The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When developing a network management system, the developer is faced with many choices concerning how to interact with the network resources and how to embed into the schema of manager agent architectures. In this paper we propose NMX (Network Management Extensions), a software framework implementation based on Java JMX (Java Management Extensions) technology and SNMP (Simple Network Management Protocol)...
Dataflow testing of programs ensures the execution of data dependencies between locations in the code (1) where variables are assigned values, and (2) where these definitions are used. Such data dependencies are called Def-Use Associations (DUAs). In an aspect-oriented (AO) program, aspects and classes interact in several ways, such as (1) through parameters passed from advised methods in a class...
Windows-WMI technologies used by WMIC command to access and manage resources and to obtain the Windows Server System parameters required ,you can quickly find the value of various controlling parameters at the same time. The results of redirect WMIC saved to the database. This paper presents a technique based on WMIC to collect the data of surveillance server system and to achieve the key monitoring...
Testing Service Oriented Architecture applications is a challenging task due to the high dynamism, the low coupling and the low testability of services. Web services, a popular implementation of services, are usually provided as black box and using testing techniques based on implementation is limited. This paper presents an approach to support the use of the structural testing technique on web service...
Few studies have been carried out with the objective of comparing criteria in different paradigms. This work presents an experimental study comparing the cost of mutation analysis in the Procedural and Guided Objects paradigms. A set of 32 programs implemented in C and Java was used. The tools Proteum and MuClipse were used. The strength of an adequate set of test cases comparing a program in one...
Non-interference is a semantic program property that assigns confidentiality levels to data objects and prevents illicit information flows to occur from high to low security levels. Erasure is a way of strengthening confidentiality by upgrading data confidentiality levels, up to the extreme of demanding the removal of secret data from the system. In this paper, we propose a certification technique...
Many existing sequential components, libraries, and applications will need to be re-engineered for parallelism. This work proposes a dynamic analysis of sequential Java programs that helps a programmer to understand bottlenecks for parallelism. The analysis measures the parallelism available in the program by considering a hypothetical parallel execution in which the code within a method executes...
Irregular scientific applications are difficult to parallelize in an efficient and scalable fashion due to indirect memory references (i.e. A[B[i]]), irregular communication patterns, and load balancing issues. In this paper, we present our experience parallelizing an irregular scientific application written in Java. The application is an N-Body molecular dynamics simulation that is the main component...
Software maintenance tasks, such as testing and program understanding, can benefit from formal specifications that describe how a program should use an API. Recently, there has been increasing interest in specification miners that automatically extract finite state specifications of method ordering constraints from existing software. However, comparing different mining approaches is difficult, because...
Java Enterprise Applications (JEAs) are large systems that integrate multiple technologies and programming languages. With the purpose to support the analysis of JEAs we have developed MooseJEE an extension of the Moose environment capable to model the typical elements of JEAs.
This paper describes the implementation of advice weaving in ÉNFASIS. Énfasis is a domain-specific framework designed to program fine-grained aspects and apply crosscutting on local variables. Applications of fine-grained aspects include data flow analysis, program comprehension, assertions, code coverage, among others. The ÉNFASIS framework uses byte code instrumentation to weave statically pieces...
Java/ASP-based web distance learning systems increase the capacity of traditional learning environment wherein knowledge can be extended, expanded, diffused, and shared; thereby distinct research, teaching and practical case experiences can be retained for sufficing the people's demands for knowledge acquisition. Consequently, taking advantage of web-based teaching materials to increase the effectiveness...
Monitoring plays a significant role in improving the quality of service in cloud computing. It helps clouds to scale resource utilization adaptively, to identify defects in services for service developers, and to discover usage patterns of numerous end users. However, due to the heterogeneity of components in clouds and the complexity arising from the wealth of runtime information, monitoring in clouds...
Nowadays, mobile phones are widespread. However, the development, distribution and installation of software on these end devices is a complex problem due to the very heterogeneous landscape of mobile end devices (especially with regard to software platforms, operational concepts and functionality), and the wide range of technical expertise on the side of the end user. Up to now, there are no empirical...
The paper aims at studying how to design and develop a virtual experiment platform, and solving the difficulties of the course experiment project for Computer Network. By creating actual 3D scene and instruments, abundant human-machine interaction, humanistic experiment tips and intellective inquiring strategies, make the students have a feeling of reality, meanwhile, they can explore freely in the...
Service-Oriented Architecture offers a technical foundation for Enterprise Application Integration and business collaboration through service-based business components. With increasing process outsourcing and cloud computing, enterprises need process-level integration and collaboration (process-oriented) to quickly launch new business processes for new customers and products. However, business processes...
The integration of Learning Management Systems and specific learning support applications known as Web Labs (remote and virtual laboratories) are the target of a new wave of service-oriented applications devoted to improving on-line learning experiences. Nowadays these solution works in a separet way therefore the students teachers, administration must log in different systems, the are not reusing...
SQL: 1999 introduced the capability to support object concepts. It is now possible to design an SQL database schema using relational and object models. Each model represents a different abstraction. We use a framework to understand the implications of this change and to explore the use of mixed abstractions in an SQL: 1999 schema. We describe two new kinds of schema. We find that current object-relational...
Recovering design pattern instances in a software system can help maintainers to understand its design and implementation. In this paper we present a fully automated design pattern recovery approach that analyzes the behavior of pattern instances both statically and dynamically. In particular, the proposed approach exploits model checking to statically verify the behavioral aspects of design pattern...
Recently the Cassini CAPS team investigated the number of different software tools, programming languages, programs, and major technologies used in building and running its ground system. A total of twenty six different tools, programs, and major technologies were used in the downlink portion of the ground system and five different tools, programs, and major technologies are used for the uplink portion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.