The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In modern networks, faults in the network state, e.g., loops, black holes and access control violations that make services unavailable, arise commonly. To ensure networks' correctness, existing approaches verify network-wide invariants. However, these approaches cannot detect or prevent faults immediately as they arise, so that network performance is not affected. In this paper, we present a data...
Historically, software security has approached the development of cryptographic software merely as a feature to be added. This stance did not have a positive influence on the design of advanced security functionalities into modern software. Thus, this work proposes a methodology for development of secure cryptographic software, providing a structured way to approach cryptography into secure development...
Feature modeling is of paramount importance to capture variabilities and commonalities within a software product line. Nevertheless, current feature modeling notations are limited, representing only propositional formulae over attributed variables. This position paper advocates the extension of feature modeling formalisms with richer computational domains and relational operations. In particular,...
Recently, Java has been educated in many universities and professional schools due to reliability, portability, and scalability. However, because of its limited time in Java programming courses, coding rules are rarely educated. As a result, codes made by students become far from readable codes. In this paper, we propose a coding rule learning function using static code analyzers in Java Programming...
Gamification and in particular game-based learning is significantly gaining ground during the latest decades. It expresses a different approach to education that is mixing education with gaming, aiming to enhance the learning experience with game mechanics and rules and to provide stronger motivations for lifelong learning. Many works have illustrated the benefits of learning while playing. This work...
It is well known that the conventional ways to capture the light around us are limited and thus provide a limited user experience, notably in terms of parallax capabilities. As this has been preventing 3D systems to explode in the market, significant advances are emerging in terms of light capturing technologies among which is relevant to highlight the socalled light field cameras which capture a...
In this paper, we investigate if a computer-supported collaborative brainstorming environment for programming design can promote students' creativity. We developed a web-based learning environment to foster the competence of innovation, one of the essential competencies required for today's software development. The proposed system includes the modules of creative thinking skills and instructional...
With the increase of network bandwidth and the popularity of Internet, cloud storage has become one of the most widely used of cloud computing. Since the user may have a variety of terminal such as PC, notebook computers, tablet PCs and smart phones, and may access data in different places and on different terminal, cloud storage provides the most suitable solution to share data between these devices...
Model driven development has become a key practice in software engineering field due to its nature of complexity reduction and comprehensive structure-based development approach. In addition to it, automated tools for UML modeling are becoming popular within engineers and the tools which provide an additional feature of forward and reverse engineering are the basic prerequisite for many organizations...
Erasure code based object storage systems are becoming popular choices for archive storage systems due to cost-effective storage space saving schemes and higher fault-resilience capabilities. Both erasure code encoding and decoding procedures involve heavy array, matrix, and table-lookup compute intensive operations. With today's advanced CPU design technologies such as multi-core, many-core, and...
Computer Assisted Qualitative Data Analysis Software (CAQDAS) may be defined as tools that help researchers developing qualitative research projects. These software packages help the users with tasks such as transcription analysis, writing and annotation, coding and text interpretation, recursive abstraction, content search and analysis, discourse analysis, data mapping, grounded theory methodology,...
The versatility and cost of embedded systems have made it ubiquitous. Such wide-application exposes an embedded system to a variety of physical threats like side-channel attacks (SCA) and fault attacks (FA). Recently, a couple of software encoding schemes were proposed as a protection against SCA. These protection schemes are based on dual-rail precharge logic (DPL), previously shown resistant to...
Intra picture coding using HEVC is very efficient and is applied to video as well as single image compression. However, the cost for this high compression efficiency is the complexity caused by the high number of 35 available coding modes. Existing methods for fast mode decision estimate the mode costs based on the prediction error samples. This paper proposes a smart method to exclude the 33 angular...
We present a new class of covert channels which can be created by utilizing common hardware but that cannot be detected by such. Our idea is to abuse anti-EMI features of a processor to create a covert channel on the physical layer. Thus, the sender uses the invariants in how digital signals are encoded over analog channels to covertly transport information. This leaked data is present on the wire...
In this paper we present a model Cyber Security course primarily designed to address the educational and training needs for developing secure software intensive systems. The course is designed, within a Computer Science curriculum, to satisfy the national requirements of the Information Assurance Workforce Improvement Program (per DoD8570.01-Mfrom 11.10.2015), for Tiers II and III jobs, primarily...
As the Smart Grid becomes highly interconnected, the power protection, control, and monitoring functions of the grid are increasingly relying on the communications infrastructure, which has seen rapid growth. At the same time concerns regarding cyber threats have attracted significant attention towards the security of power systems. A properly designed security attack against the power grid can cause...
We have observed students teams on a software engineering project course to understand what software engineering practices they end up using and how do they experience the usefulness of the selected practices and tools. In our context, the most often applied practices and tools were planning meeting, commitment to using tasks, self-selected communication tools, a revision control, and project management...
We present our findings after two years of experience involving three instructors using an "athletic" approach to software engineering education (AthSE). Co-author Johnson developed AthSE in 2013 to address issues he experienced teaching graduate and undergraduate software engineering. Co-authors Port and Hill subsequently adapted the original approach to their own software courses. AthSE...
Complex software appliances typically consist of multiple software processes running concurrently to exploit the available computational resources in the hardware. However, the computational complexity of these software processes is often variable and the processes can interfere with each other. This can be an issue for real-time applications with a fixed deadline like low delay video encoding. In...
We present an overview of the MPEG activity on Point Cloud Compression (PCC). This activity aims to satisfy the growing need for lossless and lossy PCC in industry. It follows recent advances in consumer electronics in 3D reconstruction and capturing. We present the preliminary architecture, test datasets and the test model reference software implementation. Contributions beyond the state of the art...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.