The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the past, researchers have developed specialized programs to aid programmers in detecting concurrent programming errors such as deadlocks, livelocks, starvation, and data races. In this work, we propose a language extension to the aspect-oriented programming language AspectJ, in the form of three new pointcuts, lock(), unlock(), and maybeShared(). These pointcuts allow programmers to monitor program...
The runtime detection of failure and recovery from failure is a major challenge facing e-business and e-commerce applications. Different types of failure are well understood through the failure model, but the detection and differentiation between these failures still proves difficult at runtime. Even when failures are detected, recovery may be hindered as certain failures may mask the root cause failure...
Discuss of design of the e-business interactive platform used on virtual reality technology was done, and the difficulties in the process were investigated, which was followed by corresponding solutions. It results to following conclusion: a) The problem of motion picture flicker can be commendably solved by using double buffer memory of technology with Java. b) In allusion to exceptional situation...
A Class is not only a template of objects with the same data structure, but also it could be deployed as component and web service in J2EE and .Net platforms. Therefor, Class testing is the key to ensure the quality of a distributed application. Genetic algorithm(GA) has been used to generate test data for class testing. But it has some defects, for example, some individuals would be generated and...
Since Java web applications are used widely in Internet today, the security of it becomes an outstanding problem. The attacks, including SQL injection attack, XSS attack, and etc, are great challenges for the Java application. This paper presents the vulnerability analysis framework to detect the security hole in the Java web applications. The framework combines the techniques of the static points-to...
A new approach to attack on obfuscated code is proposed using the join-point model and the bytecode instrument mechanism provided by AOP. All operations are implemented on bytecode level without acquiring the source code of target program, which makes obfuscation useless. As for attackers, they can modify the behavior of target code without decompiling and recompiling it. As experiment is shown, this...
In this paper, we propose a framework with perfect function for the web-based microcomputer interface virtual lab using the 3D simulation technology. This system was developed by using Java, Java3D and 3DMAX, which could make the system independent of operating system, realistic in experiment effect and easy to use. In particular, we focus on the implementation of human-computer interaction based...
The use of on-line experiments has been offering new resources and opportunities for laboratory training activities, especially in many engineering areas. In the Instrumentation for Measurement Laboratory (LIM), at the Faculty of Engineering of the University of Porto (FEUP), different experiments were developed in the field of measurements mainly based in software and hardware from National Instruments...
Developers often change software in ways that cause tests to fail. When this occurs, developers must determine whether failures are caused by errors in the code under test or in the test code itself. In the latter case, developers must repair failing tests or remove them from the test suite. Repairing tests is time consuming but beneficial, since removing tests reduces a test suite's ability to detect...
Web services are an emerging Service-Oriented Architecture technology to integrate applications using open standards based on XML. Software Engineering tools integration is a promising area since companies adopt different software processes and need different tools on each activity. Software engineers could take advantage of software engineering tools available as web services and create their own...
The Adobe Flash platform has become the de facto standard for developing and deploying media rich Web applications and games. The relative ease-of-development and cross-platform architecture of Flash enables designers to rapidly prototype graphically rich interactive applications, but comprehensive support for audio and signal processing has been lacking. ActionScript, the primary development language...
Recently search based software engineering (SBSE) has evolved as a major research field in the software engineering community. SBSE has been applied successfully to many software engineering activities ranging from requirement engineering to software maintenance and quality assessment. One area where SBSE has seen much application is test data generation. Search based test data generation techniques...
Today's traffic management systems require interoperability of control units from different vendors on manifold communication infrastructures. The management of these control units is getting a complex task as different vendors supply proprietary management instrumentations (e. g. for uploading new firmware, update of contents, configuration, diagnostics and troubleshooting). A standardized data model...
This paper proposes a new automatic approach for the detection of SQL Injection and XPath Injection vulnerabilities, two of the most common and most critical types of vulnerabilities in Web services. Although there are tools that allow testing Web applications against security vulnerabilities, previous research shows that the effectiveness of those tools in Web services environments is very poor....
Developing and maintaining tools for profiling, debugging, testing, and reverse engineering can be difficult when using low-level techniques, such as bytecode instrumentation. We promote tool development in Java using high-level aspect-oriented programming. We demonstrate that the use of aspects yields concise tools that are easy to develop, extend, and maintain, because low-level instrumentation...
Data structures is a core course in almost all computer science programs. Textbooks and courses on data structures these days are programming-languages-based with those based on object-oriented programming (OOP) in dominance. In many cases, they base their pedagogy on software design patterns. However, because of heavy reliance on abstraction, they place greater demands on learners. In this study,...
The popularity of the Enterprise Service Bus (ESB) pattern as a foundation of Service Oriented Architectures (SOA) for enterprise environments is increasing. Java business integration (JSR-208) is an attempt at Java-centric standardization of the ESB pattern. JSR-208 lacks a complete monitoring facility, which nowadays is crucial for management of complex enterprise environments and for establishing...
Escape analysis can determine whether and when a variable becomes shared for multiple threads, which is a foundation for many other program analyses. Most existing escape analysis tools are either purely dynamic or static analysis. Static analysis usually considers all possible behaviors of a program, however, may produce false positives; whereas dynamic approaches can not analyze unobserved behaviors...
Tracing is an important technique for program comprehension and software maintenance. Existing trace tools have some limitations, such as requiring instrumentation. This paper presents a tracer, MuTT, which can be used to collect the run-time information of multi-threaded Java programs without source code or JVM instrumentation. We also propose guidelines to use MuTT for feature location in object-oriented...
Complex applications today involve multiple processes, multiple threads of control, distributed processing, thread pools, event handling, messages. The behaviors and misbehaviors of these nondeterministic, message-based systems are difficult to capture and understand. The typical approach is to trace the behavior of the systems and track how the different incoming messages are processed throughout...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.