The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Dynamic software updating (DSU) can upgrade arunning program on-the-fly by directly replacing the in-memorycode and reusing existing runtime state (e.g., heap objects) forthe updated execution. Additionally, it is usually necessary totransform the runtime state into a proper new state to avoidinconsistencies that arise during runtime states reuse amongdifferent versions of a program. However, such...
Quickly identifying and fixing code changes that introduce regressions is critical to keep the momentum on software development, especially in very large scale software repositories with rapid development cycles, such as at Google. Identifying and fixing such regressions is one of the most expensive, tedious, and time consuming tasks in the software development life-cycle. Therefore, there is a high...
Software-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based...
Software testing plays a major role for engineering future systems that become more and more ubiquitous and also more critical for every days life. In order to fulfill the high demand, test automation is needed as a keystone. However, test automation, as it is used today, is counting on scripting and capture-and-replay and is not able to keep up with autonomous and intelligent systems. Therefore,...
We present Catena, an efficiently-verifiable Bitcoinwitnessing scheme. Catena enables any number of thin clients, such as mobile phones, to efficiently agree on a log of application-specific statements managed by an adversarial server. Catenaimplements a log as an OP_RETURN transaction chain andprevents forks in the log by leveraging Bitcoin's security againstdouble spends. Specifically, if a log...
South African industry today need to utilise the available technology across disciplines to compete globally. One of the latest trends in the system integration field is to use virtual commissioning. Virtual commissioning allow the developer to validate the complete operation of new systems before anything materialise in the physical environment. It does not only allow operation verification but also...
Current networks have much limitations due to their rigidity, which is given by static configurations mainly based on commands or static scripts. The resource provisioning is less automatic and the efficiency decreases. Moreover, virtualization and cloud are changing radically the traffic patterns of the data center. This is mainly due to the communication between servers, because the applications...
as data size is growing up, cloud storage is becoming more familiar to store a significant amount of private information. Government and private organizations require transferring plenty of business files from one end to another. However, we will lose privacy if we exchange information without data encryption and communication mechanism security. To protect data from hacking, we can use Asymmetric...
Current networks have much limitations due to their rigidity, which is given by static configurations mainly based on commands or static scripts. The resource provisioning is less automatic and the efficiency decreases. Moreover, virtualization and cloud are changing radically the traffic patterns of the data center. This is mainly due to the communication between servers, because the applications...
Hardware-Assisted Flow Integrity extension (HAFIX) was proposed as a defense against code-reuse attacks that exploit backward edges (returns). HAFIX provides finegrained protection by confining return addresses to only target call sites in functions active on the call stack. We study whether the backward-edge policy in HAFIX is sufficient to prevent code-reuse exploits on real-world programs. In this...
The Technology is increasing day by day. Modern technology gives better solution to busy working people. Now a days, houses are equipped with variety of appliances like personal computer, switches, doorbells, Ovens, Televisions, LED lighting, Water heaters, HVAC (Heating, Ventilation, & Air Conditioning)etc. It becomes difficult to monitor all the appliances at a time. Sometimes if no one present...
With the constant increase of multimedia internet penetration as well as rapid spread and sharing of various information, people pay more and more attention to the information related to daily power utilization. In order to realize the interaction between power companies and power utilization information of users, the power companies apply and register their public accounts to establish their own...
The emerging technologies in IoT unveils various devices for the convenience of users, but comes with the price of streaming and processing a large amount of data for delivering useful and presentable results. Especially the multimedia content can be estimated as the most expensive to compute and distribute in IoT environments due to the data size and complexity of algorithms. This may cause bottlenecks...
the aims of this study is to analyze staff scheduling in the Hotel X in Kuwait, as well as, reducing waiting time in queue and developing effective customer service through finding the optimal employees schedule without hiring new staff. The study will be approached by building a simulation model using Arena in order to optimize employees scheduling within reception and housekeeping department during...
Many bugs in JavaScript applications manifest themselves as objects that have incorrect property values when a failure occurs. For this type of error, stack traces and log files are often insufficient for diagnosing problems. In such cases, it is helpful for developers to know the control flow path from the creation of an object to a crashing statement. Such crash paths are useful for understanding...
Although white-box regression test prioritization has been well-studied, the more recently introduced black-box prioritization approaches have neither been compared against each other nor against more well-established white-box techniques. We present a comprehensive experimental comparison of several test prioritization techniques, including well-established white-box strategies and more recently...
In the quest for energy efficiency of Information and Communication Technology, so far research has mostly focused on the role of hardware. However, as hardware technology becomes more sophisticated, the role of software becomes crucial. Recently, the impact of software on energy consumption has been acknowledged as significant by researchers in software engineering. In spite of that, measuring the...
Chaos Engineering is a discipline emerging from the practitioner community around experimenting on a distributed system in order to build confidence in the system’s capability to withstand turbulent conditions in production. This panel will bring together practitioners from a range of technology companies to discuss how they are running experiments on production systems in order to improve reliability.
We believe that software engineering should be taught in a hands-on way such as through a project-based capstone course where students apply the learned concepts in a real setting. However, such a teaching format can be challenging and time-consuming for instructors. In this paper we explain how we selected and introduced a set of metrics to improve the manageability of our large multi-project capstone...
Peer code review locates common coding rule violations and simple logical errors in the early phases of software development, and thus reduces overall cost. However, in GitHub, identifying an appropriate code reviewer for a pull request is a non-trivial task given that reliable information for reviewer identification is often not readily available. In this paper, we propose a code reviewer recommendation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.