The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work is devoted to the multicollision attacks analysis. Known methods of the multicollision attacks counteraction are considered and main trends of these methods development are determined. Methods of data blocks bonding and hash constructions for their implementation are proposed. Theoretical infeasibility analysis of constructions based on these methods is performed and it is shown, that for...
This contribution to IDAACS2013 is in some sense a continuation of the talk in Prague in 2011. It presents some developments that were elaborated in the meantime (chapter II), but also some totally new ideas (chapter III). In chapter II it is shown that PERT systematically underestimates the real risk. Therefore it is very dangerous to rely on PERT's results. Chapter III deals with the buffers of...
Human posture recognition is gaining increasing attention in the field of computer vision due to its promising applications in the areas of personal health care, environmental awareness, human-computer-interaction and surveillance systems. Human posture recognition in video sequences is a challenging task which is part of the more general problem of video sequence interpretation. This paper presents...
Knowledge Representation is a part of Artificial Intelligence that focuses on the formalism design. The knowledge about a specific domain is expressed epistemologically and computationally. One of the main reasons for this is that knowledge must be represented so as to easily identify the structure and characteristics of classes and the relationship among them. This paper will focus on the systematic...
In this paper, we present an automatic marking system for marking interactive exercises related to heuristic search algorithms. It aims to assist tutors in assessing the performance of students and reduce the workload associated with their marking task. Also, it provides individualized and immediate feedback to the students. Automatic marking is achieved in two stages. First, the system compares a...
The paper presents extensions to the standard version of genetic programming. Concepts concerning contexts and context blocks as well as their possible applications are discussed. It is shown how these concepts can be utilized to implement a novel approach to modular genetic programming based on modules stored with the abstract syntax tree, but also attached to nodes that call them (Node-attached...
Intelligent robot cooperation tasks have very complex decision-making and computational processes. Collecting and calculating with a high amount of data is one of the weakest point of such system. In addition all of these it is necessary to process in real-time with limited computational capacity. In this paper we propose some novel algorithms for coping with these problems and give some information...
Cloud infrastructure becomes the primary business environment for all types of enterprises during recent years. In cloud computing security is a fundamental concern, loss of control and potential lack of trust prevent large set of potential customers to immerse in the cloud world. One of the major key problem is how one can test, monitor or measure the underlying Cloud infrastructure from user/customer...
The widespread deployment of mobile communications and the Internet in the 1990s accelerated a convergence process based on common digital technology. Telecommunications and the Internet are increasingly forming an integrated system for processing, storing, accessing and distributing information and managing content. Recently the content space is expanding by cognitive and sensory contents, media...
In the presentation major difficulties of designing neural networks are shown. It turn out that popular MLP (Multi Layer Perceptron) networks in most cases produces far from satisfactory results. Also, popular EBP (Error Back Propagation) algorithm is very slow and often is not capable to train best neural network architectures. Very powerful and fast LM (Levenberg- Marquardt) algorithm was unfortunately...
Jump oriented programming is one of the most up-to-date form of the memory corruption attacks. During this kind of attack the attacker tries to achieve his goal by using library files linked to the binary, without the placing of any own code. To execute attacks like this, a dispatcher gadget is needed which does the control by reading from a given memory part the address of the subsequent command...
Requirement Engineering is now established is the most critical phase in software engineering and development due to the fact that success or failure of any project depends greatly on wise and correct decisions made and strategies adopted during this phase. However, the great irony is that most of the requirement engineering still relies on outdated, manual and flawed strategies of past decades. The...
The RAISE'13 workshop brought together researchers from the AI and software engineering disciplines to build on the interdisciplinary synergies which exist and to stimulate research across these disciplines. The first part of the workshop was devoted to current results and consisted of presentations and discussion of the state of the art. This was followed by a second part which looked over the horizon...
We present a summary of the 3rd ICSE Workshop on Games and Software Engineering: Engineering Computer Games to Enable Positive, Progressive Change in this article. The full day workshop is planned to include a keynote speaker, panel discussion, and paper presentations on game software engineering topics related to requirements specification and verification, software engineering education, re-use,...
Requirements change management is a vital activity of the software development and even after maintenance. When we change one requirement it effects the other requirements of the system. A proper impact analysis maintains a repository of changing requirement, reusing previous experiences and reduces rework effort, is also essential for better requirement change management. There is also a need of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.