The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Determining complexity of software is always a prime concern for the software developers. Higher the complexity, difficult to maintain the software. If software undergoes maintenance again and again, it gradually decreases the quality of software and cost of maintenance increases. One import concept of software engineering that improves the quality of software and makes the software more maintainable...
Can we optimally attack networks (in terms of disrupting the ability of the nodes in the network from communicating) when the network topology is unknown? In this paper, we show that it is not always possible to do so when the network topology is unknown a priori. Specifically, we develop multi armed bandit-based techniques that enable the attacker to learn the best network attack strategies and also...
Adopting the concept of simultaneous wireless information and power transfer (SWIPT), applied over an integrated architecture of receiver, we propose a solution for an improved information decoder. Our research concludes to an enhanced performance with dual objective of pursuing a lower symbol error rate, while at the same time achieving the highest energy harvested in the battery. Information is...
Telecommunication networks have been designed and deployed with over-provisioning and redundancy of resources to cope with traffic load during peak hours and quickly recover from failure. However, most of these resources are underutilized and in most of the time idle but consuming full energy. With the growing concern of energy waste and greenhouse gases (GHG), the network design principles tend to...
Managing variability is a hard task for every technique that develops variability-rich systems, such as software product lines (SPL), especially in its evolution. Hence, to be effective a technique should provide stability and respect the Open-Closed principle. Among the techniques to develop SPLs, delta-oriented programming (DOP) seems to be promising given its flexibility. There are two strategies...
This paper presents a low-complexity approach for calculating soft decision metrics of polar coded quadrature amplitude modulation (QAM) system. A simple and general bit log likelihood ratio (LLR) expression is provided for Gray coded QAM signals. The characteristics of Gray code mapping such as symmetries and repeated formats of the bit assignment in a symbol among bit groups, are exploited effectively...
This paper provides a mathematical method for airspace capacity estimation. It is motivated by the need to assess the impact of unmanned aircraft systems on low altitude airspace operations. We define capacity as a minimum of metric-specific phase transition thresholds. The definition is flexible to accommodate a wide variety of metrics defined for the airspace and hence, can be used to compare different...
The problem of deriving lower and upper bounds for the edit distance between labelled undirected graphs has recently received increasing attention. However, only one algorithm has been proposed that allegedly computes not only an upper but also a lower bound for non-uniform metric edit costs and incorporates information about both node and edge labels. In this paper, we show that this algorithm is...
Systems of systems are characterized by their dynamic behavior, exhibiting evolving emerging capabilities as new members join the family. Yet, little has been said on the possibility of some members leaving the system of systems, with the impact that it might have on the emerging capabilities experienced by some members of the family. At the same time, growing attention is given to the need for establishing...
Similarity search is an essential operation in many applications. Given a collection of set records and a query, the exact set similarity search aims at finding all the records that are similar to the query from the collection. Existing methods adopt a filter-and-verify framework, which make use of inverted indexes. However, as the complexity of verification is rather low for setbased similarity metrics,...
Tracking long-term progress in engineering and applied science allows us to take stock of things we have achieved, appreciate the factors that led to them, and set realistic goals for where we want to go. We formulate seven hypotheses associated with the long term evolution of C programming in the Unix operating system, and examine them by extracting, aggregating, and synthesising metrics from 66...
Recently, Technical Debt (TD) has gained popularity in the Software Engineering community to describe design decisions that allow software development teams to achieve short term benefits such as expedited release of code. Technical debt accrued should be managed to avoid the disastrous consequences of these temporary workarounds. Management of technical debt involve documenting the debt item in the...
Reusing code segments via copying and pasting is quite common practice in the process of software development. The pasted segment may include minor differences from the original segment. As a result of copying and pasting, several code sections may be similar to each other. Such sections are referred to as code clones. This paper presents an approach for detection of these code clones. The reason...
In this paper, we explore the redundancy in convolutional neural network, which scales with the complexity of vision tasks. Considering that many front-end visual systems are interested in only a limited range of visual targets, the removing of task-specified network redundancy can promote a wide range of potential applications. We propose a task-specified knowledge distillation algorithm to derive...
We consider a class of mixed integer programs where the problem is convex except for a vector of discrete variables. Two methods based on the Alternating Direction Method of Multipliers (ADMM) are presented. The first, which has appeared in the recent literature, duplicates the discrete variable, with one copy allowed to vary continuously. This results in a simple projection, or rounding, to determine...
We consider a massive multiuser MIMO downlink scenario with 1-bit digital-to-analog converters. QPSK information symbols are transmitted to the users by a channel-dependent mapping of the symbols to 1-bit DAC signals that are transmitted from each base station (BS) antenna. The mapping is selected to emulate the desired information bearing QPSK symbols at the users. Non-linear precoding is considered,...
The Spartanizer is an eclipse plugin featuring over one hundred and fifty refactoring techniques, all aimed at reducing various size complexity of the code, without changing its design, i.e., inheritance relations, modular structure, etc. Typical use case of the Spartanizer is in an automatic mode: refactoring operations are successively selected and applied by the tool, until the code is reshaped...
Contemporary software development processes involve finding reusable software components from online repositories and integrating them to the source code, both to reduce development time and to ensure that the final software project is of high quality. Although several systems have been designed to automate this procedure by recommending components that cover the desired functionality, the reusability...
The quality characteristics are defined as a key part of business process model. So, it is an important question that arises in the research field. For instance, what are the adapted measures for a given model? How to automatically interpret these measured values? For that reason, this paper presents an overview of the existing metrics and focuses on the structural aspect of business process models...
This paper proposes a novel symbol-to-bit demapping algorithm for Gray-labeled phase shift keying (PSK) constellations. Unlike the Max-Log-MAP demapper, the proposed algorithm does not perform exhaustive search operations, but directly computes the soft information by exploiting the binary search and the symmetry of the Gray-labeled PSK constellations. Hence its complexity is remarkably reduced from...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.