The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software has been changing during its whole life cycle. Therefore, identification of source code changes becomes a key issue in software evolution analysis. However, few current change analysis research focus on dynamic language software. In this paper, we pay attention to the fine-grained source code changes of Python software. We implement an automatic tool named PyCT to extract 77 kinds of fine-grained...
Reliability is one of the important aspects of any software, which has been studied for decades with many techniques proposed and developed. In software engineering, software reliability cannot be ignored in any application. However, it is still hard to measure and difficult to ensure the reliability of software, which means that it is necessary to find new ways to study on the software reliability,...
We present a micro-architecture based lightweight framework to enhance dependability and security of software against code reuse attack. Different from the prior hardware based approaches for mitigating code reuse attacks, our solution is based on software diversity and instruction level control flow randomization. Generally, software based instruction location randomization (ILR) using binary emulator...
This paper addresses one serious SDN-specific attack, i.e., data-to-control plane saturation attack, which overloads the infrastructure of SDN networks. In this attack, an attacker can produce a large amount of table-miss packet_in messages to consume resources in both control plane and data plane. To mitigate this security threat, we introduce an efficient, lightweight and protocol-independent defense...
With the rapid development of microelectronics, it is difficult to test complicated integrated circuit for the traditional test methods. For this circs, JTAG puts forward a new kind of circuit test method — boundary scan technology. According to the IEEE1149.4, a boundary scan controller is designed by ATmega128 MCU and SN74ACT8990. Experiments show that the test controller can locate faults rapidly...
Software fault location is a very complex problem. Many researchers at home and abroad have already started studying how to use the candidate path which is similar to the invalid path to find the fault location, and they have achieved some results. In this paper, based on existing researches, a method of using the path set which is the most similar to the specified invalid path to locate fault, and...
A novel loop selection framework with cost evaluation to boost thread level speculation (TLS) parallelism in chip multiprocessor (CMP) systems is proposed in this paper. In order to improve the performance, a loop selection framework with the aid of TLS and profiling is added to reduce unnecessary loops parallelization for their low gains even losses under parallelization. A number of techniques for...
At present, most of Web applications have multi-tier architectures. The Web application contains many components, which makes it become component-based Web application. This paper focuses on this kind of Web applications and constructs three dependency graphs based on structure relations and message call relations. Then we improve the path-based integration testing method, propose an extended MM-path...
The research in this paper focuses on an approach to reverse engineering Web-based legacy systems with the integration of model-driven engineering and UML. Three types of link-based models of Web-based legacy systems are presented. Web-based legacy systems are parsed to find judgement conditions of model, and UML diagrams are described based on the modelling rules.
We designed and built a novel all-optical re-timing, re-amplifying, and re-shaping (3R) regeneration system based on terahertz optical asymmetric demultiplexers (TOADs) developed in our laboratory. The system is capable of parallel processing multiple wavelengths, a feature which will significantly improve the scalability of current wavelength division multiplexing (WDM) networks. Performance against...
Knowledge management being implemented in organizations with low cost, less risk and less time is widely recognized to be one of the crucial problems. Using formal and informal methods we propose a description model to support knowledge management in an software organization with many projects and many people. The prototype system based on the model can help the organizations to capture, store and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.