The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
SaaS based cloud computing promises to provide dedicated and specialized computational resources on-premise and on a pay-per-use base to cloud consumers. These benefits, however, are traded with data confidentiality concerns: once data is transmitted to a cloud service, cloud consumers loose control over their data and remain in uncertainty about how their data is processed and disseminated inside...
This paper looks at organization of software development teams and project communities at GitHub. Using social network analysis several open-source projects are analyzed and social networks of users with ties to a project are shown to have some scale-free properties. We further show how to find core development group and a network metric is introduced to measure collaboration among core members, corresponding...
Malware, a significant threat to maintain a healthy Android ecosystem, always receives considerable attentions. This paper proposes a new dynamic Android malware classification approach by constructing and analyzing the dynamic behavior dependency graphs together with both framework-level function call behaviors and their data dependencies. Features are extracted from behavior graphs of different...
Aspect Mining is a research domain that tries to identify occurrences of crosscutting concerns in software systems that were developed without using the aspect oriented paradigm. A top-down approach to aspect mining first manually analyzes the pattern(s) used for implementing crosscutting concerns and then tries to automatically identify them in legacy software systems. In this paper we analyze three...
The detection of behavioral design patterns is more accurate when a dynamic analysis is performed on the candidate instances identified statically. Such a dynamic analysis requires the monitoring of the candidate instances at run-time through the execution of a set of test cases. However, the definition of such test cases is a time-consuming task if performed manually, even more, when the number of...
This paper describes an exploratory study for the evaluation of the performance quality attribute for releases of the same system. The main aim is to reveal performance degradations of architectural scenarios and their possible causes. Three software systems from different domains are used in our study, including a large-scale web system (SIGAA), a UML modeling tool (Argo UML), and a client-server...
Specifications carrying formal parameters that are bound to concrete data at runtime can effectively and elegantly capture multi-object behaviors or protocols. Unfortunately, parametric specifications are not easy to formulate by nonexperts and, consequently, are rarely available. This paper presents a general approach for mining parametric specifications from program executions, based on a strict...
Data have become more and more important these years, especially for big companies, and it is of great benefit to mine useful information in these data. Oil & Gas industry has to deal with vast amounts of data, both in real-time and historical context. As the amount of data is significant, it is usually infeasible or very time consuming to actually process the data. In our project we investigate...
Lightning location information is the message on lightning received from lightning monitoring net. It contains lightning time, latitude, longitude, intensity, as well as steepness, positioning errors and other critical information. There're some differences in the information caused by the diversity of lightning positioning system models. This paper introduces a kind of methods on extracting the lightning...
Today, electronic prescription in clinical scenarios is frequently used to support decision-making tasks and services monitoring in public health institutions. The huge amount of data that has been stored during last years about medication prescriptions makes now possible to apply data mining techniques with a significant success to discover patterns that could be useful to optimize medical services...
JADE (Java Agent Development Framework) is integrated into Moodle (Modular Object-Oriented Dynamic Learning Environment) to construct a personalized learning platform, which combines Multi-Agent and decision tree technology. The framework of the system is firstly described, and then the Course Agent is presented to explain the application of Agent in Moodle. The flowchart of Course Agent and its internal...
JavaScript-based browser extensions (JSEs) enhance the core functionality of Web browsers by improving their look and feel, and are widely available for commodity browsers. To enable a rich set of functionalities, browsers typically execute JSEs with elevated privileges. For example, unlike JavaScript code in a Web application, code in a JSE is not constrained by the same-origin policy. Malicious...
The Royal Netherlands Air Force (RNLAF) operates several weapon systems, such as Chinook and Apache helicopters, F-16 fighters and C-130 Hercules transport aircrafts. For these weapon systems the Dutch National Aerospace Laboratory NLR performs several loads and usage monitoring programs. For these programs masses of flight and administrative data are collected and stored in multiple, heterogeneous...
A Grid is a large-scale, geographically distributed hardware and software infrastructure for flexible, secure, and coordinated sharing of vast amounts of heterogeneous resources within large, dynamic and distributed communities of users belonging to virtual organizations, to enable solving of complex scientific problems. From the perspective of one computer, such network partitioning may appear as...
With Ajax firmly established as a widespread Web application-development technique, it is possible to build GPS monitoring system based on B/S architecture, so a large number of Web GPS monitoring systems are released recently. This article analyzes the common GPS monitoring systems based on AJAX and points out three main existing weaknesses. Then the article introduces how to use AJAX push pattern...
The popularity of the Enterprise Service Bus (ESB) pattern as a foundation of Service Oriented Architectures (SOA) for enterprise environments is increasing. Java business integration (JSR-208) is an attempt at Java-centric standardization of the ESB pattern. JSR-208 lacks a complete monitoring facility, which nowadays is crucial for management of complex enterprise environments and for establishing...
In multiservice networks, QoS monitoring needs to be carried out in a per-class basis so that each service class measuring requirements and behavior are met and sensed properly. Facing the shortage of off-the-shelf class-based monitoring solutions, this work is focused on the development of a flexibly QoS monitoring tool oriented to multiservice networks. In this context, after discussing main QoS...
The paper introduced a novel on-line fault diagnosis system model of the hydropower units based on multi-agent system. In allusion to the classical MAS-based fault diagnosis model, it proposes a new function of information interactive between the mission-controlled subsystem and the task decomposition subsystem to increase the transmission rate of control signals and designs the status-monitoring...
Distributed systems emulators built with the aid of virtualization tools allow testing of systems in a testbed whose number of real elements are orders of magnitude smaller than the number of virtual elements being tested. However, to allow testers to benefit from these systems, operation of the virtual environment should be hidden from them and performed automatically by the emulator. Moreover, testers...
Peer to peer (P2P) network based systems offer a wide variety of network capabilities to the users worldwide and has been very popular. In this paper we have proposed a new application that works on the Peer to Peer network. The proposed application, peer-to-peer academic search (PASE) uses gnutella, a P2P decentralized network architecture that establishes an excellent search and file sharing system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.