The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Decompiling low-level code to a high-level intermediate representation facilitates the development of analyzers, model checkers, etc. which reason about properties of the low-level code (e.g., bytecode, .NET). Interpretive decompilation consists in partially evaluating an interpreter for the low-level language (written in the high-level language) w.r.t. the code to be decompiled. There have been proofs-of-concept...
Faceted and dynamic taxonomies are increasingly used nowadays in a plethora of applications. For developing user interfaces grounded on this interaction paradigm, it is advantageous to have a framework that enables the manipulation of the underlying information structure and provides the basic functionalities required. This paper introduces a formal model that captures faceted materialized taxonomies...
Virtual machines (VMs) facilitate the deployment of applications in heterogeneous environments. Popular VMs such as Sun Microsystempsilas Java VM or Microsoftpsilas common language runtime (CLR) are based on stack-based machines to execute byte code instructions. Implementations of VMs are available for devices like cell phones, personal computers, or chip-cards. It is of obvious economic benefit...
A complex system, an industrialized process that invariably involves multiple factors, such as environmental management, human relationship and equipment may result in hazard event. However, the analytical hierarchy process(AHP), provides a methodology for multi-criteria analysis and decision making, can offer decision making support technique to help people prevent the hazard event from taking place...
Advances in Internet connections speeds and computer hardware means that web content has grown richer and more interactive for users. One such area is Web3D which has seen the emergence of ISO standard technologies such as VRML (Virtual Reality Modeling Language) and its XML-based (eXtensible Markup Language) successor X3D(eXtensible 3D). X3D, in particular, presents opportunities for further integration...
Ontologies are increasingly used in many domains, such as knowledge management, information extraction, the semantic Web and so on. More and more ontologies have been published on the Web, with different scope and quality. Ontology evaluation has been proposed as one strategy for quality assurance of ontologies. In this paper, we propose a democratic ranking system analogous to that used by Amazon...
This paper investigates and simulates a coloured stochastic Petri nets model for depth evaluation intrusion detection. Network attack behaviors are very complexity sometimes, it is difficult to capture all of them. In this paper, we could realize what them happened with analyzing and simulating an intrusion. The experimental results demonstrated that the CSPN model approach was an efficient and helpful...
Inheritance is an important mechanism when developing object-oriented programs with class-based programming languages: it enables subtyping, polymorphism, and code reuse. Inheritance is also known as a difficult feature to grasp and to use correctly because of its many purposes. We propose a model of inheritance to help understand class hierarchies of class-based object-oriented programs. We define...
We propose a benchmark for object-oriented unit testing, called the behavioural response. This is a normative set of state- and equivalence partition-based test cases. Metrics are then defined to measure the adequacy and effectiveness of a test set (with respect to the benchmark) and the efficiency of the testing method (with respect to the time invested). The metrics are applied to expert manual...
In order to access resources within a peer-to-peer network, JXTA completely relies in the usage of advertisements published by the resource owner. This may easily lead to DoS or spoofing attacks from malicious peers by forging advertisements with false identifiers unless advertisement authenticity is provided. Furthermore, in a fully distributed environment, in order to truly isolate a malicious node,...
The efficient file searching is an essential feature in P2P systems. While many current approaches use brute force techniques to search files by meta information (file names, extensions or user-provided tags), the interest is in implementing techniques that allow content-based search in P2P systems. Recently, clustering techniques have been used for searching text documents to increase the efficiency...
This article describes the implementation of a new type of Web hosting service based on J2EE platform and MVC architecture, developed using Apache Struts and Hibernate frameworks.
This paper investigates embedded databases for the MicroBaseJ project. The project aims at the development of an integrated database and a user interface for a typical 3G mobile phone with Java MIDP2 capability. This includes methods for data acquisition, mobile data and information communication, data management, and remote user interface. One of the key objectives is to target a generic solution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.