The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Peer code review locates common coding standard violations and simple logical errors in the early phases of software development, and thus, reduces overall cost. Unfortunately, at GitHub, identifying an appropriate code reviewer for a pull request is challenging given that reliable information for reviewer identification is often not readily available. In this paper, we propose a code reviewer recommendation...
Due to their complexity, currently available bounded model checking techniques based on Boolean Satisfiability and Satisfiability Modulo Theories inadequately handle non-linear floating-point and integer arithmetic. Using a numerical approach, we reduce a bounded model checking problem to a constraint satisfaction problem. Currently available techniques attempt to solve the constraint problem but...
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify. Obfuscation techniques are divided in code and data obfuscation, depending on the protected asset. While preliminary empirical studies have been conducted to determine the impact of code obfuscation,...
This paper details the process to inject and measure the understanding of student's knowledge and application of software coding standards. As with most other educational processes, consistent repetition enforces the learned concept. This process and techniques to reinforce the use of coding standards can be applied from freshman through graduate level embedded software courses.
In this paper, we propose a low complexity algorithm to separate collided RFID signals. By carefully analyzing the collided signals when two tags with the same bit durations respond to a reader simultaneously, we observed that the individual amplitudes of each tag appear in pairs and the two tags' information bits are different, and regular RFID signals with larger amplitudes appear if the two tags'...
Precise reasoning for floating-point arithmetic (FPA) is as critical for accurate software analysis as it is hard to achieve. Several recent approaches reduce solving an FPA formula f to reasoning over a related but easier-to-solve proxy theory. The rationale is that a satisfying proxy assignment may directly correspond to a model for f. But what if it doesn't? Prior work deals with this case somewhat...
In this paper we present a real-time streaming demonstration with a multi-layer architecture of a pipelined software High Efficiency Video Coding (HEVC) encoders with inter-layer prediction enabling Scalable HEVC (SHVC) encodings. This SHVC encoder is implemented on an innovative platform performing real-time encodings that already demonstrated promising performance with HDR, HFR and SHVC implementation...
NoSQL databases like Redis, Cassandra, and Mon-goDB are increasingly popular because they are flexible, lightweight, and easy to work with. Applications that use these databases will evolve over time, sometimes necessitating (or preferring) a change to the format or organization of the data. The problem we address in this paper is: How can we support the evolution of high-availability applications...
An increase in the amount of program code used in the firmware of electronic control units (ECUs) in vehicles has led to an increase in updates after sales to resolve bugs in the program code. In this situation, automakers are beginning to introduce over-the-air firmware update technology currently used in the mobile phone industry. We developed an incremental update method based on BSDiff and demonstrated...
In the paper, we describe the extensions of the 3D-HEVC compression technology aimed at improved compression efficiency for multiview sequences acquired from arbitrarily located cameras. Our proposal refines the inter-view prediction by replacing the horizontal shifts with the true mapping in the 3D space. This implies changes in several coding tools, which we describe in details. The paper also reports...
The design of programming tools is slow and costly. To ease this process, we developed a design pattern catalog aimed at providing guidance for tool designers. This catalog is grounded in Information Foraging Theory (IFT), which empirical studies have shown to be useful for understanding how developers look for information during development tasks. New design patterns, authored by members of the research...
Recent research has reported numerous studies bringing into question the gender inclusiveness of many kinds of software. Inclusiveness of software (gender or otherwise) matters because supporting diversity matters — it is well-known that the more diverse a group of problem-solvers, the higher the quality of the solution. To help software creators identify features within their software that are not...
We describe the design and a trial run of an integrated course of instruction in reading, writing, and computer programming, in order to assess potential synergies of learning them together. Twelve pre-teen students diagnosed with dyslexia each took a sequence of lessons of approximately 90 minutes each over a 3-month period. In addition to computer learning activities in handwriting, word reading,...
We present TACCLE3 — Coding European Project (Ref. 2015-1-BE02-KA201-012307) in the XVIII International Symposium on Computers and Education — SIIE 2016, held within the V Congreso Nacional de Informática — CEDI 2016 in the University of Salamanca, Spain, September 14th–16th, 2016. One of the sessions was devoted to Computational Thinking topic and TACCLE3 was selected to open this session. Taccle3...
Founding proper reading and comprehension abilities of the Arabic written text is of great significance for learners of the language since this is a means for extracting the linguistic and cultural knowledge. This process is complex in Arabic since the script is interwoven and multiple segments can be fused to create a single word which in return complicates identifying word units for new learners...
In the context of motion estimation (ME) for video coding, the rate-constrained successive elimination algorithm (RC-SEA) safely eliminates candidate motion vectors while preserving the optimal candidate chosen by the block matching algorithm (BMA). This paper describes a technique for reusing ME information from rectangular to square prediction units in order to reduce the search area without altering...
Spatio-temporal desynchronization remains a major challenge for watermarking system as it could impair the detection of the hidden payload. Over the years, several (non-blind) registration techniques have been proposed to realign the analyzed content prior to watermark detection and thereby achieve robustness against severe attacks such as display-and-camcord. Such techniques rely on assumptions that...
Complex software appliances can be deployed on hardware with limited available computational resources. This computational boundary puts an additional constraint on software applications. This can be an issue for real-time applications with a fixed time constraint such as low delay video encoding. In the context of High Efficiency Video Coding (HEVC), a limited number of publications have focused...
The High Efficiency Video Coding (HEVC) standard enables meeting new video quality demands such as Ultra High Definition (UHD). Its scalable extension (SHVC) allows encoding simultaneously different versions of a video, organised in layers. Thanks to inter-layer predictions, SHVC provides bit-rate savings over an equivalent HEVC simulcast encoding. Therefore, SHVC seems a promising solution for both...
Incongruity between emotional experience and its outwardly expression is one of the prominent symptoms in schizophrenia. Though widely reported and used in clinical evaluation, this symptom is inadequately defined in the literature and may be confused with mere affect flattening. In this study we used structured-light depth camera and dedicated software to automatically measure facial activity of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.