The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The desire to understand mobile applications has resulted in researchers adapting classical static analysis techniques to the mobile domain. Examination of data and control flows in Android apps is now a common practice to classify them. Important to these analyses is a fine-grained examination and understanding of strings, since in Android they are heavily used in intents, URLs, reflection, and content...
A Call Detail Record (CDR) is a data record produced by telecommunication equipment consisting of detail of call transaction logs. It contains valuable information for many purposes of several domains such as billing, fraud detection and analytical purposes. However, in the real world, these needs face a big data challenge. Billions CDRs are generated every day and the processing systems are expected...
This paper discusses design and implementation of an operational architecture of practical work remote controlled using embedded systems. This architecture relates to university courses in electronics, such as new approaches of low-cost remote labs. Students can access these labs from a local network in the university at any time and frequently compared to conventional teaching, without being fixed...
Real-time surveillance is a vital component in any situation or environment where there is a high need of security for both personal and commercial property and assets. Technology today is used in many different ways in order to provide us such surveillance. An ideal solution for surveillance involves not only the assortment of necessary sensors and devices using appropriate tools, but also should...
Most common approach to detect security vulnerabilities is to scan code using vulnerability scanning software. This is either static analysis or dynamic analysis. Both approaches, when performed independently, have their own pros and cons. In order to protect software from attackers, vulnerabilities should be removed as early as possible. Detection of vulnerabilities in an application before its deployment...
Quality of service is the key indicator for service oriented architectures, because it directly expresses the operability and computational nature of the system. As such, we propose a quality evaluation framework for multi service multi functional hierarchical SOAP based web service. The overall interoperable quality is evaluated through load testing using Mercury Load Runner with Apache Tomcat web...
Experimenting in computer science course is challenging due to the limitation of site, equipment and special experiment tools. In this paper, based on the analysis of the experiments features of computer science curricula, such as, Principle of Computer Organization, Digital Image Process, Digital Signal Process etc., we design two kinds of virtual lab platforms and develop corresponding virtual lab...
Pairing-based cryptography have begun to draw attention ever since the work of Boneh and Franklin in 2001 proposing the first identity-based encryption scheme using bilinear pairings. In 2010, Tan et al. developed a pairing library that has running times that is as competitive as Pairing-Based Crypto (PBC) library. However, since Tan et al's pairing library was written in Java, it was not known to...
This paper discusses the problems and disadvantages users have to deal with when they attempt to use the Single Sign On mechanism, in conjunction with the Kerberos V5 protocol as a means of authenticating users on Linux based environments. Some known incompatibilities and Security problems are exposed for which, today, native Single Sign On in Kerberos is not a standard in Linux. Finally, the future...
We are moving towards a general public where web is the need of hour. Today the vast majority of the product applications executed, are composed as online applications which are keep running in a web program. Testing programming applications is critical. Numerous associations make utilization of a specific web application, so the same web applications are tried habitually by diverse clients from distinctive...
This paper describes the design and development of a Consumer Identity Module (CIM) system for use in the emerging ubiquitous consumer wireless world (UCWW). The CIM system includes a smart-card, a client application, and a server application. Inserted into an intelligent mobile terminal, the CIM card provides a trusted execution environment for mobile applications. The smart-card application maintains...
The paper presents a software system for newspaper distribution. The system contains a central server, an Android client application and a web application for data administration. Application data (customer database, distributor profiles, distributions, etc.) is managed by the system administrators using the web application. The application also generates statistics and provides opportunity to create...
Feature location is a critical step in the software maintenance process where a developer identifies the software artifacts that need to be changed in order to fulfill a new feature request. Much progress has been made in understanding the feature location process and in creating new tools to help a developer in performing this task. However, there is still lack of support for locating architectural...
Analyzed the current situation of mobile operation and maintenance management. Detail designed and implemented the mobile operation maintenance management system according to Java EE, SSH framework, Information push technology and Android development etc. It has important practical significance for the future of the work of mobile operation and maintenance management.
Debugging sessions require a methodical process of finding causes and reducing the number of software problems. During such sessions, developers run a software project, traversing method invocations, setting breakpoints, stopping or restarting executions. In these sessions, developers explore different parts of the code and create knowledge about them. When debugging sessions are over, it is likely...
Because of benefit from the strategy of open source and the strong ability of innovation, Android has become one of the most popular operating systems on mobile platform. While the explosive increase of mobile applications has leaded to several shortages in Android system, such as the limitations in hardware resources, complex and frequent updating of the applications. In this paper, we propose a...
This paper presents a web based system for remote monitoring and control of set-top boxes. The goal of the proposed system is to provide flexible control over set-top box from remote location, in order to enable test engineers, test technicians and developers to remotely access set-top box and execute different tests on it. By using the proposed system it is possible to save resources and shorten...
When developing multi-agent systems, the initial choice of deployment platform has a long-term impact on the project, as it many times restricts the architecture of agents, the communication protocols used, and the available services. The goal of this paper is to present the architecture of tATAmI-2.5, a framework that is able to integrate agents deployed using different environments, and communicating...
Few can deny the diverse applications of NoSQL Database technology today. The last decade has witnessed an exponential rise in not only data generation but also in the manipulation and management of the same. NoSQL Technologies have engendered a new platform for large enterprises to come up and have provided them a wide vista for data manipulation. Moreover, existing technologies have been augmented...
The continuation of Persistent Identifier Infrastructures is crucial when next-generation Internet architectures based on Information-Centric Networking (ICN) arise. When moving to ICN, we must ensure the resolution of Persistent Identifiers (PID), such as the billions of Digital Object Identifiers (DOI) used today, to provide continued access to scientific literature and research data. It provides...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.