The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a world of the global communications, with continuous expansion to new horizons, which requires anytime and anywhere access to information sources, the need to manage the communication requirements is a very important issue. Traditional IP networks are facing difficulties in ensuring, to a user, a specific bandwidth[1] level for network access. Related to this matter, in this article we are proposing...
Program dependency artifacts such as call graphs help support a number of software engineering tasks such as software mining, program understanding, debugging, feature location, software maintenance and evolution. Java Enterprise Edition (JEE) applications represent a significant part of the recent legacy applications, and we are interested in modernizing them. This modernization involves, among other...
Dynamic software updating (DSU) can upgrade arunning program on-the-fly by directly replacing the in-memorycode and reusing existing runtime state (e.g., heap objects) forthe updated execution. Additionally, it is usually necessary totransform the runtime state into a proper new state to avoidinconsistencies that arise during runtime states reuse amongdifferent versions of a program. However, such...
Exception handling is a powerful tool provided by many pro- gramming languages to help developers deal with unforeseen conditions. Java is one of the few programming languages to enforce an additional compilation check on certain sub- classes of the Exception class through checked exceptions. As part of this study, empirical data was extracted from soft- ware projects developed in Java. The intent...
Exception handling is a technique that addresses exceptional conditions in applications, allowing the normal flow of execution to continue in the event of an exception and/or to report on such events. Although exception handling techniques, features and bad coding practices have been discussed both in developer communities and in the literature, there is a marked lack of empirical evidence on how...
This demonstration is a proof of concept for the design of secure IoT frameworks using Secure Elements as trusted TLS/DTLS stack. It presents a connected plug built over a cheap Raspberry Pi board, whose data exchanges over TCP/IP are controlled by a javacard providing TLS server services. In a smart grid context it could be used by energy operators in order to authorize/monitor battery charging.
Java applications form an important class of applications running in the data center and in the cloud. They may perform better when more memory can be used in the heap, as the time spent in garbage collections is reduced. However, when ample CPU is available and memory is tight, such Java applications may do well with a smaller heap as it can absorb the cost of more garbage collections. In the cloud,...
Component-based programming is predicted to become mainstream practice in software engineering in the next few years. Students need to get familiar with modern programming approaches such as this one, but including the topic into curricula is not a simple task. This paper presents our approach to teaching component-based programming. The goal of Component-Based Programming course was to practically...
In this paper, it is presented the Arduino Uno single board microcontroller based system, which measures air condition parameters, and also the developed software for graphical visualization of the measurement results. The results and working principles of some type of Arduino boards are analyzed. The developed software for Arduino data parameter visualization is described. An experimental prototype...
MYSQL is a relational database administrator. So, it is used to store data in a persistent way. It allows the creation of stored procedures on which they are a set of SQL instructions, plus a series of control structures that facilitate automated control actions that often take place in it. They are saved on the server, where they wait to be called to execute. In this context it has created a partial...
This paper describes the architectural design both for software and hardware that led to the construction of an innovative project that bridges smartphone capabilities with augmented reality remote controlled (RC) cars, called Augmented-Car. The Augmented Car uses a smartphone Android application to make it controllable through on-line software services. The resulting platform is operated by a software...
The Siyakhula Living Lab in the rural Eastern Cape province of South Africa has been in existence for over a decade now. In this time, several software artefacts have been developed by students and partners with the aim of providing contextually-relevant services to the rural community. However, reliance on different platforms and paradigms has meant that the deployment of such services would be difficult...
While modern web development technologies enhancethe capabilities of web applications, they introduce challengesfor testers. This paper introduces, evaluates, and refinesweb mutation operators that target interaction faults in web applications. An experimental study is conducted on 11 subject webapplications using 15 web mutation operators. The effectivenessof 12 independently developed test sets...
This paper presents a first step into theconstruction of an innovative web-based eLearning platformfeaturing Learning Analytics and Gamification called ICTFLAG. The main goal and key decision at this initial stage of theplatform development is the search and selection processes of themost suitable software development framework to guide andsupport the effective construction of the platform. Despite...
This paper discusses design and implementation of an operational architecture of practical work remote controlled using embedded systems. This architecture relates to university courses in electronics, such as new approaches of low-cost remote labs. Students can access these labs from a local network in the university at any time and frequently compared to conventional teaching, without being fixed...
Most common approach to detect security vulnerabilities is to scan code using vulnerability scanning software. This is either static analysis or dynamic analysis. Both approaches, when performed independently, have their own pros and cons. In order to protect software from attackers, vulnerabilities should be removed as early as possible. Detection of vulnerabilities in an application before its deployment...
Feature location is a critical step in the software maintenance process where a developer identifies the software artifacts that need to be changed in order to fulfill a new feature request. Much progress has been made in understanding the feature location process and in creating new tools to help a developer in performing this task. However, there is still lack of support for locating architectural...
Debugging sessions require a methodical process of finding causes and reducing the number of software problems. During such sessions, developers run a software project, traversing method invocations, setting breakpoints, stopping or restarting executions. In these sessions, developers explore different parts of the code and create knowledge about them. When debugging sessions are over, it is likely...
This paper presents a web based system for remote monitoring and control of set-top boxes. The goal of the proposed system is to provide flexible control over set-top box from remote location, in order to enable test engineers, test technicians and developers to remotely access set-top box and execute different tests on it. By using the proposed system it is possible to save resources and shorten...
Hot deployment is a typical feature in mainstream application servers. But current application servers treat each module as a standalone application and may fail if a module with dependencies against other ones is partially updated with hot deploying. The reason lies in that those module dependencies are not respected in current application servers. Direct countermeasures that manage dependencies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.