The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Currently, there are many tools that modify the program code of the compiled protected modules. The authors of the considered tools do not publish technique of embedding their protection system and any proofs of their tools' algorithm correctness. This article describes the technique of program module modification with algorithm preservation for the subsequent embedding a protection system. The article...
Software change histories are results of incremental updates made by developers. As a side-effect of the software development process, version history is a surprisingly useful source of information for understanding, maintaining and reusing software. However, traditional commit-based sequential organization of version histories lacks semantic structure and thus are insufficient for many development...
In Software Defined Networking (SDN), connections between the controller and the switches are maintained in two ways: out-of-band and in-band. In out-of-band controlling, the control channels are constructed via separate links. However, due to several reasons, sometimes in-band controlling is needed instead of out-of-band controlling. In in-band controlling, the data paths are used for control channels...
With the proliferation of online developer forums as informal documentation, developers often share their opinions about the APIs they use. However, given the plethora of opinions available for an API in various online developer forums, it can be challenging for a developer to make informed decisions about the APIs. While automatic summarization of opinions have been explored for other domains (e...
The twenty-first century is the era of information technology, route planning play an important role in the field of navigation. An improved algorithm for route planning based on A∗ algorithm is presented in this paper. A certain number of turning points for route planning are set firstly by sorting out and analyzing the s-57 charts ENC data. Secondly, a database is established to store route points...
Finite state models, such as Mealy machines or state charts, are often used to express and specify protocol and software behavior. Consequently, these models are often used in verification, testing, and for assistance in the development and maintenance process. Reverse engineering these models from execution traces and log files, in turn, can accelerate and improve the software development and inform...
At present, radio frequency identification technology has been widely used in many fields, such as data acquisition, transportation, logistics management and so on. However, the collision problem in RFID technology seriously affects the performance of RFID system. Aimed at the shortcomings of search times and traffic by the traditional binary search algorithm, this paper propose an improved binary...
In order to virtualize the optical resources and support as required, software-defined optical networks (SDON) can dynamically customize the structure and function of the optical network using the software programming method according to the requirements of the users and operators. Each layer in SDON architecture has a lot of core technology. In this paper, we focus on the dynamic scheduling and optimization...
When analyzing programs using static program analysis, we need to determine the reachability of each possible execution path of the programs. Many static analysis tools collect constraints of each path and use SMT solvers to determine the satisfiability of these constraints. The accumulated computing time can be long if we use SMT solvers too many times. In this paper, we propose a constraint-pattern...
This paper introduces a cost effective scheme for a Cloud Radio Access Network (C-RAN) based on virtualization, which is a technology used to reduce Power Consumption (PC) in the Base Band Unit (BBU pool). The BBU's function is proposed to be as a software application running in a servers, which is called the virtual BBU (vBBU). To asses the proposal scheme, a power model of the BBU pool is proposed...
Network Function Virtualization and Software Defined Networking promise to radically innovate the way network services are provisioned, especially in terms of dynamic and flexible service delivery. Although the problem of NFV/SDN orchestration is recently gaining increasing interest, the problem of how effectively realizing the as-a-service exposure of network functions and services remains essentially...
The paper is devoted to application of the novel 2DOF Quadrotor-based Laboratory Testbed for engineering education in the such the disciplines as Automatic Control, Adaptation and Identification, Real-time Control Systems, Data and Signal Processing, Telecommunications, Information Theory, Flight Dynamics, high- and low-level Programming Languages. The testbed is based on a quadrotor, mounted in the...
In this paper we present a complete, open-source GZIP compressor implementation for FPGA based on a systolic array architecture. GZIP is one of the most utilized compression algorithms. Besides the usual use-case of compression for data storage, distributed computing systems such as Hadoop utilize compression to reduce the amount of data which is transferred between computing nodes in a cluster. However,...
In this paper it is presented a new application of Levenshtein distance algorithm, for the selection of choices in a vocabulary quiz. Levenshtein distance is a measure for the similarity of two strings. In order to make the quiz more difficult, the choices for the correct word are selected using the calculated degree of similarity with the correct word. We developed a Java graphical application that...
In this paper we present an encryption-based obfuscation technique aiming to address a common and current issue that regards software theft intelligence and malicious attacks. Our approach involves executable code encryption and advanced code management that allows us to decrypt and execute only small parts of the program at a time. This will make the process of reverse engineering much harder than...
Ternary Content Addressable Memory (TCAM) capacity problem is an important issue in Software-Defined Networking. Rule caching is an efficient technique to solve the TCAM capacity problem. However, there exists rule dependency problem in wildcard-rule caching technique. In this paper, we utilize cover-set method to solve the rule dependency problem and propose a wildcard-rule caching algorithm to cache...
Search-based software testing has achieved great attention recently, but the efficiency is still the bottleneck of it. This paper focuses on improving the efficiency of generating test data for multiple paths. Genetic algorithms are chosen as the heuristic algorithms in search-based software testing in this paper. First, we propose an improved grouping strategy of target paths to balance the load...
As the first NP-complete problem, the Boolean satisfiability (SAT) problem is the key problem in computer theory and application. FPGA has been address frequently to accelerate the SAT solving process in the last few years, owing to its parallelism and flexibility. In this paper, we have proposed a novel SAT solver adopting an improved local search algorithm on the reconfigurable hardware platform...
Ant colony algorithm as a new heuristic optimization algorithm, with distributed computing, information positive feedback, and heuristic search features, in solving a variety of combinatorial optimization problems has been widely used. In this paper, with restrictions, to any matter required multi-objective path planning problem using ant colony algorithm for path optimization, the ant colony system...
New applications where anyone can broadcast video are becoming very popular on smartphones. With the advent of high definition video, ISP providers may take the opportunity to propose new high quality broadcast services to their clients. Because of its centralized control plane, Software Defined Networking (SDN) seems an ideal way to deploy such a service in a flexible and bandwidth-efficient way...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.