The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Techniques for automated code repair have the potential for greatly aiding in the development of secure and correct code. There are currently a few major difficulties confronting the development and deployment of tools for automated repair, we examine these and briefly explore possible solutions. To give a flavor of what automated repair might look like, we discuss in detail three types of proposed...
Non-functional requirements (NFRs) such as security, reliability and performance play a crucial role in the development of modern distributed systems. The burden of incorporating NFRs into a system's architecture, as well the determination of new design-level NFRs, can be greatly eased by the use of a structured approach providing guidance to developers. Such structured approaches, however, require...
Traditional live update systems offer little or no automated support for state transfer between two different program versions with changes in the program state. In this paper, we report our efforts to build a safe and automated state transfer framework for C programs that requires a minimal number of program state annotations and handles common structural state changes with no programmer assistance...
As Digital Campus applications gaining momentum, the complexity of IT infrastructure on campus network, resource utilization efficiency, security control and data backup impose increased difficulties. In this paper, an analysis is conducted on applications of virtualization technology including virtual server, virtual storage, and network virtualization technology for IT infrastructure to cast down...
The proposed work gives novel technique to exploit the cloud for the purpose of qualitative improvement in services being rendered. In this context a service level agreement is executed between the service provider and the user incorporating stipulations regarding terms & conditions relevant with the transactions. Agreement envisages the provisioning of services to the users at the appointed time...
Electronic voting systems are a perfect example of security-critical computing. One of the critical and complex parts of such systems is the voting process, which is responsible for correctly and securely storing intentions and actions of the voters. Unfortunately, recent studies revealed that various e-voting systems show serious specification, design, and implementation flaws. The application of...
The next generation air transportation system (NextGen) implementation plan (NGIP) describes the system changes and operational improvements that need to be implemented through the mid-term (2012-2018) to realize NextGen. It is anticipated that the system wide information management (SWIM) program will provide functionality that will help the Federal Aviation Administration (FAA) achieve the goal...
Asset classes respond differently to shifts in financial markets, thus an investor can minimize the risk of loss and maximize return of his portfolio by diversification of assets. Increasing the number of diversified assets in a financial portfolio significantly improves the optimal allocation of different assets giving better investment opportunities. However, a large number of assets require a significant...
This document describes how the DESEREC framework can be enhanced through the usage of an offline learning loop. This mechanism consists basically of computational methods and techniques which enable the framework to gradually improve the effectiveness of its behaviour, by analysing internal data produced by some of the modules, applying some learning algorithms to them and to the information received...
When managing a complex information system for critical activities, reaching an high level of dependability is a key requirement. A central challenge is identifying a set of alternative system configurations to be enforced when particular system situations take place. In large systems, this task requires automation as the administrator can hardly cope with the complexity of all components and their...
The seamless combining with context-aware sensors and numerous devices and e-home server will soon become a part of our home environment in the near future. We name it as a context-aware home based on ubiquitous computing concept. This context-aware home reduces participations of users in order to realize a ubiquitous computing and automates various services. Therefore, the risk of privacy violation...
This paper introduces a PC cluster based supporting platform, called wide logic grid (WLGrid), for new generation of EMS. This platform has an open and loosely coupling plug-in architecture, which allows components developed individually to be easily plugged into the system. A component-based development (CBD) pattern is used to develop this platform, which can make software modules loosely coupled...
Grid technologies are emerging as the next generation of distributed computing, allowing the aggregation of resources that are geographically distributed across different locations. However, these resources are independent and managed separately by various organizations with different policies. This will have a major impact to users who submit their jobs to the Grid, as they have to deal with issues...
This is an introduction to the proceedings of the MWS 2007 workshop held at EDOC 2007. It first explains the motivation for and background of the workshop. Then, it contains a short description of the keynote, each long and short peer-reviewed paper, and the discussion session "impact of various execution environments on middleware for web services". After the closing statements, MWS 2007...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.