The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A developer of mobile or desktop applications is responsible for implementing the network logic of his software. Nonetheless: i) Developers are not network specialists, while pressure for emphasis on the visible application parts places the network logic out of the coding focus. Moreover, computer networks undergo evolution at paces that developers may not follow. ii) From the network resource provider...
The chance to influence the lives of a million children does not come often. Through a partnership between the BBC and several technology companies, a small instructional computing device called the BBC micro:bit will be given to a million children in the UK in 2016. Moreover, using the micro:bit will be part of the CS curriculum. We describe how Microsoft's Touch Develop programming platform works...
Peer code review locates common coding rule violations and simple logical errors in the early phases of software development, and thus reduces overall cost. However, in GitHub, identifying an appropriate code reviewer for a pull request is a non-trivial task given that reliable information for reviewer identification is often not readily available. In this paper, we propose a code reviewer recommendation...
GitHub, one of the most popular social coding platforms, is the platform of reference when mining Open Source repositories to learn from past experiences. In the last years, a number of research papers have been published reporting findings based on data mined from GitHub. As the community continues to deepen in its understanding of software engineering thanks to the analysis performed on this platform,...
Safety and security in software coding is becoming increasingly important in mission-critical systems due to various emerging threats and to avoid potential disastrous consequences. These issues can be significantly reduced by software designs and implementations that adequately protect systems. This abstract describes coding methodologies in the Ada 95/2005 programming language for complex embedded...
Peer code review locates common coding standard violations and simple logical errors in the early phases of software development, and thus, reduces overall cost. Unfortunately, at GitHub, identifying an appropriate code reviewer for a pull request is challenging given that reliable information for reviewer identification is often not readily available. In this paper, we propose a code reviewer recommendation...
Historically, software security has approached the development of cryptographic software merely as a feature to be added. This stance did not have a positive influence on the design of advanced security functionalities into modern software. Thus, this work proposes a methodology for development of secure cryptographic software, providing a structured way to approach cryptography into secure development...
Number of security vulnerabilities in web application has grown with the tremendous growth of web application in last two decades. As the domain of Web Applications is maturing, large number of empirical studies has been reported in web applications to address the solution of vulnerable web application. However, before advancing towards finding new approaches of web applications security vulnerability...
This paper introduces an optimization template library (OTL), a cross-platform C++ template library for multiobjective optimization. OTL has an object-oriented architecture, which allows that different modules can be arbitrarily combined with each other. Moreover, the C++ template technique is used to increase the flexibility of OTL. Meanwhile, generic programming is widely used in OTL, and the generic...
It is poorly understood how developers discover and adopt software development innovations such as tools, libraries, frameworks, or web sites that support developers. Yet, being aware of and choosing appropriate tools and components can have a significant impact on the outcome of a software project. In our study, we investigate link sharing on Stack Overflow to gain insights into how software developers...
Since the very first graphical user interfaces, progress indicators have been widely used to provide feedback regarding the execution of long-running system tasks. In order to make progress feedback possible, the involved services must provide on-line monitoring capabilities. However, on larger concurrent and object-oriented implementations, as services execution involve multiple interactions between...
COTS component evaluation is one of the most important steps in component-based development. Enforcing the coding standard within the coding phase is one important aspect for the quality of safety-critical software. This paper addresses the problem of carrying out COTS component evaluation of its compliance to the coding standard in case when only the executables with neither source code nor debugging...
Conducting valid comparative evaluations of techniques in the field of Music Information Retrieval (MIR)presents particular challenges to MIR researchers due to issues of copyright and data sharing. Further, the interdisciplinary nature of MIR research and multi-faceted nature of human music perception make the sharing and reuse of techniques and implementations for particular facets of music perception...
The problem of designing radiation-tolerant devices working in application critical systems becomes very important especially if human life depends on the reliability of control mechanisms. One of the possible solution of this problem are pure software protection methods. They constitute different category of techniques to detect transient faults and correct corresponding errors. Software fault tolerance...
This research concerns a system, which is called Ubiquitous Multi-Processor (UMP) system, which constructs dataflow network dynamically by connecting function-specific execution modules. The software model of the system was developed consisting only of application-specific execution modules (SS-PE) providing fixed functions. We developed a general-purpose execution module (GP-PE) which performs equivalent...
This paper presents a learning experience at the on-line master on free software at the Universitat Oberta de Catalunya (UOC). For the final course, which leads to the presentation of a master thesis, students have to set up a free software project with the aim of making its development community-driven. Instead of setting up a new project for the course I decided to join to an existing free software...
This work proposes JECoLi-a novel Java-based library for the implementation of metaheuristic optimization algorithms with a focus on Genetic and Evolutionary Computation based methods. The library was developed based on the principles of flexibility, usability, adaptability, modularity, extensibility, transparency, scalability, robustness and computational efficiency. The project is open-source, so...
The IEEE Standards Committee recently approved the IEEE 754-2008 Standard for Floating-point Arithmetic, which includes specifications for decimal floating-point (DFP) arithmetic. A growing number of DFP solutions have emerged, and developers now have many DFP design choices including arbitrary or fixed precision, binary or decimal significand encodings, 64-bit or 128-bit DFP operands, and software...
Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software...
This paper designs the hardware platform of video and audio coder system based on DM642 and simulates this system's data and address from DSP to SDRAM by using HyperLynx software. It discovers and resolves EMC of the PCB. Further more, the multimedia-processing library is also constructed on the hardware. This design adjusts the framework of the MPEG4 and H.264 coder, and it optimizes the setting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.