The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For security, management and accounting, network administrators benefit from knowledge of IP and MAC address bindings. In IPv6, learning these bindings is not as straightforward as it is in IPv4. This paper presents a new approach to track IPv6 address assignments in LANs. The method is based on a study of implementation of IPv6 (mainly neighbor discovery) in current operating systems. The detection...
As a deterministic parallel programming language that guarantees safety of parallel executions, EFL was designed to allow the embedding of parallel code blocks into a sequential host language program. An EFL pre-compiler, which is described here, has been implemented that translates EFL blocks into the host language. The EFL pre-compiler and runtime supports parallel building blocks such as parallel...
The Agents of Things is an extension of the Internet of Things concept in which objects or things are embedded with self-reasoning intelligent software agents to provide value-added services to humans. However, a particular difficulty in designing intelligent things for the Agents of Things implementation is to determine the level of reasoning ability that corresponds to the functions of the things...
There are many applications where some property of an array of values has to be evaluated and some overall characteristic determined. As an example we can mention the calculation the sum of an array of bytes. Simple and naive approach is to iterate through the elements of the array one by one and add the values into some accumulator variable. Such approach is valid for simple computer architectures...
Wearable devices are a new form of mobile computer system that provides exclusive and user personalized services. Wearable devices bring new issues and challenges to computer science and technology. This paper summarizes the development process, current situation and important software research issues of wearable devices.
In this paper the distributed software environment called Conan dedicated to numerical computing is presented. The environment provides mechanisms for running separate units of execution and communication between them. It is written in C++ and can work both on Linux and Windows systems. Thanks to its versatility, Conan can be used to build complex distributed computing systems. It was created for...
In his seminal work on file system forensic analysis, Carrier defined the notion of essential data as "those that areneeded to save and retrieve files." He argues that essential data is therefore more trustworthy since it has to be correctin order for the user to use the file system. In many practical settings, however, it is unclear whether a specific pieceof data is essential because either...
We report on our development of a new course: Introduction to Performance Measurement, Modeling and Analysis (IPMMA). The first offering was in Fall 2014, with a second offering in Winter 2015 in finals week at this writing. The course focuses on the fundamentals of measuring, analyzing, and modeling computer performance. As we cover the basics we will move through a set of case studies, allowing...
In this paper, we propose model driven software development and Security Performance Framework Model to maintain the balance between security and performance for web applications. We know the large scale enterprise web applications are naturally complex and rigid to maintain. To deal with this complexity of web applications, we propose OMG's UML modeling language for forward engineering and SPF based...
The world has evolved so quickly in the field of information and technology, especially in those parts that include computer engineering. Operating systems are a very big proof that demonstrates this evolution. We were very interested in the treatment of this theme starting from the curiosity on how deadlocks perform in different OS, especially in Windows and Linux. As we know deadlocks are a very...
An operating system has some rules that control the execution of processes. These rules are called the scheduling algorithms. Scheduling algorithms make the organization and management of resources in a hardware. Two of these algorithms are round robin and priority scheduling. In this paper we will stimulate the logic of these algorithms with two simple programs written in c language.
This paper presents a "MP3 Player", application that was modeled and developed to run on Windows 7 operating system in order to "play" music in MP3 format responding to voice commands. This feature allows the end software can be used to assist people with disability to use the input devices such as keyboard or mouse.
Honeynet represents a new strategy in defending the computer networks and systems against unauthorized access or hacking attempts. Not only it can detect and display the attack pattern or the tools utilized, it can also help in eliminating access to real systems by representing an emulation of the physical systems and services present within the network, thus delaying or confusing the intruder. In...
Due to the ever increasing growth rate of malwares, Memory Forensics has become unavoidable in a cyber crime investigation. This is because physical memory may contain crucial information that is available nowhere in the system hard disk. Memory Forensics deals with collection of forensically sound evidence from physical memory content of Suspect's system. This is a fast growing and challenging field...
Most approaches towards automatic evaluation of free text answers are keyword centric. Though keywords essentially reflect and represent the primary concept coverage of an answer, they are incomplete without the associated texts. The words occurring before and after the keywords bring out the true meaning. The work presented in this paper proposes a semantic similarity based approach for evaluation...
European Space Agency (ESA) has recognized Integrated Modular Avionics (IMA) and ARINC specification 653 (ARINC 653) as a reference avionics computer for space application. IMA reduces the space by integrating a system composed of many electronic devices into a computer. Recent researches have been studying how to apply the ARINC 653 into an open source operating system, such as Linux. These studies...
The use of Project Based Learning has spread widely over the last decades, not only throughout countries but also among disciplines. One of the most significant characteristics of this methodology is the use of ill-structured problems as central activity during the course, which represents an important difficulty for both teachers and students. This work presents a model, supported by a tool, focused...
This study explores the opinions and experiences of five Mac-using students in a first-year engineering program where Windows-based personal computers (PCs) are requisite. These students have circumvented the restrictive departmental policies which solely support Windows-based PC systems and which (as of this writing) clearly identify the lack of technical support for Mac users. Tablet PCs were the...
This article briefly describes the development of our country's new scientific direction -- the "programming automation", and recounts the most significant developments of programming languages, compilers and operating systems. Special attention is paid to the development of automating the or biter's "BURAN" on-board software, as well as the software for testing and prelaunch of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.