The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Joint idea generation is vital in software development projects requiring team members with different knowledge specializations to exchange and integrate multiple perspectives into ideas to improve the software product. While joint idea generation is generally difficult to achieve, it is even more challenging in offshore-outsourced settings. Our goal was to understand the process of how software prototypes...
This paper presents an approach for securing software application chains in cloud environments. We use the concept of workflow management systems to explain the model. Our prototype is based on the Kepler scientific workflow system enhanced with security analytics package.
In this paper, we propose a method to optimize two-layer light field display using depth initialization. In contrast to existing trade-off work between performance and processing time, this paper firstly models the display principle of layered light field display, and then performs layered initialization with the prior known depth of 3D objects, and finally optimizes the layered images for light field...
The Department of Electrical and Computer Engineering in National Institute of Technology (NIT), Maizuru College offers practical engineering education that teaches how to utilize skills to contribute to local area in cooperation with local society. In the lecture, the students propose solutions to problems related to local area by fabricating prototypes using their electrical and information engineering...
This paper describes the co-simulation methodology adopted for hardware verification of a next generation network packet processing engine (Advanced I/O Processor or AIOP) utilizing virtual prototype models developed originally for software verification. Though co-simulation strategies are common in verification of stand-alone processors, they have seldom been used for mega-modules and SoC, which...
Informal and semi-formal specifications are commonly adopted for requirements engineering (RE), especially for customer-oriented system development projects, but their validity with respect to the user's requirements is usually difficult to perform. The common reason for the difficulty is that the specifications are often misinterpreted by the stakeholders due to the ambiguity of the natural language...
This paper proposes an approach to concurrent feedback development method in the software development of automotive systems. The automotive software is increasing its size and complexity. Therefore, it has become more difficult to ensure quality. At the same time, automobile manufacturers demand to shorten the development time. Conventionally, we developed the software in the two phases of "prototype...
QI2S is a project financed in the frame of the European FP7 funding programme, developing the prototype of a lightweight low-power on-board processing platform that operates with a massively parallel many-core technology based on Ramon Chips ITAR free RC64 architecture. This technology will be able, in the future, of reaching performances of hundreds of GOPS and tens of GFLOPS, although for demonstrational...
User Interfaces (UI) design is a complex and multi-faceted problem. It depends on devices, users and their environments and involves various stakeholders with different backgrounds. Moreover, user requirements are difficult to evaluate precisely upfront and require iterative design cycles based on trial and error. All this variability is complex and should be managed efficiently to ensure moderate...
Model Driven Development (MDD) is deemed as a key to address the increasing complexity of software systems. It is imperative that the developed software fulfills the end-user's requirements. This implies that a collaboration between the Requirements Management (RM) tools and the modeling tools, enabling complete traceability and interfacing among these tools, is essential. On the other hand, existing...
Delivering complex software across a worldwide distributed system is a major challenge in high-throughput scientific computing. The problem arises at different scales for many scientific communities that use grids, clouds, and distributed clusters to satisfy their computing needs. For high-energy physics (HEP) collaborations dealing with large amounts of data that rely on hundreds of thousands of...
Post-silicon validation is becoming widely adopted because it runs significantly faster than pre-silicon verification and hence it helps uncover subtle design errors that escape to silicon prototypes. However, it is hindered by limited controllability and observability, which makes it challenging to reuse pre-silicon content. In order to enable the reuse of stimuli constraints from pre-silicon verification...
Because modern engineering products require more and more functionality, the models used in the design of these products get larger and more complex. A way to handle this complexity would be a suitable mechanism to modularize models. However, current approaches in the Model Driven Engineering field have limited support for modularity. This is the gap that our research addresses. We want to tackle...
New inventions and changes in technology and methodologies affect design activity frequently resulting in unpredictable effects on the final design solution, hence on the real outcome — unsatisfactory buildings. To avoid these consequences, it is necessary to store and exploit ever-growing knowledge and experiences that allow these problems to be overcome. An innovative ‘Abstraction Layer’ overlying...
Side channel attacks exploit inadvertent information leakage from the physical implementation of computing systems, bypassing the theoretical strength of cryptographic algorithms. Of particular concern are software side-channel attacks which can be mounted remotely without access or alteration of the hardware system. One type of attack that has been demonstrated to be highly effective is cache timing...
Introduction. The National Social Security System (SJSN) prioritizes primary service as a spearhead to assist Primary Care Physicians to make medical decisions. The purpose of this research is to develop computer software that will assist primary care physicians in the fields of Obstetrics Ultrasonography, related to referral decision-making abilities.
In post disaster situations it is vital to restore voice and data communication services quickly. Currently, portable wireless systems are used as a temporary solution. However, these solutions have a lengthy setup, limited coverage, and typically require the use of expensive satellite backhaul. Solutions based on cognitive radio mesh networks have been proposed, to exploit self-configuration and...
The following study deals with static analysis of Java source codes and it is dedicated to those readers who are interested in techniques aiming at evaluation of programming abilities of job candidates or students. In our case, the goal of the static analysis is to assemble the most significant and interesting data about source code author (programmer). If properly visualized, such assembled data...
Gesture-controlled applications typically are tied to specific gestures, and also tied to specific recognition methods and specific gesture-detection devices. We propose a concern-separation architecture, which mediates the following concerns: gesture acquisition, gesture recognition, and gestural control. It enables application developers to respond to gesture-independent commands, recognized using...
The increasing complexity of modern digital circuits has exacerbated the challenge of verifying the functionality of these systems. To further compound the issue, shrinking time-to-market constraints place increased pressure on attaining correct devices in short amounts of time. As a result, more and more of the burden of validation has shifted to the post-silicon stage, when the first silicon prototypes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.