The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As high-performance computing resources have become increasingly available, new modes of computational processing and experimentation have become possible. This tutorial presents the Extreme-scale Model Exploration with Swift/T (EMEWS) framework for combining existing capabilities for model exploration approaches (e.g., model calibration, metaheuristics, data assimilation) and simulations (or any...
Recently a novel extension of a dataflow model with a library task has been proposed to overcome the severe limitation of dataflow models to handle shared resources. The library task that contains library functions and shared data inside plays the role of a server task when dataflow tasks as clients call library functions. In this paper, we propose a meta-heuristic technique based on a multi-objective...
In this paper we present preliminary results of an empirical study, in which we used copy/paste detection (PMD CPD implementation) to search for repeating documentation fragments. The study was performed on 5 open source projects, including Java 8 SDK sources. The study shows that there are many occurrences of copy-pasting documentation fragments in the internal documentation, e.g., copy-pasted method...
Software Process Improvement (SPI) has become one of the main strategic objectives in software industry. Companies make more investments in implementing software quality standards and models that focus on process assessment to improve their performance and productivity. To achieve these goals, companies focus on improving their process by means of improvement initiatives which may be implemented....
Global Software Development (GSD) poses inherent risks to projects success. Project managers are now faced with new challenges related to the geographical, temporal and socio-cultural distances between stakeholders. The objective of this research is to identify challenges associated with Software Project Management (SPM) activities in a GSD context and present an integrative framework encompassing...
Anatomy learning is very important for many courses, and it requires understanding three-dimensional (3D) shapes, most forms of anatomy teaching are offered to students through two-dimensional (2D) resources, such as images and videos. Many software solutions were developed with the purpose of assisting anatomy teaching and learning, arranging varied techniques and assets, as interaction and visualization...
Many performance engineering tasks, from long-term performance monitoring to post-mortem analysis and online tuning, require efficient runtime methods for introspection and performance data collection. To understand interactions between components in increasingly modular HPC software, performance introspection hooks must be integrated into runtime systems, libraries, and application codes across the...
Large scale simulation performance is dependent on a number of components, however the task of investigation and optimization has long favored computational and communication elements above I/O. Manually extracting the pattern of I/O behavior from a parent application is a useful way of working to address performance issues on a per-application basis, but developing workflows with some degree of automation...
Wireless Sensor Networks (WSNs) have evolved during the last decade, becoming an accessible technology in the market nowadays. Even cutting edge state of the art works are still being carried out in universities and research centers and departments, the curriculum of communication, computer science and electronic engineers lacks of contents related to specific disciplines inherent to WSNs field. The...
In this paper, image processing algorithms designed in Zynq SoC using the Vivado HLS tool are presented and compared with hand-coded designs. In Vivado HLS, the designer has the opportunity to employ libraries similar to OpenCV, a library that is well-known and wide used by software designers. The algorithms are compared in terms of area resources in two conditions: using the libraries and not using...
In order to compare and rank the worlds fastest computers, benchmarks evaluating their performance are required. A single execution of HPL is used for the most widely recognized ranking: the TOP500. Lately, two benchmarks, arguably more representative of typical modern workloads, have been proposed: HPCG and HPGMG. Currently, all three benchmarks use the highest observed performance from a single...
Safety and security in software coding is becoming increasingly important in mission-critical systems due to various emerging threats and to avoid potential disastrous consequences. These issues can be significantly reduced by software designs and implementations that adequately protect systems. This abstract describes coding methodologies in the Ada 95/2005 programming language for complex embedded...
Module based robot has long history. There are many module based robot in the market. Some companies sell those to be used in industrial application. However software technology is not doing catch up hardware performance. Company provide software tool-set, and user can build their own control system. Customers meet the limitation when they want to build kinematics library to control their robots in...
To accomplish the organizational business objectives and consistently improve processes, high maturity processes are implemented in numerous software enterprises. Organizational process asset library (OPAL) plays a significant role in the definitions, executions and improvements for software processes. Based on the conceptions of Capability Maturity Model Integration (CMMI) and practical experience,...
We developed a software framework for boundary element analyses. The software supports a hybrid parallel programming model and is equipped with a hierarchical matrix (H-matrix) library to accelerate the BEM analysis.
A brief review of Protected Execution Mode (PEM) for user-space applications featured in Elbrus architecture is described first. Then, AddressSanitizer, a well-known utility by Google Inc, is considered as an example of a pure software technique of memory control. Comparative analysis of these solutions is given with performance flaws, applicability and boundary violation detection quality.
Interactive images can increase the popularity of some existing technologies. Although the most popular way to create interactive images is using the already popular maps engines, there is a large number of available options. In this paper, we analyze several Maps APIs and evaluate the most suitable API for interactive images regarding its usability, accessibility and performance. The result is that...
Teaching informatics in primary and secondary schools in Slovakia has already become a tradition. A creative informatics teacher can take different forms for their lessons. One of them is the use of small educational applications which programs the teacher programmed him/herself. As part of a KEGA project we decided to create a software library, which provides comfort to the teacher and thus supports...
Peer code review locates common coding standard violations and simple logical errors in the early phases of software development, and thus, reduces overall cost. Unfortunately, at GitHub, identifying an appropriate code reviewer for a pull request is challenging given that reliable information for reviewer identification is often not readily available. In this paper, we propose a code reviewer recommendation...
Although correct error handling is crucial to software robustness and security, developers often inadvertently introduce bugs in error handling code. Moreover, such bugs are hard to detect using existing bug-finding tools without correct error specifications. Creating error specifications manually is tedious and error-prone. In this paper, we present a new technique that automatically infers error...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.