The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
DstriSimJ is framework, written in Java, which allows the user to build modular simulators and to deploy them on multiple machines in order to take advantage of their cumulated computation power. The framework is focused mainly on the functional part of the simulation and it offers only a limited support for building graphical user interfaces which have no impact on the simulation itself. While this...
In this paper, we introduce a new Eclipse-based IDE for teaching Java following the object-later approach. In particular, this IDE allows the programmer to write code in Java-, a smaller version of the Java language that does not include object-oriented features. For the implementation of this language we used Xtext, an Eclipse framework for implementing Domain Specific Languages; besides the compiler...
In this paper it is presented a Java software application, used for the vocabulary learning of a foreign language. It has a simple design, according to the KISS principle. The application is developed using Java language and its main difference comparing with other vocabulary learning software consists in the accent put on the repetition of unknown words. The examples are shown for the English language,...
Nowadays high energy physics scientists build and design systems that are complex in terms of the huge amount of subsystems and individual components. A single subsystem may consist of a few tens of thousands digital and analogue channels and sensors. As a result, the data rates captured in modern systems may result in gigabytes per second. Complex systems could generate various alarms and provide...
This paper describes one solution of Eclipse Plugin used for embedded platform memory map visualization and editing. The solution solves the problem of inefficient representation of used memory in firmware applications during debugging session. This plugin obtains information from memory map, a file generated after process of application building, and graphically displays it in a clear manner where...
This paper describes a steganography technique in which text is concealed in an image. The lower nibble of each image byte is modified so as to contain each nibble of the input text. The steganography algorithm used in this implementation maximises on data capacity and also ensures security. The Java programming language is used for its comprehensive libraries and ease of use. A simple GUI has been...
The control plane is an essential part of the SDN architecture, so it is very important to give proper attention to any proposal or design of an SDN controller. During the past few years, several controllers have been developed and several studies have been done to evaluate, compare and test the performance of these controllers. In this paper, new controllers are tested, such as ONOS and Libfluid-based...
The Integrated Development Environment (IDE) based development tools like .NET framework, Windows Builder, Net beans are popular for easier and comparably faster project development which is also need of an hour. These tools have capabilities of Drag and Drop (DND) with tool box with controls which help developer to design Graphical User Interface (GUI) just with mouse click. But, none of these tools...
The classical, popular Hungarian algorithm for solving the “optimum assignment” problems (with its broad engineering/science applications) has been well-documented in the literature. Other (more efficient) variations of the Hungarian algorithm have also been extensively studied by the research communities. In this paper, the basic Hungarian algorithm is revisited, with the ultimate goal of developing...
Cerebral palsy (CP) is a permanent motor disorder that appears in early age and it requires multiple tests to assess the physical and mental capabilities of the patients. Current medical record data collection systems, e.g., EPIC, employed for CP are very general, difficult to navigate, and prone to errors. The data cannot easily be extracted which limits data analysis on this rich source of information...
It has been argued that systems that are comprised of similar components (i.e., a monoculture) are more prone to attacks than a system that exhibits diversity. But it is not currently clear how much diversity is needed and how to leverage the underlying diversity in the design space. In this paper, we present a game theoretic model to analyze strategic attack-defense scenarios as well as present our...
Context: Developers possess mental models containing information far beyond what is explicitly captured in the source code. Objectives: We investigate the possibility to use source code annotations to capture parts of the developers' mental models and later reuse them by other programmers during program comprehension and maintenance. Method: We performed two studies and a controlled experiment. Results:...
Android malware authors use sophisticated techniques to hide the malicious intent of their applications. They use cryptography or obfuscation techniques to avoid detection during static analysis. They can also avoid detection during a dynamic analysis. Frequently, the malicious execution is postponed as long as the malware is not convinced that it is running in a real smartphone of a real user. However,...
The present paper introduces the initial implementation of a software exploration tool targeting graphical user interface (GUI) driven applications. GUITracer facilitates the comprehension of GUI-driven applications by starting from their most conspicuous artefact - the user interface itself. The current implementation of the tool can be used with any Java-based target application that employs one...
The DTV market is growing and the DTV services offer wide variety of features to the end-users. Features as appealing applications and internet service, are commonly presented through the main application, in addition to the DTV functionality. This paper presents Android framework for web based digital TV applications. The framework provides sets of functions for accessing DTV functionality from JavaScript/HTML...
The devices profile for Web services (DPWS) standard enables the use of Web services for resource-constrained devices, main components of the Internet of Things (IoT). DPWS can power the next generation of IoT applications by connecting millions of networked devices and services on the Web. This paper presents a simulator, called DPWSim, to support the use of this technology. DPWSim featuring secure...
System testing and invariant detection is usually conducted from the user interface perspective when the goal is to evaluate the behavior of an application as a whole. A large number of tools and techniques have been developed to generate and automate this process, many of which have been evaluated in the literature or internally within companies. Typical metrics for determining effectiveness of these...
Many software applications have been developed in recent years, to exploit the convergence between voice and data networks and the availability to the final user of high speed and low cost connections. These software applications operate in real-time communication scenarios and, at least in principle, should ensure portability and platform independence. In this paper a software IP telephony application...
Code search techniques are well-known as one of the techniques that helps code reuse. If developers input queries that represent functionality that they want, the techniques suggest code fragments that are related to the query. Generally, code search techniques suggest code at the component level of programming language such as class or file. Due to this, developers occasionally need to search necessary...
Cloud computing has become very popular in recent years. Various SaaS, PaaS and IaaS systems for collaborative software development have been proposed. We also have proposed a PaaS system that delivers both a server-side development and server-side execution environment for character user interface applications that can be executed on the server machine and a server-side development and client-side...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.