The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this article, we propose a novel state-based fault-localization approach. Given an observed failure that is reproducible under the same program input, this new approach uses two main techniques to reduce the state exploration cost. Firstly, the execution trace to be analyzed for the observed failure is successively narrowed by making the set of trace points in each step a cut of the dynamic dependence...
Contemporary software development processes involve finding reusable software components from online repositories and integrating them to the source code, both to reduce development time and to ensure that the final software project is of high quality. Although several systems have been designed to automate this procedure by recommending components that cover the desired functionality, the reusability...
The paper presents the current state of art of a smart Distribution Management System (DMS) environment based on the evolution of a traditional Supervision Control and Data Acquisition (SCADA) system and the integration with a Network Calculation Algorithm System (NCAS). The tool is designed to perform a sensible management, on-line and off-line, of a distribution system with a high penetration of...
Device shipment trends indicate that the number of web-enabled devices will grow very rapidly. The rapid growth of different types of devices in our daily lives will fundamentally change the expectations on device synchronization. In this paper, we introduce EDB -- a database architecture that has been built specifically to support automatic multi-master synchronization between multiple mobile devices...
This paper introduces a new property language for describing the behavior of low-level hardware-dependent software. The design of the language is motivated by the industrial success of property languages for hardware verification by simulation and formal techniques. The new language is constructed to concisely capture the timed behavior of the interactions between software and hardware by means of...
In a coarse-grained reconfigurable array (CGRA) architecture, software pipelining is primarily used to improve performance by exploiting loop-level parallelism (LLP). In this technique, the loop-carried memory dependence in user code prevents high parallelism, and it is difficult to be detected. In this paper, we propose a simulation-based memory dependence checker, which is used in the verification...
Undoubtedly, Basic Local Alignment Search Tool is one of the most prevalent algorithms in sequence searching and bioinformatics. BLAST is an index-based approach in order to recognize an unknown string of DNA sequence and due to its high computational nature, different types of hardware configurations have been proposed. In this paper, the traditional algorithm is applied; however a new architecture...
Peers search contents with information of contents such as keywords in many peer-to-peer contents sharing systems. In many peer-to-peer contents search architectures, queries are forwarded to peers which belong to clusters related with the keywords. Since clusters are basically constructed regardless of physical network topology, a peer receives contents from peers that are located far from the peer...
Current solutions to the problem of finding valuable information on the Web suffer from several limitations, including inconvenient query languages, arbitrary sorting or results and out-of-date information. In this paper a different solution to this problem is described. It is based on the idea of distributed processing of web pages in real-time. To provide sufficient performance, the approach of...
Transactional Memory (TM) potentially simplifies parallel programming by providing atomicity and isolation for executed transactions. One of the key mechanisms to provide such properties is version management, which defines where and how transactional updates (new values) are stored. Version management can be implemented either eagerly or lazily. In Hardware Transactional Memory (HTM) implementations,...
Ranking software requirements helps decide what requirements to implement during a software development project, and when. Currently, requirements ranking techniques focus on resource constraints or stakeholder priorities and neglect the effect of requirements on the software architecture process. However, the order in which requirements are implemented impacts the process of creating architectures...
Modern NAND Flash-based Solid-State Drives (SSD) presents low latency, high throughput, low power consumption and solid-state reliability improvements comparing to traditional magnetic-disk based Hard Disk Drives (HDD). However, due to NAND Flash memory cell characteristics, update-in-place is impossible. Instead, the Flash software layer allocates new storage space whenever data is written, even...
Current distributed systems are usually composed of several distributed components that communicate through specific ports. When testing these systems we separately observe sequences of inputs and outputs at each port rather than a global sequence and potentially cannot reconstruct the global sequence that occurred. In this paper we concentrate on the problem of formally testing systems with distributed...
In the field of drought monitoring using remote sensing, the software has been lagging behind the applications. For the operational needs of monitoring and evaluating drought, a professional remote sensing application system (named RSDMS) is designed and developed with the concept of component-based technology. Starting from the architecture design, this article details the component-based design...
Pre-fetching in a memory hierarchy is known to alleviate the “memory wall” paradigm but its use is impeded because of the difficulty to estimate efficiency when used in a complex system such as a SoC (System on Chip) or NoC (Network on Chip). Therefore, some methods are needed to evaluate the benefit of pre-fetching at the earliest possible stage in a design flow to help the designer choose architectural...
The Merkle Signature Scheme relies on hash function and is, therefore, assumed to be resistant to attacks by quantum computers. This paper presents an efficient hardware architecture to accelerate the generation of Merkle hash trees. Timing measurements on a prototype show a considerable performance boost compared to a similar software solution.
In this paper, we discuss the construction of dialogs for Personal Assistant Agents that are in charge of the interface between users and a Multi-Agent System. Such a system aims at providing support for small teams developing software collaboratively. These small teams have specific needs such as the integration of free or open-source tools or the support to elaborate project documentation. Considering...
Attack signature validation plays a key role in intrusion detection and prevention technologies. Usually, when new attacks, particularly worms, appear, security software analyzes and generates signatures for these attacks. Since inaccurate signatures may block legitimate traffic that is similar to the attack traffic (false positives), security software is reluctant to deploy new signatures without...
The available frameworks for adaptive systems propose various solutions for addressing and implementing software which is adaptable at runtime. These solutions have different perspective on adaptivity: architectural, structural, or behavioral. Hence, based on which criteria should be decided which framework to adopt? In this paper, we present a possible approach to evaluate the available frameworks...
Dynamic adaptivity is one of the most challenging non-functional issues to address during the engineering of information systems. Furthermore, it is even harder to evaluate. The definition of mechanisms through which adaptivity may be evaluated would be very useful both for the maintainability, reusability, and evolution of adaptive systems, and for the relations which may be established among adaptive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.