The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A new radiometry and design framework has been introduced in the latest Digital Imaging and Remote Sensing Image Generation model (DIRSIG5) that allows for faster simulations while streamlining the generation of high-fidelity radiometric data. The same framework that allows for improved computational performance has also modularized simulation components to allow for extensive interchangeability based...
Graph Pattern Matching (GPM) plays a significant role in many real applications, where given a graph pattern Q and a data graph G, computing the set M(Q, G) of matching subgraphs of Q in G. However, many applications like the experts recommendation in social networks, often need to find Top-K matches of a designated node v0, rather than the entire set M(Q, G). Moreover, the existing GPM method for...
Resilience is usually associated to the capability of a networked infrastructure to guarantee an acceptable service even if some failure occurs. The paper presents a framework based on network analysis and software hydraulic simulation to supporting the resilience management in Water Distribution Networks increasing the sustainability of these Cyber Physical Systems while saving water and energy....
The shares are considered as a fundamental part of the equity market, as their values change over time as a result of offer and demand, and the effect of market volatility. This volatility makes the trading of shares on a stock exchange is an extremely difficult task. That is why in this article develops and analyzes a system for automatic trading shares, which incorporates a series of progressive...
Feature location is a program comprehension activity in which a developer inspects source code to locate the classes or methods that implement a feature of interest. Many feature location techniques (FLTs) are based on text retrieval models, and in such FLTs it is typical for the models to be trained on source code snapshots. However, source code evolution leads to model obsolescence and thus to the...
We present a compositional SMT-based algorithm for safety of procedural C programs that takes the heap into consideration as well. Existing SMT-based approaches are either largely restricted to handling linear arithmetic operations and properties, or are non-compositional. We use Constrained Horn Clauses (CHCs) to represent the verification conditions where the memory operations are modeled using...
Computer system designers need a deep understanding of end users’ workload in order to arrive at an optimum design. Unfortunately, many end users will not share their software to designers due to the proprietary or confidential nature of their software. Researchers have proposed workload cloning, which is a process of extracting statistics that summarize the behavior of users’ workloads through profiling,...
We present the M.In.E.R.Va. project, an online tool to help students (both attending Secondary Schools and Universities) recovering their deficiencies in Mathematics. We also present an analysis of the answers given by the students, performed using the Rasch model, which allows to investigate both students' results and the validity of the items.
With the growing demands for automotive auxiliary functions, more and more complex applications have been developed based on OSEK/VDX OS. However, how to check the developed applications is becoming a challenge for developers. Although some invaluable formal methods have been proposed to check actual software, these methods cannot be directly employed to check OSEK/VDX applications. In this paper,...
Information Retrieval (IR) based bug localization techniques use a bug reports to query a software repository to retrieve relevant source files. These techniques index the source files in the software repository and train a model which is then queried for retrieval purposes. Much of the current research is focused on improving the retrieval effectiveness of these methods. However, little consideration...
Agile software development and project management methodologies, such as Scrum and Extreme Programming, have become very popular in quickly delivering quality Functional Requirements (FRs). However, agile project management methodologies have not adequately captured planning and prioritization activities for crosscutting concerns and non-functional requirements in agile practices. This research proposes...
Different rules for proving properties have been studied for systems with different kinds of fairness constraints, such as justice, compassion and strengthened compassion. This work considers a kind of bounded fairness and propose a general form that includes these fairness constraints. The general form is referred to as mixed-fairness (m-fairness for short). A deductive rule for proving live ness...
Debugging techniques assist a developer in localizing and correcting faults in a system's description when the behavior of the system does not conform to its specification. Two fault localization techniques are model-based diagnosis and error explanation. Model-based diagnosis computes a subset of the system's components which when replaced correct the system. Error explanation determines potential...
Feature selection has been applied in many domains, such as text mining and software engineering. Ideally a feature selection technique should produce consistent outputs regardless of minor variations in the input data. Researchers have recently begun to examine the stability (robustness) of feature selection techniques. The stability of a feature selection method is defined as the degree of agreement...
Existing design research on culture was summed up at first, and then the culture dimensions which contra pose the Internet products were summarized, and then the user satisfaction model was established. At last, a research example-MSN based on a questionnaire to some Chinese, Japanese and Americans was completed. The research finished the data analysis, found out the relativity of initial evaluation...
System emulation provides a new solution for software migrating on heterogeneous platform. As one of the important components of system emulation, memory emulation directly affects the performance of system. This paper presents a universal emulation model of IA-32 memory management with Software MMU, virtual TLB and virtual MMIO. And an IA-32 memory management emulator prototype is implemented successfully...
Folded proteins are held together mainly by weak noncovalent interactions. We propose a method for classifying which of these interactions are critical to maintaining the protein's 3D shape, using information about their redundancy within the rigid clusters of atoms. We have developed KINARI-Web, a server performing rigidity analysis of proteins. It implements pebble game analysis to determine rigid...
Defragmentation as a technique is deployed in all the operating system to enhance system speed, search and memory operations. The proposed approach presents a customizable heuristic mechanism which makes the defragmentation processes a continuous process rather than be user driven. Various factors like folder behavior, frequency and magnitude of modification, user specific trends for disk utilization...
In this paper we report the results of our experiments conducted for fault identification in self healing systems. The proposed scheme is designed to identify faults in a large-scale system where frequent faults can increase downtime. The experiments show that the scheme proposed has linear computational complexity and highly portable.
This paper presents the analysis model of the assessment method of software source code SQALE (Software Quality Assessment Based on Lifecycle Expectations). We explain what brought us to develop consolidation rules based in remediation indices. We describe how the analysis model can be implemented in practice.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.