The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Web service is a popular solution to integrate components when building a software system, or to allow communication between a system and third-party users, providing a flexible and reusable mechanism to access its functionalities. Various web service based systems are prevailing in health service provision. We propose a framework of construction, searching and protection of typed health resources...
Program invariant is formal description of properties that should hold at certain program location in every valid execution. It is very useful for program analysis and verification. In this paper, we introduce an abstraction interpretation approach for generating program invariant efficiently and precisely. A polynomial interval domain is proposed for representing abstract state and precise loop effect...
Software Defined Networks (SDNs) are a promising network architecture for future computer networks because they enable more dynamic, fine-grained control over network traffic. OpenFlow is an open standard network protocol that provides specifications for managing network traffic. Permissible (and impermissible) network flows are defined by OpenFlow policies that are translated into network switch...
Many kinds of real world data can be modeled by a heterogeneous information network (HIN) which consists of multiple types of objects. Clustering plays an important role in mining knowledge from HIN. Several HIN clustering algorithms have been proposed in recent years. However, these algorithms suffer from one or moreof the following problems: (1) inability to model general HINs, (2) inability to...
UML is the only language which clearly distinguishes a higher level design and lower level design diagrams. While designing UML diagrams, the same semantics can be implemented with different pragmatics. This created the commotion in the SDLC design stages. This commotion leads to the gorge between the higher level and lower level designs. This is resolved by the redesign of new higher level diagrams...
This paper explores the notion of self-agency in developing agent-based systems that support human-to-human communication. We first point out that a challenge in developing such agent-based systems is to successfully transfer conversational experiences that agents gain to their users. We then propose that the sense of self-agency is a key to address this challenge. We also show an experimental system...
Pull-Request (PR) is the primary method for code contributions from thousands of developers in GitHub. To maintain the quality of software projects, PR review is an essential part of distributed software development. Assigning new PRs to appropriate reviewers will make the review process more effective which can reduce the time between the submission of a PR and the actual review of it. However, reviewer...
In this paper we examine the possibilities for analyzing the behavior of library users. We point out that the softwares that we can use cannot fulfill library requirements. There are many data given for on-line searches in library systems hidden from the analyzers. After examining the possibilities and some log files produced by the library systems, we propose how log files could give more usable...
Refactoring is a method to change a source-code's structure without modifying its semantics and was first introduced for object-oriented code. Since then refactorings were defined for relational databases too. But database refactorings must be treated differently because a database schema's structure defines semantics used by other applications to access the data in the schema. Thus, many database...
In model-based software development, models are primary artifacts which iteratively evolve and which have many versions during their lifetime. A clear representation of the changes between different versions of a model is the key to understanding and successfully managing the evolution of a model-based system. However, model comparison tools currently available display model differences on a low level...
This paper presents a study aimed at investigating on whether the text mining technique using graphs can be used to analyze the relevance of the messages in online forums. Experiments were carried out with a program that calculates the thematic relevance of text contributions. In addition, the paper presents results found in the automatic analysis obtained by the application of the software.
This paper introduces a new open source static analysis tool, the Java Static Checker (JSC). Traditional static analysis tools examine Java code for fault instances considering specific code patterns. JSC is novel in that it examines Java code for potential fault classes based on propagating values and examining fault classes. In this paper, we use the tool to examine programs for potential null pointer...
A case-based approach allows reuse without the usual and significant effort for making software explicitly reusable. We even support such reuse for only partially developed requirements, since it allows reuse already without the need to develop a “complete” specification first. The solution information (models and code) of (one of) the most similar problems can then be taken for reuse and adapted...
Available code search engines provide typically coarse-grained lexical search. To address this limitation we present SE-CodeSearch, a Semantic Web-based approach for Internet-scale source code search. It uses an ontological representation of source code facts and analysis knowledge to complete missing information using inference engine. This approach allows us to reason and search across project boundaries...
The traditional methods can't describe semantic relation of function of component, obstructing components from being applied by users. So description model of component is founded by means of ontology, in order to carry out semantic extending of retrieval of component. The method that figures out similarity value between function of component and requirement of users is presented. It helps users speedy...
In the environment which supports access control, the behaviors of an application not only depend on the logic of its code, also depend on the security policy enforced in the system. So, while verifying the trustworthy of a remote application, related security policy should be verified besides the application itself. However, the security policies to restrict different applications are commonly mixed...
With the information technology development, distant learning of the network develops continuously. The paper carries out a new form (OpePicus) of modern distant learning of the network which has beyond space with real time and non-real time interactive features based on hypertext preprocessor. Implementation of the large scale distant learning of the network is imperative. It sees that the OpePicus...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.