The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper present some of the systems (main of them) for automated software creation/generation or the stages of its development, so and its documentation.
In recent years, a system that can flexibly accommodate and resolve difficulties is necessary for network service users because of the rapid development of information technology. Accordingly, agent-oriented computing, a technique for generating an agent that operates autonomously according to behavior knowledge, is receiving much attention. Various frameworks are used to develop and operate agent...
Apache Hadoop Map Reduce has been highly successful in processing large-scale, data-intensive batch applications on commodity clusters. However, for low-latency interactive applications and iterative computations, Apache Spark, an emerging in-memory processing framework, has been stealing the limelight. Recent studies have shown that current generation Big Data frameworks (like Hadoop) cannot efficiently...
In order to cultivate human resources with an advanced skill of software development, it is necessary to make the learner acquire the programming technology as the basis at an early point and with certainty. Programming education is conducted with a focus on exercise, and it is often the case that the result is made submitted as a report, in order to evaluate the degree of fixation for the knowledge...
Distributed computing, a paradigm often used for building business applications, enables a task to be performed by combining the efforts of multiple processes. The processes can be running at different locations, and on different types of computers. This paper gives an overview on the distributed computing problem in an integrated application environment. Based on this problem description, it gives...
Traditional Java Enterprise Edition(EE)-based application servers are powerful, but complex solutions requiring a comparably high administration effort and a steep learning curve to be used efficiently. However, e.g. For Java-based web development education a more easy-to-use platform is desired. In addition, to design a future PaaS cloud environment for education a lightweight, highly scalable and...
K-scope is a source code analysis tool with a graphical user interface for the performance tuning of Fortran programs. With K-scope, developers are able to visually understand the structures of their Fortran programs and estimate their performance. However, the original version of K-scope has two problems. First, it lacks the ability to integrate the results of source code analysis with performance...
We propose "Drip cast", a new server-less Java programming framework for billions of IoT (Internet of Things) devices. The framework provides a simple and easy way to develop device applications working with a cloud, that is, scalable computing resources on the Internet. The framework consists of two key technologies, (1) transparent remote procedure call (2) mechanism to read, write and...
A cross-terminal web system refers to a web system which can be accessed through various terminal platforms, including the web browsers on personal computers, the mobile applications on smart phones and so on. Traditional design of such a system usually uses XML data format and RPCful web services. There are some issues lying in this design such as the low efficiency of data exchange, the complex...
Web services are supported by a set of protocols that have been designed with the main goal of providing interoperable communication to applications. In typical business-critical services environments the occurrence of interoperability issues can have disastrous consequences, including direct financial costs, reputation, and client fidelity losses. Despite this, experience suggests that interoperability...
The Internet-based Electrical Engineering Lab (iEELab) of Zhejiang University is a hybrid network laboratory which provides users with both physical and virtual experimental mode. For the further integration of iEELab's platform resources, a management system is designed to unify the physical and virtual experiment platforms. The management system is structured in a layered pattern, and implemented...
The progressive transition in the nature of both scientific and industrial datasets has been the driving force behind the development and research interests in the NoSQL data model. Loosely structured data poses a challenge to traditional data store systems, and when working with the NoSQL model, these systems are often considered impractical and expensive. As the quantity of unstructured data grows,...
Web Services are a set of technologies designed to support the invocation of remote services by client applications, with the key goal of providing interoperable application-to-application interaction while supporting vendor and platform independence. The goal of this work is to study the real level of interoperability provided by these technologies through a massive experimental campaign involving...
Mobile applications are getting more and more sophisticated and demanding. Although the processing, memory, and storage resources of mobile devices are constantly increasing to enable such resource-demanding mobile applications, battery capacity is still the main limiting factor. To solve this problem, mobile code offloading approaches can be used to offload parts of a mobile application to remote...
In Web applications, it is often needed to upload a file to the server. With current file upload methods, it is difficult to deal with large file uploaded and user experience is also bad. This paper introduces the principles and methods of files upload in the IIS environment and Java EE environment in detail. The FileList interface, Blob interface, File interface and FileReader interface in HTML5...
The SSL man-in-the-middle attack uses forged SSL certificates to intercept encrypted connections between clients and servers. However, due to a lack of reliable indicators, it is still unclear how commonplace these attacks occur in the wild. In this work, we have designed and implemented a method to detect the occurrence of SSL man-in-the-middle attack on a top global website, Facebook. Over 3 million...
Industrial control computers can be connected to the Internet, and equipped with a Web interface. This enables access to process data from any computer with a set of common web-related software applications. This paper deals with laboratory exercises performed as a part of courses regarding process control computers, which include tasks dealing with this topic. Integration of Java and HTML technologies...
With the trend of mobile enterprise information systems, security has become the primary issue as it relates to business secret, decision, and process control. Hence, we carry out a fully customized framework to emphasize on security from trust authority of the cloud certificate authority server, and to guarantee security with the process of the software developments. The core object model, named...
This paper studies the method of how the Android Application and the web page script controls each other to catch the RFID real-time data and to produce an event. Using web application data interaction based on the complex event processing mechanism to drive the manufacturing execution system. This mechanism is using the terminal and the server computing resources for their own complex event processing...
“Big Data” is data whose scale, distribution, diversity, and/or timeliness require the use of new technical architectures and analytics to enable insights that unlock new sources of business value. It requires new data architectures, analytic sandboxes, new tools, new analytical methods, integrating multiple skills into new role of data scientist. Organizations are deriving business benefit from analyzing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.