The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this article, we propose a novel state-based fault-localization approach. Given an observed failure that is reproducible under the same program input, this new approach uses two main techniques to reduce the state exploration cost. Firstly, the execution trace to be analyzed for the observed failure is successively narrowed by making the set of trace points in each step a cut of the dynamic dependence...
Preserving important troubleshooting experience gained in industrial practice, often referred to as “tribal knowledge”, and making it readily available to be re-applied in similar situations represent a serious challenge for many companies in heavy industry. The solution is very often tied to building mental models to capture and express key latent cognitive variables. In this paper, we first attempt...
Computer system designers need a deep understanding of end users’ workload in order to arrive at an optimum design. Unfortunately, many end users will not share their software to designers due to the proprietary or confidential nature of their software. Researchers have proposed workload cloning, which is a process of extracting statistics that summarize the behavior of users’ workloads through profiling,...
This paper proposed an automatic detection and automatic configuration method of 1553B RT device based on SoC chip. This method made SoC as information dealing unit of each terminal on 1553 bus. Electronic data form was added on the RT device, and a multi-task management procedure was run on the BC device. When a RT device was plugged in or pulled out the 1553 bus, the operation was detected and the...
To solve the problem of vision diminishing and lumbar cervical vertebra disease caused by using computers, we design an intelligent fatigue health monitoring system based on computer with mouse and its software. By designing the algorithm and making relevant research, the system can make daily health evaluation and fatigue prompt to computer users. We adopt the embedded design method to enable the...
As a space-efficient approach to data archive and backup, data deduplication is becoming increasingly popular in storage systems. However, as the data growing rapidly in data centers, single-node storage node is no longer be able to provide the corresponding throughput and capacities as expected. Building deduplication clusters is considered as a promising strategy to leverage such bottle-neck on...
Education quality assessment of primary and secondary school teachers is an important part of teacher education. In this paper, a fuzzy comprehensive assessment model for the education quality of primary and secondary school teachers, which combines the experience of experts with quantitative analysis, is proposed. It reduces the influence of human arbitrariness on the assessment, and then enhances...
Set reconciliation between nodes without prior context is an interesting problem that has numerous applications. Finding the set difference between two sets forms the basis of set reconciliation and de-duplication problems. As the number of devices spread across diverse networks required to be kept in sync is increasing, the cost of communication is increasingly proportionately. In this paper, I propose...
Software industry as a soul and core of the information industry plays a vital role in the development of the world economy. China's present judicial situation of protection of intellectual property rights to software did not achieve the desired effect and piracy of software is prevalent. New Regulations on Computer Software Protection has narrowed the scope of fair use of original “Regulations” to...
Automation of generating test data is an adequate solution for testing software. Moreover, solving constraints is one of the most important parts of this process. Each constraint is a condition along which there is a vector with different variables' values involves in condition to satisfy the constraint. Despite the fact that previous methods have investigated the solver vectors by decreasing the...
In On-Line Analytical Processing applications, we can shorten the query response time and increase the efficiency of online analytical processing by the implementation of the memory data cube or other methods. According to the specific characteristics of NAND flash memory, combined with condensed data cube tuple storage characteristics and the three level storage structure of "Disk-Memory-NAND...
In this paper, one multifunctional handheld barcode system is designed based on MEGA128L, barcode scanner, SD card, micro-printer, keyboard and LCD. This system can scan barcode and compare this barcode with the data stored in SD card, it can also restore or print data and barcode according to instructions. This system can be used in the area of printing price tag, stock management and checking management...
Lots of uncertainties exist during risk evaluation. This paper takes advantage of the evidence theory during processing uncertainties to solve the problems in risk evaluation. By modeling the hierarchy index system of the risk objective, calculating the value of evaluation indicators and fusing the uncertain information, this paper illuminates the common steps showing how to use the evidence theory...
The paper proposes a dancing robot based on the beat tracking method. The robot can carry out different actions when receiving different musical signal input. The dancing poses are vivid and lifesome, and development of the robot is helpful to enhance intelligence of the traditional creational robot, which exerts a striking influences on the conventional toy market. In the paper, the design of the...
People's perception and attitude towards computer ethics and information security significantly affect the way they use information technology. This is especially the case among university students who are generally regarded as major violators of computer ethics and computer security. This paper follows previous work on computer security and ethics. The paper intend to examine the level of ethical...
Defragmentation as a technique is deployed in all the operating system to enhance system speed, search and memory operations. The proposed approach presents a customizable heuristic mechanism which makes the defragmentation processes a continuous process rather than be user driven. Various factors like folder behavior, frequency and magnitude of modification, user specific trends for disk utilization...
Refactoring is to make easier to read the code structure and upgrade maintenance without changing function of the system. Crosscutting refactoring defines an aspect as a specific part of the program and use materialized aspect specification. The purpose of this paper is to suggest a materialized approach for applying crosscutting concern to Object-oriented refactoring. First of all, duplicated code...
The stability of power network has an important significance along with the rapid growth of demand and supply of electric power. The traditional maintenance system has defects in insufficient maintenance, excess maintenance, and high maintenance cost. In this paper, to solve the problems, the evaluation method of equipment condition-based maintenance in the electric power supply enterprise was presented,...
Points out the obvious deficiencies in capture/playback mechanism at present, aiming at difficulties of maintenance and extension in constantly altered GUI elements, presents a new GUI automation testing solution - Building AUILibrary. It can search, identify all the controls, trigger all kinds of mouse and keyboard events, execute data driving verification roundly and accurately, trace and record...
The existence and orientation of risks in a software development life cycle is a fundamental truth despite the effort that we incur in eliminating them. Having known that, risks can be reduced but can't be eliminated completely; gives strength yields the thinking to focus on the avoidance and mitigation in software development. The mitigation and avoidance both: require the risk factors to be identified...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.