The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This demo showcases some of the capabilities foreseen for the security infrastructure designed by the H2020 SHIELD project. SHIELD exploits NFV for adaptive monitoring of an IT infrastructure and for feeding the data to an analytics engine to detect attacks in real time. An intelligent reaction system is then activated to reconfigure the SDN/NFV infrastructure so that the attacks are thwarted. The...
The emerging trend of network devices with configurable data planes is pushing software switches as convenient playgrounds for experimenting novel programming paradigms and abstractions. OfSoftSwitch is a popular tool for carrying on such experimentation, as it provides a straightforward implementation of a pipeline of match-action tables. Unfortunately, OfSoftSwitch is not performance oriented and...
Apply Integrated Logistics Support (ILS) to weapon equipment can efficiently improve equipment's automation and digital level. ILS needs support of various integrated support systems, which have demands for data editing. Nowadays, most of data editing software used in these systems are customized and provide a form-based editing approach, which becomes an obstacle to carry out ILS. This paper brings...
Data is the new natural resource of this century. As data volumes grow and applications aimed at monetizing the data continue to evolve, data processing platforms are expected to meet new scale, performance, reliability and data retention requirements. At the same time, storage hardware continues to improve in performance and price-performance. In this paper, we present TOKVS - Trillion Operation...
In this paper, a reconfigurable component based on the new platform is designed for the intercommunication between different communication devices and the difficulty of software and hardware upgrade with the purpose of improving the portability and sharing of components. According to the development process of reconfigurable components and the key technology of reconfigurable components in GNU Radio...
Accelerating relational databases in general and SQL in particular has become an important topic given thechallenges arising from large data collections and increasinglycomplex workloads. Most existing work, however, has beenfocused on either accelerating a single operator (e.g., a join) orin data reduction along the data path (e.g., from disk to CPU). In this paper we focus instead on the system...
This paper presents a novel cognitive management architecture developed within the H2020 CogNet project to manage 5G networks. We also present the instantiation of this architecture for two Operator use cases, namely ‘SLA enforcement’ and ‘Mobile Quality Predictor’. The SLA enforcement use case tackles the SLA management with machine learning techniques, precisely, LSTM (Long Short Term Memory). The...
Computer games are rich, complex, and often large-scale software applications. They're a significant, interesting, and often compelling domain for innovative research in software engineering techniques and technologies. Computer games are progressively changing the everyday world in many positive ways. Game developers, whether focusing on entertainment market opportunities or game-based applications...
Dynamic symbolic execution is an important automated testing technique. Firstly, we introduce the traditional symbolic execution and dynamic symbolic execution technology, and then review the research status of Python application testing with dynamic symbolic execution technology. Then we compare and analyze the dynamic symbolic execution tools with the existing Python programs and Architectures,...
The paper proposes an approach to instruction stream generation for verification of microprocessor designs. The approach is based on using formal specifications of the instruction set architecture as a source of knowledge about the design under verification. This knowledge is processed with generic engines implementing an extensible set of generation strategies to produce stimuli in the form of instruction...
Software-Defined Security (SDS), which provides a flexible and centralized security solution by abstracting the security mechanisms from the hardware layer into a software layer, attracts many researchers to study the detail of this conception. One of the key challenges of SDS is how to schedule and orchestrate security appliances according to huge and heterogeneous threat information, especially...
This paper aims to describe the software architecture used for the development of Cultiventura, tool that provides technology resources to support the formation of cultural identity in the teaching-learning process through technology of videogame and augmented reality for students of fourth, fifth and sixth elementary school. The design method of architecture in the context of an agile software development...
This article studies the extent and practicality of plagiarism detection systems using multiple classifications of detection engines, further described within the article. An in-depth analysis of 8 individual articles from different fields of work was carried out allowing comparisons both between detection systems and different writing styles/formats. The first analysis used unmodified versions of...
In these last few years we are witnessing a change in the way video games are implemented. Starting from an early age, where a single developer was sometimes in charge of the whole creative process, we have moved now toward extremely large groups with a multi-layered organisation. This increasing complexity of team organisation, together with a tremendous growth of projects size, calls for the adoptions...
Graph cuts are very popular methods for combinatorial optimization mainly utilized, while also being the most computational intensive part, in several vision schemes such as image segmentation and stereo correspondence; their advantage is that they are very efficient as they provide guarantees about the optimality of the reported solution. Moreover, when those vision schemes are executed in mobile...
DevOps presents a significant broader perspective in delivering software solutions. The perception of DevOps being a mere tool has been formulated into a change in culture, paradigms in automation, clarity in measuring risks and facilitating ease of sharing. DevOps has been responsible for companies to move from a monolithic pace of software releases to an agile mindset. This paper discovers the significance...
For a small gas turbine engine test cell newly developed and built at the University of Defence in Brno a system for automated measurement and engine test control was designed. The system is based on National Instruments Compact RIO hardware and LabVIEW software and is implementing supervisory control and data acquisition (SCADA) architecture. This paper describes the requirements that drove the decision...
Currently multiple Domain Specific Languages (DSLs) are used for model-driven software development, in some specific domains. Software development methods, such as agile development, are test-centered, and their application in model-based frameworks requires model support for test development. We introduce a specific language to define generic test models, which can be automatically transformed into...
Modern SoC designs incorporate several security policies to protect sensitive assets from unauthorized access. The policies affect multiple design blocks, and may involve subtle interactions between hardware, firmware, and software. This makes it difficult for SoC designers to implement these policies, and system validators to ensure adherence. Associated problems include complexity in upgrading these...
The use of Network Function Virtualization to run network services in software enables Software Defined Networks to create a largely software-based network. We envision a dynamic and flexible network that can support a smarter data plane than just simple switches that forward packets. This network architecture needs to support complex stateful routing of flows where processing by network functions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.