images to hide secrets. Steganalysis, the countermeasure to steganography, is designed to detect and analyse the hidden data disseminated...
Web caching is widely used to cache resources that have already been used and reuse them in near future. Prefetching, in comparison, is a technique to cache resources that have never been used. The core of prefetching is prediction - predicting which resources might be used in the the near future. Prefetching is a technology that has been actively studied in the recent years. Most of the modern browsers...
Steganalysis detects the presence of hidden information in media files. In this paper, we propose a steganalysis technique based on an estimate of the complexity of media files. The technique detects not only the presence of hidden information but also the size of the hidden information. We compare our technique to another published technique and show empirically that, in some well-defined cases,...
With the current emphasis on “Big Data”, NoSQL databases have surged in popularity. These databases are claimed to perform better than SQL databases. In this paper we aim to independently investigate the performance of some NoSQL and SQL databases in the light of key-value stores. We compare read, write, delete, and instantiate operations on key-value stores implemented by NoSQL and SQL databases...
With the growth of the speed of and access to the Internet, the use of networked or cloud-based applications have grown substantially. Even though there is an increase in the speed of the network, latencies presented to networked applications are often unacceptable and result in lowering user experience. In this paper, we review the state of the art techniques that optimize network latency. These...
The OAuth 2.0 authorization protocol standardises delegated authorization on the Web. Popular social networks such as Facebook, Google and Twitter implement their APIs based on the OAuth protocol to enhance user experience of social sign-on and social sharing. The intermediary authorization code can be potentially leaked during the transmission, which then may lead to its abuse. This paper uses an...
Steganalysis is the science of detecting the presence of hidden information in media files. In this paper, we propose a simple scheme based on close colours that detects not only the presence of hidden information but also the size of the hidden information. The scheme applies to synthetic digital images with a small number of distinct colours (such as logos and flags). We compare our scheme to another...
The simplest way to maximize the use of the available broadband capacity is to compress data transfers and cache data whenever possible. The HTTP protocol allows both compression and caching, benefiting both servers (in terms of bandwidth requirements and lighter load) and clients (in terms of faster downloads). In this paper, we investigate some of the top-ranking websites within New Zealand to see...
GPS navigators track vehicle location in real-time. A related problem is tracking a vehicle's path after the travel. This often is a requirement for fleet management and also for ensuring correct payment of road user charges. Such path prediction uses data stored during the vehicle's travel. The problem then is to ensure storing minimum amount of data, while maximizing the path prediction accuracy:...
Vision-based driver assistance is an active safety measure currently under development in various car companies and research institutes worldwide. The paper informs about related activities at The University of Auckland, focussing on stereo vision, performance evaluation, provided test data, and currently developed components.
This report informs about current activities and results in the .enpeda‥ (short for ‘environment perception and driver assistance’) project and related performance evaluation studies, in panoramic visualization, in environmental surveillance based on scanned footprints of small species, in artistic filters, and in the design of efficient geometric algorithms for areas related to 2D or 3D imaging or...
This paper presents the design and implementation of a web-based application for video content sharing in the driver assistance research domain. The domain has special needs for video such as the ability to zoom and the ability to play related clips concurrently. In addition, since large amounts of data (video contents) have to be transmitted over the network, network usage and efficiency are critical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.