The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Protection against Pornography application provides a unique method to secure children and youngsters. The application has an embedded in the porn webpage. Whenever the children and youngsters are trying to enter such page, automatically it sends message to their parents. The input of the user is stored in database for comparison with national aadhaar card database for login process. This paper...
Consumer-initiated sporadic operations on cloud applications, such as deployment, upgrade and reconfiguration, may fail because of the inherent uncertainty of operating in a cloud environment. For example, if a VM is not able to start, operations dependent on that VM will fail. In this paper we propose an approach for analyzing sporadic operations on cloud applications to facilitate recovery. We do...
Current-day programming languages include constructs to embed meta-data in a program's source code in the form of annotations. More than mere documentation, these annotations are used in modern frameworks to map source-level entities to domain-specific ones. A common example being the Hibernate Object-Relational Mapping framework that relies on annotations to declare persistence configurations. While...
Not all bugs in software would be experienced and reported by end users right away: Some bugs manifest themselves quickly and may be reported by users a few days after they get into the code base; others manifest many months or even years later, and may only be experienced and reported by a small number of users. We refer to the period of time between the time when a bug is introduced into code and...
Java-Digital Signal Processing (J-DSP) is an online DSP laboratory that allows students to simulate various signal processing algorithms. In this paper, we describe an interactive learning tool that combines multiple discrete learning environments together at one place. The idea of the new interface revolves around the web-based DSP quiz synchronized with J-DSP simulations and video streamed lectures...
Sport result prediction is nowadays very popular among fans around the world, which particularly contributed to the expansion of sports betting. This makes the problem of predicting the results of sporting events, a new and interesting challenge. Consequently systems dealing with this problem are developed every day. This paper presents one such system, which uses data mining techniques in order to...
Most software systems developed nowadays are highly complex and subject to strict time constraints, and are often deployed with critical software faults. In many cases, software faults are responsible for security vulnerabilities which are exploited by hackers. Automatic web vulnerability scanners can help to locate these vulnerabilities. Trustworthiness of the results that these tools provide is...
With the popularity of the Internet and the rapid development of information technology, Web application has become an integral part of the information age. Ajax (Asynchronous JavaScript and XML) is a new interaction method between server and client side, and asynchronous interactive technology is involved with Web applications, so that applications could give users more efficient response and a good...
We propose a different method to define patterns on the Go board, which has a tengen pattern and tengen centered 9 square-patterns as well as necessary conditions for two patterns to be equivalent. Using this method, we show that our methodology can easily locate a specific or a desired pattern out of multiple games.
Due to the linear nature of time, XML timestamped solutions for the management of XML versions have difficulty in supporting non-lineal versioning, and their implementations are few and portableless. This paper proposes a version data model for XML documents developed using the branch version technique for XML documents shown in [9, 10]. We have built a system following this model based on XQuery...
Distributed software systems are characterized by increasing autonomy. They often have the capability to sense the environment and react to it, discover the presence of other systems and take advantage of their services, adapt and re-configure themselves in accordance with the internal as well as the global state. Testing this kind of systems is challenging, and systematic and automated approaches...
This position paper proposes a research agenda for the field of security testing. It gives a critical account of the state of the art as seen by a practitioner and identifies questions that research failed to answer so far, or failed to answer in such a way that it would have had an impact in the real world. Three categories of research problems are proposed: theory of vulnerabilities, theory of security...
Software security testing tools and methodologies are presently abundant, and the question no longer seems to be "if to test" for security, but rather "where and when to test" and "then what?". In this paper we present a review of security testing literature, and propose a software security testing scheme that exploits an intra-organisational repository of discovered...
The size of unified modeling language (UML) models used in practice is very large and ranges up to hundreds and thousands of classes. Querying of these models is used to support their quality assessment by information filtering and aggregating. For both, human cognition and automated analysis, there is a need for fast querying. In this context performance of model queries becomes an important issue...
Feature selection is a key issue in many machine learning applications and the need to test lots of candidate features is real while computational time required to do so is often huge. In this paper, we introduce a parallel version of the well-known AdaBoost algorithm to speed up and size up feature selection for binary classification tasks using large training datasets and a wide range of elementary...
SBVR is a new standard that defines a metamodel for business-layer vocabularies and rules. This paper summarizes SBVR features and argues that the SBVR enables definition of true ontologies. The paper also summarizes experience with a partial SBVR implementation in the context of an existing technique for modeling businesses and transforming the models into implementations. The work contributes to...
The paper describes an annotation-based Java framework for supporting transactional Web services. We provide a framework for automated management of compensations in business activity type extended transactions. Unlike rollbacks in traditional ACID transactions, these usually require substantial implementation effort by business programmers. Our annotations provide a flexible, intuitive and easy to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.