The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this talk, I'll revisit the role of Software in Software-Defined Networking and argue how not only control plane but also forwarding is becoming increasingly only a matter of software development. In short, I'll discuss how x86 is already on its way to transform the networking as we know it.
In academic courses of computer science and engineering, software project development holds maximum credits for students. Through these projects student learn various aspects of software development such as on hand practical exposure, time, effort as well as project management and corporate ethics. But the most important criteria or factor or parameter is that they learn how to work as well as coordinate...
Software maintenance is an integral post delivery activity that plays an important role in the client gratification. Service delivery is one of the key aspects of software maintenance. The quality of a maintenance activity can be assessed by the quality of service. Ticketing is the process used to manage service delivery. A number of tickets generated per year are in millions. The tickets are raw,...
In the near future, die-stacked DRAM will be increasingly present in conjunction with off-chip memories in hybrid memory systems. Research on this subject revolves around using the stacked memory as a cache or as part of a flat address space. This paper proposes MemPod, a scalable and efficient memory management mechanism for flat address space hybrid memories. MemPod monitors memory activity and...
Memory access latency has a significant impact on application performance. Unfortunately, the random access latency of DRAM has been scaling relatively slowly, and often directly affects the critical path of execution, especially for applications with insufficient locality or memory-level parallelism. The existing low-latency DRAM organizations either incur significant area overhead or burden the...
Organizations like Mozilla, Microsoft, and Apple are floodedwith thousands of automated crash reports per day. Although crash reports contain valuable information for debugging, there are often too many for developers to examineindividually. Therefore, in industry, crash reports are oftenautomatically grouped together in buckets. Ubuntu’s repository contains crashes from hundreds of software systemsavailable...
The emergence of telecommunication technologies, collaborative software environment and group support systems have developed the new opportunities for the software organization in the form of virtual teams in order to accomplish the development activities for the complex software projects. The use of virtual teams helps software organizations to get various benefits with respect to time, cost and...
Maintenance is a very important part of an organization management. It significantly helps to reduce the costs and fault times of the equipment. We developed an app for mobile devices on Android platform, which efficiently enables to apply a methodology of maintenance management classification in industrial practice (maintenance performance audit). Its aim is to assist with the maintenance management...
One of the most accepted tool for represent information in knowledge management application is the ontology. There are many theory describe for ontology development method but in a loosely instruction. This paper contributes the new method to develop ontology by using a structured model of the software requirement engineering process. We demonstrate that requirement engineering process can provide...
Production of engineering drawings have evolved from manual to Computer Aided Design (CAD), primarily for the speed and accuracy presented by CAD. Unlike modelling and simulation packages that are equipped with building blocks, CAD packages are generally supplied with no pre-drawn symbols. From best practices in industrial engineering and working for companies that make use of CAD systems, evidently...
Somewhat Homomorphic Encryption (SHE) schemes allow to carry out operations on data in the cipher domain. In a cloud computing scenario, personal information can be processed secretly, inferring a high level of confidentiality. Most practical Somewhat Homomorphic Encryption (SHE) schemes require the implementation of fast polynomial arithmetic, that is why hardware accelerators usually target the...
This paper present a software infrastructure for multiservice access solution based on S-OrBAC model and smartcard that allow benefiting from free or prepaid multiservice offered by big organizations. The authentication of users is made by the security features of the smartcard and the control of rights and attributes by a new variant S-OrBAC model based on the concept of service.
Security is often treated as secondary or a non- functional feature of software which influences the approach of vendors and developers when describing their products often in terms of what it can do (Use Cases) or offer customers. However, tides are beginning to change as more experienced customers are beginning to demand for more secure and reliable software giving priority to confidentiality, integrity...
A search system that allows the users to search and find the most interesting software artifacts based on the current context of the user is highly desirable. This paper sets forth the requirements of contextual search for software engineering. A context for software engineering is defined by four dimensions in. A contextual search system is presented to address the requirements. We conclude that...
In today's dynamic, fast world, many IT organizations are shifting their focus towards global software development to utilize every possible benefit across geography. This provides an opportunity for many practitioners across the globe to undertake an assignment for their betterment. Though, they undertake assignments with confidence, they face multiple challenge in the working environment to gain...
To maintain acceptable levels of security, organizations must manage their IT assets and related vulnerabilities. However, this can be a considerable burden because their resources are often limited. We have been working on a technique and system architecture that monitor the vulnerability of the IT assets on an organization's administrative networks. It uses identifiers of IT assets to locate vulnerability...
Accounting Information System (AIS) is a platform in which the core concepts of accounting, such as, recording, classifying, storing, safeguarding and interpreting data and reporting accounting information are performed by using various standardized and customized software for better financial control. A wide range of accounting software, such as, Tally, Troyee, AccPac, Oracle Applications, SAP, etc...
Data traffic on the Internet is growing continuously due to the high number of connected devices and increased number of applications and transactions performed online. To ensure information security, integrity and confidentiality, cryptography is applied over transmitted or stored data. Hence, even if an attacker capture data packets, its reading is hampered or not even possible. However, an attacker...
Dynamic Instance Queuing (DIQ) is a promising technique to optimize resource management during business process execution. It is domain-independent, does not require any predefined knowledge, and can be applied complementary to other optimization strategies. It represents a compromise between a non-optimized process execution and comprehensive business process redesign approaches which require a lot...
This work investigates how social bots can phish employees of organizations, and thus endanger corporate network security. Current literature mostly focuses on traditional phishing methods (through e-mail, phone calls, and USB sticks). We address the serious organizational threats and security risks caused by phishing through online social media, specifically through Twitter. This paper first provides...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.