The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Dependence clusters are (maximal) groups of source code entities that each depend on the other according to some dependence relation. Such clusters are generally seen as detrimental to many software engineering activities, but their formation and overall structure are not well understood yet. In a set of subject programs from moderate to large sizes, we observed frequent occurrence of dependence clusters...
Adaptive methodologies and business delegate pattern have garnered improbable interest from both security experts and analysts in the last several years. In this position paper, we verify the development of business delegate pattern in J2EE applications (EngagerRum). In our research we argue not only that evolutionary programming and the business delegate pattern can cooperate to answer this grand...
To date, digital tabletop research has predominantly focused on resolving fundamental software and hardware challenges introduced by this new interactive platform. Understanding not only what technical functionality a digital tabletop can provide, but also how appropriate that functionality is for different usage contexts is crucial in designing tables intended for use outside of the research lab...
It's necessary to discuss the topology model of digital images for integrating remote sensing and geographic information system in higher levels. Based on cellular complex theories, a hierarchical image representation is presented that maintains both raster and vector representations of an object inside a same data structure and to translate between spatial concepts in image understanding and mining...
Software security testing tools and methodologies are presently abundant, and the question no longer seems to be "if to test" for security, but rather "where and when to test" and "then what?". In this paper we present a review of security testing literature, and propose a software security testing scheme that exploits an intra-organisational repository of discovered...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.