The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Methods for numerical solutions of differential equations have been studied since the end of the last century. A large number of integration formulas have been published especially for solving special systems of differential equations. In general, it was not possible to choose the best method but for a subclass of tasks defined by similar properties the most suitable method could always be found....
Mosaic of research, applications and case studies, starting with natural language text processing, automated domain building, sentiment analysis, document similarities, and ending with indication of mental illness based on self-essay analysis, is given in an overview of this extended abstract of the invited paper.
Cloud computing is getting increasingly important part of IT strategies in modern organizations [5] and nowadays it is generally positioned in broad context of strategic planning of information systems [2] [3]. Since cloud services can appear in various flavors (software as a service, platform as service, etc.) there is no one common approach to their incorporation into certain business and organizational...
In the paper, there are analyzed and compared results of usable methods for a document verification based on n-grams and on local histograms build for its words for English and Arabic language. English and Arabic texts were analyzed from many statistical characteristics point of view. There were discovered some statistical differences between both languages and applied n-gram analysis and local histograms...
This article presents the potential of using Multi-Path Transmission Control Protocols for more secure data transfer. Data transfer over the network could be sniffed and then some decryption process could be made. Nowadays lot of network have more than one connection to others. The authors presents idea of Multi-Path TCP which could be used in such networks which have more than one connection to public...
The subject of this article are the security problems of network resources in computer networks. Presently the main problem of computer networks are Distributed Denial of Service attacks which can block them. The methods suggested by the literature that mostly base on using firewall and IDS/IPS mechanisms to fight the attacks are not sufficient enough. In this article the author presents a new method...
The progress of hardware evolution cannot be stopped. Not just new CPUs and memory modules are invented but new kind of data storage devices appeared. Typically the programming languages do not follow all the changes in hardware. Solid-state drives (SSD) are improved data storage devices in order to reach must faster read and write speed than hard disk drives. Nowadays the solid-state drives have...
Many software systems nowadays aim for usability or accessibility from the effectiveness and ergonomics point of view. However there still is lack of such ones that correctly use the domain dictionary, correct describe domain relations and properties and implement the target domain processes via their user interfaces. This property is called ‘domain usability’. This paper aims at automating the evaluation...
This paper deals with the problem of designing the optimal structure of a public service system. The public service system design problem are often related to the p-median location problem. Optimal solution of smaller instances of the problem can be obtained by universal IP solvers. The universal IP solvers are very time-consuming and often fail when a large instance is solved. Our approach to the...
In the context of a research project aimed at studying patterns for energy consumption at runtime in order to transform the original software into executable programs that consume less energy, we are carrying out a master's thesis looking for ways to get this improvement at the code generation phase. First we investigated how the hardware manufacturers have been and are concerned with green issues,...
Programming languages are continuously evolving as the experiences are accumulated, developers face new problems and other requirements such as increasing support for multi-threading is emerging. These changes are reflected in new language standards and compiler versions. Although these changes are carefully planned to keep reverse compatibility with previous versions to keep the syntax and the semantics...
The methods of conflict resolution of names in programming languages that allow multiple inheritance were researched. Those methods are based on the linearization of the classes. The idea of linearization is to reduce multiple inheritance to single, in which the problem of selecting a suitable attribute is solved trivially. The definition of a hierarchy of classes is introduced. The property of monotonicity...
Nowadays there is a strong demand for programming frameworks which can help the systems programmers to effectively exploit, in a natural way, the computing potential of modern clusters of multi-core machines. This paper proposes a methodology for the development of concurrent/parallel programs in Java which depends on UPPAAL, for modelling and exhaustive verification of a concurrent system, and the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.