The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computing as a whole suffers from a crisis of reproducibility. Programs executed in one context are astonishingly hard to reproduce in another context, resulting in wasted effort by people and general distrust of results produced by computer. The root of the problem lies in the fact that every program has implicit dependencies on data and execution environment which are rarely understood by the end...
Certification has been proved as an essential mechanism for achieving different security properties in new systems. However, it has important advantages; among which we highlighted the increasing in users trust by means of attesting security properties, but it is important to consider that in most of cases the system that is subject of certification is considered to be monolithic, and this feature...
One of the biggest challenges faced by Computer Science undergraduate courses is to create challenging and stimulating learning environment for their students. As a part of Software Engineering focused on innovation, Agile development allows teachers to experiment new ways to transform their students' knowledge. Practitioners of this discipline often prefer to use participative approaches than the...
In contrast to intelligence, wisdom is the part of the propositional knowledge part of the background of knowledge that is a mean between two extremes of believing without sufficient evidence and not believing with sufficient evidence. Wisdom may be incorporated in an artificial intelligence system as artificial wisdom (AW). An intelligence system with AW, will learn a collection of activities like...
This document covers the beginning of the Computer Center of the Universidad Nacional de Rio Cuarto. Through this narrative will reveal the evolution of computer hardware and software that is used between the decade 70's and 80's, all framed in the context of the beginnings of an interior university within Argentina with the difficulties of this region.
With the emergence of high-performance computing instances in the cloud, massive scale computations have become available to technically every organization. Digital libraries typically employ a data-intensive infrastructure, but given the resources, advanced services based on data and text mining could be developed. A fundamental issue is the ease of development and integration of such services. We...
As a promising distributed computing technology, mobile agent (MA) can be used in many fields. But the security problem of MA is a barrier for application of MA technology. In this paper, we analyzed the security problems of mobile agent system exposed in opening environment and proposed a model system for mobile agent is proposed. In this system, the mobile agent security is enhanced by the trusted...
This paper explores timing anomalies in WCET analysis.Timing anomalies add to the complexity of WCET analysis and make it hard to apply divide-and-conquer strategies to simplify the WCET assessment. So far, timing anomalies have been described as a problem that occurs when the WCET of a control-flow graph is computed from the WCETs of its subgraphs, i.e., from a series decomposition. This paper extends...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.