The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to compare and rank the worlds fastest computers, benchmarks evaluating their performance are required. A single execution of HPL is used for the most widely recognized ranking: the TOP500. Lately, two benchmarks, arguably more representative of typical modern workloads, have been proposed: HPCG and HPGMG. Currently, all three benchmarks use the highest observed performance from a single...
Safety and security in software coding is becoming increasingly important in mission-critical systems due to various emerging threats and to avoid potential disastrous consequences. These issues can be significantly reduced by software designs and implementations that adequately protect systems. This abstract describes coding methodologies in the Ada 95/2005 programming language for complex embedded...
Module based robot has long history. There are many module based robot in the market. Some companies sell those to be used in industrial application. However software technology is not doing catch up hardware performance. Company provide software tool-set, and user can build their own control system. Customers meet the limitation when they want to build kinematics library to control their robots in...
To accomplish the organizational business objectives and consistently improve processes, high maturity processes are implemented in numerous software enterprises. Organizational process asset library (OPAL) plays a significant role in the definitions, executions and improvements for software processes. Based on the conceptions of Capability Maturity Model Integration (CMMI) and practical experience,...
We developed a software framework for boundary element analyses. The software supports a hybrid parallel programming model and is equipped with a hierarchical matrix (H-matrix) library to accelerate the BEM analysis.
A brief review of Protected Execution Mode (PEM) for user-space applications featured in Elbrus architecture is described first. Then, AddressSanitizer, a well-known utility by Google Inc, is considered as an example of a pure software technique of memory control. Comparative analysis of these solutions is given with performance flaws, applicability and boundary violation detection quality.
Interactive images can increase the popularity of some existing technologies. Although the most popular way to create interactive images is using the already popular maps engines, there is a large number of available options. In this paper, we analyze several Maps APIs and evaluate the most suitable API for interactive images regarding its usability, accessibility and performance. The result is that...
Teaching informatics in primary and secondary schools in Slovakia has already become a tradition. A creative informatics teacher can take different forms for their lessons. One of them is the use of small educational applications which programs the teacher programmed him/herself. As part of a KEGA project we decided to create a software library, which provides comfort to the teacher and thus supports...
Peer code review locates common coding standard violations and simple logical errors in the early phases of software development, and thus, reduces overall cost. Unfortunately, at GitHub, identifying an appropriate code reviewer for a pull request is challenging given that reliable information for reviewer identification is often not readily available. In this paper, we propose a code reviewer recommendation...
Although correct error handling is crucial to software robustness and security, developers often inadvertently introduce bugs in error handling code. Moreover, such bugs are hard to detect using existing bug-finding tools without correct error specifications. Creating error specifications manually is tedious and error-prone. In this paper, we present a new technique that automatically infers error...
Nowadays, software developers often utilize existing third party libraries and make use of Application Programming Interface (API) to develop a software. However, it is not always obvious which library to use or whether the chosen library will play well with other libraries in the system. Furthermore, developers need to spend some time to understand the API to the point that they can freely use the...
This demo introduces an automated collaborative requirements engineering tool, called TestMEReq, which is used to promote effective communication and collaboration between client-stakeholders and requirements engineers for better requirements validation. Our tool is augmented with real time communication and collaboration support to allow multiple stakeholders to collaboratively validate the same...
Cascading Style Sheets (CSS) is the standard language for styling web documents and is extensively used in the industry. However, CSS lacks constructs that would allow code reuse (e.g., functions). Consequently, maintaining CSS code is often a cumbersome and error-prone task. Preprocessors (e.g., Less and Sass) have been introduced to fill this gap, by extending CSS with the missing constructs. Despite...
Most programs related to security communicate with servers through encrypted channels, and sensitive data that are transmitted should be encrypted using a suitable protocol. Transport Layer Security (TLS) is a protocol that encrypts data by exchanging key materials in a secure way. Protocol analyzers in turn decrypt packets to see the raw protocols in plain text. Decryption is not a minor job, and...
Commercialization of desktop milling machines has made rapid Printed Circuit Board (PCB) fabrication accessible. Unfortunately, PCB design for embedded and robotic systems is still a tedious and time consuming activity. In this paper, we present a technique, Just In Time Printed Circuit Board (JITPCB) for designing PCB systems at speeds commensurate with the capability of desktop PCB milling machines...
We present HPP, a software designed for complex classes of motion planning problems, such as navigation among movable objects, manipulation, contact-rich multiped locomotion, or elastic rods in cluttered environments. HPP is an open-source answer to the lack of a standard framework for these important issues for robotics and graphics communities.
Energy efficiency can have a significant influence on user experience of mobile devices such as smartphones and tablets. Although energy is consumed by hardware, software optimization plays an important role in saving energy, and thus software developers have to participate in the optimization process. The source code is the interface between the developer and hardware resources. In this paper, we...
The common DPU platform for ESA JUICE mission instruments is a hardware and software platform developed by Cobham Gaisler for the scientific instrument payloads of the European Space Agency Jupiter Icy Moons spacecraft. The hardware is based around the GR712RC dual-core LEON3-FT processor with GRSPW2 SpaceWire interfaces. To accompany the JUICE instrument hardware, a flight quality SpaceWire software...
Chile is a seismic country, and as such, requires to create and to develop systems which allow a better understanding of seismic events by its population. In collaboration with Earthquake Risk Program (ERP), a technologic platform to the observation of seismic events in Chile was developed, using Rapid Application Development (RAD) methodologies. The primary objective of the platform is to deliver...
Computing as a whole suffers from a crisis of reproducibility. Programs executed in one context are astonishingly hard to reproduce in another context, resulting in wasted effort by people and general distrust of results produced by computer. The root of the problem lies in the fact that every program has implicit dependencies on data and execution environment which are rarely understood by the end...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.