The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Developing minimum viable products (MVPs) is critical for start-up companies to hit the market fast with an accepted level of performance. The US Food and Drug Administration mandates additional nonfunctional requirements in healthcare systems, meaning that the MVP should provide the best availability, privacy, and security. This critical demand is motivating companies to further rely on analytics...
Memory leaks are one of the primary causes of software aging. Despite of recent countermeasures in C/C++ such as smart pointers, leak-related defects remain a troublesome issue in C/C++ code, especially in legacy applications.We propose an approach for automatic detection of memory leaks in C/C++ programs based on characterizing memory allocation sites via the age distribution of the non-disposed...
In enterprise networks, network functions, such as address translation, firewall, and deep packet inspection, are often implemented in middleboxes. Those can suffer from temporary unavailability due to misconfiguration or software and hardware malfunction. Traditionally, middlebox survivability is achieved by an expensive active-standby deployment where each middlebox has a backup instance, which...
Distributing software effectively to multi core, many core, and distributed systems has been studied for decades but still advances successively driven by domain specific constraints. Programming vehicle ECUs is one of the most constrained domains that recently approached the need for concurrency due to advanced driver assistant systems or autonomous driving approaches. In this paper, software distribution...
In this paper we propose new attack on dynamic watermark scheme Radix-n widely known as one of the most secure. It was shown that we are able to reveal dynamically allocated memory blocks and then a digital watermark can be discovered by hooking API function calls. During the experiment it was ascertained that often an amount of such structures is low because of widely used optimization. This feature...
Survivability of optical networks is considered among the most critical problems that telecommunications operators need to solve at a reasonable cost. Survivability can be enhanced by increasing the amount of network links and its spare capacity, nevertheless this deploys more resources on the network that will be used only under failure scenarios. In other words, these spare resources do not generate...
NVRAM, such as STT-MRAM and 3D XPoint, enables persistent heap to replace existing file systems for data persistence. The persistent heap can eliminate the overhead of serializing the data structure into the file address space by granting persistence to the data structure. In this paper, we defined a persistent object store for persistent heap, and developed a namespace and persistent object management...
School Bus Routing (SBR) is a typical instance of Vehicle Routing Problem (VRP). Meanwhile SBR has unique and important objectives, such as safety of the students and total amount of time the students stay on the bus that other VRPs usually do not need to consider. When all these factors are considered, the school bus routing problem becomes a complex combinatorial optimization issue which the traditional...
In order to virtualize the optical resources and support as required, software-defined optical networks (SDON) can dynamically customize the structure and function of the optical network using the software programming method according to the requirements of the users and operators. Each layer in SDON architecture has a lot of core technology. In this paper, we focus on the dynamic scheduling and optimization...
In Software Defined Networking (SDN), the severe conflict between rule number and memory size has attracted considerable academic attention. Ternary Content Addressable Memory (TCAM), generally used to guarantee the query speed, is a scarce and expensive resource, which limits the number of rules that the switch can support. However, the table miss may increase processing burden of the controller...
Many classification techniques can automatically summarize text into topics and accordingly identify topic terms from the online reviews. Among these techniques Latent Dirichlet Allocation (LDA) and Latent Semantic Analysis (LSA) are some of the most often employed approaches. LDA is a probability generated model that projects a document into the topic space using Dirichlet Distribution, and each...
In the SDN/NFV ecosystem, network services are provided as single Virtual Network Functions (VNFs) or chains of them, each instantiated and executed on dedicated servers. So far, the chaining of those virtual functions, which is also known as the service chain composition problem, has been mostly performed by Telco Operators (TOs) for the great advantages they receive in terms of Capex and OpEX. However,...
Classical concurrency problems define environments for task processing with high contention of shared resources. The adaptive conflictless scheduling is an alternative to existing synchronization mechanisms used in known solutions of concurrency problem to provide parallel tasks processing without resource conflicts. Used in this paper scheduling concept eliminates deadlock between tasks that are...
Programming Multiprocessor Systems-on-Chips (MPSoCs) with hundreds of heterogeneous Processing Elements (PEs), complex memory architectures, and Networks-on-Chips (NoCs) remains a challenge for embedded system designers. Dataflow Models of Computation (MoCs) are increasingly used for developing parallel applications as their high-level of abstraction eases the automation of mapping, task scheduling...
Agent-based stochastic simulation is an established approach to study infectious diseases. Its advantage is the flexibility to incorporate important concepts. The effect of various mitigation strategies has been demonstrated using simulation models. Most of the previous studies compared a few options with a few selected scenarios. We propose to use genetic algorithms to search for the best vaccination...
This paper describes the software architecture and the implementation of a fully operational testbed that demonstrates the benefits of flexible, dynamic resource allocation with virtualized LTE-A nodes. The testbed embodies and specializes the general software architecture devised within the Flex5Gware EU project, and focuses on two intelligent programs: the first one is a Global Scheduler, that coordinates...
Middleboxes are widely deployed to perform various network functions to ensure security and improve performance. The recent trend of Network Function Virtualization (NFV) makes it easy for operators to deploy software implementations of these network functions on commodity servers. However, virtual network functions consume different amounts of resources when processing packets. Thus a multi-resource...
We formulate a mathematical programming problem for allocating capital budget between the organizational and physical capitals of the firm and solve it to obtain an analytically tractable and easy to implement decision rule for the optimal allocation of the capital budget. The model we develop depicts interconnections of these capitals and their constituent variables in the context of the firm's valuation...
The high growth of companies in recent years has caused the transformation of local markets into global ones. The software industry is not stranger to this transformation and has been looking for effective ways to work in a distributed scenario. A critical activity in distributed projects concerns the assignment of tasks to remote teams. This is a multicriteria decision-making problem and can be supported...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.