The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Continuous deployment is the software engineering practice of deploying many small incremental software updates into production, leading to a continuous stream of 10s, 100s, or even 1,000s of deployments per day. High-profile Internet firms such as Amazon, Etsy, Facebook, Flickr, Google, and Netflix have embraced continuous deployment. However, the practice has not been covered in textbooks and no...
The electricity demand is increasing with the growth of population and with the use of different appliances in the households. So, there is a need for consumers to track their daily usage and understand the consumption patterns to save and control these resources. Smart meter along with Advanced Metering Infrastructure(AMI) is a pragmatic and efficient solution for this. Earlier procedure which put...
Based on the new application demands of distributed monitoring system, the hardware and software equipment of one or more monitoring position was abstracted as a distributed agent; central server was canceled, the system level management functions were shared by one or more agent flexibly. Agents used point-to-point communication; the interaction driver which was based on the state of agent was realized...
In this paper, we introduce a road surface conditionunderstanding and sharing system. Traffic accidents and obstructionsdue to bad weather conditions and poor road conditions areserious social problems. It is necessary for drivers to understandweather and road conditions in advance to avoid traffic accidentsand obstructions and it is necessary to alert drivers to weatherand road conditions in order...
With the rapid development of web, mobile apps and IoT devices, a huge volume of data are created every day. In fact, these data are not only large, but also generated quickly and with a variety of different formats. Many companies are forced to face the problem of processing these large data in near real-time. Within different application domains, some data are required to be processed in real-time,...
The use of Internet of Things (IoT) devices has grown significantly in the past decade. While IoT is expected to improve life for many by enabling smart living spaces, the number of security risks that consumers and businesses will face is also increasing. A high number of vulnerable IoT devices are prone to attacks and easy exploit. Existing research has focused on security that must be implemented...
New web development technologies enhance functionality of web applications but also introduce challenges in testing the software. As mutation analysis has been shown to be effective at designing tests for traditional software, we previously proposed web mutation testing. However, applying mutation analysis can be computationally expensive due to an extensive number of test requirements. This paper...
Programmable Virtual Networks (PVNs) make the network more flexible and allow the fast introduction of new services. However, several shortcomings hamper their wider adoption, including: (i) the extensive knowledge required to configure and manage the NetApps, (ii) the lack of descriptors to detail all nuances of the NetApps, and (iii) there is no solution that enables to distribute and configure...
Empirical studies have shown that most software interaction faults involve one or two variables interacting, with progressively fewer triggered by three to six variables interacting. This paper introduces a model for the origin of this distribution. We start with two empirically reasonable assumptions regarding the distribution of branch conditions in code and the proportion of t-way combinations...
Sensitive data of the user present in the storage server has to be highly available, secured and also accessible from anywhere as per the user requirements. This paper provides a preventive maintenance approach, so that even if the main storage server containing the sensitive data of the user fails, that data can be retrieved by the user. This is achieved by copying the data blocks to both main storage...
This presents a research work which is carried out to optimize the Zigbee based remote meter reading network. There are various technologies available to automate the meter reading. As far as utility providers are concerned, their focus is on a reliable Remote Meter Reading (RMR) system to read the meter at minimum possible cost. The development of a reliable RMR system is highly dependent on telecommunication...
In this paper, we designed software which is short for "Looking for partners". It is a kind of social media software. The majority users of the software are the college students. The novelty of this software lays in the personal interests-based friends match patterns when a user wants to add friends. The software also could support both online and offline communications with achieving the...
Failure prevention and protection are very critical issues nowadays. Although there are many commercial high availability (HA) solutions, they are expensive and do not support intelligent platform management interface (IPMI) that can improves failure detection efficiency. We present NCU-HA, a HA solution based on the open source project KVM(Kernel-based Virtual Machine). NCU-HA can be run on both...
In this paper, we present a collection of Modern Code Review data for five open source projects. The data showcases mined data from both an integrated peer review system and source code repositories. We present an easy–to–use andricher data structure to retrieve the 1.) People 2.) Process and 3.) Product aspects of the peer review. This paperpresents the extraction methodology, the dataset structure,...
Exception handling is a powerful tool provided by many pro- gramming languages to help developers deal with unforeseen conditions. Java is one of the few programming languages to enforce an additional compilation check on certain sub- classes of the Exception class through checked exceptions. As part of this study, empirical data was extracted from soft- ware projects developed in Java. The intent...
Exception handling is a technique that addresses exceptional conditions in applications, allowing the normal flow of execution to continue in the event of an exception and/or to report on such events. Although exception handling techniques, features and bad coding practices have been discussed both in developer communities and in the literature, there is a marked lack of empirical evidence on how...
The availability of open source software projects has created an enormous opportunity for software engineering research. However, this availability requires that researchers judiciously select an appropriate set of evaluation targets and properly document this rationale. After all, the choice of targets may have a significant effect on evaluation.We developed a tool called RepoGrams to support researchers...
Quality-of-Service attributes such as performance and reliability heavily depend on the run-time conditions under which software is executed (e.g., workload fluctuation and resources availability). Therefore, it is important to design systems able to adapt their setting and behavior due to these run-time variabilities. In this paper we propose a novel approach based on queuing networks as the quantitative...
The need for application-level intelligence cannot be easily satisfied with existing architectures or methodologies that separate methods and tools for application developers and data scientists. We aim, therefore, to develop a framework (an architecture and a methodology) to make it possible to add intelligence capabilities to existing applications (decision-enablement) and to facilitate building...
The ever-increasing number of IoT devices necessitates a secure and scalable infrastructure to store and process generated data. Blockchain is an ideal choice with its decentralized, trustless architecture. However, low-power IoT end-devices do not possess enough horsepower to run a software client for intensive blockchain calculations. The purpose of this paper is to create a proof of concept to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.