The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper demonstrates the usage of Kvazaar open-source HEVC intra encoder in 4K real-time video encoding. In this setup, a raw 4K video is shot by an action camera, captured by an HDMI capture card, encoded in real-time by Kvazaar ultrafast preset on a 22-core Intel Xeon processor, sent to a laptop, and decoded by OpenHEVC decoder for playback. The encoding process is visualized on the fly by Kvazaar...
Background: Although there has been a significant amount of research focused on designing and conducting controlled experiments, few studies report how experienced experimental software engineering researchers actually design and conduct their studies. Aims: This study aimed to offer a practical perspective from their viewpoint regarding controlled experiment planning. Method: We collected data through...
Context. Member checking can be defined as a research phase performed during a qualitative research in which the researcher compares her interpretations and understanding obtained from the data analysis with the view-points of participants to increase accuracy and consistency of results. This is an important step for any qualitative research. However, considering a sample of 66 case studies developed...
Understanding developer productivity is important to deliver software on time and at reasonable cost. Yet, there are numerous definitions of productivity and, as previous research found, productivity means different things to different developers. In this paper, we analyze the variation in productivity perceptions based on an online survey with 413 professional software devel-opers at Microsoft. Through...
Background: In Software Engineering (SE) the term maturity is often linked to the work process and product quality. In many cases, team maturity is seen as a backdrop to the process of SE, and sometimes as something that is known to exist, but which cannot be understood, neither measured accurately nor even dimension its value. Aim: In this article, we seek to understand the concept of mature teams...
We focus on developer code review performance, and analyze whether the age of a subject affects the efficiency and preciseness of their code. Generally, older coders have more experience. Therefore, the age is considered to positively affect code review. However, in our past study, code understanding speed was relatively slow for older subjects, and memory is needed to understand programs. Similarly,...
The incorrect use of cryptography is a common source of critical software vulnerabilities. As developers lack knowledge in applied cryptography and support from experts is scarce, this situation is frequently addressed by adopting static code analysis tools to automatically detect cryptography misuse during coding and reviews, even if the effectiveness of such tools is far from being well understood...
Edutainment systems' Development is well documented in research papers, and its application has satisfying results in several knowledge areas. However, methods for multidisciplinary team management in immersive edutainment systems engineering were not found in the survey made. A qualitative evaluation of immersive edutainment systems' engineering was conducted aiming to achieve grounded theory that...
Computing has become ubiquitous in many fields. The pervasiveness of computing has catalyzed growing demand for a broad range of skills. However, recent trends suggest a growing gap between supply-versus-demand for programmers — estimates indicate that by 2024, there will be a million more jobs than computing professionals resulting in over $500 billion in lost salaries. A key aspect to this growing...
Now that it is becoming straight forward that industrial environments are a target for threats, hints will be provided here to face this issue with a focus on architecture and design. This approach is not treated by traditional means in detection of security vulnerabilities, like the static code analysis. Our approach explains how the quality of the code architecture against security attacks can be...
Automatic static analysis tools help developers to automatically spot code issues in their software. They can be of extreme value in languages with dynamic characteristics, such as JavaScript, where developers can easily introduce mistakes which can go unnoticed for a long time, e.g. a simple syntactic or spelling mistake. Although research has already shown how developers perceive such tools for...
Code review is a key tool for quality assurance in software development. It is intended to find coding mistakes overlooked during development phase and lower risk of bugs in final product. In large and complex projects accurate code review is a challenging task. As code review depends on individual reviewer predisposition there is certain margin of source code changes that is not checked as it should...
The use of games in non-leisure contexts is referred to as serious games. The tradition of using games for purposes beyond entertainment goes back a long time before digital games. However, with the advent of digital games, serious games development has become an issue of both game design and technology development in various combinations. This paper presents a literature review of what types of topics...
Automotive electronic control units (ECUs) have been the focus of many security researchers who have demonstrated the ability to affect the deterministic operation of safety critical vehicle cyber physical systems. Flaws in software design that have direct impacts to the functional safety of a target vehicle have been discovered. The rapid increase in data connectivity within a modern automobile has...
Increasingly developers are becoming aware of the importance of software security, as frequent high-profile security incidents emphasize the need for secure code. Faced with this new problem, most developers will use their normal approach: web search. But are the resulting web resources useful and effective at promoting security in practice? Recent research has identified security problems arising...
There is widening chasm between the ease of creating software and difficulty of "building security in". This paper reviews the approach, the findings and recent experiments from a seven-year effort to enable consistency across a large, diverse development organization and software portfolio via policies, guidance, automated tools and services. Experience shows that developing secure software...
Problem of telemetry and telecontrol data transmission systems noise immunity at endpoints implementing in the Internet of Things technology is considered. A method of improving streaming data encryption in open communication channels was proposed. The dynamic change of crypto key using non-linear feedback in shift register data and quasi-periodic reconfigure of the encoder / decoder device in data...
The research was carried out and the Cyrillic typeface, based on the handwriting, was developed. The font-building software was investigated. Sketches of the font were drawn and converted to the vector format. Afterward, the characters and glyphs, ligatures, tracking, kerning pairs of the handwritten font were constructed. The FineReader was learned to recognize the developed font.
Merge conflicts occur when software practitioners need to work in parallel and are inevitable in software development. Tool builders and researchers have focused on the prevention and resolution of merge conflicts, but there is little empirical knowledge about how practitioners actually approach and perform merge conflict resolution. Without such knowledge, tool builders might be building on wrong...
The features of weight-based sum codes for error detection in channel are discussed in this article. These features are acceptable for modification remote railway controlling systems such as locomotive signalization. In this article proposed the investigation for different coding modification algorithms, made an analysis of noise-immune properties when the modified Bauer code was replaced to modulo...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.