The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
At present, radio frequency identification technology has been widely used in many fields, such as data acquisition, transportation, logistics management and so on. However, the collision problem in RFID technology seriously affects the performance of RFID system. Aimed at the shortcomings of search times and traffic by the traditional binary search algorithm, this paper propose an improved binary...
Search-based software testing has achieved great attention recently, but the efficiency is still the bottleneck of it. This paper focuses on improving the efficiency of generating test data for multiple paths. Genetic algorithms are chosen as the heuristic algorithms in search-based software testing in this paper. First, we propose an improved grouping strategy of target paths to balance the load...
Combining with software-defined networking and virtualization technology, Network Function virtualization (NFV) has been proposed as an important technology for constructing scalable network. VNF (Virtual Network Function) redeployment is a critical step for dealing with network evolve. Due to the inner state consistency constraints, VNF migration to a new location is major challenge for redeployment...
Software has been changing during its whole life cycle. Therefore, identification of source code changes becomes a key issue in software evolution analysis. However, few current change analysis research focus on dynamic language software. In this paper, we pay attention to the fine-grained source code changes of Python software. We implement an automatic tool named PyCT to extract 77 kinds of fine-grained...
Mobile multicast has been deployed in telecommunication networks for information dissemination applications such as IPTV and video conferencing. Recent studies of mobile multicast focused on fast handover protocols, and algorithms for multicast tree management have witnessed little improvement over the years. Shortest path trees represent the status quo of multicast topology in real-world systems...
Python is widely used for web programming and GUI development. Due to the dynamic features of Python, Python programs may contain various unlimited errors. Dynamic slicing extracts those statements from a program which affect the variables in a slicing criterion with a particular input. Dynamic slicing of Python programs is essential for program debugging and fault location. In this paper, we propose...
Effective testing can develop quality software with higher productivity at a lower cost. Redundancy in the test suite increases the execution cost and consumes scarce project resources. Due to time and resource constraints in testing, test suite reduction techniques are required to remove those redundant test cases from the test suite. Since Weighted Set Covering Techniques can be used to resolve...
Hardware/software partitioning is a crucial problem in hardware/software co-design. In this paper, we deeply investigate genetic algorithm (GA) for hardware/software partitioning, our co-design targets a heterogeneous multicore system on chip (SoC) which consists of several different types of processing engines(PE), Communicating structure adopts NOC, We use GA for four task graphs to simulate the...
In order to implement the remote sensing applied in land use research, we use a series of remote sensing image processing commercial software to extract land use/land cover information. The article are based on compare and analyze the ability of identify information of land use and land cover between two software (Erdas imagine 8.5 and ENVI4.1) which using the same classification method in a imagine...
Software fault location is a very complex problem. Many researchers at home and abroad have already started studying how to use the candidate path which is similar to the invalid path to find the fault location, and they have achieved some results. In this paper, based on existing researches, a method of using the path set which is the most similar to the specified invalid path to locate fault, and...
Page switching is a technique that increases the memory in microcontrollers without extending the address buses. This technique is widely used in the design of 8-bit MCUs. In this paper, we present an algorithm to reduce the overhead of page switching. To pursue small code size, we place the emphasis on the allocation of functions into suitable pages with a heuristic algorithm, thereby the cost-effective...
In the Internet age, Software security and piracy becomes a more and more important issue. In order to prevent software from piracy and unauthorized modification, various techniques have been developed. Among them is software watermarking which protects software through embedding some secret information into software as an identifier of the ownership of copyright for this software. This paper gives...
This paper is dedicated to the study of Symbolic Execution and improves the core algorithm of it using Heuristic learning, search and Function Abstraction to effectively address the path explosion problem, which will trigger the vulnerabilities that the traditional method can not find and improve the efficiency, precision and accuracy of software vulnerability discovery.
Hardware/Software partitioning is one of the critical steps in Hardware/Software Co-Design flow, and has very important influence on the system performance. Hardware/Software partitioning is also a NP-hard problem. In this paper, we present a new Hardware/Software partitioning algorithm called PSO-IC for heterogeneous multicore SOC, which combines particle swarm optimization (PSO) algorithm and immune...
Software as a Service (SaaS) is thriving as a new mode of service delivery and operation with the development of network technology and the maturity of application software. SaaS application providers offer services for multiple tenants through the ??single-instance multi-tenancy?? model, which can effectively reduce service costs due to scale effect. Meanwhile, the providers allocate resources according...
This paper has made a thorough analysis of brushless DC motor simulation system, in which we use a single neuron PID control algorithm based on RBF neural network for on-line identification (RBF-PID Algorithm). A special human-computer interaction (HCI) interface was designed in this paper, which provides interface for users to set the correlative parameters and select related control algorithm. Two...
In this paper we indicate the concept of dynamic data flow graph based on the dynamic data dependency during execution of software. On this basis, we propose a dynamic software watermarking algorithm, which embeds watermarking information into DDFG of software, and discuss the implementation of embedding and extracting watermark. Finally we analyze the performance of this algorithm.
Pointcut fragility is a well-documented problem in Aspect-Oriented Programming; changes to the base-code can lead to join points incorrectly falling in or out of the scope of pointcuts. We present an automated approach that limits fragility problems by providing mechanical assistance in pointcut maintenance. The approach is based on harnessing arbitrarily deep structural commonalities between program...
Java exception mechanism can effectively free a program from abnormal exits and help developers locate faults with the exception tracing stacks. It is necessary to verify whether the exception handling constructs are arranged appropriately. Some approaches have been developed to evaluate the test sets and improve the quality of them, so that they can raise more number of exceptions in programs. Mutation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.