The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As websites have become bulkier and serve more larger files to end users, it has become harder for the HTTP/1.1 protocol to provide adequately short page load times. The HTTP protocol, in its previous versions, is a generic stateless application protocol most often used for distributed, collaborative, hypermedia information systems. The newest version, HTTP/2, introduced an updated protocol feature...
Program dependency artifacts such as call graphs help support a number of software engineering tasks such as software mining, program understanding, debugging, feature location, software maintenance and evolution. Java Enterprise Edition (JEE) applications represent a significant part of the recent legacy applications, and we are interested in modernizing them. This modernization involves, among other...
Dynamic software updating (DSU) can upgrade arunning program on-the-fly by directly replacing the in-memorycode and reusing existing runtime state (e.g., heap objects) forthe updated execution. Additionally, it is usually necessary totransform the runtime state into a proper new state to avoidinconsistencies that arise during runtime states reuse amongdifferent versions of a program. However, such...
There is a large body of work in the literature about automatic unit tests generation, and many successful results have been reported so far. However, current approaches target library classes, but not full applications. A major obstacle for testing full applications is that they interact with the environment. For example, they access files on the hard drive or establish connections to remote servers...
While the Java runtime is installed on billions of devices and servers worldwide, it remains a primary attack vector for online criminals. As recent studies show, the majority of all exploited Java vulnerabilities comprise incorrect or insufficient implementations of access-control checks. This paper for the first time studies the problem in depth. As we find, attacks are enabled by shortcuts that...
This research paper is a study on trade-off of using Java to create cluster capable of achieving high-performance computing. Here we have made a distributed computing architecture in Java using Low-level API implementations. Time is crucial in any field of work. We value fast and optic results. Creating cluster base through traditional method using C, C++ or FORTAN programming language can be tedious,...
In today's world data is growing very rapidly, which we call as big data. To deal with these large data sets, currently we are using NoSQL databases, as relational database is not capable for handling such data. These schema less NoSQL database allow us to handle unstructured data. Through this paper we are comparing two NoSQL databases MongoDB and CouchBase server, in terms of image storage and retrieval...
Web developers generally prefer coding in dynamically compiled or scripting languages, such as Java and JavaScript, because those languages allow them to deploy applications quickly to deliver new features and bug fixes in a timely manner. In this paper, we compared the Go language, a popular statically compiled language, with two dynamically compiled languages, JavaScript and Java. We evaluated the...
Data stores are typically accessed using a clientserver paradigm wherein the client runs as part of an application process which is trying to access the data store. This paper presents the design and implementation of enhanced data store clients having the capability of caching data for reducing the latency for data accesses, encryption for providing confidentiality before sending data to the server,...
To advance Java programming educations, we have developed the Java programming learning assistant system (JPLAS) that can verify the correctness of the code from a student automatically using the test-driven development (TDD) method. Then, to register a new assignment in JPLAS, teachers are required to write the test code in addition to the reference source code. Unfortunately, most teachers at schools...
Recently, Software Defined Network (SDN) technology has become widely used to take advantage of its features, including capabilities for optimization, flexibility, and customization. Many companies and organizations are applying this technology to build SDN networks for testbeds or production networks to address their requirements for optimization and customization. Currently, north bound and south...
In this epoch of growing technology the data collected by organizations has the requirement to preserve the privacy of the individuals. The techniques like anonymization, randomization are used to achieve the goal. But unfortunately anonymization leads to certain level of information loss while preserving privacy. Due to drift of data over the centralized server has added to the more demand of preserving...
Exception handling is a powerful tool provided by many pro- gramming languages to help developers deal with unforeseen conditions. Java is one of the few programming languages to enforce an additional compilation check on certain sub- classes of the Exception class through checked exceptions. As part of this study, empirical data was extracted from soft- ware projects developed in Java. The intent...
Exception handling is a technique that addresses exceptional conditions in applications, allowing the normal flow of execution to continue in the event of an exception and/or to report on such events. Although exception handling techniques, features and bad coding practices have been discussed both in developer communities and in the literature, there is a marked lack of empirical evidence on how...
This demonstration is a proof of concept for the design of secure IoT frameworks using Secure Elements as trusted TLS/DTLS stack. It presents a connected plug built over a cheap Raspberry Pi board, whose data exchanges over TCP/IP are controlled by a javacard providing TLS server services. In a smart grid context it could be used by energy operators in order to authorize/monitor battery charging.
The Web has become an indispensable part of our society and is currently most commonly used mode of information delivery. Millions of users access the free services provided by the websites on daily basis and while providing these free services websites track and profile their web users. In this environment, the ability to track users and their online habits can be very lucrative for advertising companies,...
The software puzzle scheme counters resource-inflated Denial-of-Service (DoS) attacks by requiring each client connecting to the server to correctly solve a cryptographic puzzle before a connection can be established. It is specifically designed to thwart attempts at utilizing high-performance Graphic Processing Units (GPUs) to cut down solution time, by dynamically and randomly generating the puzzle...
Java applications form an important class of applications running in the data center and in the cloud. They may perform better when more memory can be used in the heap, as the time spent in garbage collections is reduced. However, when ample CPU is available and memory is tight, such Java applications may do well with a smaller heap as it can absorb the cost of more garbage collections. In the cloud,...
From 2004 to 2016 the Leipzig Linguistic Services (LLS) existed as a SOAP-based cyberinfrastructure of atomic micro-services for the Wortschatz project, which covered different-sized textual corpora in more than 230 languages. The LLS were developed in 2004 and went live in 2005 in order to provide a webservice-based API to these corpus databases. In 2006, the LLS infrastructure began to systematically...
The research background of management system of Hainan Li brocade pattern gene database and the meaning of Li ethnic cultural inheritance were introduced in the paper. And the overall structure of management system of Hainan Li brocade pattern gene database was introduced also. The functional implementation of modules in the system was elaborated, such as: the design of the data table structure, add,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.