The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Science is conducted collaboratively, often requiring knowledge sharing about computational experiments. When experiments include only datasets, they can be shared using Uniform Resource Identifiers (URIs) or Digital Object Identifiers (DOIs). An experiment, however, seldom includes only datasets, but more often includes software, its past execution, provenance, and associated documentation. The Research...
Text password is a very common user authentication technique. Users face a major problem, namely that of managing many site-unique and strong (i.e. non-guessable) passwords. One way of addressing this is by using a password generator, i.e. a client-side scheme which generates (and regenerates) site-specific strong passwords on demand, with minimal user input. This paper gives a detailed specification...
Nowadays multiple bus communication types are comprehensively employed to construct different networks in vehicles information system design. Data interchange among these networks must be conducted through complex communication gateways, which are difficult to test all the features wholly by manual work. MIC and RS422 communication networks are very common in some special vehicles, so in this paper...
This article describes the use of the comparison method MM to protect the Internet user from the effects of DNS Injection attacks. A description of the basic concepts of this area of the computer network and the dangers of DNS Injection attacks is presented. The description of the MM method used in the literature is concluded. In the paper the concept of using above-mentioned method to protect Internet...
Contemporary tools aimed at information system (IS) development often use models to generate system implementation. Starting from an IS model, these tools commonly generate database implementation schema as well as code for generic CRUD operations of business applications. On the other hand, at the level of platform-independent models (PIMs) there is a lack of support for specification of more complex...
Interface-based design methodologies and tools using machine-readable metadata have been in use for many years; however, a lot of manual effort is still needed to gather module information, especially when the SoC and modules are being co-designed. It is a time-consuming and error prone challenge made more difficult by increasing SoC complexity. Various efforts to address these issues with document-based...
Mobile Broadband (MBB) Networks are evolving at a fast pace, with technology enhancements that promise drastic improvements in capacity, connectivity, coverage, i.e., better performance in general. But how to measure the actual performance of a MBB solution? In this paper, we present our experience in running the simplest of the performance test: "speedtest-like" measurements to estimate...
This paper discusses the role of safety, availability, dependability of Internet of Things (IoT) data services dedicated to the monitoring and control of objects in the physical world. These services are designed to be available to devices and users on request at any time and at any location. The Internet of Things differs from today's global Internet in a number of ways. For instance, the networks...
The article considers the most popular methods of data collection from socially oriented websites. There were reviewed specialized software for information search and analysis from social networks. Advantages and disadvantages of manual social network analysis as well as automated software are shown. Main stages of socially oriented websites analysis using API and source code analysis are described.
This article considers problems of distributed database structure development connected with presenting similar data in different nodes. It is suggested to use the results of users SQL-queries parsing for optimizing DB structure in order to increase local requests and synchronization speed.
This paper describes the dynamic seminar management system named “e-Sem”, developed according to the open-source software philosophy. Due to its dynamic management functionality, it can equally adapt to any education environment (Primary, Secondary, Tertiary). The purpose of the proposed dynamic system is ease of use and handling, by any class of users, without the need of special guidance. Also,...
The Kansas City National Security Campus (KCNSC) collects a large amount of test data used to accept high value and high rigor product. Data has been used historically to support root cause analysis when anomalies are detected in down-stream processes (bottom portion of Fig. 1). The opportunity to use the data for predictive failure analysis however, had never been exploited (top portion of Fig. 1)...
Memory and logic integration on the same chip is becoming increasingly cost effective, creating the opportunity to offload data-intensive functionality to processing units placed inside memory chips. The introduction of memory-side processing units (MPUs) into conventional systems faces virtual memory as the first big showstopper: without efficient hardware support for address translation MPUs have...
The paper presents the application of the RFID technology in the international system of the European Union (EU) border control. The proposed architecture consists of computerized portable units (equipped with specialized devices for data acquisition) carried by border officers and the server cloud infrastructure. Among other details of the proposed system (such as QR codes or images of people trying...
During research analysis of connection problems was made. It has been studied and determined the relationship between theory and graph analysis of social networks. Database was created. Betweenness centrality and centrality was used in prototype.
Intensive development of information systems has led to an increase in malicious software, which is associated with the emergence of new types of cyber attacks. Expanding impact of cyber attacks aimed at a variety of resources information system initiates creation of special countermeasures that can be effective in the emergence of new types of threats from unknown or ill-defined properties. There...
Continuous Integration (CI) and Continuous Delivery (CD) are widespread in both industrial and open-source software (OSS) projects. Recent research characterized build failures in CI and identified factors potentially correlated to them. However, most observations and findings of previous work are exclusively based on OSS projects or data from a single industrial organization. This paper provides...
The current state of the problem of distributed attacks aimed at denial of service is investigated, the last DDoS attacks are monitored. The most popular type of DDoS attacks continues to be httpflood. The modern methods of diagnosing DDoS-attacks are investigated. Positive and negative aspects of these methods were identified.
Service infrastructures operated by different operators with own policies are being federated to agglomerate various services. To join a federation, an operator must comply with a federation agreement. As a result, it takes time for the operator to check the consistency between own policies and the agreement, and to establish a network connection to federation's infrastructure. To ease these concerns,...
The accurate measurement of a server's power consumption when running realistic workloads enables characterization of its energy efficiency and helps to make better provisioning and workload placement decisions. Information on the energy efficiency of a server for a given target workload can greatly influence such decisions and thus the final energy efficiency of a cluster or data center. However,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.