The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose an approach in the form of a light weight smart fuzzer to generate string based inputs to detect buffer overflow vulnerability in C code. The approach is based on an evolutionary algorithm which is a combination of genetic algorithm and evolutionary strategies. In this preliminary work we focus on the problem that there are constraints on string inputs that must be satisfied in order to...
User's behaviors in information systems have different formats in different working modes, they mean users' intention actually. API callings, menu selections or requests are the familiar base elements of software behaviors, and different technologies are required to monitor and understand them. In information systems, it is necessary to insure that users' software behavior is trusted while processing...
The application of network computing technology, more and more widely, its security is particularly important to the emergence of trusted computing research for the security of network computing application technology research has provided new opportunities. In this paper, the credibility of Web-based computing environment, the structure of thought and its implementation model.
Measurement methods have significant meaning for user's trust to software trustworthiness. Data mining is one of technologies through which measurement methods and tools can collect trustworthiness data to calculate software trustworthiness. In this paper, a Measurement Method based on Data Mining (MMDM) is proposed, trying to improve correctness of conclusion made by user toward provider's service...
Trustworthiness evaluation is an increasingly common theme in service-oriented computing. However, existing approaches are not effective for web services trustworthiness assessment. In this paper, we present a web services trustworthiness evaluation model based on Fuzzy Cognitive Maps. The model combines the trust evidence framework and the dynamic context reputation feedback at runtime. The simulation...
A design of IIR digital filter based on DSP and SOPC technology was respectively conducted in this paper. Then design principles and implementation schemes were put forward, and the schematics of the hardware circuits as well as the software flow chart were given in detail. The experimental results indicate that the SOPC design has the advantages of flexible controls, continuous output phase, high...
Depth study of the network environment based on software engineering theory and cutting-edge technology to improve the competitiveness of China's software industry breakthrough. Only by having a strong independent research and development of software innovation can fundamentally industrial upgrading its software, and resolve network resources brought by the deepening of the software application bottlenecks...
This paper provides a methodology for designing and developing a common software framework for wearable computers. We have presented some important features that are important in designing and developing a software platform. The designed and realized common platform for wearable computer is easily adaptable to any application with few changes. A prototype is created and installed in a wearable computer,...
In the Web 2.0 era, users share and discover interesting content via a network of relationships created in various social networking or content sharing sites. They can become for example contacts, followers or friends and express their appreciation of specific content uploaded by their peers by faving, retweeting or liking them depending on whether they are in Flickr, Twitter or Facebook respectively...
Despite high expectations, agile methods have not always produced the desired results. The suitability of various agile practices depends on many situational factors, such as team size, project complexity, individuals competence, etc. As agile practices have become increasingly widespread, there is a growing body of literature that reports on empirical experiences, including factors that contribute...
This paper asks which of White's (2009) three disciplines and relative valuation orders does the Singapore blogosphere adhere to. Analysing not just the hyperlink connections but the textual discourse; and in doing so attempts to highlight certain limitations of using automated data mining and analysis software. Using the Singapore blogosphere, described by Lin, Sundaram, Chi, Tatemura, and Tseng,...
This paper presents an approach to providing better safety for adolescents playing online games. We highlight an emerging paedophile presence in online games and offer a general framework for the design of monitoring and alerting tools. Our method is to monitor and detect relationships forming with a child in online games, and alert if the relationship indicates an offline meeting with the child has...
Extensible dependency grammar (XDG) is a modern formalism for declaring dependency relations between lexical entries, generally used to construct natural language parsers. This work shows how to use XDG to declare specific contexts of the words, thus turning XDG parser into a word sense disambiguation module or a context-sensitive bilingual dictionary. The capabilities of the proposed method are shown...
Stakeholder Theory is an area of strategic management that defines a stakeholder as someone who affects or is affected by the actions of the organization. The principles and concepts of stakeholder theory can be applied to software development organizations to give managers a better understanding of the diverse community of stakeholders that influence product development efforts. A deeper understanding...
This paper describes a unit of collective structures that is being used to acquire and access data throughout the empathic space. The data include but is not limited to the output of sensors (ambient, context, and user location) and multimedia content (audio and video) which serves as input for various empathic computing activities or processes. The system tailors both high level (e.g. host applications,...
Code reviews have many benefits, most importantly to find bugs early in the development phase and to enforce coding standards. Still, it is widely accepted that formal code reviews are time-consuming and the practical applicability in agile development is controversial. This work presents a continuous differential-based method and tool for code reviews. By using a continuous approach to code reviews,...
This paper aims to find the cause leading to aviation accident and put forward relevant prevention strategy from organizational level. 7 types of direct reason causing aviation accidents are analyzed and classifies by using method of System Theory and `Human-Machine-Environment' Model which was proposed out in previous. Then a Stat. on 21 Chinese civil aviation accidents happened from 1981 to 2008...
The progress of distributed interaction simulation is restricted by the traditional Basic Simulation Computing Resource (BSCR). It is difficult to speedily customize BSCR on demand. Aiming at this question, a BSCR management platform is proposed based on the virtualization technology. Upon the platform, users could apply for a Virtual Machine (VM) as BSCR to execute simulation application. B/S architecture...
Bug report is becoming a main approach to improve and perfect a complicated piece of software, but analyzing the bug report is a tedious and time-consuming job, especially when the number of bug reports is huge and many duplicate reports are mixed within the incoming bug reports. In this paper, we present a framework to automatically triage and detect the duplicate bug reports by keywords extraction...
GUI testing is an important and difficult issue. One of the difficulties in GUI testing is that the input domain of a non-trivial GUI application is extremely large or infinite. It is necessary to introduce some coverage criteria to help people select test cases from the input domain of the GUI applications. In this paper, we propose an event handler-based coverage criterion for GUI testing. It requires...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.