The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Several web-based signal processing simulation packages for education have been developed in a Java environment. Although this environment has provided convenience and accessibility using standard browser technology, it has recently become vulnerable to cyber-attacks and is no longer compatible with secure browsers. In this paper, we describe our efforts to transform our award-winning J-DSP online...
This paper describes an implementation of a runtime environment for portable message-passing C programs with Message Passing Interface (MPI) library on web browsers. We have implemented core functions of the library. The runtime system runs several MPI programs without any modification. We confirm that the runtime performances of the programs are comparable to their native executions on some conditions.
In this research, I want to investigate programming language and middleware abstractions which offer an alternative approach in client/server Web application development, for dealing specifically with coordination between client and server components that has flexibility in mapping components to physical locations. I work on a middleware and JavaScript interpreter that provides support for modular...
The best practice to prevent Cross Site Scripting (XSS) attacks is to apply encoders to sanitize untrusted data. To balance security and functionality, encoders should be applied to match the web page context, such as HTML body, JavaScript, and style sheets. A common programming error is the use of a wrong encoder to sanitize untrusted data, leaving the application vulnerable. We present a security...
The paper demonstrates remote control of test experiment in the virtual laboratory. This is a common problem, but another way can always be used to solve it. The paper compares several existing virtual laboratories and their possible issues at present. To develop such a new solution JavaScript technology was used on both client and server side using Node.js runtime.
Automated Static Analysis Tools (ASATs) are an integral part of today's software quality assurance practices. At present, a plethora of ASATs exist, each with different strengths. However, there is little guidance for developers on which of these ASATs to choose and combine for a project. As a result, many projects still only employ one ASAT with practically no customization. With UAV, the Unified...
The Web has become an indispensable part of our society and is currently most commonly used mode of information delivery. Millions of users access the free services provided by the websites on daily basis and while providing these free services websites track and profile their web users. In this environment, the ability to track users and their online habits can be very lucrative for advertising companies,...
Cross site scripting (XSS) is a type of scripting attack on web pages and account as one of the unsafe vulnerability existed in web applications. Once the vulnerability is oppressed, an intruder advances intended access of the authenticate user's web-browser and may perform session-hijacking, cookie-stealing, malicious redirection and malware-spreading. As prevention against such attacks, it is essential...
In-Vehicle Infotainment (IVI) applications are gaining more and more attention in the automotive industry. For application development different technologies are used, typically Linux-based, accompanied with various proprietary IDE tools. Cross-platform applications are therefore not easy to create, ramp up time to start a development project is large and require specific know-how. In this paper,...
Web applications are getting closer to the performance of native applications taking advantage of new standard-based technologies. The recent HTML5 standard includes, among others, the Web Workers API that allows executing JavaScript applications on multiple threads, or workers. However, the internals of the browser’s JavaScript virtual machine does not expose direct relation between workers and running...
To assist Java programming educations, we have developed a Web-based Java Programming Learning Assistant System (JPLAS). JPLAS provides fill-in-blank problems to let students study the grammar and the code structure for Java by filling blank elements in a high-quality code that are composed of reserved words, identifiers, and control symbols. However, students can answer the problems only when connected...
A web-based, interactive and platform-independent courseware for electrical engineering education is presented, which is runnable on conventional personal computers as well as on modern mobile devices such as smartphones and tablets without installing any additional software or plugins. The presented course program can be used to support lectures and text books and it is also suitable for self-study.
While modern web development technologies enhancethe capabilities of web applications, they introduce challengesfor testers. This paper introduces, evaluates, and refinesweb mutation operators that target interaction faults in web applications. An experimental study is conducted on 11 subject webapplications using 15 web mutation operators. The effectivenessof 12 independently developed test sets...
In this paper we proposed a simple rule based, context aware framework to extend the web browser features at run time without modifying base binary. This is a very light weight framework which provides interaction of various applications to the web browser so that the web browser can customize or provide additional functionality in a given web page as per the requirement from third party application...
Android is the most popular mobile platform. Increased Android user base has attracted attackers to target the open platform and developed applications. Openness and flexibility of Android has introduced new attack surfaces and vulnerabilities that can be exploited. In this paper, we present Android vulnerabilities and also discuss the exploitation methods on the vulnerabilities and their effect across...
Client-side User Interface (UI) for web applications clearly plays a critical role in user performance and efficiency. Growing user expectations drive UI design to greater functionality with ever increasing expectations for rich and continuous interactivity. Such increases require greater and greater computational resources. At the same time, web applications are increasingly accessed through mobile,...
The relevance of simulation based software has increased for the academic education of engineers. In this article we consider didactic issues and an open source software architecture to address these issues. The sketched software and teaching approach provides the design and prototype implementation of a learning environment to support teaching in engineering education. A software architecture that...
An applet that performs an action against the will of the user who invoked it should be considered malicious. A malicious applet is applet that attacks the local system of a Web surfer. They can even seriously damage a Java user's machine. The problem of malicious Java applets, that is currently not well addressed by existing work. We have developed a tool for malicious Java applets, which we call...
Feature location is a critical step in the software maintenance process where a developer identifies the software artifacts that need to be changed in order to fulfill a new feature request. Much progress has been made in understanding the feature location process and in creating new tools to help a developer in performing this task. However, there is still lack of support for locating architectural...
Debugging sessions require a methodical process of finding causes and reducing the number of software problems. During such sessions, developers run a software project, traversing method invocations, setting breakpoints, stopping or restarting executions. In these sessions, developers explore different parts of the code and create knowledge about them. When debugging sessions are over, it is likely...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.