The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In software development, software reuse has become a pivotal factor in creating and providing high-quality software at a reduced cost. The reuse of a code creates dependencies, which as they increase over time become difficult to manage and avoid compatibility issues or bugs. With newer version releases, come various quality improvements, new features and issue fixes, but deciding whether or not to...
Design and implementation are two major aspects of the software development and the deviation between them needs to be minimized to the best extent possible. Of the many difficulties in detecting the deviation is the absence of common notation to compare the implementation artefact (code) against the design artefact. In this paper we present an approach to bridge the gap by providing a methodology...
This paper introduces a newly developed Object-Oriented Open Software Architecture designed for supporting security applications, while leveraging on the capabilities offered by dedicated Open Hardware devices. Specifically, we target the SEcube™ platform, an Open Hardware security platform based on a 3D SiP (System on Package) designed and produced by Blu5 Group. The platform integrates three components...
In this paper we propose new attack on dynamic watermark scheme Radix-n widely known as one of the most secure. It was shown that we are able to reveal dynamically allocated memory blocks and then a digital watermark can be discovered by hooking API function calls. During the experiment it was ascertained that often an amount of such structures is low because of widely used optimization. This feature...
The development of cyber-physical systems (CPSs) is a multi-disciplinary process. A model-based approach during the design of a system is important for making design decisions during the exploration of alternatives. However, all disciplines use different modelling tools and techniques, which makes the integration of these models difficult and time-consuming. The use of the High Level Architecture...
Domain-specific languages (DSLs) are frequently used in software engineering. In contrast to general-purpose languages, DSLs are designed for a special purpose in a particular domain. Due to volatile user requirements and new technologies DSLs, similar to the software systems they describe or produce, are subject to continuous evolution. This work explores existing research on DSL evolution to summarize,...
NVRAM, such as STT-MRAM and 3D XPoint, enables persistent heap to replace existing file systems for data persistence. The persistent heap can eliminate the overhead of serializing the data structure into the file address space by granting persistence to the data structure. In this paper, we defined a persistent object store for persistent heap, and developed a namespace and persistent object management...
High Availability (HA) is a quality of service that is required for many services, e.g. carrier grade services. Systems providing such services undergo upgrades, e.g. software version upgrade, like any other system. Avoiding/limiting service outage during these upgrades is of critical importance to meet the HA requirement. Thus, the upgrade campaign specifications, which drive the process need to...
High Performance Computing (HPC) Systems are usually large systems which require specialized infrastructure. For a variety of small time users, who need performance of the parallel computing for their applications, such systems are unaffordable and inaccessible for a number of reasons. Even to setup a small state-of-the-art HPC system, such users would require vast efforts and expertise to design...
Timeseries line charts are a popular visualization technique but traditionally do not show many lines. We borrow concepts of tiny microtext and path dependent cartographic text to embed labels and additional text directly into lines on line charts, thereby making it easier to identify individual lines in a congested line chart, enabling more lines to be displayed and enabling additional data to be...
Due to the high cost and high power consumption problem of the present smart home server, we designed and implemented a home server based on embedded system, mainly developed by ARM11 for a hardware platform, Linux system for operating system, SQLite database and BOA server for a software platform. The home server has successfully implemented the network communication, SQLite database peration and...
The current static analysis approaches for detecting stack overflow vulnerabilities in binaries are only usable to the functions in system libraries and not suitable for user defined functions. In this paper, we model the characteristic of stack overflow vulnerabilities and propose a static taint analysis method, which can recognize user defined functions that may have that type of vulnerabilities...
A novel academic recommendation algorithm, MTAR (multi-type academic recommendation), which integrates resource content and user behaviors, is proposed to process five types of academic resources at the same time, which can quickly and precisely recommend academic resources of interest to users. The MTAR algorithm profiles five kinds of academic resources from four features including resource type,...
Kapok is a Python library created to estimate forest height using repeat-pass polarimetric synthetic aperture radar interferometry (PolInSAR). The library can import data collected by NASA's Uninhabited Aerial Vehicle Synthetic Aperture Radar (UAVSAR) sensor. The library includes functions for data visualization, coherence region plotting, coherence optimization, and inversion of the random volume...
Different perspectives about the concept of Robustness in Automotive Electronic are provides by leading edge semiconductor manufacturer. Xilinx contribution is related to the development and evaluation of Software Test Libraries suitable for in-field testing of the interconnect blocks in large SoCs. Infineon (IFX) section is discussing safety and security concerns of On-Line FLASH Memory Repair. STMicroelectronics...
Inter-vehicle communication (IVC) is a key component enabling the autonomous driving vehicles. Standardization of IVC is advanced but yet improvements are still introduced. Congestion control is one of the sensitive topics. The IVC European standard ITS-G5 addresses the congestion issue enabled by a geo-networking protocol that exploits at networking level the geographic information. Implementation...
A developer of mobile or desktop applications is responsible for implementing the network logic of his software. Nonetheless: i) Developers are not network specialists, while pressure for emphasis on the visible application parts places the network logic out of the coding focus. Moreover, computer networks undergo evolution at paces that developers may not follow. ii) From the network resource provider...
Despite all the efforts of the research community, buffer overflows remain one of the most dangerous bugs for modern IT systems. The problem is compounded by the fact that there are many developers who do not follow the basic rules of a secure software development lifecycle, supplying proprietary vulnerable products. To address this problem, the industry has proposed a number of techniques that perform...
An important step toward adoption of formal methods in software development is support for mainstream programming languages. Unfortunately, these languages are often rather complex and come with substantial standard libraries. However, by choosing a suitable intermediate language, most of the complexity can be delegated to existing execution-oriented (as opposed to verification-oriented) compiler...
Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.