The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data-flow analyses are used as part of many software engineering tasks: they are the foundations of program understanding, refactorings and optimized code generation. Similar to general-purpose languages (GPLs), state-of-the-art domain-specific languages (DSLs) also require sophisticated data-flow analyses. However, as a consequence of the different economies of DSL development and their typically...
Software updates often introduce new bugs to existing code bases. Prior regression testing tools focus mainly on test case selection and prioritization whereas symbolic execution tools only handle code changes in sequential software. In this paper, we propose the first incremental symbolic execution method for concurrent software to generate new tests by exploring only the executions affected by code...
Although correct error handling is crucial to software robustness and security, developers often inadvertently introduce bugs in error handling code. Moreover, such bugs are hard to detect using existing bug-finding tools without correct error specifications. Creating error specifications manually is tedious and error-prone. In this paper, we present a new technique that automatically infers error...
Dynamic impact analysis is a fundamental technique for understanding the impact of specific program entities, or changes to them, on the rest of the program for concrete executions. However, existing techniques are either inapplicable or of very limited utility for distributed programs running in multiple concurrent processes. This paper presents DISTIA, a dynamic analysis of distributed systems that...
Association rule mining is an unsupervised learning technique that infers relationships among items in a data set. This technique has been successfully used to analyze a system's change history and uncover evolutionary coupling between system artifacts. Evolutionary coupling can, in turn, be used to recommend artifacts that are potentially affected by a given set of changes to the system. In general,...
Code reviews are an essential part of quality assurance in Free, Libre, and Open Source Software (FLOSS) projects. However, finding a suitable reviewer can be difficult, and delayed or forgotten reviews are the consequence. Automating reviewer selection with suitable algorithms can mitigate this problem. We compare empirically six algorithms based on modification expertise and two algorithms based...
In this paper, we propose a low complexity algorithm to separate collided RFID signals. By carefully analyzing the collided signals when two tags with the same bit durations respond to a reader simultaneously, we observed that the individual amplitudes of each tag appear in pairs and the two tags' information bits are different, and regular RFID signals with larger amplitudes appear if the two tags'...
Abstract interpretation, symbolic execution, concolic testing and other techniques all require interpretation of a program. They all share common requirements for the interpreter, but also have their specialties. In this paper, we present a pragmatic interpreter framework that allows easy realization of all these use cases. This is possible because the interpreter supports arbitrary abstractions and...
We present a new fault localization algorithm, called Vautrin, built on an approximation of causality based on call graphs. The approximation of causality is done using software mutants. The key idea is that if a mutant is killed by a test, certain call graph edges within a path between the mutation point and the failing test are likely causal. We evaluate our approach on the fault localization benchmark...
This paper presents the cross layer network design of traffic management in terms of throughput, spectrum efficiency, congestion control, latency and prioritized Quality of Service (QoS) for broadband satellite network. Design aspects include queueing structure and algorithms for link layer multiplexing and queue servicing, flow control between Layer 2 and Layer 3, scheduling and QoS provisioning...
The problem of software fault-tolerance is described. The fault-tolerance problem is considered as hardware faults and software errors. The software errors classification is proposed. Authors describe the computational process as treelike directed graph. Errors are bringing in the realisation of the algorithm at the stage of programming. It is cause forming “real” algorithm instead of its “theoretical”...
We describe a security visualization tool for finding algorithmic complexity attacks in Java bytecode. Our tool, which we call J-Viz, visualizes connected directed graphs derived from Java bytecode according to a canonical node ordering, which we call the sibling-first recursive (SFR) numbering. The particular graphs we consider are derived from applying Shiver's k-CFA framework to Java bytecode,...
We present a dataflow based performance estimation and synthesis framework that will help hardware designers quantify the algorithm performance and synthesize their HW designs onto Field Programmable Gate Arrays (FPGAs). Typically, Digital Signal Processing (DSP) systems are designed by making gradual architectural choices in HW refinement steps. These decisions are based on performance quantification...
Content Based Image Retrieval has been one of the most popular topics in the computer vision literature. CBIR offers the opportunity to research from a huge multimedia database and with appropriate methods the relevant collections of images that have characteristics similar to the case(s) of interest. In the forensic field, CBIR has many possible uses in crime fighting and has also been investigated...
The paper deals with NP-hard optimization problems with the use of behavioral foundations of subject in nature. Swarm intelligent methods and algorithms are the most promising ones. Suggested algorithm is based on the simulation of bats' behavior. The authors concern a behavioral model of a bat — it moves within search space for the purpose of finding quasi-optimal solutions. Also there are represented...
Modern computing systems are hybrid in nature and employ various processing technologies that range from specific-to general-purpose processors. In co-design environments, specific-purpose processors, also known as hardware, work to support software implementations under general-purpose systems to create high-performance computers. Algorithms and computationally intensive tasks are partitioned among...
IC3 and k-induction are commonly used in automated analysis of infinite-state systems. We present a reformulation of IC3 that separates reachability checking from induction reasoning. This makes the algorithm more modular, and allows us to integrate IC3 and k-induction. We call this new method property-directed k-induction (PD-KIND). We show that k-induction is more powerful than regular induction,...
In software projects, there is a data repository which contains the bug reports. These bugs are required to carefully analyse and resolve the problem. Handling these bugs humanly is extremely time consuming process, and it can result the deleying in addressing some important bugs resolutions. To overcome this problem, researchers have introduced many techniques. One of the commonly used algorithm...
This paper presents the use of ZYNQ-7000 All Programmable SoC for flexible object recognition applications targeted for indoor mapping and localization. The architecture of the system is designed to provide the necessary infrastructure to support hardware software partitioning. Vivado HLS OpenCV libraries are used to synthesize the hardware for accelerating parts of the algorithms. Idea of identifying...
The biometric encryption system is a significant addition in the areas of privacy, security and convenience among its users. The intent of this research is to propose an RSA based biometric encryption system which can be realized on field programmable gate arrays (FPGAs) using hardware-software co-design methods. Due to the high number of hackers that stand to profit from sub-par security methods,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.