Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In the last years, the growing adoption of cloud-based multi-tiers systems has strongly increased the levels of resource sharing among companies, improving the enterprise efficiency, thanks to a refined business dynamism and a rapid decrease in costs. However, in spite of their advantages, this new business model highlights the emergence of new computational approaches aimed at the distribution and...
Mobile systems have become essential for communication and productivity but are also becoming target of continuous malware attacks. New malware are often obtained as variants of existing malicious code. This work describes an approach for dynamic malware detection based on the combination of Process Mining (PM) and Fuzzy Logic (FL) techniques. The firsts are used to characterize the behavior of an...
In the last two decades, the increased production and installation of photovoltaic (PV) plants worldwide has asked for efficient low-cost methods for PV plant inspection to monitor their functionality and guaranteed their performance. To lower maintenance costs new systems have been thought to substitute human workers inspecting the PV plants. The employment of Unmanned Aerial Vehicles (UAVs) has...
The growth in use of mobile phones to communicate and access sensitive resources drives the research of new approaches for protecting smartphones from all the possible attacks deriving from malicious software. Moreover, the continuous emerging of new and sophisticated malware makes current solutions to protect mobile phones inadequate shortly after being implemented. In this paper a new approach for...
Mobile phones are more and more used for sensitive resources exchange and access, becoming target for possible malware attacks. These attacks are still increasing with the birth of new and sophisticated malware that make the existing malware detection approaches often inadequate. Since the majority of new malware are generated using existing malicious code, it becomes very important tracking the mobile...
Cloud computing is rapidly emerging as a new information technology that aims at providing improved efficiency in the private and public sectors, as well as promoting growth, competition, and business dynamism. Cloud computing represents, today, an opportunity also from the perspective of business process analytics since data recorded by process-centered cloud systems can be used to extract information...
Fast prototyping is a quick and cost effective development of a (minimum) viable version of a software useful to some purpose (e.g., requirements verification or design validation), which can be discarded or refactored to become the version of the software to be delivered. In this paper we propose a model-driven approach for the fast prototyping of Rich Internet Applications (RIAs). Starting from...
In this paper an approach to automatically detect Design Patterns (DPs) in Object Oriented systems is presented. It allows to link system's source code components to the roles they play in each pattern. DPs are modelled by high level structural properties (e.g. inheritance, dependency, invocation, delegation, type nesting and membership relationships) that are checked against the system structure...
Reverse engineering is usually used to recover missing and up to date models of a software system to support its comprehension when changes are required to maintain or evolve it. Model driven engineering approaches have been recently proposed to develop more quickly web applications with a high design quality and maintainability. Integrating reverse engineering techniques with model driven web engineering...
Developers working on related artifacts often communicate each other to coordinate their changes and to make others aware of their changes. When such a communication does not occur, this could create misunderstanding and cause the introduction of bugs. This paper investigates how the level of communication between committers relates to their proneness to introduce faults. This is done by identifying...
This paper presents an approach for the model-driven fast prototyping of Web applications. The approach exploits well known Model-Driven Engineering frameworks and technologies, such as Eclipse EMF, GMF, and Xpand, to enable the design of a Web application and the automatic generation of the code artifacts implementing a ready to deploy prototype of it. The approach allows to effortlessly and quickly...
This paper presents a semi-automatic approach to Web applications design evolution which leverages the Ubiquitous Web Applications (UWA) design framework, a methodology and a set of models and tools for the user-centered design of multi-channels and context-aware Web applications. The approach is based on a two-step redesign process: first a semi-automatic reverse modeling phase analyzes the html...
Tracing source code elements of an existing Object Oriented software system to the components of a Design Pattern is a key step in program comprehension or re-engineering. It helps, mainly for legacy systems, to discover the main design decisions and trade-offs that are often not documented. In this paper an approach is presented to automatically detect Design Patterns in existing Object Oriented...
This paper presents the main features of ConAn, a tool supporting an approach to find scattered and tangled class members in OO systems and to group them in concerns. The recovered information is useful for refactoring/migration tasks, such as towards Aspect Oriented Programming (AOP).
Aspect Oriented Programming (AOP) constructs introduce new kinds of relationships among traditional units, e.g. classes in Object Oriented (OO) code, and aspects due to the weaving among aspects’ code fragments, such as advice or inter-type declarations, and the traditional system units. These relationships can be difficult to identify making hard and risky the maintenance operations because the impact...
The kernel design of the flexible framework for magnetic measurements (FFMM), under development at the European Organization for Nuclear Research (CERN), is described. The design aims at satisfying the critical scenario of short-term requirement variability for the small batches of magnets after the commissioning for the large hadron collider (LHC). The experimental test results of software flexibility...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.